PhD Course: A Primer on Resilient Control Methodologies for Cyber-Physical Systems

Published March 25, 2024 - 11:49

Recent progress on high-speed networks, wireless communication technologies and the development of novel control strategies for embedded systems gave rise to a boost in the deployment of the cyber-physical systems (CPSs) paradigm within a wide range of applications. The heterogeneous nature of CPS components may give intruders the chance of launching severe attacks. Therefore, control solutions capable of ensuring CPS safety and performance under cyber-attacks are extremely important for security issues.
How to keep system operations at a satisfactory level in the presence of attacks still remains an open challenge. Usually, the assumption is that the intruder is removed from the system architecture once detected. On the other hand, in most of the operating scenarios the plant must operate even if the attack is running: this poses the key question to develop a joint design for the detector and the controller in order to maintain suitable plant performance.
According to these premises, the so-called resilient control problem for constrained cyber-physical systems subject to false data injections is addressed. The core of the proposed course consists in defining an ad-hoc versatile framework whose main feature consists in the ability of being geared to different classes of attacks. This is formally achieved by resorting to the receding horizon philosophy that is fully exploited for detection, countermeasures and control purposes. In particular, set-theoretic model predictive arguments are combined with the perturbation analysis and sequential quadratic programming to reduce as much as possible the occurrence of refresh procedures on the communication network when resilient command actions are no longer available. Further, one of its main merits consists in the dismissal of constructive assumptions existing in recent competitors. In this respect, the framework is then customized for replay and covert attacks by specifying actuation/detection phases and proving feasibility and closed-loop stability properties.

Seminar room - 5th floor, cube 42C

20/05/2024 (10:00-12:00)
21/05/2024 (10:00-12:00)
22/05/2024 (10:00-12:00)
23/05/2024 (10:00-12:00)

8h 2 CFU

G. Franzè