Research challenges for the security of control systems
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid
SIAM Journal on Optimization
Reachability analysis for controlled discrete time stochastic hybrid systems
HSCC'06 Proceedings of the 9th international conference on Hybrid Systems: computation and control
Survey Constrained model predictive control: Stability and optimality
Automatica (Journal of IFAC)
Optimization over state feedback policies for robust control with constraints
Automatica (Journal of IFAC)
Security interdependencies for networked control systems with identical agents
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Reputation-based networked control with data-corrupting channels
Proceedings of the 14th international conference on Hybrid systems: computation and control
HMM-based characterization of channel behavior for networked control systems
Proceedings of the 1st international conference on High Confidence Networked Systems
Integrity attacks on cyber-physical systems
Proceedings of the 1st international conference on High Confidence Networked Systems
Attack models and scenarios for networked control systems
Proceedings of the 1st international conference on High Confidence Networked Systems
NCS security experimentation using DETER
Proceedings of the 1st international conference on High Confidence Networked Systems
Securing system controllers in critical infrastructures
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
Minimax control for cyber-physical systems under network packet scheduling attacks
Proceedings of the 2nd ACM international conference on High confidence networked systems
A stochastic games framework for verification and control of discrete time stochastic hybrid systems
Automatica (Journal of IFAC)
Hi-index | 0.00 |
We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over a communication network. The packets may be jammed or compromised by a malicious adversary. For a class of denial-of-service (DoS) attack models, the goal is to find an (optimal) causal feedback controller that minimizes a given objective function subject to safety and power constraints. We present a semi-definite programming based solution for solving this problem. Our analysis also presents insights on the effect of attack models on solution of the optimal control problem.