Parallel and Distributed Computation: Numerical Methods
Parallel and Distributed Computation: Numerical Methods
Brief paper: Discrete-time dynamic average consensus
Automatica (Journal of IFAC)
Stealthy deception attacks on water SCADA systems
Proceedings of the 13th ACM international conference on Hybrid systems: computation and control
Secure control against replay attacks
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Network Security: A Decision and Game-Theoretic Approach
Network Security: A Decision and Game-Theoretic Approach
Decentralized receding horizon control for large scale dynamically decoupled systems
Automatica (Journal of IFAC)
Attack models and scenarios for networked control systems
Proceedings of the 1st international conference on High Confidence Networked Systems
Survey Constrained model predictive control: Stability and optimality
Automatica (Journal of IFAC)
The explicit linear quadratic regulator for constrained systems
Automatica (Journal of IFAC)
Distributed receding horizon control for multi-vehicle formation stabilization
Automatica (Journal of IFAC)
Technical communique: Stabilizing decentralized model predictive control of nonlinear systems
Automatica (Journal of IFAC)
Game Theoretic Modeling of Malicious Users in Collaborative Networks
IEEE Journal on Selected Areas in Communications
Security of interdependent and identical networked control systems
Automatica (Journal of IFAC)
Hi-index | 22.14 |
We consider an operator-vehicle network where each vehicle is remotely maneuvered by an operator. The objective of the operators is to steer the vehicles to the desired formation subject to the given state and input constraints. Each operator-vehicle pair is attacked by an adversary who is able to maliciously replay the control commands sent from the operator. To play against attackers, we come up with a novel distributed resilient algorithm based on the receding-horizon control methodology, and show that the algorithm is able to allow vehicles, on the one hand, satisfy state and input constraints, and on the other hand, asymptotically achieve the desired formation despite replay attacks. With slight modifications, our proposed algorithm shows an analogous resilience to denial-of-service attacks.