TC6 Security and resilience for networked control systems
Time : 16:00-17:00
Room : Room 6 (Marine City 1)
Chair : Prof.Gyunghoon Park (University of Seoul, Korea)
16:00-16:15        TC6-1
Guaranteeing Infinite-time Stealthiness in Robust Zero-dynamics Attack Policy with Time-varying Time Constant: A Preliminary Study

Gyunghoon Park(University of Seoul, Korea)

Motivated by the robust control theory, robust zero-dynamics attack (RZA) was recently proposed as a model-based attack policy that guarantees the stealthiness even in the presence of model uncertainty, while the time period of stealthiness must be finite. In this work, we extend the RZA so as to make the attack undetectable theoretically for the entire time period. The core idea is to employ a time-varying time constant in the RZA structure, so that even a diverging state of the system can be captured and compensated by the RZA.
16:15-16:30        TC6-2
Switching-like event-triggered control of nonlinear networked systems under DoS attacks using predictor-based observer

Meng Yang, Junyong Zhai(Southeast University, China)

This paper addresses the switching-like event-triggered control (SETC) problem for nonlinear networked systems under denial-of-service (DoS) attacks using predictor-based observer. By employing the prediction approach, a novel predictor-based state observer is constructed to estimate the system states, where an output predictor is used to attenuate the impact of measurement delay. To mitigate the bandwidth pressure and the influence of DoS attacks, a switching-like event-triggered scheme (SETS) with two threshold parameters is developed.
16:30-16:45        TC6-3
Simultaneous conversion of state and output matrix for encrypted control

Junsoo Kim(SeoulTech, Korea)

Homomorphic encryption applied to a networked controller allows for addition and multiplication over integers only, because of computation efficiency. An approach to deal with the constraint is conversion of state matrix, with which a dynamic system can operate over encrypted data, based on addition and multiplication. As a brief remark continuing the previous result, it is addressed that both the state matrix and the output matrix can be converted to integers, while the input-output relation is kept the same. The proposed method will reduce the required computational burden of the constructed encrypted controller.

<<   1   >>