Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks

  • Zhong-Hua Pang
  • Guo-Ping Liu
  • Donghua Zhou
  • Dehui Sun

Table of contents

  1. Front Matter
    Pages i-xx
  2. Introduction and Preliminaries for Networked Predictive Control

    1. Front Matter
      Pages 1-1
    2. Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 3-19
    3. Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 21-29
  3. Networked Predictive Control of Systems with Communication Constraints

    1. Front Matter
      Pages 31-31
    2. Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 33-56
    3. Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 57-77
    4. Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 79-93
    5. Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 95-104
    6. Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 105-123
  4. Networked Predictive Control of Systems with Cyber Attacks and Communication Constraints

    1. Front Matter
      Pages 125-125
    2. Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 127-146
    3. Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 147-163
    4. Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 165-179
    5. Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 181-203
    6. Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 205-219

About this book

Introduction

This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered. For the former, it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter, it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore, it uses practical experiments to demonstrate the effectiveness and applicability of all the methods, bridging the gap between control theory and practical applications. The book is of interest to academic researchers, R&D engineers, and graduate students in control engineering, networked control systems and cyber-physical systems. 

Keywords

Networked control systems (NCSs) Predictive control Networked predictive control (NPC) Network-induced delay Packet dropout Deception attacks DoS attacks Experiments

Authors and affiliations

  • Zhong-Hua Pang
    • 1
  • Guo-Ping Liu
    • 2
  • Donghua Zhou
    • 3
  • Dehui Sun
    • 4
  1. 1.North China University of TechnologyBeijingChina
  2. 2.University of South WalesPontypriddUnited Kingdom
  3. 3.Shandong University of Science and TechnologyQingdaoChina
  4. 4.North China University of TechnologyBeijingChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-981-13-0520-7
  • Copyright Information Springer Nature Singapore Pte Ltd. 2019
  • Publisher Name Springer, Singapore
  • eBook Packages Engineering
  • Print ISBN 978-981-13-0519-1
  • Online ISBN 978-981-13-0520-7
  • Buy this book on publisher's site