Resilient Parameter-Invariant Control with Application to Vehicle Cruise Control

  • James WeimerEmail author
  • Nicola Bezzo
  • Miroslav Pajic
  • George J. Pappas
  • Oleg Sokolsky
  • Insup Lee
Part of the Lecture Notes in Control and Information Sciences book series (LNCIS, volume 449)


This work addresses the general problem of resilient control of unknown stochastic linear time-invariant (LTI) systems in the presence of sensor attacks. Motivated by a vehicle cruise control application, this work considers a first order system with multiple measurements, of which a bounded subset may be corrupted. A frequency-domain-designed resilient parameter-invariant controller is introduced that simultaneously minimizes the effect of corrupted sensors, while maintaining a desired closed-loop performance, invariant to unknown model parameters. Simulated results illustrate that the resilient parameter-invariant controller is capable of stabilizing unknown state disturbances and can perform state trajectory tracking.


Secure Cyber-Physical Systems Robust Control Resilient Sensor Fusion 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Willsky, A.: A survey of design methods for failure detection in dynamic systems. Automatica 12, 601–611 (1976)MathSciNetzbMATHCrossRefGoogle Scholar
  2. 2.
    Zhou, K., Doyle, J.C.: Essentials of robust control. Prentice-Hall, Englewood Cliffs (1998) ISBN: 0-13-790874-1; Qiu, L.: Automatica 38(5), 910–912 (2002) Google Scholar
  3. 3.
    Astrom, K.J., Wittenmark, B.: Adaptive Control, 2nd edn. Addison-Wesley Longman Publishing Co., Inc., Boston (1994)Google Scholar
  4. 4.
    Trees, H.L.V.: Detection, Estimation, and Modulation Theory. John Wiley & Sons, Inc., New York (1968)zbMATHGoogle Scholar
  5. 5.
    Scharf, L.L.: Statistical Signal Processing, Detection, Estimation, and Time Series Analysis. Addison-Welsley Publishing Company Inc., Reading (1991)zbMATHGoogle Scholar
  6. 6.
    Schenato, L., Sinopoli, B., Franceschetti, M., Poolla, K., Sastry, S.: Foundations of control and estimation over lossy networks. Proceedings of the IEEE 95(1), 163–187 (2007)CrossRefGoogle Scholar
  7. 7.
    Gupta, A., Langbort, C., Basar, T.: Optimal control in the presence of an intelligent jammer with limited actions. In: 2010 49th IEEE Conference on Decision and Control (CDC), pp. 1096–1101 (December 2010)Google Scholar
  8. 8.
    Pasqualetti, F., Dörfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems – part ii: Centralized and distributed monitor design. Technical Report arXiv:1202.6049 (February 2012)Google Scholar
  9. 9.
    Sundaram, S., Pajic, M., Hadjicostis, C.N., Mangharam, R., Pappas, G.J.: The wireless control network: Monitoring for malicious behavior. In: CDC, pp. 5979–5984 (2010)Google Scholar
  10. 10.
    Weimer, J., Kar, S., Johansson, K.H.: Distributed detection and isolation of topology attacks in power networks. In: Proceedings of the 1st International Conference on High Confidence Networked Systems, HiCoNS 2012, pp. 65–72. ACM, New York (2012)Google Scholar
  11. 11.
    Weimer, J., Ahmadi, S.A., Araujo, J., Mele, F.M., Papale, D., Shames, I., Sandberg, H., Johansson, K.H.: Active actuator fault detection and diagnostics in hvac systems. In: 4th ACM Workshop on Embedded Systems For Energy-Efficiency in Buildings (BuildSys), Toronto, Canada (2012)Google Scholar
  12. 12.
    Fawzi, H., Tabuada, P., Diggavi, S.N.: Secure estimation and control for cyber-physical systems under adversarial attacks. CoRR abs/1205.5073 (2012)Google Scholar
  13. 13.
    Pintelon, R., Guillaume, P., Rolain, Y., Schoukens, J.: Parametric identification of transfer functions in the frequency domain-a survey. IEEE Transactions on Automatic Control 39(11), 2245–2260 (1994)MathSciNetzbMATHCrossRefGoogle Scholar
  14. 14.
    Ljung, L. (ed.): System identification: theory for the user, 2nd edn. Prentice Hall PTR, Upper Saddle River (1999)Google Scholar
  15. 15.
    Van Den Hof, P.: Identification and control - closed-loop issues. Automatica 31(12), 1751–1770 (1995)MathSciNetzbMATHCrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2013

Authors and Affiliations

  • James Weimer
    • 1
    Email author
  • Nicola Bezzo
    • 1
  • Miroslav Pajic
    • 1
  • George J. Pappas
    • 1
  • Oleg Sokolsky
    • 1
  • Insup Lee
    • 1
  1. 1.School of Engineering and Applied SciencesUniversity of PennsylvaniaPhiladelphiaUSA

Personalised recommendations