Skip to main content

LQ Control under Security Constraints

  • Chapter
Control of Cyber-Physical Systems

Part of the book series: Lecture Notes in Control and Information Sciences ((LNCIS,volume 449))

Abstract

In this paper, a LQ optimal control problem in considered under several security constraints. The security constraints depend on the information gathered by an adversary making partial noisy measurements of the state. Control sequences are designed to drive the system to a specified terminal state while minimizing a quadratic cost and satisfying bounds on the information available to the adversary. The resulting optimization problems are shown to be convex. Duality techniques are incorporated to compute the optimal solutions. For a terminal state with a continuous distribution, the optimal solution is shown to be affine.

This work has been funded by ONR AppEl center at UMD (Task E12), NSF CPS grant CNS 0931878, AFOSR FA95501110182, and ARL.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cardenas, A., Amin, S., Sastry, S.: Research challenges for the security of control systems. In: Proceedings of the 3rd conference on Hot Topics in Security. USENIX Association, San Jose (2008)

    Google Scholar 

  2. Cardenas, A., Amin, S., Sastry, S.: Secure Control: Towards survivable cyber-physical systems. In: 28th International Conference Distributed Computing Systems Workshops, Beijing, China, pp. 495–500 (June 2008)

    Google Scholar 

  3. Mo, Y., Kim, T., Brancik, K., Dickinson, D., Lee, H., Perrig, A., Sinopoli, B.: Cyber-Physical Security of a Smart Grid Infrastructure. Proceedings of the IEEE: Special Issue on Cyber-Physical Systems 100, 195–209 (2012)

    Google Scholar 

  4. Gupta, A., Langbort, C., Basar, T.: Optimal Control in the presence of an intelligent jammer with limited actions. In: 49th IEEE Conference on Decision and Control, pp. 1096–1101 (2010)

    Google Scholar 

  5. Mo, Y., Sinopli, B.: False Data Injection Attacks in Control Systems. In: 1st Workshop on Secure Control Systems (2010)

    Google Scholar 

  6. Fwazi, H., Tabuada, P., Diggavi, S.: Security of control systems under sensors and actuator attacks. In: 51st IEEE Conference on Decision and Control, pp. 3412–3417 (2012)

    Google Scholar 

  7. Zhu, Q., Bushnell, L., Basar, T.: Game Theoretic Analysis of Node Capture and Cloning Attack with Multiple Attackers in Wireless Sensor Networks. In: 51st IEEE Conference on Decision and Control, pp. 3404–3411 (2012)

    Google Scholar 

  8. Pasqualetti, F., Dorfler, F., Bullo, F.: Cyber-Physical Security via Geomtric Control: Distributed Monitoring and Mailicious Attacks. In: 51st IEEE Conference on Decision and Control, pp. 3418–3425 (2012)

    Google Scholar 

  9. Poor, V.: An Introduction to Signal Detection and Estimation, 2nd edn. Springer (1994)

    Google Scholar 

  10. Grant, M., Boyd, S.: CVX: Matlab software for disciplined convex programming (2000), http://stanford.edu/boyd/cvx

  11. Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press (2004)

    Google Scholar 

  12. Bickel, P., Doksum, K.: Mathematical Statistics: Basic Ideas and Selected Topics, 2nd edn., vol. 1. Pearson Prentice Hall (2007)

    Google Scholar 

  13. Luenberger, D.: Optimization by Vector Space Methods. Wiley (1969)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Waseem A. Malik .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Malik, W.A., Martins, N.C., Swami, A. (2013). LQ Control under Security Constraints. In: Tarraf, D. (eds) Control of Cyber-Physical Systems. Lecture Notes in Control and Information Sciences, vol 449. Springer, Heidelberg. https://doi.org/10.1007/978-3-319-01159-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-01159-2_6

  • Publisher Name: Springer, Heidelberg

  • Print ISBN: 978-3-319-01158-5

  • Online ISBN: 978-3-319-01159-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics