Controller vulnerabilities allow malicious actors to disrupt or hijack the Software-Defined Networking. Traditionally, it is static mappings between the control plane and data plane. Adversaries have plenty of time to...Controller vulnerabilities allow malicious actors to disrupt or hijack the Software-Defined Networking. Traditionally, it is static mappings between the control plane and data plane. Adversaries have plenty of time to exploit the controller's vulnerabilities and launch attacks wisely. We tend to believe that dynamically altering such static mappings is a promising approach to alleviate this issue, since a moving target is difficult to be compromised even by skilled adversaries. It is critical to determine the right time to conduct scheduling and to balance the overhead afforded and the security levels guaranteed. Little previous work has been done to investigate the economical time in dynamic-scheduling controllers. In this paper, we take the first step to both theoretically and experimentally study the scheduling-timing problem in dynamic control plane. We model this problem as a renewal reward process and propose an optimal algorithm in deciding the right time to schedule with the objective of minimizing the long-term loss rate. In our experiments, simulations based on real network attack datasets are conducted and we demonstrate that our proposed algorithm outperforms given scheduling schemes.展开更多
Conference Theme-Anti-Crime Networking and Systems The 2007 IEEE International Conference on Networking,Sensing and Control will be held in London. The main theme of the conference is anti-crime networking and critica...Conference Theme-Anti-Crime Networking and Systems The 2007 IEEE International Conference on Networking,Sensing and Control will be held in London. The main theme of the conference is anti-crime networking and critical infrastructure.The area of anti- crime networking and critical infrastructure is a fusion of a number of research areas in networking, sensing,human factors,artificial intelligence,operational research,and systems control theory. However,the real challenge is to design anti-crime networking and systems from a holistic perspective; taking into account technical,organizational as well as contextual complexity.A system engineering approach is required to address new problems of this challenging and promising area.This conference will provide a remarkable opportunity for the academic and industrial community to address new challenges and share solutions,and discuss future research directions.It will feature plenary speeches, industrial panel sessions,funding agency panel sessions,interactive sessions,and invited/special sessions.Contributions are expected from academia,industry,EPSRC,EU,DTI,and MoD.Technical topics of the conference include but are not limited to:展开更多
In this tutorial paper, we explore the field of quantized feedback control, which has gained significant attention due to the growing prevalence of networked control systems. These systems require the transmission of ...In this tutorial paper, we explore the field of quantized feedback control, which has gained significant attention due to the growing prevalence of networked control systems. These systems require the transmission of feedback information, such as measurements and control signals, over digital networks, presenting novel challenges in estimation and control design. Our examination encompasses various topics, including the minimal information needed for effective feedback control, the design of quantizers, strategies for quantized control design and estimation,achieving consensus control with quantized data, and the pursuit of high-precision tracking using quantized measurements.展开更多
This paper proposes a novel event-driven encrypted control framework for linear networked control systems(NCSs),which relies on two modified uniform quantization policies,the Paillier cryptosystem,and an event-trigger...This paper proposes a novel event-driven encrypted control framework for linear networked control systems(NCSs),which relies on two modified uniform quantization policies,the Paillier cryptosystem,and an event-triggered strategy.Due to the fact that only integers can work in the Pailler cryptosystem,both the real-valued control gain and system state need to be first quantized before encryption.This is dramatically different from the existing quantized control methods,where only the quantization of a single value,e.g.,the control input or the system state,is considered.To handle this issue,static and dynamic quantization policies are presented,which achieve the desired integer conversions and guarantee asymptotic convergence of the quantized system state to the equilibrium.Then,the quantized system state is encrypted and sent to the controller when the triggering condition,specified by a state-based event-triggered strategy,is satisfied.By doing so,not only the security and confidentiality of data transmitted over the communication network are protected,but also the ciphertext expansion phenomenon can be relieved.Additionally,by tactfully designing the quantization sensitivities and triggering error,the proposed event-driven encrypted control framework ensures the asymptotic stability of the overall closedloop system.Finally,a simulation example of the secure motion control for an inverted pendulum cart system is presented to evaluate the effectiveness of the theoretical results.展开更多
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be...As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network.展开更多
Set stabilization is one of the essential problems in engineering systems, and self-triggered control(STC) can save the storage space for interactive information, and can be successfully applied in networked control s...Set stabilization is one of the essential problems in engineering systems, and self-triggered control(STC) can save the storage space for interactive information, and can be successfully applied in networked control systems with limited communication resources. In this study, the set stabilization problem and STC design of Boolean control networks are investigated via the semi-tensor product technique. On the one hand, the largest control invariant subset is calculated in terms of the strongly connected components of the state transition graph, by which a graph-theoretical condition for set stabilization is derived. On the other hand, a characteristic function is exploited to determine the triggering mechanism and feasible controls. Based on this, the minimum-time and minimum-triggering open-loop, state-feedback and output-feedback STCs for set stabilization are designed,respectively. As classic applications of self-triggered set stabilization, self-triggered synchronization, self-triggered output tracking and self-triggered output regulation are discussed as well. Additionally, several practical examples are given to illustrate the effectiveness of theoretical results.展开更多
In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set f...In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network.展开更多
As the demand for more efficient and adaptable power distribution systems intensifies, especially in rural areas, innovative solutions like the Capacitor-Coupled Substation with a Controllable Network Transformer (CCS...As the demand for more efficient and adaptable power distribution systems intensifies, especially in rural areas, innovative solutions like the Capacitor-Coupled Substation with a Controllable Network Transformer (CCS-CNT) are becoming increasingly critical. Traditional power distribution networks, often limited by unidirectional flow capabilities and inflexibility, struggle to meet the complex demands of modern energy systems. The CCS-CNT system offers a transformative approach by enabling bidirectional power flow between high-voltage transmission lines and local distribution networks, a feature that is essential for integrating renewable energy sources and ensuring reliable electrification in underserved regions. This paper presents a detailed mathematical representation of power flow within the CCS-CNT system, emphasizing the control of both active and reactive power through the adjustment of voltage levels and phase angles. A control algorithm is developed to dynamically manage power flow, ensuring optimal performance by minimizing losses and maintaining voltage stability across the network. The proposed CCS-CNT system demonstrates significant potential in enhancing the efficiency and reliability of power distribution, making it particularly suited for rural electrification and other applications where traditional methods fall short. The findings underscore the system's capability to adapt to varying operational conditions, offering a robust solution for modern power distribution challenges.展开更多
The random delays in a networked control system (NCS) degrade control performance and can even destabilize the control system.To deal with this problem,the time-stamped predictive functional control (PFC) algorithm is...The random delays in a networked control system (NCS) degrade control performance and can even destabilize the control system.To deal with this problem,the time-stamped predictive functional control (PFC) algorithm is proposed,which generalizes the standard PFC algorithm to networked control systems with random delays.The algorithm uses the time-stamp method to estimate the control delay,predicts the future outputs based on a discrete time delay state space model,and drives the control law that applies to an NCS from the idea of a PFC algorithm.A networked control system was constructed based on TrueTime simulator,with which the time-stamped PFC algorithm was compared with the standard PFC algorithm.The response curves show that the proposed algorithm has better control performance.展开更多
A kind of networked control system with network-induced delay and packet dropout, modeled on asynchronous dynamical systems was tested, and the integrity design of the networked control system with sensors failures an...A kind of networked control system with network-induced delay and packet dropout, modeled on asynchronous dynamical systems was tested, and the integrity design of the networked control system with sensors failures and actuators failures was analyzed using hybrid systems technique based on the robust fault-tolerant control theory. The parametric expression of controller is given based on the feasible solution of linear matrix inequality. The simulation results are provided on the basis of detailed theoretical analysis, which further demonstrate the validity of the proposed schema.展开更多
In this paper, the stability of iterative learning control with data dropouts is discussed. By the super vector formulation, an iterative learning control (ILC) system with data dropouts can be modeled as an asynchr...In this paper, the stability of iterative learning control with data dropouts is discussed. By the super vector formulation, an iterative learning control (ILC) system with data dropouts can be modeled as an asynchronous dynamical system with rate constraints on events in the iteration domain. The stability condition is provided in the form of linear matrix inequalities (LMIS) depending on the stability of asynchronous dynamical systems. The analysis is supported by simulations.展开更多
Implementing a control system over a communication network induces inevitable time delays that may degrade performance and even cause instability. One of the most effective ways to reduce the negative effect of delays...Implementing a control system over a communication network induces inevitable time delays that may degrade performance and even cause instability. One of the most effective ways to reduce the negative effect of delays on the performance of networked control system (NCS) is to reduce network traffic. In this paper, adjustable deadbands are explored as a solution to reduce network traffic in NCS. A method of fault-tolerant control of networked control system is presented, which takes into account system response as well as network traffic. The integrity design for a kind of NCS with sensor failures and actuator failures is analyzed based on robust fault-tolerant control theory and information scheduling. After detailed theoretical analysis, the paper also provides the simulation results, which further validate the proposed scheme.展开更多
Abstract--This paper provides a survey on modeling and theories of networked control systems (NCS). In the first part, modeling of the different types of imperfections that affect NCS is discussed. These imperfectio...Abstract--This paper provides a survey on modeling and theories of networked control systems (NCS). In the first part, modeling of the different types of imperfections that affect NCS is discussed. These imperfections are quantization errors, packet dropouts, variable sampling/transmission intervals, vari- able transmission delays, and communication constraints. Then follows in the second part a presentation of several theories that have been applied for controlling networked systems. These theories include: input delay system approach, Markovian system approach, switched system approach, stochastic system approach, impulsive system approach, and predictive control approach. In the last part, some advanced issues in NCS including decentral- ized and distributed NCS, cloud control system, and co-design of NCS are reviewed. Index Terms--Decentralized networked control systems (NCS), distributed networked control systems, network constraints, net- worked control system, quantization, time delays.展开更多
Networked control systems are spatially distributed systems in which the communication between sensors, actuators,and controllers occurs through a shared band-limited digital communication network. Several advantages ...Networked control systems are spatially distributed systems in which the communication between sensors, actuators,and controllers occurs through a shared band-limited digital communication network. Several advantages of the network architectures include reduced system wiring, plug and play devices,increased system agility, and ease of system diagnosis and maintenance. Consequently, networked control is the current trend for industrial automation and has ever-increasing applications in a wide range of areas, such as smart grids, manufacturing systems,process control, automobiles, automated highway systems, and unmanned aerial vehicles. The modelling, analysis, and control of networked control systems have received considerable attention in the last two decades. The ‘control over networks’ is one of the key research directions for networked control systems. This paper aims at presenting a survey of trends and techniques in networked control systems from the perspective of ‘control over networks’, providing a snapshot of five control issues: sampled-data control, quantization control, networked control, event-triggered control, and security control. Some challenging issues are suggested to direct the future research.展开更多
The guaranteed cost control problem for networked control systems (NCSs) is addressed under communication constraints and varying sampling rate. First of all, a simple information-scheduling scheme is presented to des...The guaranteed cost control problem for networked control systems (NCSs) is addressed under communication constraints and varying sampling rate. First of all, a simple information-scheduling scheme is presented to describe the scheduling approach of system signals in NCSs. Then, based on such a scheme and given sampling method, the design procedure in dynamic output feedback manner is also derived which renders the closed loop system to be asymptotically stable and guarantees an upper bound of the LQ performance cost function.展开更多
Based on bounded network-induced time-delay, the networked control system is modeled as a linear time-variant singular system. Using the Lyapunov theory and the linear matrix inequality approach, the criteria for dela...Based on bounded network-induced time-delay, the networked control system is modeled as a linear time-variant singular system. Using the Lyapunov theory and the linear matrix inequality approach, the criteria for delay-independent stability and delay-dependent stability of singular networked control systems are derived and transformed to a feasibility problem of linear matrix inequality formulation, which can be solved by the Matlab LMI toolbox, and the feasible solutions provide the maximum allowable delay bound that makes the system stable. A numerical example is provided, which shows that the analysis method is valid and the stability criteria are feasible.展开更多
The H_∞ performance analysis and controller design for linear networked control systems(NCSs) are presented.The NCSs are considered a linear continuous system with time-varying interval input delay by assuming that t...The H_∞ performance analysis and controller design for linear networked control systems(NCSs) are presented.The NCSs are considered a linear continuous system with time-varying interval input delay by assuming that the sensor is time-driven and the logic Zero-order-holder(ZOH) and controller are event-driven.Based on this model,the delay interval is divided into two equal subintervals for H_∞ performance analysis.An improved H_∞ stabilization condition is obtained in linear matrix inequalities(LMIs) framework by adequately considering the information about the bounds of the input delay to construct novel Lyapunov–Krasovskii functionals(LKFs).For the purpose of reducing the conservatism of the proposed results,the bounds of the LKFs differential cross terms are properly estimated without introducing any slack matrix variables.Moreover,the H_∞ controller is reasonably designed to guarantee the robust asymptotic stability for the linear NCSs with an H_∞ performance level γ.Numerical simulation examples are included to validate the reduced conservatism and effectiveness of our proposed method.展开更多
For a class of linear discrete-time systems that is subject to randomly occurred networked packet loss in industrial cyber physical systems, a novel robust model predictive control method with active compensation mech...For a class of linear discrete-time systems that is subject to randomly occurred networked packet loss in industrial cyber physical systems, a novel robust model predictive control method with active compensation mechanism was proposed. The probability distribution of packet loss is described as the Bernoulli distributed white sequences. By using the Lyapunov stability theory, the existing sufficient conditions of the controller are derived from solving a group of linear matrix inequalities. Moreover, dropout-rate with uncertainty and unknown dropout-rate are also considered, which can greatly reduce the conservativeness of the controller. The designed robust model predictive control method not only efficiently eliminates the negative effects of the networked data loss in industrial cyber physical systems but also ensures the stability of closed-loop system. Two examples were provided to illustrate the superiority and effectiveness of the proposed method.展开更多
Security and reliability must be focused on control sys- tems firstly, and fault detection and diagnosis (FDD) is the main theory and technology. Now, there are many positive results in FDD for linear networked cont...Security and reliability must be focused on control sys- tems firstly, and fault detection and diagnosis (FDD) is the main theory and technology. Now, there are many positive results in FDD for linear networked control systems (LNCSs), but nonlinear networked control systems (NNCSs) are less involved. Based on the T-S fuzzy-modeling theory, NNCSs are modeled and network random time-delays are changed into the unknown bounded uncertain part without changing its structure. Then a fuzzy state observer is designed and an observer-based fault detection approach for an NNCS is presented. The main results are given and the relative theories are proved in detail. Finally, some simulation results are given and demonstrate the proposed method is effective.展开更多
In this paper, we present an interval model of networked control systems with time-varying sampling periods and time-varying network-induced delays and discuss the problem of stability of networked control systems usi...In this paper, we present an interval model of networked control systems with time-varying sampling periods and time-varying network-induced delays and discuss the problem of stability of networked control systems using Lyapunov stability theory. A sufficient stability condition is obtained by solving a set of linear matrix inequalities. In the end, the illustrative example demonstrates the correctness and effectiveness of the proposed approach.展开更多
基金supported by the Foundation for Innovative Research Groups of the National Natural Science Foundation of China (No. 61521003)The National Key R&D Program of China (No.2016YFB0800101)+1 种基金the National Science Foundation for Distinguished Young Scholars of China (No.61602509)Henan Province Key Technologies R&D Program of China(No.172102210615)
文摘Controller vulnerabilities allow malicious actors to disrupt or hijack the Software-Defined Networking. Traditionally, it is static mappings between the control plane and data plane. Adversaries have plenty of time to exploit the controller's vulnerabilities and launch attacks wisely. We tend to believe that dynamically altering such static mappings is a promising approach to alleviate this issue, since a moving target is difficult to be compromised even by skilled adversaries. It is critical to determine the right time to conduct scheduling and to balance the overhead afforded and the security levels guaranteed. Little previous work has been done to investigate the economical time in dynamic-scheduling controllers. In this paper, we take the first step to both theoretically and experimentally study the scheduling-timing problem in dynamic control plane. We model this problem as a renewal reward process and propose an optimal algorithm in deciding the right time to schedule with the objective of minimizing the long-term loss rate. In our experiments, simulations based on real network attack datasets are conducted and we demonstrate that our proposed algorithm outperforms given scheduling schemes.
文摘Conference Theme-Anti-Crime Networking and Systems The 2007 IEEE International Conference on Networking,Sensing and Control will be held in London. The main theme of the conference is anti-crime networking and critical infrastructure.The area of anti- crime networking and critical infrastructure is a fusion of a number of research areas in networking, sensing,human factors,artificial intelligence,operational research,and systems control theory. However,the real challenge is to design anti-crime networking and systems from a holistic perspective; taking into account technical,organizational as well as contextual complexity.A system engineering approach is required to address new problems of this challenging and promising area.This conference will provide a remarkable opportunity for the academic and industrial community to address new challenges and share solutions,and discuss future research directions.It will feature plenary speeches, industrial panel sessions,funding agency panel sessions,interactive sessions,and invited/special sessions.Contributions are expected from academia,industry,EPSRC,EU,DTI,and MoD.Technical topics of the conference include but are not limited to:
基金partially supported by National Natura Science Foundation of China (62350710214, U23A20325)Shenzhen Key Laboratory of Control Theory and Intelligent Systems (ZDSYS20220330161800001)。
文摘In this tutorial paper, we explore the field of quantized feedback control, which has gained significant attention due to the growing prevalence of networked control systems. These systems require the transmission of feedback information, such as measurements and control signals, over digital networks, presenting novel challenges in estimation and control design. Our examination encompasses various topics, including the minimal information needed for effective feedback control, the design of quantizers, strategies for quantized control design and estimation,achieving consensus control with quantized data, and the pursuit of high-precision tracking using quantized measurements.
基金the Research Grants Council of Hong Kong(CityU 21208921)the Chow Sang Sang Group Research Fund Sponsored by Chow Sang Sang Holdings International Ltd.
文摘This paper proposes a novel event-driven encrypted control framework for linear networked control systems(NCSs),which relies on two modified uniform quantization policies,the Paillier cryptosystem,and an event-triggered strategy.Due to the fact that only integers can work in the Pailler cryptosystem,both the real-valued control gain and system state need to be first quantized before encryption.This is dramatically different from the existing quantized control methods,where only the quantization of a single value,e.g.,the control input or the system state,is considered.To handle this issue,static and dynamic quantization policies are presented,which achieve the desired integer conversions and guarantee asymptotic convergence of the quantized system state to the equilibrium.Then,the quantized system state is encrypted and sent to the controller when the triggering condition,specified by a state-based event-triggered strategy,is satisfied.By doing so,not only the security and confidentiality of data transmitted over the communication network are protected,but also the ciphertext expansion phenomenon can be relieved.Additionally,by tactfully designing the quantization sensitivities and triggering error,the proposed event-driven encrypted control framework ensures the asymptotic stability of the overall closedloop system.Finally,a simulation example of the secure motion control for an inverted pendulum cart system is presented to evaluate the effectiveness of the theoretical results.
基金Scientific Research Project of Liaoning Province Education Department,Code:LJKQZ20222457&LJKMZ20220781Liaoning Province Nature Fund Project,Code:No.2022-MS-291.
文摘As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network.
基金supported by the National Natural Science Foundation of China (62273201,62173209,72134004,62303170)the Research Fund for the Taishan Scholar Project of Shandong Province of China (TSTP20221103)。
文摘Set stabilization is one of the essential problems in engineering systems, and self-triggered control(STC) can save the storage space for interactive information, and can be successfully applied in networked control systems with limited communication resources. In this study, the set stabilization problem and STC design of Boolean control networks are investigated via the semi-tensor product technique. On the one hand, the largest control invariant subset is calculated in terms of the strongly connected components of the state transition graph, by which a graph-theoretical condition for set stabilization is derived. On the other hand, a characteristic function is exploited to determine the triggering mechanism and feasible controls. Based on this, the minimum-time and minimum-triggering open-loop, state-feedback and output-feedback STCs for set stabilization are designed,respectively. As classic applications of self-triggered set stabilization, self-triggered synchronization, self-triggered output tracking and self-triggered output regulation are discussed as well. Additionally, several practical examples are given to illustrate the effectiveness of theoretical results.
基金National Natural Science Foundation of China(U2133208,U20A20161)National Natural Science Foundation of China(No.62273244)Sichuan Science and Technology Program(No.2022YFG0180).
文摘In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network.
文摘As the demand for more efficient and adaptable power distribution systems intensifies, especially in rural areas, innovative solutions like the Capacitor-Coupled Substation with a Controllable Network Transformer (CCS-CNT) are becoming increasingly critical. Traditional power distribution networks, often limited by unidirectional flow capabilities and inflexibility, struggle to meet the complex demands of modern energy systems. The CCS-CNT system offers a transformative approach by enabling bidirectional power flow between high-voltage transmission lines and local distribution networks, a feature that is essential for integrating renewable energy sources and ensuring reliable electrification in underserved regions. This paper presents a detailed mathematical representation of power flow within the CCS-CNT system, emphasizing the control of both active and reactive power through the adjustment of voltage levels and phase angles. A control algorithm is developed to dynamically manage power flow, ensuring optimal performance by minimizing losses and maintaining voltage stability across the network. The proposed CCS-CNT system demonstrates significant potential in enhancing the efficiency and reliability of power distribution, making it particularly suited for rural electrification and other applications where traditional methods fall short. The findings underscore the system's capability to adapt to varying operational conditions, offering a robust solution for modern power distribution challenges.
文摘The random delays in a networked control system (NCS) degrade control performance and can even destabilize the control system.To deal with this problem,the time-stamped predictive functional control (PFC) algorithm is proposed,which generalizes the standard PFC algorithm to networked control systems with random delays.The algorithm uses the time-stamp method to estimate the control delay,predicts the future outputs based on a discrete time delay state space model,and drives the control law that applies to an NCS from the idea of a PFC algorithm.A networked control system was constructed based on TrueTime simulator,with which the time-stamped PFC algorithm was compared with the standard PFC algorithm.The response curves show that the proposed algorithm has better control performance.
基金This project was supported by the National Natural Science Foundation of China (60274014)Doctor Foundation of China Education Ministry (20020487006).
文摘A kind of networked control system with network-induced delay and packet dropout, modeled on asynchronous dynamical systems was tested, and the integrity design of the networked control system with sensors failures and actuators failures was analyzed using hybrid systems technique based on the robust fault-tolerant control theory. The parametric expression of controller is given based on the feasible solution of linear matrix inequality. The simulation results are provided on the basis of detailed theoretical analysis, which further demonstrate the validity of the proposed schema.
基金supported by General Program (No. 60774022)State Key Program (No. 60834001) of National Natural Science Foundation of China
文摘In this paper, the stability of iterative learning control with data dropouts is discussed. By the super vector formulation, an iterative learning control (ILC) system with data dropouts can be modeled as an asynchronous dynamical system with rate constraints on events in the iteration domain. The stability condition is provided in the form of linear matrix inequalities (LMIS) depending on the stability of asynchronous dynamical systems. The analysis is supported by simulations.
基金Supported by National Natural Science Foundation of P. R. China (60274014)the Specialized Research Fund for Doctoral Program of Higher Education of P. R. China (20020487006)
文摘Implementing a control system over a communication network induces inevitable time delays that may degrade performance and even cause instability. One of the most effective ways to reduce the negative effect of delays on the performance of networked control system (NCS) is to reduce network traffic. In this paper, adjustable deadbands are explored as a solution to reduce network traffic in NCS. A method of fault-tolerant control of networked control system is presented, which takes into account system response as well as network traffic. The integrity design for a kind of NCS with sensor failures and actuator failures is analyzed based on robust fault-tolerant control theory and information scheduling. After detailed theoretical analysis, the paper also provides the simulation results, which further validate the proposed scheme.
基金supported by the Deanship of Scientific Research(DSR) at KFUPM through Research Project(IN141048)
文摘Abstract--This paper provides a survey on modeling and theories of networked control systems (NCS). In the first part, modeling of the different types of imperfections that affect NCS is discussed. These imperfections are quantization errors, packet dropouts, variable sampling/transmission intervals, vari- able transmission delays, and communication constraints. Then follows in the second part a presentation of several theories that have been applied for controlling networked systems. These theories include: input delay system approach, Markovian system approach, switched system approach, stochastic system approach, impulsive system approach, and predictive control approach. In the last part, some advanced issues in NCS including decentral- ized and distributed NCS, cloud control system, and co-design of NCS are reviewed. Index Terms--Decentralized networked control systems (NCS), distributed networked control systems, network constraints, net- worked control system, quantization, time delays.
基金supported in part by the Australian Research Council Discovery Project(DP160103567)
文摘Networked control systems are spatially distributed systems in which the communication between sensors, actuators,and controllers occurs through a shared band-limited digital communication network. Several advantages of the network architectures include reduced system wiring, plug and play devices,increased system agility, and ease of system diagnosis and maintenance. Consequently, networked control is the current trend for industrial automation and has ever-increasing applications in a wide range of areas, such as smart grids, manufacturing systems,process control, automobiles, automated highway systems, and unmanned aerial vehicles. The modelling, analysis, and control of networked control systems have received considerable attention in the last two decades. The ‘control over networks’ is one of the key research directions for networked control systems. This paper aims at presenting a survey of trends and techniques in networked control systems from the perspective of ‘control over networks’, providing a snapshot of five control issues: sampled-data control, quantization control, networked control, event-triggered control, and security control. Some challenging issues are suggested to direct the future research.
基金This work was supported by the National Natural Science Foundation of China (No.60274014)Specialized+1 种基金Research Fund for the Doctoral Program of Higher Education (No. 20020487006)China Education Ministry' s Key Laboratory Foundation for Intelligent Ma
文摘The guaranteed cost control problem for networked control systems (NCSs) is addressed under communication constraints and varying sampling rate. First of all, a simple information-scheduling scheme is presented to describe the scheduling approach of system signals in NCSs. Then, based on such a scheme and given sampling method, the design procedure in dynamic output feedback manner is also derived which renders the closed loop system to be asymptotically stable and guarantees an upper bound of the LQ performance cost function.
基金the National Natural Science Foundation of China (60574011)the National Natural Science Foundation of Liaoning Province (2050770).
文摘Based on bounded network-induced time-delay, the networked control system is modeled as a linear time-variant singular system. Using the Lyapunov theory and the linear matrix inequality approach, the criteria for delay-independent stability and delay-dependent stability of singular networked control systems are derived and transformed to a feasibility problem of linear matrix inequality formulation, which can be solved by the Matlab LMI toolbox, and the feasible solutions provide the maximum allowable delay bound that makes the system stable. A numerical example is provided, which shows that the analysis method is valid and the stability criteria are feasible.
基金Project (61304046) supported by the National Natural Science Funds for Young Scholar of ChinaProject (F201242) supported by Natural Science Foundation of Heilongjiang Province,China
文摘The H_∞ performance analysis and controller design for linear networked control systems(NCSs) are presented.The NCSs are considered a linear continuous system with time-varying interval input delay by assuming that the sensor is time-driven and the logic Zero-order-holder(ZOH) and controller are event-driven.Based on this model,the delay interval is divided into two equal subintervals for H_∞ performance analysis.An improved H_∞ stabilization condition is obtained in linear matrix inequalities(LMIs) framework by adequately considering the information about the bounds of the input delay to construct novel Lyapunov–Krasovskii functionals(LKFs).For the purpose of reducing the conservatism of the proposed results,the bounds of the LKFs differential cross terms are properly estimated without introducing any slack matrix variables.Moreover,the H_∞ controller is reasonably designed to guarantee the robust asymptotic stability for the linear NCSs with an H_∞ performance level γ.Numerical simulation examples are included to validate the reduced conservatism and effectiveness of our proposed method.
基金Project(61673199)supported by the National Natural Science Foundation of ChinaProject(ICT1800400)supported by the Open Research Project of the State Key Laboratory of Industrial Control Technology,Zhejiang University,China
文摘For a class of linear discrete-time systems that is subject to randomly occurred networked packet loss in industrial cyber physical systems, a novel robust model predictive control method with active compensation mechanism was proposed. The probability distribution of packet loss is described as the Bernoulli distributed white sequences. By using the Lyapunov stability theory, the existing sufficient conditions of the controller are derived from solving a group of linear matrix inequalities. Moreover, dropout-rate with uncertainty and unknown dropout-rate are also considered, which can greatly reduce the conservativeness of the controller. The designed robust model predictive control method not only efficiently eliminates the negative effects of the networked data loss in industrial cyber physical systems but also ensures the stability of closed-loop system. Two examples were provided to illustrate the superiority and effectiveness of the proposed method.
文摘Security and reliability must be focused on control sys- tems firstly, and fault detection and diagnosis (FDD) is the main theory and technology. Now, there are many positive results in FDD for linear networked control systems (LNCSs), but nonlinear networked control systems (NNCSs) are less involved. Based on the T-S fuzzy-modeling theory, NNCSs are modeled and network random time-delays are changed into the unknown bounded uncertain part without changing its structure. Then a fuzzy state observer is designed and an observer-based fault detection approach for an NNCS is presented. The main results are given and the relative theories are proved in detail. Finally, some simulation results are given and demonstrate the proposed method is effective.
基金the National Natural Science Foundation of China (No.60674043)
文摘In this paper, we present an interval model of networked control systems with time-varying sampling periods and time-varying network-induced delays and discuss the problem of stability of networked control systems using Lyapunov stability theory. A sufficient stability condition is obtained by solving a set of linear matrix inequalities. In the end, the illustrative example demonstrates the correctness and effectiveness of the proposed approach.