Design of Inputs Without Data Informativity for Secure Model Predictive Control
This paper considers a control problem to prevent dynamic stealth attacks using interception data. The attacker can design a stealth attack signal from the trajectory of the system if the input data is persistently exciting (PE). Thus, this paper considers model predictive control using the input wi...
Saved in:
Published in | 2023 IEEE/SICE International Symposium on System Integration (SII) pp. 1 - 4 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
17.01.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | This paper considers a control problem to prevent dynamic stealth attacks using interception data. The attacker can design a stealth attack signal from the trajectory of the system if the input data is persistently exciting (PE). Thus, this paper considers model predictive control using the input without PE. Since a design problem for the input without PE is a combinatorial optimization problem, nuclear and l2/l1 norm optimization problems are proposed as alternative problems to obtain approximate solutions. |
---|---|
ISSN: | 2474-2325 |
DOI: | 10.1109/SII55687.2023.10039159 |