Design of Inputs Without Data Informativity for Secure Model Predictive Control

This paper considers a control problem to prevent dynamic stealth attacks using interception data. The attacker can design a stealth attack signal from the trajectory of the system if the input data is persistently exciting (PE). Thus, this paper considers model predictive control using the input wi...

Full description

Saved in:
Bibliographic Details
Published in2023 IEEE/SICE International Symposium on System Integration (SII) pp. 1 - 4
Main Authors Adachi, Ryosuke, Wakasa, Yuji
Format Conference Proceeding
LanguageEnglish
Published IEEE 17.01.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:This paper considers a control problem to prevent dynamic stealth attacks using interception data. The attacker can design a stealth attack signal from the trajectory of the system if the input data is persistently exciting (PE). Thus, this paper considers model predictive control using the input without PE. Since a design problem for the input without PE is a combinatorial optimization problem, nuclear and l2/l1 norm optimization problems are proposed as alternative problems to obtain approximate solutions.
ISSN:2474-2325
DOI:10.1109/SII55687.2023.10039159