IEEE/CAA Journal of Automatica Sinica
Citation: | Giuseppe Franzè, Francesco Tedesco and Domenico Famularo, "Resilience Against Replay Attacks: A Distributed Model Predictive Control Scheme for Networked Multi-Agent Systems," IEEE/CAA J. Autom. Sinica, vol. 8, no. 3, pp. 628-640, Mar. 2021. doi: 10.1109/JAS.2020.1003542 |
[1] |
F. Pasqualetti, R. Carli, and F. Bullo, “A distributed method for state estimation and false data detection in power networks,” in Proc. IEEE Int. Conf. Smart Grid Communications, Brussels, Belgium, 2011, pp. 469–474.
|
[2] |
J. A. Guerrero-Ibanez, S. Zeadally, and J. Contreras-Castillo, “Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies,” IEEE Wirel. Commun., vol. 22, no. 6, pp. 122–128, Dec. 2015. doi: 10.1109/MWC.2015.7368833
|
[3] |
A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson, “A secure control framework for resource-limited adversaries,” Automatica, vol. 51, pp. 135–148, Jan. 2015. doi: 10.1016/j.automatica.2014.10.067
|
[4] |
W. P. M. H. Heemels, A. R. Teel, N. Van de Wouw, and D. Nešić, “Networked control systems with communication constraints: Tradeoffs between transmission intervals, delays and performance,” IEEE Trans. Autom. Control, vol. 55, no. 8, pp. 1781–1796, Aug. 2010. doi: 10.1109/TAC.2010.2042352
|
[5] |
A. A. Cárdenas, S. Amin, and S. Sastry, “Research challenges for the security of control systems,” in Proc. 3rd Conf. Hot Topics in Security, San Jose, USA, 2008.
|
[6] |
W. Lucia, B. Sinopoli, and G. Franzè, “A set-theoretic approach for secure and resilient control of cyber-physical systems subject to false data injection attacks,” in Proc. Science of Security for Cyber-Physical Systems Workshop, Vienna, Austria, 2016, pp. 1–5.
|
[7] |
Q. Y. Zhu, L. Bushnell, and T. Başar, “Resilient distributed control of multi-agent cyber-physical systems,” in Control of Cyber-Physical Systems, D. C. Tarraf, Ed. Heidelberg: Springer, 2013, pp. 301–316.
|
[8] |
Y. P. Guan and X. H. Ge, “Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks,” IEEE Trans. Signal Inf. Process. Netw., vol. 4, no. 1, pp. 48–59, Mar. 2018.
|
[9] |
D. Zhang, Y. P. Shen, S. Q. Zhou, X. W. Dong, and L. Yu, “Distributed secure platoon control of connected vehicles subject to DoS attack: Theory and application,” IEEE Trans. Syst., Man, Cybernet.: Syst., Feb. 2020. DOI: 10.1109/TSMC.2020.2968606.
|
[10] |
A. Teixeira, S. Amin, H. Sandberg, K. H. Johansson, and S. S. Sastry, “Cyber security analysis of state estimators in electric power systems,” in Proc. 49th IEEE Int. Conf. Decision and Control, Atlanta, USA, 2010, pp. 5991–5998.
|
[11] |
L. Xie, Y. L. Mo, and B. Sinopoli, “ False data injection attacks in electricity markets,” in Proc. 1st IEEE Int. Conf. Smart Grid Communications, Gaithersburg, USA, 2010, pp. 226–231.
|
[12] |
F. Pasqualetti, A. Bicchi, and F. Bullo, “Consensus computation in unreliable networks: A system theoretic approach,” IEEE Trans. Autom. Control, vol. 57, no. 1, pp. 90–104, May 2012. doi: 10.1109/TAC.2011.2158130
|
[13] |
S. Sundaram and C. N. Hadjicostis, “Distributed function calculation via linear iterative strategies in the presence of malicious agents,” IEEE Trans. Autom. Control, vol. 56, no. 7, pp. 1495–1508, Jul. 2011. doi: 10.1109/TAC.2010.2088690
|
[14] |
Y. L. Mo and B. Sinopoli, “Secure control against replay attacks,” in Proc. 47th Annu. Allerton Conf. Communication, Control, and Computing, pp. 911–918, 2009.
|
[15] |
S. Amin, G. A. Schwartz, and S. S. Sastry, “Security of interdependent and identical networked control systems,” Automatica, vol. 49, no. 1, pp. 186–192, Jan. 2013. doi: 10.1016/j.automatica.2012.09.007
|
[16] |
A. Gupta, C. Langbort, and T. Başar, “Optimal control in the presence of an intelligent jammer with limited actions,” in Proc. 49th IEEE Conf. Decision and Control, Atlanta, USA, 2010, pp. 1096–1101.
|
[17] |
W. Chen, D. R. Ding, H. L. Dong, and G. L. Wei, “Distributed resilient filtering for power systems subject to denial-of-service attacks,” IEEE Trans. Syst.,Man,Cybernet.:Syst., vol. 49, no. 8, pp. 1688–1697, Aug. 2019. doi: 10.1109/TSMC.2019.2905253
|
[18] |
M. H. Zhu and S. Martinez, “On distributed constrained formation control in operator–vehicle adversarial networks,” Automatica, vol. 49, no. 12, pp. 3571–3582, Dec. 2013. doi: 10.1016/j.automatica.2013.09.031
|
[19] |
R. Moghadam and H. Modares, “Resilient autonomous control of distributed Multiagent systems in contested environments,” IEEE Trans. Cybernet., vol. 49, no. 11, pp. 3957–3967, Nov. 2019. doi: 10.1109/TCYB.2018.2856089
|
[20] |
P. D. Christofides, R. Scattolini, D. M. de la Peña, and J. F. Liu, “Distributed model predictive control: A tutorial review and future research directions,” Comput. Chem. Eng., vol. 51, pp. 21–41, Apr. 2013. doi: 10.1016/j.compchemeng.2012.05.011
|
[21] |
H. Fawzi, P. Tabuada, and S. Diggavi, “Secure estimation and control for cyber-physical systems under adversarial attacks,” IEEE Trans. Autom. Control, vol. 59, no. 6, pp. 1454–1467, Jun. 2014. doi: 10.1109/TAC.2014.2303233
|
[22] |
P. Velarde, J. M. Maestre, H. Ishii, and R. R. Negenborn, “Scenario-based defense mechanism for distributed model predictive control,” in Proc. IEEE 56th Annu. Conf. Decision and Control, Melbourne, Australia, 2017, pp. 6171–6176.
|
[23] |
A. D. Liu and L. Y. Bai, “Distributed model predictive control for wide area measurement power systems under malicious attacks,” IET Cyber-Phys. Syst.:Theory Appl., vol. 3, no. 3, pp. 111–118, Oct. 2018. doi: 10.1049/iet-cps.2017.0056
|
[24] |
G. Franzè, F. Tedesco, and D. Famularo, “Model predictive control for constrained networked systems subject to data losses,” Automatica, vol. 54, pp. 272–278, Apr. 2015. doi: 10.1016/j.automatica.2015.02.018
|
[25] |
G. Franzè, A. Casavola, D. Famularo, and W. Lucia, “Distributed receding horizon control of constrained networked leader-follower formations subject to packet dropouts,” IEEE Trans. Control Syst. Technol., vol. 26, no. 5, pp. 1798–1809, Sep. 2018. doi: 10.1109/TCST.2017.2723869
|
[26] |
F. Blanchini and S. Miani, Set-Theoretic Methods in Control. 2nd ed. Boston, USA: Birkäuser, 2015.
|
[27] |
S. Bhattacharya, N. Michael, and V. Kumar, “Distributed coverage and exploration in unknown non-convex environments,” in Distributed Autonomous Robotic Systems, A. Martinoli, F. Mondada, N. Correll, G. Mermoud, M. Egerstedt, M. A. Hsieh, L. E. Parker, and K. Støy, Eds. Berlin, Heidelberg: Springer, 2013, pp. 61–75.
|
[28] |
G. Franzè, W. Lucia, and F. Tedesco, “A distributed model predictive control scheme for leader-follower multi-agent systems,” Int. J. Control, vol. 91, no. 2, pp. 369–382, 2018. doi: 10.1080/00207179.2017.1282178
|
[29] |
G. Franzè, F. Tedesco, and W. Lucia, “Resilient control for cyber-physical systems subject to replay attacks,” IEEE Control Syst. Lett., vol. 3, no. 4, pp. 984–989, Oct. 2019. doi: 10.1109/LCSYS.2019.2920507
|
[30] |
D. R. Ding, Z. D. Wang, and Q. L. Han, “A set-membership approach to event-triggered filtering for general nonlinear systems over sensor networks,” IEEE Trans. Autom. Control, vol. 65, no. 4, pp. 1792–1799, Apr. 2020. doi: 10.1109/TAC.2019.2934389
|