TY - GEN
T1 - Robust Data-Driven Control Against Actuator FDI for Unknown Linear Systems
AU - Liu, Wenjie
AU - Sun, Jian
AU - Deng, Fang
AU - Wang, Gang
AU - Chen, Jie
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - This paper designs a data-driven controller for unknown linear systems whose actuators suffer from false data injection (FDI) attacks, using only noisy input-state data. To achieve this objective, a general FDI attack model is introduced, which imposes constraints only on the switching frequency of attack channels and the magnitude of attack matrices. A time-varying state feedback control law is designed based on offline and online input-state data, which adapts to the channel switching of FDI attacks. This is achieved by solving a data-based semi-definite programs (SDPs) on-the-fly such that stabilizing the set of subsystems consistent with both offline clean data and online attack-corrupted data. It is shown that under mild conditions on the attack and the noise, the feasibility of the proposed SDP guarantees that the controller stabilizes the attack-corrupted system. A numerical example is presented to validate the effectiveness of the proposed method.
AB - This paper designs a data-driven controller for unknown linear systems whose actuators suffer from false data injection (FDI) attacks, using only noisy input-state data. To achieve this objective, a general FDI attack model is introduced, which imposes constraints only on the switching frequency of attack channels and the magnitude of attack matrices. A time-varying state feedback control law is designed based on offline and online input-state data, which adapts to the channel switching of FDI attacks. This is achieved by solving a data-based semi-definite programs (SDPs) on-the-fly such that stabilizing the set of subsystems consistent with both offline clean data and online attack-corrupted data. It is shown that under mild conditions on the attack and the noise, the feasibility of the proposed SDP guarantees that the controller stabilizes the attack-corrupted system. A numerical example is presented to validate the effectiveness of the proposed method.
UR - http://www.scopus.com/inward/record.url?scp=85200373177&partnerID=8YFLogxK
U2 - 10.1109/ICCA62789.2024.10591860
DO - 10.1109/ICCA62789.2024.10591860
M3 - Conference contribution
AN - SCOPUS:85200373177
T3 - IEEE International Conference on Control and Automation, ICCA
SP - 246
EP - 251
BT - 2024 IEEE 18th International Conference on Control and Automation, ICCA 2024
PB - IEEE Computer Society
T2 - 18th IEEE International Conference on Control and Automation, ICCA 2024
Y2 - 18 June 2024 through 21 June 2024
ER -