A Resilient Data-Driven Controller Against DoS Attacks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper is concerned with the stabilization problem of linear time-invariant systems under Denial-of-Service (DoS) attacks. Meanwhile, system matrices are unknown, and only some input-output trajectories collected from off-line experiments are accessible. Generally, in the model-based case, it has been proven that systems equipped with a predictor-based state feedback controller achieve resilience against DoS attacks. However, this is difficult or even impossible to be implemented in the absence of a system model, thus leading to resilient control challenging in the data-based case. To maintain resilience against DoS attacks in the data-based case, a data-driven model predictive control (MPC) scheme is proposed such that future system input-output trajectories can be obtained by solving a data-dependent optimal problem. Leveraging this scheme, a data-driven resilient control strategy is developed such that the system achieves the same level of resilience of the DoS attacks as the model-based case. Finally, a numerical example is given to validate the effectiveness of the proposed method.

Original languageEnglish
Title of host publicationProceedings of the 41st Chinese Control Conference, CCC 2022
EditorsZhijun Li, Jian Sun
PublisherIEEE Computer Society
Pages4305-4310
Number of pages6
ISBN (Electronic)9789887581536
DOIs
Publication statusPublished - 2022
Event41st Chinese Control Conference, CCC 2022 - Hefei, China
Duration: 25 Jul 202227 Jul 2022

Publication series

NameChinese Control Conference, CCC
Volume2022-July
ISSN (Print)1934-1768
ISSN (Electronic)2161-2927

Conference

Conference41st Chinese Control Conference, CCC 2022
Country/TerritoryChina
CityHefei
Period25/07/2227/07/22

Keywords

  • Denial-of-service attack
  • data-driven control
  • input-to-state stability
  • model predictive control

Fingerprint

Dive into the research topics of 'A Resilient Data-Driven Controller Against DoS Attacks'. Together they form a unique fingerprint.

Cite this