@inproceedings{0ebfa3698b824528a891243ad6ec7805,
title = "Solutions Verification for Cloud-Based Networked Control System using Karush-Kuhn-Tucker Conditions",
abstract = "The rapid development of the Cloud Computing Technologies (CCTs) has amended the conventional design of resource-constrained Network Control System (NCS) to the powerful and flexible design of Cloud-Based Networked Control System (CB-NCS) by relocating the processing part to the cloud server. This arrangement has produced many internets based exquisite applications. However, this new arrangement has also raised many network security challenges for the cloud-based control system related to cyber-physical part of the system. In the absence of robust verification methodology, an attacker can launch the modification attack in order to destabilize or take control of NCS. It is desirable that there shall be a solution authentication methodology used to verify whether the incoming solutions are coming from the cloud or not. This paper proposes a methodology used for the verification of the receiving solution to the local control system from the cloud using Karush-Kuhn-Tucker (KKT) conditions, which is then applied to actuator after verification and thus ensure the stability in case of modification attack.",
keywords = "Analysis of Solution verification for NCS, Cloud-based Control System, KKT Conditions, Security of NCS",
author = "Yasir Ali and Zhen Shen and Fenghua Zhu and Gang Xiong and Shichao Chen and Yuanqing Xia and Wang, \{Fei Yue\}",
note = "Publisher Copyright: {\textcopyright} 2018 IEEE.; 2018 Chinese Automation Congress, CAC 2018 ; Conference date: 30-11-2018 Through 02-12-2018",
year = "2018",
month = jul,
day = "2",
doi = "10.1109/CAC.2018.8623109",
language = "English",
series = "Proceedings 2018 Chinese Automation Congress, CAC 2018",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "1385--1389",
booktitle = "Proceedings 2018 Chinese Automation Congress, CAC 2018",
address = "United States",
}