TY - JOUR
T1 - Inherent attack tolerance properties of model predictive control under DoS attacks
AU - Zhang, Chenrui
AU - Jiang, Yiming
AU - Shen, Shuang
AU - Zeru, Rediet Tesfaye
AU - Xia, Yuanqing
AU - Chai, Senchun
N1 - Publisher Copyright:
© 2023
PY - 2024/2
Y1 - 2024/2
N2 - We consider the inherent attack tolerance properties of resilient model predictive control (R-MPC) for cyber–physical systems (CPSs) modeled by discrete linear time-invariant (LTI) systems subjected to limited disruptions. In this paper, the relationship between the maximum allowable duration of Denial-of-Service (DoS) attacks, namely attacks that disrupt both sensor to controller (S–C) and controller to actuator (C–A) communication channels, and the upper bound of disturbances is deduced at length. Moreover, to achieve robust recursive feasibility and closed-loop stability of the system, we discuss that MPC with state, control and terminal constraints has a certain degree of inherent attack tolerance concerning the DoS attack duration and parameters like system matrices and the nominal terminal set. Finally, numerical simulation is given to substantiate the effectiveness of the proposed approach.
AB - We consider the inherent attack tolerance properties of resilient model predictive control (R-MPC) for cyber–physical systems (CPSs) modeled by discrete linear time-invariant (LTI) systems subjected to limited disruptions. In this paper, the relationship between the maximum allowable duration of Denial-of-Service (DoS) attacks, namely attacks that disrupt both sensor to controller (S–C) and controller to actuator (C–A) communication channels, and the upper bound of disturbances is deduced at length. Moreover, to achieve robust recursive feasibility and closed-loop stability of the system, we discuss that MPC with state, control and terminal constraints has a certain degree of inherent attack tolerance concerning the DoS attack duration and parameters like system matrices and the nominal terminal set. Finally, numerical simulation is given to substantiate the effectiveness of the proposed approach.
KW - Denial-of-service attacks
KW - Inherent attack tolerance
KW - Model predictive control
UR - http://www.scopus.com/inward/record.url?scp=85182587200&partnerID=8YFLogxK
U2 - 10.1016/j.jfranklin.2023.11.042
DO - 10.1016/j.jfranklin.2023.11.042
M3 - Article
AN - SCOPUS:85182587200
SN - 0016-0032
VL - 361
SP - 1371
EP - 1385
JO - Journal of the Franklin Institute
JF - Journal of the Franklin Institute
IS - 3
ER -