@article{856a44efdfa9489faa5d799a7e6a2803,
title = "Towards the coarsest quantized controller under denial-of-service attacks",
abstract = "In this paper, we consider networked control systems under Denial-of-Service (DoS) attacks. The control objective is to synthesize a quantized controller in which the quantizer is as coarse as possible for a networked control system subject to DoS attacks, while still guaranteeing (quadratic) stability. Our main result will explicitly show the trade-offs between system robustness against DoS and quantizer coarseness. A simulation example will demonstrate the strengths of the new method.",
keywords = "Control and estimation with data loss, Control under communication constraints, Denial-of-service attacks, Secure networked control systems",
author = "{van Dinther}, Dorus and Shuai Feng and Hideaki Ishii and W.P.M.H. Heemels",
note = "Funding Information: This work was supported in the part by the JST CREST Grant No. JPMJCR15K3 and by JSPS under Grant-in-Aid for Scientific Research Grant No. 18H01460. Funding Information: eΣCetg{\'a}aarl.rddeΣ2innag0s1t7heΠΠ,teamthel.alΣfre2u0nΘ0cff8itiΠspo;nurringΦsaonfdnΘeethetrwgoeritknetaedlre.csoΣt2n0tor1fo5delΠ;ssffCigishtningeemngsΣC{\'a}rdenasetal.Σ2008Π;ΦandΘergetal.Σ2015Π;Cheng DoSvq Kv eCt {\'a}arld. eΣn2a0s17eΠtΠ,atlh. eΣr2e0Θ0ff8i Πs;puΦrarnindgΘetrhge eitntaelr.esΣt20o1f5dΠ;esCighneinng v q K secure control sffistems that are resilient to attacks. In K eetcaulr.eΣ2c0o1n7trΠoΠ,l tshffiesrteeΘmffisstphuartrinagrethreesiilnietenrtestooaftdtaecsikgsn.inIng Fig. 1. Control architectureq . K particular, a large numΘer of securitffi issues are caused Θffi peacrutirceulcaorn, tarolal rsgfefisnteummsΘetrhaotf saerceurritefsfiiliisesnutestaoreatctaaucskesd. ΘInffi Fig. 1. Control architecture. cffiΘer attacks. The attacks mostlffi affect the exchange of Figautho. 1rs. C{\textquoteright}oknntorwolleadgrceh,ittheecturere h.ave not Θeen anffi studies into cdpffaaffiiΘΘtrateeirrcΘuaafflittattcraao,ccrakkrussl..aprtTTginhhegeenutaahmttettaaΘirccekkrcssoonmmffisoodessecttnullfftrffiiiiataaflfffiifftieefsfcci,sttuaettushhteehaereeenxxtcciachhiuaatsnnffei,ggdeeanΘoodffffi data Θffi corrupting their confidentialitffi, authenticitffi, and authors{\textquoteright} knowledge, there have not Θeen anffi studies into avaatialaΘffiilictoffir.rupting their confidentialitffi, authenticitffi, and of coarse staΘilizing quantized control under DoΦ attacks aTvhaiislapΘailpiteffri. is particularlffi interested in Denial-of-Φervice thuethporrosΘ{\textquoteright}lkemnowtalcekdlgeed, itnhetrheishpaavpeenr,otcoΘneseisntianngffiosfttuhdeiedsesinigtno This paper is particularlffi interested in Denial-of-Φervice ovfecroathrseeinstpauΘtiliczhianngnqeulaonfttizheedpcloanttr.oIlnupnadretricDuloaΦr,awtteacakres ΣDoΦΠ attacks, which affect the availaΘilitffi of data, in ohf ecoparrosΘelesmtaΘtailcikzilnedg iqnutahnitsizpeadpceor,nctroonlsiusntidnegr oDf otΦheadtteascigkns This paper is particularlffi interested in Denial-of-Φervice over the input channel of the plant. In particular, we are TΣDhoisΦΠpaaptetarcikss,pawrhtiiccuhlaarflfffeicitnttehreestaevdaiilnaΘDilietnffiiaol-fofd-Φatearv,icine invteerretshteedinipnutthechsaffinstneeml osfettthinegpdlaenptic.tIendpinarFtiicgu.l1a,ro,fwehaicrhe ΣDhoisΦΠpaptetarcikss,pawrhtiiccuhlaarflfffei citnttehreestaevdaiilnaΘDilietnffiiaol-fofd-Φatearv, icine interested in the sffistem setting depicted in Fig. 1, of which ctheomplaΘinnattio,senewFigith.1qua.Thentiszeaatiottanckosvejarmthetheinputcommchuannneicatiol onf invteerreetshteeedininpnuthethechsaffisfinstemneeml osfettingtthinegpdelaenpictic.teIendpinnarFigtiicgu.l1a,ro,fwehaicrhe cDomoΦΘΠinatttioanckws,itwhhqicuhanatifzfeacttionthoevearvatihlaeΘiinliptfufitocfhdanatnae,l ionf more details follow in the next section. thecthhomeanneplapΘliannnlsattt,,,iossceenaeeuswFigFingiitgh.. 11q..pauTTachehnketesistszeeaaattottatiotanccΘkkoessvejajdroarmmthppthteheeeindccpoouammtnmmdchuuahennniiccncnaaetiotelioonnaf Notntoereereesdettheeattadailsilqnsutfoahonleltosiwzedffistinnemcthohnsetrtneolteinxtugtndsdeeercptioiicortn.ane.ddinomFigp.a1ck,eotf wlosseshich chheanpnlaenlst,, sceaeuFsiingg. 1.pTachkestesattotacΘkes jdarmoptphedcoamnmduhneicnacteiona was addressed in Tsumura et al. Σ2009Π. Non-quantized ΣtemporalΠ loss of communication, see, e.g., De Persis was addressed in Tsumura et al. Σ2009Π. Non-quantized atnedmpToersailΠΣ2l0o1s5sΠ;ofDcoolkmmetunailc.atΣi2o0n1,7Πs,eew, hei.cgh., cDonesiPderseids losses are discussed extensivelffi in Hespanha et al. Σ2007Π; the staΘilizing control proΘlems under unlimited data-rate losses are discussed extensivelffi in Hespanha et al. Σ2007Π; tnahhneeetdwssottTaarekΘΘssiiilliiszzΣuii2nnΘ0ggj1ecc5cooΠt;nntttDrroooollDlkpporrΦooeΘΘtalleetammtla.ssckΣuu2snn.0dd1Mee7rrΠo,uutinnwvllaiihmmtieciidhtteeddΘcfofddinaaΘsttiiaatd--erarraetetde lossesestswesorarkreeddcioscucnutrssedoseldsffexisxtteenmnssiitvhealffifti ienxpHespeersiepnancnehraaetntdalolm. Σp2007Πa0c0k7eΠt; networks suΘject to DoΦ attacks. Motivated Θffi Θit-rate Φchenato et al. Σ2007Π; Zhang et al. Σ2013Π. However, nltihemeettwwitsoaotartrikkΘossinlisszuuinoΘΘfgjjeetccchottentttcrooomlDDpmoorΦΦuoΘnaaliecttmtataatscicokkunssn..dcMMheraoonuttniinvvelaailmstt,eeiddotetdΘΘhffeffdiiraΘΘstiitattu---rradaiettees DolocshsΦeensaattaatroecdkestisccaaulsn.seΣΘd2e0e0sxo7tphΠe;nistisZivhecaalnffllffiigineotHrgeaaslpniz.aΣne2hd0a1a3endΠt.aHlla.ouΣw2n0ec0vh7eeΠrd;, limhavitaeΘtioeennscoofnducthetecodmremguanrdingicatiothen chpaermnneislss,iΘleothecorarsstudieenesss ΦDochΦenaatttaocketscaaln. ΣΘ2007Πesoph;istiZhcaanllffig etorgalaniz. Σe2013Πdand. Hlaouwnecvheerd, limtwitoartikosnsuoΘfjetchte tcomDmoΦunaictataticokns.cMhaontnivealst,edotΘhfefirΘsittu-rdaietes intelligentlffi, in the sense that attackers would trffi to max-have Θeen conducted regarding the permissiΘle coarseness intelligentlffi, in the sense that attackers would trffi to max-ofavqeuaΘneteinzecdonsidguncatlesdforregstaarΘdiilnizgatthioenp, esurmchisassiΘBleroccokaertstenaensds adversarffi{\textquoteright}s Θehaviour using stochastic processes such as LiΘerzon Σ2000Π; Elia and Mitter Σ2001Π; LiΘerzon Σ2003Π; adversarffi{\textquoteright}s Θehaviour using stochastic processes such as LfiΘqeuraznotnizΣe2d00si0gΠn;aElsliafoarnsdtaMΘiliitztaetrioΣ2n0,0s1uΠc;hLaisΘeBrrzocnkeΣt2t00a3nΠd; randompacketlossesishardlffijustified.Thismotivatesthe Fu and Xie Σ2005Π. random packet losses is hardlffi justified. This motivates the FHLuuioΘwaaeernnzvddoenrXX,Σiiree2e0lΣΣa022t000ivΠ00;e55lEΠΠff..ililittlea andwMorkittiserdoΣ2001Πneon;quaLiΘnertizonzedΣc2003Πontro;l dadenvvdeelroosmpamrpffiea{\textquoteright}sncktΘeeothfloaavssineosuewrisuhtsahirendoglrffesittjiuocscathliafiasentdiac.lTffpishrisoiscfmeosrosetqisvuasautnectshiztehades under DoΦ attacks. In Wakaiki et al. Σ2018Π, the case raenvdeloompmpeanckteotfloassnesewishtahredolrffeitjiucsatlifiaenda.lTffishisisfmorotqivuaatnetsiztehde HunodweerveDr,orΦelaattitvaeclkffisl.itItnlewWoarkkaiiskidoenteaoln. qΣu20a1n8tiΠz,edthceonctarsoel perotwΘaoΘrkileidtfficaonndtreoxlpseffcisttaetmiosnutfnfipdeeranDaolΦffisesisnacreetnhoetcalpapssliiccaa-l unodweerveDr,orΦelatitvaeclkffisl.itItnle wWoarkkaiiskidoenteaoln. qΣu20a1n8tiΠz,edthceonctarsoel proΘaΘilitffi and expectation tffipe analffises are not applica-ochfaquannenltoizfethed coplantnrotlisundeinverstigDoaΦted,attawcheksreoavseinr theFengoutpuetal.t proerotwΘaaoΘrkileidtfficaondndtreoxplpseffcistataetiomiosnutfnfipdeeranaDaolffisΦffisesisnacreeetnohoetcalpplicapssliiccaa-l ofndqeuranDtiozΦedacttoanctkrso.l IunndWerakDaoikΦi aetttaaclk.s Σo2v0e1r8Πt,hethoeutcpauset Θleadveinrsartheffi.context of DoΦ attacks launched Θffi a malicious cΣ2h0a2nne0Πltheof theminiplamunmt isdaitanverastigteaisteded,rwivheedrefoalsloinwingFengtheetlineal. ΘleoΘinaΘtihlietffcioanntdexetxpofecDtaotΦioantttafficpkesalnaualnffcisheesdarΘeffinaotmaplipcliiocuas- chfaqnunaenltoizfetdhecopnlatnrotlisuinndveerstDigoaΦtedat,twachkesreoavseirntFheengouettpault. adversarffi. cΣ2h0a2n0nΠelthoef tmhienipmlaunmt idsaitnaversattiegaistedde,rwivhederfeoalsloiwniFngentghetlianle. adversarffi. ΣoΣ22hf00ar22ne00snΠΠeealttrhhoceefhtmmohiifenn,iipemml.aguun.mm,tNiddsaaaiittnraaveerrtsaatattieelg.aiissΣt2edd0dee0,rr7wiivvΠh.eeddeTroffeooalltsllhooiewwniiΘFnneggesntttghhoeeftlltiiahnnleee. aduvrecrsoanrtfrfi.iΘutions in this paper form a step towards solving of research of, e.g., Nair et al. Σ2007Π. To the Θest of the Our contriΘutions in this paper form a step towards solving ★ofTrheissewarocrhk woaf,s esu.gp.p,oNrtaedirinetthael.pΣa2rt00b7yΠt.hTe oJStTheCRΘEesStToGf rtahnet Our contriΘutions in this paper form a step towards solving NofoT.rheJisPseMwaroJcrChkRwo1a5f,sKe3su.gap.np,doNrbtaeydirJiSnePttShaelu.npΣda2retr00bG7yrΠat.nhTte-ioJnS-tAThiedCRΘfoEersStSTcoieGfnrttaihfniect★Σ2f0r2e0sΠeatrhcehmoifn,iem.gu.m,Ndaaitraertaatel.isΣ2d0e0r7ivΠ.edTofoltlhoewiΘnegstthoefltihne thethatprostaΘΘilizlemesofthefindingsffistemt,hewheconarsethestmpaoxsismiΘleumquaduranttioizenr ★ This work was supported in the part by the JST CREST Grant that staΘilizes the sffistem, when the maximum duration Reos.eJaPrcMhJGCrRan1t5KN3o.a1n8dH0b1y46J0S.PS under Grant-in-Aid for Scientific of the DoΦ attack is known. In fact, we consider a more No. JPMJCR15K3 and by JSPS under Grant-in-Aid for Scientific that staΘilizes the sffistem, when the maximum duration RNeoTs.ehJaiPrscMhwoJGrCkrRawn1ta5sKN3so.uap18Hnpdor01460.bteydJiSnPtSheunpdaretr bGyratnhte-iJnS-ATidCRfoErSSTcieGnrtaifnict of the DoΦ attack is known. In fact, we consider a more Research Grant No. 18H01460. thf atthestDaΘoiΦlizaetstatchke issffisktneomw,nw. hInenfatchte, wmeaxciomnusimderduaramtoiorne R2405-8963 Copyright esearch Grant No. 18H{\textcopyright} 2020 The Authors. This is an open access article under the CC BY-NC-ND license01460. of the DoΦ attack is know. n. In fact, we consider a more Peer review under responsibility of International Federation of Automatic Control. 10.1016/j.ifacol.2020.12.1702 Publisher Copyright: Copyright {\textcopyright} 2020 The Authors. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0); 21st World Congress of the International Federation of Aufomatic Control (IFAC 2020 World Congress), IFAC 2020 ; Conference date: 12-07-2020 Through 17-07-2020",
year = "2020",
doi = "10.1016/j.ifacol.2020.12.1702",
language = "English",
volume = "53",
pages = "3496--3501",
journal = "IFAC-PapersOnLine",
issn = "2405-8963",
publisher = "Elsevier",
number = "2",
url = "https://www.ifac2020.org/",
}