Shamila Nateghi, Y. Shtessel, R. Rajesh, S. S. Das
{"title":"Control of Nonlinear Cyber-Physical Systems under Attack Using Higher Order Sliding Mode Observer","authors":"Shamila Nateghi, Y. Shtessel, R. Rajesh, S. S. Das","doi":"10.1109/CCTA41146.2020.9206251","DOIUrl":null,"url":null,"abstract":"In this paper, resilient control of nonlinear cyber-physical systems under sensor and actuator attacks is investigated. At first, by using a low pass filter and the higher order sliding mode observer, the estimations of the attacks are computed. As soon as the attacks are reconstructed, the measurements are cleaned from the sensor attacks before being used in feedback control. It can stop the propagation of the sensor attacks into the system through the feedback control. Next, the control signal is cleaned from the actuator attacks. The efficacy of the proposed technique is illustrated via simulation results of a controlled electric power system whose measurements and actuators are corrupted by the cyber-attacks.","PeriodicalId":241335,"journal":{"name":"2020 IEEE Conference on Control Technology and Applications (CCTA)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE Conference on Control Technology and Applications (CCTA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCTA41146.2020.9206251","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
In this paper, resilient control of nonlinear cyber-physical systems under sensor and actuator attacks is investigated. At first, by using a low pass filter and the higher order sliding mode observer, the estimations of the attacks are computed. As soon as the attacks are reconstructed, the measurements are cleaned from the sensor attacks before being used in feedback control. It can stop the propagation of the sensor attacks into the system through the feedback control. Next, the control signal is cleaned from the actuator attacks. The efficacy of the proposed technique is illustrated via simulation results of a controlled electric power system whose measurements and actuators are corrupted by the cyber-attacks.