{"title":"IEEE Open Journal of Control Systems Publication Information","authors":"","doi":"10.1109/OJCSYS.2024.3360362","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3360362","url":null,"abstract":"","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"3 ","pages":"C2-C2"},"PeriodicalIF":0.0,"publicationDate":"2025-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10832461","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Watermarking for Finite Markov Decision Processes","authors":"Jiacheng Tang;Jiguo Song;Abhishek Gupta","doi":"10.1109/OJCSYS.2025.3526003","DOIUrl":"https://doi.org/10.1109/OJCSYS.2025.3526003","url":null,"abstract":"Dynamic watermarking is an active intrusion detection technique that can potentially detect replay attacks, spoofing attacks, and deception attacks in the feedback channel for control systems. In this paper, we develop a novel dynamic watermarking algorithm for finite-state finite-action Markov decision processes. We derive a lower bound on the mean time between false alarms and an upper bound on the mean delay between the time an attack occurs and when it is detected. We further compute the sensitivity of the performance of the control system as a function of the watermark. We demonstrate the effectiveness of the proposed dynamic watermarking algorithm by detecting a spoofing attack in a sensor network system.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"4 ","pages":"41-52"},"PeriodicalIF":0.0,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10824908","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143106756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hyung Jun Kim;Mohammadreza Kamaldar;Dennis S. Bernstein
{"title":"Initial Undershoot in Discrete-Time Input–Output Hammerstein Systems","authors":"Hyung Jun Kim;Mohammadreza Kamaldar;Dennis S. Bernstein","doi":"10.1109/OJCSYS.2025.3525983","DOIUrl":"https://doi.org/10.1109/OJCSYS.2025.3525983","url":null,"abstract":"This paper considers initial undershoot in the step response of discrete-time, input-output Hammerstein (DIH) systems, which have linear unforced dynamics and nonlinear zero dynamics (ZD). Initial undershoot occurs when the step response of a system moves initially in a direction that is opposite to the direction of the asymptotic response. For DIH systems, the paper investigates the relationship among the existence of initial undershoot, the step height, the height-dependent delay, and the stability of the ZD. For linear, time-invariant systems, the height-dependent delay specializes to the relative degree. The main result of the paper provides conditions under which, for all sufficiently small step heights, initial undershoot in the step response of a DIH system implies instability of the ZD. Several examples of DIH systems are presented to illustrate these results.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"4 ","pages":"30-40"},"PeriodicalIF":0.0,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10824927","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143106754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantization Effects on Zero-Dynamics Attacks to Closed-Loop Sampled-Data Control Systems","authors":"Xile Kang;Hideaki Ishii","doi":"10.1109/OJCSYS.2024.3508396","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3508396","url":null,"abstract":"This paper focuses on cyber-security issues of networked control systems in closed-loop forms from the perspective of quantized sampled-data systems. Quantization of control inputs adds quantization error to the plant input, resulting in certain variation in the plant output. On the other hand, sampling can introduce non-minimum phase zeros in discretized systems. We consider zero-dynamics attacks, which is a class of false data injection attacks utilizing such unstable zeros. Although non-quantized zero-dynamics attacks are undetectable from the plant output side, quantized attacks may be revealed by larger output variation. Our setting is that the attack signal is applied with the same uniform quantizer used for the control input. We evaluate the attack stealthiness in the closed-loop system setting by quantifying the output variation. Specifically, we characterize the cases for static and dynamic quantization in the attack signal, while keeping the control input statically quantized. Then we demonstrate that the attacker can reduce such output variation with a modified approach, by compensating the quantization error of the attack signal inside the attack dynamics. We provide numerical examples to illustrate the effectiveness of the proposed approaches. We show that observing the quantized control input value by a mirroring model can reveal the zero-dynamics attacks.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"4 ","pages":"18-29"},"PeriodicalIF":0.0,"publicationDate":"2024-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10770577","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exact Recovery for System Identification With More Corrupt Data Than Clean Data","authors":"Baturalp Yalcin;Haixiang Zhang;Javad Lavaei;Murat Arcak","doi":"10.1109/OJCSYS.2024.3507452","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3507452","url":null,"abstract":"This paper investigates the system identification problem for linear discrete-time systems under adversaries and analyzes two lasso-type estimators. We examine non-asymptotic properties of these estimators in two separate scenarios, corresponding to deterministic and stochastic models for the attack times. We prove that when the system is stable and attacks are injected periodically, the sample complexity for exact recovery of the system dynamics is linear in terms of the dimension of the states. When adversarial attacks occur at each time instance with probability \u0000<inline-formula><tex-math>$p$</tex-math></inline-formula>\u0000, the required sample complexity for exact recovery scales polynomially in the dimension of the states and the probability \u0000<inline-formula><tex-math>$p$</tex-math></inline-formula>\u0000. This result implies almost sure convergence to the true system dynamics under the asymptotic regime. As a by-product, our estimators still learn the system correctly even when more than half of the data is compromised. We emphasize that the attack vectors are allowed to be correlated with each other in this work. This paper provides the first mathematical guarantee in the literature on learning from correlated data for dynamical systems in the case when there is less clean data than corrupt data.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"4 ","pages":"1-17"},"PeriodicalIF":0.0,"publicationDate":"2024-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10769004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Control of Endemic Epidemic Diseases With Behavioral Response","authors":"Francesco Parino;Lorenzo Zino;Alessandro Rizzo","doi":"10.1109/OJCSYS.2024.3488567","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3488567","url":null,"abstract":"Behavioral factors play a crucial role in the emergence, spread, and containment of human diseases, significantly influencing the effectiveness of intervention measures. However, the integration of such factors into epidemic models is still limited, hindering the possibility of understanding how to optimally design interventions to mitigate epidemic outbreaks in real life. This paper aims to fill in this gap. In particular, we propose a parsimonious model that couples an epidemic compartmental model with a population game that captures the behavioral response, obtaining a nonlinear system of ordinary differential equations. Grounded on prevalence-elastic behavior—the empirically proven assumption that the disease prevalence affects the adherence to self-protective behavior—we consider a nontrivial negative feedback between contagions and adoption of self-protective behavior. We characterize the asymptotic behavior of the system, establishing conditions under which the disease is quickly eradicated or a global convergence to an endemic equilibrium is attained. In addition, we elucidate how the behavioral response affects the endemic equilibrium. Then, we formulate and solve an optimal control problem to plan cost-effective interventions for the model, accounting for their healthcare and social-economical implications. Numerical simulations on a case study calibrated on sexually transmitted diseases demonstrate and validate our findings.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"3 ","pages":"483-496"},"PeriodicalIF":0.0,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10738387","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142694671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Resilience Guarantees by Finite-Time Robust Control Barrier Functions With Application to Power Inverter Networks","authors":"Kamil Hassan;Daniel Selvaratnam;Henrik Sandberg","doi":"10.1109/OJCSYS.2024.3487408","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3487408","url":null,"abstract":"In this study, a control theoretic description of resilience is provided to quantify the characteristics of a resilient system. The aim is to establish a paradigm for resilient control design based on tangible control objectives that yield desirable attributes for safety-critical systems. In that regard, durability and recoverability properties are identified as key components of the proposed resilience framework and, to offer a methodology to enforce these attributes, the notion of finite-time robust control barrier function (FR-CBF) is introduced. Furthermore, to offer a comprehensive treatment of the problem, resilient control design is investigated for both continuous and sampled-data systems. To that end, FR-CBF-based design conditions for both continuous and piece-wise constant zero-order hold (ZOH) control inputs are included. Moreover, to provide a concrete example of how the proposed framework could be adopted for safety-critical control applications, in this study we also investigate the voltage regulation problem for inverter-interfaced radial power distribution networks subject to adversarial injections. In that regard, sufficient conditions for both the continuous and sampled-data ZOH control are derived to guarantee finite-time recovery and safe operation of the distribution grid in accordance with the proposed resilience framework. Finally, the efficacy of the proposed results is advocated using a simulation study showing resilient grid performance in the presence of the ‘worst-case’ power injection attack, as reported in (Lindström et al. 2021).","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"3 ","pages":"497-513"},"PeriodicalIF":0.0,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10737302","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142875106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resilient Multi-Agent Systems Against Denial of Service Attacks via Adaptive and Activatable Network Layers","authors":"Deepalakshmi Babu Venkateswaran;Zhihua Qu","doi":"10.1109/OJCSYS.2024.3477091","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3477091","url":null,"abstract":"This paper tackles the challenge of maintaining resilience in multi-agent systems under Denial of Service (DoS) attacks by proposing a robust architecture that includes an instantaneous detection algorithm for connectivity losses and a dynamic system to activate backup network layers when disruptions occur. We also introduce a simplified approach that reduces the number of required layers through an adaptive repair algorithm. The simulation section, divided into two parts, demonstrates the effectiveness of the algorithm: one part showcases its scalability in a large-scale system, and the other applies it to a real-world power system using the IEEE 123-node system. Both simulations confirm that the proposed approach significantly enhances system stability and performance under attack conditions.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"3 ","pages":"472-482"},"PeriodicalIF":0.0,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10710321","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142694672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alexander A. Nguyen;Faryar Jabbari;Magnus Egerstedt
{"title":"Resiliency Through Collaboration in Heterogeneous Multi-Robot Systems","authors":"Alexander A. Nguyen;Faryar Jabbari;Magnus Egerstedt","doi":"10.1109/OJCSYS.2024.3467991","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3467991","url":null,"abstract":"This paper examines pairwise collaborations in heterogeneous multi-robot systems. In particular, we focus on how individual robots, with different functionalities and dynamics, can enhance their resilience by forming collaborative arrangements that result in new capabilities. Control barrier functions are utilized as a mechanism to encode the safe operating regions of individual robots, with the idea being that a robot may be able to operate in new regions that it could not traverse alone by working with other robots. We explore answers to three questions: “Why should robots collaborate?”, “When should robots collaborate?”, and “How can robots collaborate?” To that end, we introduce the safely reachable set – capturing the regions that individual robots can reach safely, either with or without help, while considering their initial states and dynamics. We then describe the conditions under which a help-providing robot and a help-receiving robot can engage in collaboration. Next, we describe the pairwise collaboration framework, modeled through hybrid automata, to show how collaborations can be structured within a heterogeneous multi-robot team. Finally, we present case studies that are conducted on a team of mobile robots.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"3 ","pages":"461-471"},"PeriodicalIF":0.0,"publicationDate":"2024-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10693575","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142595023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resilient Synchronization of Pulse-Coupled Oscillators Under Stealthy Attacks","authors":"Yugo Iori;Hideaki Ishii","doi":"10.1109/OJCSYS.2024.3458593","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3458593","url":null,"abstract":"This paper studies a clock synchronization problem for wireless sensor networks employing pulse-based communication when some of the nodes are faulty or even adversarial. The objective is to design resilient distributed algorithms for the nonfaulty nodes to keep the influence of the malicious nodes minimal and to arrive at synchronization in a safe manner. Compared with conventional approaches, our algorithms are more capable in the sense that they are applicable to networks taking noncomplete graph structures. Our approach is to extend the class of mean subsequence reduced (MSR) algorithms from the area of multi-agent consensus. First, we provide a simple detection method to find malicious nodes that transmit pulses irregularly. Then, we demonstrate that in the presence of adversaries avoiding to be detected, the normal nodes can reach synchronization by ignoring suspicious pulses. Two extensions of this algorithm are further presented, which can operate under more adversarial attacks and also with relaxed conditions on the initial phases. We illustrate the effectiveness of our results by numerical examples.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"3 ","pages":"429-444"},"PeriodicalIF":0.0,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10675443","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142430771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}