-
A Verifiable Computing Scheme for Encrypted Control Systems
Authors:
Francesca Stabile,
Walter Lucia,
Amr Youssef,
Giuseppe Franze
Abstract:
The proliferation of cloud computing technologies has paved the way for deploying networked encrypted control systems, offering high performance, remote accessibility and privacy. However, in scenarios where the control algorithms run on third-party cloud service providers, the control logic might be changed by a malicious agent on the cloud. Consequently, it is imperative to verify the correctnes…
▽ More
The proliferation of cloud computing technologies has paved the way for deploying networked encrypted control systems, offering high performance, remote accessibility and privacy. However, in scenarios where the control algorithms run on third-party cloud service providers, the control logic might be changed by a malicious agent on the cloud. Consequently, it is imperative to verify the correctness of the control signals received from the cloud. Traditional verification methods, like zero-knowledge proof techniques, are computationally demanding in both proof generation and verification, may require several rounds of interactions between the prover and verifier and, consequently, are inapplicable in realtime control system applications. In this paper, we present a novel computationally inexpensive verifiable computing solution inspired by the probabilistic cut-and-choose approach. The proposed scheme allows the plant's actuator to validate the computations accomplished by the encrypted cloud-based networked controller without compromising the control scheme's performance. We showcase the effectiveness and real-time applicability of the proposed verifiable computation scheme using a remotely controlled Khepera IV differential-drive robot.
△ Less
Submitted 28 May, 2024;
originally announced May 2024.
-
A Feedback Linearized Model Predictive Control Strategy for Input-Constrained Self-Driving Cars
Authors:
Cristian Tiriolo,
Walter Lucia
Abstract:
This paper proposes a novel real-time affordable solution to the trajectory tracking control problem for self-driving cars subject to longitudinal and steering angular velocity constraints. To this end, we develop a dual-mode Model Predictive Control (MPC) solution starting from an input-output feedback linearized description of the vehicle kinematics. First, we derive the state-dependent input co…
▽ More
This paper proposes a novel real-time affordable solution to the trajectory tracking control problem for self-driving cars subject to longitudinal and steering angular velocity constraints. To this end, we develop a dual-mode Model Predictive Control (MPC) solution starting from an input-output feedback linearized description of the vehicle kinematics. First, we derive the state-dependent input constraints acting on the linearized model and characterize their worst-case time-invariant inner approximation. Then, a dual-mode MPC is derived to be real-time affordable and ensuring, by design, constraints fulfillment, recursive feasibility, and uniformly ultimate boundedness of the tracking error in an ad-hoc built robust control invariant region. The approach's effectiveness and performance are experimentally validated via laboratory experiments on a Quanser Qcar. The obtained results show that the proposed solution is computationally affordable and with tracking capabilities that outperform two alternative control schemes.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
A Modular Safety Filter for Safety-Certified Cyber-Physical Systems
Authors:
Mohammad Bajelani,
Walter Lucia,
Klaske van Heusden
Abstract:
Nowadays, many control systems are networked and embed communication and computation capabilities. Such control architectures are prone to cyber attacks on the cyberinfrastructure. Consequently, there is an impellent need to develop solutions to preserve the plant's safety against potential attacks. To ensure safety, this paper introduces a modular safety filter approach that is effective for a va…
▽ More
Nowadays, many control systems are networked and embed communication and computation capabilities. Such control architectures are prone to cyber attacks on the cyberinfrastructure. Consequently, there is an impellent need to develop solutions to preserve the plant's safety against potential attacks. To ensure safety, this paper introduces a modular safety filter approach that is effective for a variety of cyber-attack types. This solution can be implemented in combination with existing control and detection algorithms, effectively separating safety from performance. The safety filter does not require information on the reliability of the received command or the feature of the used anomaly detector. It can be implemented in conjunction with high-performance, resilient controllers, to achieve both high performance during normal operation and safety during an attack. As an illustrative example, we have shown the effectiveness of the proposed design considering a multi-agent formation task involving 20 mobile robots. The simulation results testify that the safety filter operates effectively during false data injection and intelligent attacks.
△ Less
Submitted 23 March, 2024;
originally announced March 2024.
-
A Constrained Tracking Controller for Ramp and Sinusoidal Reference Signals using Robust Positive Invariance
Authors:
Geovana Franca dos Santos,
Eugenio B. Castelan,
Walter Lucia
Abstract:
This paper proposes an output feedback controller capable of ensuring steady-state offset-free tracking for ramp and sinusoidal reference signals while ensuring local stability and state and input constraints fulfillment. The proposed solution is derived by jointly exploiting the internal model principle, polyhedral robust positively invariant arguments, and the Extended Farkas' Lemma. In particul…
▽ More
This paper proposes an output feedback controller capable of ensuring steady-state offset-free tracking for ramp and sinusoidal reference signals while ensuring local stability and state and input constraints fulfillment. The proposed solution is derived by jointly exploiting the internal model principle, polyhedral robust positively invariant arguments, and the Extended Farkas' Lemma. In particular, by considering a generic class of output feedback controller equipped with a feedforward term, a proportional effect, and a double integrator, we offline design the controller's gains by means of a single bilinear optimization problem. A peculiar feature of the proposed design is that the sets of all the admissible reference signals and the plant's initial conditions are also offline determined. Simulation results are provided to testify to the effectiveness of the proposed tracking controller and its capability to deal with both state and input constraints.
△ Less
Submitted 14 March, 2024; v1 submitted 13 March, 2024;
originally announced March 2024.
-
Collision-Free Platooning of Mobile Robots through a Set-Theoretic Predictive Control Approach
Authors:
Suryaprakash Rajkumar,
Cristian Tiriolo,
Walter Lucia
Abstract:
This paper proposes a control solution to achieve collision-free platooning control of input-constrained mobile robots. The platooning policy is based on a leader-follower approach where the leader tracks a reference trajectory while followers track the leader's pose with an inter-agent delay. First, the leader and the follower kinematic models are feedback linearized and the platoon's error dynam…
▽ More
This paper proposes a control solution to achieve collision-free platooning control of input-constrained mobile robots. The platooning policy is based on a leader-follower approach where the leader tracks a reference trajectory while followers track the leader's pose with an inter-agent delay. First, the leader and the follower kinematic models are feedback linearized and the platoon's error dynamics and input constraints characterized. Then, a set-theoretic model predictive control strategy is proposed to address the platooning trajectory tracking control problem. An ad-hoc collision avoidance policy is also proposed to guarantee collision avoidance amongst the agents. Finally, the effectiveness of the proposed control architecture is validated through experiments performed on a formation of Khepera IV differential drive robots
△ Less
Submitted 13 March, 2024;
originally announced March 2024.
-
A Data-Driven Safety Preserving Control Architecture for Constrained Cyber-Physical Systems
Authors:
Mehran Attar,
Walter Lucia
Abstract:
In this paper, we propose a data-driven networked control architecture for unknown and constrained cyber-physical systems capable of detecting networked false-data-injection attacks and ensuring plant's safety. In particular, on the controller's side, we design a novel robust anomaly detector that can discover the presence of network attacks using a data-driven outer approximation of the expected…
▽ More
In this paper, we propose a data-driven networked control architecture for unknown and constrained cyber-physical systems capable of detecting networked false-data-injection attacks and ensuring plant's safety. In particular, on the controller's side, we design a novel robust anomaly detector that can discover the presence of network attacks using a data-driven outer approximation of the expected robust one-step reachable set. On the other hand, on the plant's side, we design a data-driven safety verification module, which resorts to worst-case arguments to determine if the received control input is safe for the plant's evolution. Whenever necessary, the same module is in charge of replacing the networked controller with a local data-driven set-theoretic model predictive controller, whose objective is to keep the plant's trajectory in a pre-established safe configuration until an attack-free condition is recovered. Numerical simulations involving a two-tank water system illustrate the features and capabilities of the proposed control architecture.
△ Less
Submitted 21 February, 2024; v1 submitted 1 December, 2023;
originally announced December 2023.
-
An Observer-Based Key Agreement Scheme for Remotely Controlled Mobile Robots
Authors:
Amir Mohammad Naseri,
Walter Lucia,
Amr Youssef
Abstract:
Remotely controlled mobile robots are important examples of Cyber-Physical Systems (CPSs). Recently, these robots are being deployed in many safety critical applications. Therefore, ensuring their cyber-security is of paramount importance. Different control schemes that have been proposed to secure such systems against sophisticated cyber-attacks require the exchange of secret messages between the…
▽ More
Remotely controlled mobile robots are important examples of Cyber-Physical Systems (CPSs). Recently, these robots are being deployed in many safety critical applications. Therefore, ensuring their cyber-security is of paramount importance. Different control schemes that have been proposed to secure such systems against sophisticated cyber-attacks require the exchange of secret messages between their smart actuators and the remote controller. Thus, these schemes require pre-shared secret keys, or an established Public Key Infrastructure (PKI) that allows for key agreement. Such cryptographic approaches might not always be suitable for the deployment environments of such remotely mobile robots. To address this problem, in this paper, we consider a control theoretic approach for establishing a secret key between the remotely controlled robot and the networked controller without resorting to traditional cryptographic techniques. Our key agreement scheme leverages a nonlinear unknown input observer and an error correction code mechanism to allow the robot to securely agree on a secret key with its remote controller. To validate the proposed scheme, we implement it using a Khepera-IV differential drive robot and evaluate its efficiency and the additional control cost acquired by it. Our experimental results confirm the effectiveness of the proposed key establishment scheme.
△ Less
Submitted 23 October, 2023; v1 submitted 8 March, 2023;
originally announced March 2023.
-
Data-Driven Robust Backward Reachable Sets for Set-Theoretic Model Predictive Control
Authors:
Mehran Attar,
Walter Lucia
Abstract:
In this paper, we propose a novel approach for computing robust backward reachable sets from noisy data for unknown constrained linear systems subject to bounded disturbances. In particular, we develop an algorithm for obtaining zonotopic inner approximations that can be used for control purposes. It is shown that such sets, if built on an extended space including states and inputs, can be used to…
▽ More
In this paper, we propose a novel approach for computing robust backward reachable sets from noisy data for unknown constrained linear systems subject to bounded disturbances. In particular, we develop an algorithm for obtaining zonotopic inner approximations that can be used for control purposes. It is shown that such sets, if built on an extended space including states and inputs, can be used to embed the system's one-step evolution in the computed extended regions. Such a result is then exploited to build a set-theoretic model predictive controller that, offline, builds a recursive family of robust data-driven reachable sets, and online, computes recursively admissible control actions without explicitly resorting to either a model of the system or the available data.The validity of the proposed data-driven solution is verified by means of a numerical simulation and its performance is contrasted with the model-based counterpart.
△ Less
Submitted 20 December, 2023; v1 submitted 8 March, 2023;
originally announced March 2023.
-
Wyner wiretap-like encoding scheme for cyber-physical systems
Authors:
Walter Lucia,
Amr Youssef
Abstract:
In this study, the authors consider the problem of exchanging secrete messages in cyber-physical systems (CPSs) without resorting to cryptographic solutions. In particular, they consider a CPS where the networked controller wants to send a secrete message to the plant. They show that such a problem can be solved by exploiting a Wyner wiretap-like encoding scheme taking advantage of the closed-loop…
▽ More
In this study, the authors consider the problem of exchanging secrete messages in cyber-physical systems (CPSs) without resorting to cryptographic solutions. In particular, they consider a CPS where the networked controller wants to send a secrete message to the plant. They show that such a problem can be solved by exploiting a Wyner wiretap-like encoding scheme taking advantage of the closed-loop operations typical of feedback control systems. Specifically, by resorting to the control concept of one-step reachable sets, they first show that a wiretap-like encoding scheme exists whenever there is an asymmetry in the plant model knowledge available to control system (the defender) and to the eavesdropper. The effectiveness of the proposed scheme is confirmed by means of a numerical example. Finally, they conclude the study by presenting open design challenges that can be addressed by the research community to improve, in different directions, the secrete message exchange problem in CPSs
△ Less
Submitted 7 May, 2021;
originally announced May 2021.
-
On Securing Cloud-hosted Cyber-physical Systems Using Trusted Execution Environments
Authors:
Amir Mohammad Naseri,
Walter Lucia,
Mohammad Mannan,
Amr Youssef
Abstract:
Recently, cloud control systems have gained increasing attention from the research community as a solution to implement networked cyber-physical systems (CPSs). Such an architecture can reduce deployment and maintenance costs albeit at the expense of additional security and privacy concerns. In this paper, first, we discuss state-of-the-art security solutions for cloud control systems and their li…
▽ More
Recently, cloud control systems have gained increasing attention from the research community as a solution to implement networked cyber-physical systems (CPSs). Such an architecture can reduce deployment and maintenance costs albeit at the expense of additional security and privacy concerns. In this paper, first, we discuss state-of-the-art security solutions for cloud control systems and their limitations. Then, we propose a novel control architecture based on Trusted Execution Environments (TEE). We show that such an approach can potentially address major security and privacy issues for cloud-hosted control systems. Finally, we present an implementation setup based on Intel Software Guard Extensions (SGX) and validate its effectiveness on a testbed system.
△ Less
Submitted 31 March, 2021;
originally announced April 2021.
-
Networked Constrained Cyber-Physical Systems subject to malicious attacks: a resilient set-theoretic control approach
Authors:
Walter Lucia,
Bruno Sinopoli,
Giuseppe Franze'
Abstract:
In this paper a novel set-theoretic control framework for Networked Constrained Cyber-Physical Systems is presented. By resorting to set-theoretic ideas and the physical watermarking concept, an anomaly detector module and a control remediation strategy are formally derived with the aim to contrast severe cyber attacks affecting the communication channels. The resulting scheme ensures Uniformly Ul…
▽ More
In this paper a novel set-theoretic control framework for Networked Constrained Cyber-Physical Systems is presented. By resorting to set-theoretic ideas and the physical watermarking concept, an anomaly detector module and a control remediation strategy are formally derived with the aim to contrast severe cyber attacks affecting the communication channels. The resulting scheme ensures Uniformly Ultimate Boundedness and constraints fulfillment regardless of any admissible attack scenario. Simulation results show the effectiveness of the proposed strategy both against Denial of Service and False Data Injection attacks.
△ Less
Submitted 25 March, 2016;
originally announced March 2016.
-
Multi-dimensional Conversation Analysis across Online Social Networks
Authors:
William Lucia,
Cuneyt Gurcan Akcora,
Elena Ferrari
Abstract:
With the advance of the Internet, ordinary users have created multiple personal accounts on online social networks, and interactions among these social network users have recently been tagged with location information. In this work, we observe user interactions across two popular online social networks, Facebook and Twitter, and analyze which factors lead to retweet/like interactions for tweets/po…
▽ More
With the advance of the Internet, ordinary users have created multiple personal accounts on online social networks, and interactions among these social network users have recently been tagged with location information. In this work, we observe user interactions across two popular online social networks, Facebook and Twitter, and analyze which factors lead to retweet/like interactions for tweets/posts. In addition to the named entities, lexical errors and expressed sentiments in these data items, we also consider the impact of shared user locations on user interactions. In particular, we show that geolocations of users can greatly affect which social network post/tweet will be liked/ retweeted. We believe that the results of our analysis can help researchers to understand which social network content will have better visibility.
△ Less
Submitted 23 December, 2013;
originally announced December 2013.