Skip to main content

Showing 1–6 of 6 results for author: Murguia, C

Searching in archive math. Search in all archives.
.
  1. arXiv:2307.15874  [pdf, ps, other

    eess.SY math.OC

    Resilient Controller Synthesis Against DoS Attacks for Vehicular Platooning in Spatial Domain

    Authors: Jian Gong, Carlos Murguia, Anggera Bayuwindra, **de Cao

    Abstract: This paper proposes a vehicular platoon control approach under Denial-of-Service (DoS) attacks and external disturbances. DoS attacks increase the service time on the communication network and cause additional transmission delays, which consequently increase the risk of rear-end collisions of vehicles in the platoon. To counter DoS attacks, we propose a resilient control scheme that exploits polyt… ▽ More

    Submitted 28 July, 2023; originally announced July 2023.

  2. arXiv:2304.10359  [pdf, other

    math.OC eess.SY

    Secondary Controller Design for the Safety of Nonlinear Systems via Sum-of-Squares Programming

    Authors: Yankai Lin, Michelle S. Chong, Carlos Murguia

    Abstract: We consider the problem of ensuring the safety of nonlinear control systems under adversarial signals. Using Lyapunov based reachability analysis, we first give sufficient conditions to assess safety, i.e., to guarantee that the states of the control system, when starting from a given initial set, always remain in a prescribed safe set. We consider polynomial systems with semi-algebraic safe sets.… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

  3. arXiv:1812.04168  [pdf, ps, other

    math.OC cs.CR eess.SY

    Secure and Private Implementation of Dynamic Controllers Using Semi-Homomorphic Encryption

    Authors: Carlos Murguia, Farhad Farokhi, Iman Shames

    Abstract: This paper presents a secure and private implementation of linear time-invariant dynamic controllers using Paillier's encryption, a semi-homomorphic encryption method. To avoid overflow or underflow within the encryption domain, the state of the controller is reset periodically. A control design approach is presented to ensure stability and optimize performance of the closed-loop system with encry… ▽ More

    Submitted 20 June, 2019; v1 submitted 10 December, 2018; originally announced December 2018.

    Comments: Improved numerical example

  4. arXiv:1710.02597  [pdf, other

    eess.SY math.DS math.OC

    A Comparison of Stealthy Sensor Attacks on Control Systems

    Authors: Navid Hashemi, Carlos Murguia, Justin Ruths

    Abstract: As more attention is paid to security in the context of control systems and as attacks occur to real control systems throughout the world, it has become clear that some of the most nefarious attacks are those that evade detection. The term stealthy has come to encompass a variety of techniques that attackers can employ to avoid detection. Here we show how the states of the system (in particular, t… ▽ More

    Submitted 6 October, 2017; originally announced October 2017.

  5. arXiv:1710.02576  [pdf, other

    eess.SY math.DS math.OC

    Constraining Attacker Capabilities Through Actuator Saturation

    Authors: Sahand Hadizadeh Kafash, Jairo Giraldo, Carlos Murguia, Alvaro A. Cardenas, Justin Ruths

    Abstract: For LTI control systems, we provide mathematical tools - in terms of Linear Matrix Inequalities - for computing outer ellipsoidal bounds on the reachable sets that attacks can induce in the system when they are subject to the physical limits of the actuators. Next, for a given set of dangerous states, states that (if reached) compromise the integrity or safe operation of the system, we provide too… ▽ More

    Submitted 6 October, 2017; originally announced October 2017.

  6. arXiv:1710.02573  [pdf, other

    eess.SY math.DS math.OC

    Tuning Windowed Chi-Squared Detectors for Sensor Attacks

    Authors: Tunga R, Carlos Murguia, Justin Ruths

    Abstract: A model-based windowed chi-squared procedure is proposed for identifying falsified sensor measurements. We employ the widely-used static chi-squared and the dynamic cumulative sum (CUSUM) fault/attack detection procedures as benchmarks to compare the performance of the windowed chi-squared detector. In particular, we characterize the state degradation that a class of attacks can induce to the syst… ▽ More

    Submitted 6 October, 2017; originally announced October 2017.