Secure LQG control for a Quadrotor under false data injection attacks

被引:16
|
作者
Lin, Hong [1 ]
Sun, Pei [1 ]
Cai, Chenxiao [2 ]
Lu, Shan [1 ]
Liu, He [1 ]
机构
[1] Shenzhen Polytech, Inst Intelligence Sci & Engn, Shenzhen 518055, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Automat, Nanjing 210094, Peoples R China
来源
IET CONTROL THEORY AND APPLICATIONS | 2022年 / 16卷 / 09期
基金
中国国家自然科学基金;
关键词
STATE ESTIMATION; SYSTEMS;
D O I
10.1049/cth2.12261
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The linear quadratic Gaussian (LQG) control for a quadrotor unmanned aerial vehicle (UAV) under false data injection attacks is studied. The LQG control depends on optimal state estimation, while this type of attacks makes the optimal state estimation unimplementable in practice. To address this problem, the authors prose a framework to detect attacks and then augment the information for controller design. Based on this framework, the LQG control is designed and a sufficient condition for the security of the closed-loop control system is given. Finally, the LQG controller is applied to a quadrotor UAV, and some experiments are carried out to illustrate its effectiveness.
引用
收藏
页码:925 / 934
页数:10
相关论文
共 50 条
  • [31] A Blockchain-Based Approach to Secure Networked Control Systems Against False Data Injection Attacks
    Mohamed vall Ould Mohamed
    Journal of Electrical Engineering & Technology, 2023, 18 : 2335 - 2342
  • [32] Security Analysis of Stochastic Networked Control Systems under False Data Injection Attacks
    Hu, Liang
    Wang, Zidong
    Naeem, Wasif
    2016 UKACC 11TH INTERNATIONAL CONFERENCE ON CONTROL (CONTROL), 2016,
  • [33] On adaptive resilient secondary control for DC microgrids under false data injection attacks
    Tawan, Shahab
    Batmani, Yazdan
    Shafiee, Qobad
    Konstantinou, Charalambos
    IET RENEWABLE POWER GENERATION, 2024, 18 (15) : 3405 - 3415
  • [34] Optimal Secure Control of Networked Control Systems Under False Data Injection Attacks: A Multi-Stage Attack-Defense Game Approach
    Du, Dajun
    Zhang, Yi
    Xu, Baoyue
    Fei, Minrui
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2025, 12 (04) : 821 - 823
  • [35] False Data Injection Attacks for Output Tracking Control Systems
    Pang Zhonghua
    Hou Fangyuan
    Zhou Yuguo
    Sun Dehui
    2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 6747 - 6752
  • [36] A Secure Hybrid Dynamic-State Estimation Approach for Power Systems Under False Data Injection Attacks
    Kazemi, Zahra
    Safavi, Ali Akbar
    Naseri, Farshid
    Urbas, Leon
    Setoodeh, Peyman
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (12) : 7275 - 7286
  • [37] Event-based secure control for cyber-physical systems against false data injection attacks
    Li, Jinyan
    Li, Xiao-Meng
    Cheng, Zhijian
    Ren, Hongru
    Li, Hongyi
    INFORMATION SCIENCES, 2024, 679
  • [38] New Approaches to Detection and Secure Control for Cyber-physical Systems Against False Data Injection Attacks
    Wang, Puying
    Zhang, Ruimei
    He, Xuxia
    INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS, 2025, 23 (01) : 332 - 345
  • [39] A resource-aware control approach to vehicle platoons under false data injection attacks
    Yang, Fan
    Gu, Zhou
    Hua, Lingzhi
    Yan, Shen
    ISA TRANSACTIONS, 2022, 131 : 367 - 376
  • [40] BMI-Based Load Frequency Control in Microgrids Under False Data Injection Attacks
    Javanmardi, Hamidreza
    Dehghani, Maryam
    Mohammadi, Mohsen
    Siamak, Sara
    Hesamzadeh, Mohammad Reza
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1021 - 1031