The rapid development of the cloud Computing Technologies (CCTs) has amended the conventional design of resource-constrained Network controlsystem (NCS) to the powerful and flexible design of cloud-based Networked Co...
详细信息
ISBN:
(纸本)9781728113128
The rapid development of the cloud Computing Technologies (CCTs) has amended the conventional design of resource-constrained Network controlsystem (NCS) to the powerful and flexible design of cloud-based Networked controlsystem (CB-NCS) by relocating the processing part to the cloud server. This arrangement has produced many internets based exquisite applications. However, this new arrangement has also raised many network security challenges for the cloud-based control system related to cyber-physical part of the system. In the absence of robust verification methodology, an attacker can launch the modification attack in order to destabilize or take control of NCS. It is desirable that there shall be a solution authentication methodology used to verify whether the incoming solutions are coming from the cloud or not. This paper proposes a methodology used for the verification of the receiving solution to the local controlsystem from the cloud using Karush-Kuhn-Tucker (KKT) conditions, which is then applied to actuator after verification and thus ensure the stability in case of modification attack.
The rapid development of the cloud Computing Technologies (CCTs) has amended the conventional design of resource-constrained Network controlsystem (NCS) to the powerful and flexible design of cloud-based Networked Co...
详细信息
The rapid development of the cloud Computing Technologies (CCTs) has amended the conventional design of resource-constrained Network controlsystem (NCS) to the powerful and flexible design of cloud-based Networked controlsystem (CB-NCS) by relocating the processing part to the cloud server. This arrangement has produced many internets based exquisite applications. However, this new arrangement has also raised many network security challenges for the cloud-based control system related to cyber-physical part of the system. In the absence of robust verification methodology, an attacker can launch the modification attack in order to destabilize or take control of NCS. It is desirable that there shall be a solution authentication methodology used to verify whether the incoming solutions are coming from the cloud or not. This paper proposes a methodology used for the verification of the receiving solution to the local controlsystem from the cloud using Karush-Kuhn-Tucker (KKT) conditions, which is then applied to actuator after verification and thus ensure the stability in case of modification attack.
The increasing availability of cloud computing services has revolutionized industrial productivity by providing essential tools for data storage, data transfer, and computation. In a cloud-based control system (CCS), ...
详细信息
ISBN:
(纸本)9798350363029;9798350363012
The increasing availability of cloud computing services has revolutionized industrial productivity by providing essential tools for data storage, data transfer, and computation. In a cloud-based control system (CCS), the controller is located in the cloud, thereby enabling complex computation processes such as nonlinear model predictive control (NMPC). Using cloud computing, expensive control algorithms can be deployed without the upfront cost of a local computing unit. The computation time can be drastically reduced due to the improved computing power, which is important in the case of systems with fast dynamics in combination with NMPC-basedcontrol to maintain the existing time step size with regard to the calculation time. Placing the controller in the cloud also introduces communication latency in the control loop. It has been highlighted in former studies that computation time and communication latency can reduce the reliability and stability of a CCS. This paper proposes a cloud-based model predictive control strategy that extends simple time delay compensation with event-basedcontrol to reduce the effect of computation and communication delays. The optimal input variable sequence is used until a new sequence is available. This event-based method reduces the amount of communication and redundant calculations. The developed CCS algorithm is implemented in the real-time control of an experimental pendulum crane system. The effects of the proposed algorithm in mitigating computation and communication delay are compared to another CCS strategy that only uses the first element of the sequence.
暂无评论