Enhanced stability analysis for networked control systems under random and malicious packet losses

Ahmet Cetinkaya, Hideaki Ishii, Tomohisa Hayakawa

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

We investigate the effects of random and malicious packet losses on the stability of a networked control system. Specifically, we explore the networked control problem for the case where the plant and the controller exchange state and control input packets over a communication channel that may face random transmission failures as well as malicious attacks by an intelligent agent. We obtain a sufficient condition for the stability of the networked system and show that this condition can be assessed by examining the solutions to linear programming problems. The coefficients of the constraints in these problems depend on an asymptotic upper-bound for the average number of transmission failures that we use for characterizing random packet losses and malicious attacks. We illustrate the efficacy of our results with a numerical example.

Original languageEnglish
Title of host publication2016 IEEE 55th Conference on Decision and Control, CDC 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2721-2726
Number of pages6
ISBN (Electronic)9781509018376
DOIs
Publication statusPublished - 2016 Dec 27
Externally publishedYes
Event55th IEEE Conference on Decision and Control, CDC 2016 - Las Vegas, United States
Duration: 2016 Dec 122016 Dec 14

Publication series

Name2016 IEEE 55th Conference on Decision and Control, CDC 2016

Conference

Conference55th IEEE Conference on Decision and Control, CDC 2016
Country/TerritoryUnited States
CityLas Vegas
Period16/12/1216/12/14

ASJC Scopus subject areas

  • Artificial Intelligence
  • Decision Sciences (miscellaneous)
  • Control and Optimization

Fingerprint

Dive into the research topics of 'Enhanced stability analysis for networked control systems under random and malicious packet losses'. Together they form a unique fingerprint.

Cite this