مقاله انگلیسی رایگان در مورد کنترل پیش بینی مدل شبکه ای با امنیت رایانه ای – الزویر ۲۰۲۲

مقاله انگلیسی رایگان در مورد کنترل پیش بینی مدل شبکه ای با امنیت رایانه ای – الزویر ۲۰۲۲

 

مشخصات مقاله
ترجمه عنوان مقاله امنیت سایبری در کنترل پیش بینی مدل شبکه ای و توزیع شده
عنوان انگلیسی مقاله Cyber-security in networked and distributed model predictive control
انتشار مقاله سال ۲۰۲۲
تعداد صفحات مقاله انگلیسی ۱۸ صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
پایگاه داده نشریه الزویر
نوع نگارش مقاله
مقاله مروری (Review Article)
مقاله بیس این مقاله بیس میباشد
نمایه (index) Scopus – Master Journal List – JCR
نوع مقاله ISI
فرمت مقاله انگلیسی  PDF
ایمپکت فاکتور(IF)
۱۱٫۴۷۳ در سال ۲۰۲۰
شاخص H_index ۸۶ در سال ۲۰۲۲
شاخص SJR ۳٫۷۴۲ در سال ۲۰۲۰
شناسه ISSN ۱۳۶۷-۵۷۸۸
شاخص Quartile (چارک) Q1 در سال ۲۰۲۰
فرضیه دارد
مدل مفهومی دارد
پرسشنامه ندارد
متغیر دارد
رفرنس دارد
رشته های مرتبط مهندسی فناوری اطلاعات – مهندسی کامپیوتر
گرایش های مرتبط اینترنت و شبکه های گسترده – شبکه های کامپیوتری – مهندسی کنترل
نوع ارائه مقاله
ژورنال
مجله  بررسی های سالانه در کنترل – Annual Reviews in Control
دانشگاه Department of Ingeniería de Sistemas y Automática, Universidad de Sevilla, Spain
کلمات کلیدی امنیت سایبری – کنترل توزیع شده – مدل کنترل پیش بینی – یادگیری
کلمات کلیدی انگلیسی Cyber-security – Distributed control – Model predictive control – Learning
شناسه دیجیتال – doi
https://doi.org/10.1016/j.arcontrol.2021.10.005
کد محصول e16794
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

فهرست مطالب مقاله:
Abstract
۱٫ Introduction
۲٫ Problem setting
۳٫ Cyber attacks in DMPC
۴٫ Cyber-defense mechanisms
۵٫ Conclusions
Declaration of Competing Interest
Acknowledgments
References

بخشی از متن مقاله:

Abstract

     Distributed model predictive control (DMPC) schemes have become a popular choice for networked control problems. Under this approach, local controllers use a model to predict its subsystem behavior during a certain horizon so as to find the sequence of inputs that optimizes its evolution according to a given criterion. Some convenient features of this method are the explicit handling of constraints and the exchange of information between controllers to coordinate their actuation and minimize undesired mutual interactions. However, we find that schemes have been developed naively, presenting flaws and vulnerabilities that malicious entities can exploit to gain leverage in cyber-attacks. The goal of this work is to raise awareness about this issue by reviewing the vulnerabilities of DMPC methods and surveying defense mechanisms. Finally, several examples are given to indicate how these defense mechanisms can be implemented in DMPC controllers.

Introduction

     The last years have witnessed a growing interest in distributed control methods due to their superior scalability in large-scale applications such as smart grids (Qi et al., 2011, Yazdanian and Mehrizi-Sani, 2014), water systems (Negenborn, van Overloop, Keviczky, & De Schutter, 2009), and traffic control (De Oliveira & Camponogara, 2010). This approach considers the overall system as an aggregation of smaller pieces, i.e., subsystems, which are locally managed by control units referred to as agents (Kordestani et al., 2021, Scattolini, 2009), whose combined decisions determine the overall performance due to the subsystems’ coupling, e.g., in the control objectives and the system constraints. Moreover, this decomposition may be the only choice regarding the control architecture in applications where the implementation of a centralized controller becomes unfeasible due to the problem size or the existence of multiple independent decision-making entities.

Conclusions

     The evolution of technology is leading towards a world of pervasive connectivity where control systems are expected to play a major role. In this context, DMPC algorithms are likely to become essential because they enhance their capabilities with the progress of technology and they offer a means to coordinate control actions in order to attain optimal performance in a scalable manner. However, an interconnected world will also offer significant opportunities for cyber-attacks, which may have devastating consequences if they affect critical infrastructures. Even nowadays we can find every now and then headlines in major newspapers that show how severe cyber-threats can become, with some notorious attacks disrupting applications such as nuclear plants, power grids, smart buildings and autonomous cars, to make a few examples.

     In this article we have reviewed the most vulnerable spots in the control infrastructure that can be exploited to attack DMPC methods. In addition, we have seen that the algorithms have inherent vulnerabilities because their design is usually based on the assumption that every controller in the network will be compliant with the algorithm employed. To deal with these issues, we have presented detection and mitigation mechanisms that can be used to make these schemes resilient. In particular, we have seen that learning methods can make a difference in defensive tasks because of their superior flexibility to adapt to the nominal operation conditions.

ثبت دیدگاه