2019 American Control Conference (ACC) 2019
DOI: 10.23919/acc.2019.8814821
|View full text |Cite
|
Sign up to set email alerts
|

LQG Reference Tracking with Safety and Reachability Guarantees under False Data Injection Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…Second, we derive a closed-form solution of the controller for a special case of the problem where there is a unique attack pattern. The derived controller not only guarantees safety and reachability, but also achieves better approximation with respect to the expected cost, compared with our preliminary work [21].…”
Section: Introductionmentioning
confidence: 83%
See 1 more Smart Citation
“…Second, we derive a closed-form solution of the controller for a special case of the problem where there is a unique attack pattern. The derived controller not only guarantees safety and reachability, but also achieves better approximation with respect to the expected cost, compared with our preliminary work [21].…”
Section: Introductionmentioning
confidence: 83%
“…At present, less attention has been paid to the design of closed-loop controllers with safety and reachability guarantees under FDI attacks. In the preliminary conference version of this work [21], we investigated the linear quadratic Gaussian (LQG) reference tracking problem, in which there was only one possible set of compromised sensors. In this paper, we generalize the problem so that multiple possible compromised sensor sets are given, each of which corresponds to a different attack scenario.…”
Section: Introductionmentioning
confidence: 99%
“…The authors of [33] used barrier functions to solve a reference tracking problem for a continuous-time linear system subject to possible false data injection attacks by an adversary, with additional constraints on the safety and reachability of the system. Probabilistic reachability over a finite time horizon for discretetime stochastic hybrid systems was presented in [1].…”
Section: Related Workmentioning
confidence: 99%