Abstract-Wireless networked control systems (WNCS) are composed of spatially distributed sensors, actuators, and controllers communicating through wireless networks instead of conventional point-to-point wired connections. Due to their main benefits in the reduction of deployment and maintenance costs, large flexibility and possible enhancement of safety, WNCS are becoming a fundamental infrastructure technology for critical control systems in automotive electrical systems, avionics control systems, building management systems, and industrial automation systems. The main challenge in WNCS is to jointly design the communication and control systems considering their tight interaction to improve the control performance and the network lifetime. In this survey, we make an exhaustive review of the literature on wireless network design and optimization for WNCS. First, we discuss what we call the critical interactive variables including sampling period, message delay, message dropout, and network energy consumption. The mutual effects of these communication and control variables motivate their joint tuning. We discuss the effect of controllable wireless network parameters at all layers of the communication protocols on the probability distribution of these interactive variables. We also review the current wireless network standardization for WNCS and their corresponding methodology for adapting the network parameters. Moreover, we discuss the analysis and design of control systems taking into account the effect of the interactive variables on the control system performance. Finally, we present the state-of-the-art wireless network design and optimization for WNCS, while highlighting the tradeoff between the achievable performance and complexity of various approaches. We conclude the survey by highlighting major research issues and identifying future research directions.
Abstract-In this paper we propose a subgradient method for solving coupled optimization problems in a distributed way given restrictions on the communication topology. The iterative procedure maintains local variables at each node and relies on local subgradient updates in combination with a consensus process. The local subgradient steps are applied simultaneously as opposed to the standard sequential or cyclic procedure. We study convergence properties of the proposed scheme using results from consensus theory and approximate subgradient methods. The framework is illustrated on an optimal distributed finite-time rendezvous problem.
The comprehensive integration of instrumentation, communication, and control into physical systems has led to the study of Cyber-Physical Systems (CPS), a field that has recently garnered increased attention. A key concern that is ubiquitous in CPS is a need to ensure security in the face of cyber attacks. In this paper, we carry out a survey of systems and control methods that have been proposed for the security of CPS. We classify these methods into three categories based on the type of defense proposed against the cyberattacks: prevention, resilience, and detection & isolation. A unified threat assessment metric is proposed in order to evaluate how CPS security is achieved in each of these three cases. Also surveyed are risk assessment tools and the effect of network topology on CPS security. An emphasis has been placed on power and transportation applications in the overall survey. Index Terms-cyber-physical systems, resilient control I. INTRODUCTION Motivated by concerns about sustainability, efficiency, and resiliency, several sectors including energy, transportation, water, and healthcare systems have witnessed significant advances in instrumentation, monitoring, and automation over the past decade. The resulting integration of information, communication, and computation with physically engineered systems demands a detailed investigation into the analysis and synthesis of Cyber-Physical Systems (CPS) so as to realize the desired performance metrics of efficiency, sustainability, and safety. The extensive and intricate presence of cyber components also introduces a vulnerability of unwanted access to these systems. The available communication technologies, referred to as SCADA (Supervisory Control and Data Acquisition), are witnessing significant advances, triggering a shift from protected, closed, and wired networks to open and wireless networks which, as a side effect, are more vulnerable to outside interference.
Abstract-The operation of groups of heavy-duty vehicles (HDVs) at a small inter-vehicular distance (known as platoon) allows to lower the overall aerodynamic drag and, therefore, to reduce fuel consumption and greenhouse gas emissions. However, due to the large mass and limited engine power of HDVs, slopes have a significant impact on the feasible and optimal speed profiles that each vehicle can and should follow. Therefore maintaining a short inter-vehicular distance as required by platooning without coordination between vehicles can often result in inefficient or even unfeasible trajectories. In this paper we propose a two-layer control architecture for HDV platooning aimed to safely and fuel-efficiently coordinate the vehicles in the platoon. Here, the layers are responsible for the inclusion of preview information on road topography and the real-time control of the vehicles, respectively. Within this architecture, dynamic programming is used to compute the fuel-optimal speed profile for the entire platoon and a distributed model predictive control framework is developed for the real-time control of the vehicles. The effectiveness of the proposed controller is analyzed by means of simulations of several realistic scenarios that suggest a possible fuel saving of up to 12% for the follower vehicles compared to the use of standard platoon controllers.
Networked control systems under certain cyber attacks are analyzed. The communication network of these control systems make them vulnerable to attacks from malicious outsiders. Our work deals with two types of attacks: attacks on the network nodes and attacks on the communication between the nodes. We propose a distributed scheme to detect and isolate the attacks using observers. Furthermore, we discuss how to reduce the number of observer nodes while maintaining the coverage of the entire network. The results are applied to two classes of networked control systems: a network running the consensus protocol and a power network defined by the linearized swing equation. Sufficient conditions for the existence of the proposed attack detection scheme are provided for the first class of systems. For the second class, we provide a necessary condition for the existence of the proposed detection scheme.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.