Encrypted distributed model predictive control of nonlinear processes

被引:6
作者
Kadakia, Yash A. [1 ]
Abdullah, Fahim [1 ]
Alnajdi, Aisha [2 ]
Christofides, Panagiotis D. [1 ,2 ]
机构
[1] Univ Calif Los Angeles, Dept Chem & Biomol Engn, Los Angeles, CA 90095 USA
[2] Univ Calif Los Angeles, Dept Elect & Comp Engn, Los Angeles, CA 90095 USA
基金
美国国家科学基金会;
关键词
Distributed model predictive control; Encrypted control; Cybersecurity; Nonlinear systems; Process control; ATTACK DETECTION; SYSTEMS; MPC;
D O I
10.1016/j.conengprac.2024.105874
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this research, we present an encrypted iterative distributed model predictive controller (DMPC) to enhance the computational efficiency and cybersecurity of large-scale nonlinear processes. In this configuration, a single large process is divided into numerous smaller subsystems, each regulated by a unique Lyapunovbased MPC (LMPC) that utilizes the complete process model and exchanges control inputs with other LMPCs to address the interactions between subsystems. Further, to enhance cybersecurity, all communication links between sensors, actuators, and control input computing units are encrypted. Through a comprehensive stability analysis of the encrypted iterative DMPC, bounds are established on errors arising from encrypted communication links, disturbances, and the sample -and -hold implementation of controllers. Practical aspects such as reducing data encryption time by appropriate key length choices, sampling interval criterion, and quantization parameter selection are discussed. Simulation results of the proposed control scheme, applied to a nonlinear chemical process, showcase its effective closed -loop performance in the presence of sensor noise and process disturbances. Specifically, a non -Gaussian noise distribution is obtained from an industrial data set and added to the state measurements to justify the practical effectiveness of the proposed approach.
引用
收藏
页数:9
相关论文
共 19 条
[1]   An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System [J].
Al-Abassi, Abdulrahman ;
Karimipour, Hadis ;
Dehghantanha, Ali ;
Parizi, Reza M. .
IEEE ACCESS, 2020, 8 :83965-83973
[2]  
Barker E., 2019, Recommendation for Key Management: Part 2Best Practices for Key Management Organizations
[3]  
CSIRO's Data61, 2013, Python paillier library
[4]   A generalization of Paillier's public-key system with applications to electronic voting [J].
Damgard, Ivan ;
Jurik, Mads ;
Nielsen, Jesper Buus .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (06) :371-385
[5]   Encrypted MPC based on ADMM real-time iterations [J].
Darup, Moritz Schulze .
IFAC PAPERSONLINE, 2020, 53 (02) :3508-3514
[6]   Encrypted cloud-based MPC for linear systems with input constraints [J].
Darup, Moritz Schulze ;
Redder, Adrian ;
Quevedo, Daniel E. .
IFAC PAPERSONLINE, 2018, 51 (20) :535-542
[7]   Towards Encrypted MPC for Linear Constrained Systems [J].
Darup, Moritz Schulze ;
Redder, Adrian ;
Shames, Iman ;
Farokhi, Farhad ;
Quevedo, Daniel .
IEEE CONTROL SYSTEMS LETTERS, 2018, 2 (02) :195-200
[8]   A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection [J].
Dutta, Vibekananda ;
Choras, Michal ;
Pawlicki, Marek ;
Kozik, Rafal .
SENSORS, 2020, 20 (16) :1-20
[9]   Encrypted decentralized model predictive control of nonlinear processes with delays [J].
Kadakia, Yash A. ;
Alnajdi, Aisha ;
Abdullah, Fahim ;
Christofides, Panagiotis D. .
CHEMICAL ENGINEERING RESEARCH & DESIGN, 2023, 200 :312-324
[10]   Integrating machine learning detection and encrypted control for enhanced cybersecurity of nonlinear processes [J].
Kadakia, Yash A. ;
Suryavanshi, Atharva ;
Alnajdi, Aisha ;
Abdullah, Fahim ;
Christofides, Panagiotis D. .
COMPUTERS & CHEMICAL ENGINEERING, 2024, 180