Model Predictive Control as a Secure Service for Cyber-Physical Systems: A Cloud-Edge Framework

被引:18
作者
Sun, Qi [1 ]
Shi, Yang [1 ]
机构
[1] Univ Victoria, Dept Mech Engn, Victoria, BC V8W 2Y2, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Cloud computing; Elliptic curve cryptography; Optimization; Encryption; Real-time systems; Computer architecture; Elliptic curves; Cloud-edge computing; cyber-physical system (CPS); elliptic curve cryptography (ECC); external disturbance; Gaussian radial basis function; model predictive control (MPC); INTERNET;
D O I
10.1109/JIOT.2021.3091981
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article proposes a model predictive control as a secure service (MPCaaSS) framework for cyber-physical systems (CPSs) in the presence of both cyber threats and external disturbances. First, in order to take advantage of the cloud-edge computing, we design a double-layer controller architecture by using a novel control parameterization based on Gaussian radial basis functions. In this controller architecture, the cloud-side controller optimizes the controller parameters of the edge-side controller, whereas the edge-side controller implements the real-time control law using the generated controller parameters. Second, in order to securely transmit data packets, we integrate an encoding scheme and an elliptic curve cryptography (ECC)-based encryption into the proposed MPCaaSS framework. Then, the controller parameters and the state measurements can be encrypted such that no malicious attackers can corrupt and intercept the transmission. It is shown that the recursive feasibility of MPCaaSS is achieved under some sufficient conditions, and the robust stability of the closed-loop system is guaranteed if the optimization problem is recursively feasible. Simulated examples are conducted to demonstrate the effectiveness of the proposed method.
引用
收藏
页码:22194 / 22203
页数:10
相关论文
共 32 条
[1]  
Abdelaal AE, 2017, P AMER CONTR CONF, P1017, DOI 10.23919/ACC.2017.7963086
[2]   Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice [J].
Adrian, David ;
Bhargavan, Karthikeyan ;
Durumeric, Zakir ;
Gaudry, Pierrick ;
Green, Matthew ;
Halderman, J. Alex ;
Heninger, Nadia ;
Springall, Drew ;
Thome, Emmanuel ;
Valenta, Luke ;
VanderSloot, Benjamin ;
Wustrow, Eric ;
Zanella-Beguelin, Santiago ;
Zimmermann, Paul .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :5-17
[3]  
Andonovski Goran, 2015, 2015 IEEE International Conference on Evolving and Adaptive Intelligent Systems (EAIS), P1, DOI 10.1109/EAIS.2015.7368793
[4]  
[Anonymous], SECP256K1 BITCOIN WI
[5]  
Biyik E, 2015, P AMER CONTR CONF, P1683, DOI 10.1109/ACC.2015.7170975
[6]   A Survey on Edge and Edge-Cloud Computing Assisted Cyber-Physical Systems [J].
Cao, Kun ;
Hu, Shiyan ;
Shi, Yang ;
Colombo, Armando ;
Karnouskos, Stamatis ;
Li, Xin .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (11) :7806-7819
[7]   Systems with persistent disturbances: predictive control with restricted constraints [J].
Chisci, L ;
Rossiter, JA ;
Zappa, G .
AUTOMATICA, 2001, 37 (07) :1019-1028
[8]   Industrial Cyberphysical Systems [J].
Colombo, Armando W. ;
Karnouskos, Stamatis ;
Kaynak, Okyay ;
Shi, Yang ;
Yin, Shen .
IEEE INDUSTRIAL ELECTRONICS MAGAZINE, 2017, 11 (01) :6-16
[9]  
Cowling Ian D., 2007, Proceedings of the European Control Conference 2007 (ECC), P4001
[10]  
Eijs H., Pycryptodome: Cryptographic Library for Python