Towards Encrypted MPC for Linear Constrained Systems

被引:80
作者
Darup, Moritz Schulze [1 ]
Redder, Adrian [1 ]
Shames, Iman [2 ]
Farokhi, Farhad [2 ]
Quevedo, Daniel [1 ]
机构
[1] Univ Paderborn, Dept Elect Engn, Automat Control Grp, D-33098 Paderborn, Germany
[2] Univ Melbourne, Dept Elect & Elect Engn, Control & Signal Proc Lab, Parkville, Vic 3010, Australia
来源
IEEE CONTROL SYSTEMS LETTERS | 2018年 / 2卷 / 02期
关键词
Networked control systems; security; privacy; homomorphic encryption; predictive control for linear systems;
D O I
10.1109/LCSYS.2017.2779473
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present an encrypted model predictive control (MPC) scheme for linear constrained systems. More precisely, we show that homomorphic encryption can be used to realize a secure and private cloud-based evaluation of an MPC if the corresponding piecewise affine control law is explicitly given.
引用
收藏
页码:195 / 200
页数:6
相关论文
共 15 条
[1]   Stability Analysis of Quadratic MPC With a Discrete Input Alphabet [J].
Aguilera, Ricardo P. ;
Quevedo, Daniel E. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2013, 58 (12) :3190-3196
[2]   The explicit linear quadratic regulator for constrained systems [J].
Bemporad, A ;
Morari, M ;
Dua, V ;
Pistikopoulos, EN .
AUTOMATICA, 2002, 38 (01) :3-20
[3]  
Cardenas A.A., 2008, P 3 USENIX WORKSH HO
[4]   STABILIZING A LINEAR-SYSTEM WITH QUANTIZED STATE FEEDBACK [J].
DELCHAMPS, DF .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1990, 35 (08) :916-924
[5]   Secure and private control using semi-homomorphic encryption [J].
Farokhi, Farhad ;
Shames, Iman ;
Batterham, Nathan .
CONTROL ENGINEERING PRACTICE, 2017, 67 :13-20
[6]   LINEAR-SYSTEMS WITH STATE AND CONTROL CONSTRAINTS - THE THEORY AND APPLICATION OF MAXIMAL OUTPUT ADMISSIBLE-SETS [J].
GILBERT, EG ;
TAN, KT .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1991, 36 (09) :1008-1020
[7]  
Kogiso K, 2015, IEEE DECIS CONTR P, P6836, DOI 10.1109/CDC.2015.7403296
[8]  
Kvasnica M, 2004, LECT NOTES COMPUT SC, V2993, P448
[9]   Robust model predictive control of constrained linear systems with bounded disturbances [J].
Mayne, DQ ;
Seron, MM ;
Rakovic, SV .
AUTOMATICA, 2005, 41 (02) :219-224
[10]   Secure Control Against Replay Attacks [J].
Mo, Yilin ;
Sinopoli, Bruno .
2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, :911-918