Concepedia

Publication | Closed Access

A Data-Driven Attack Detection Approach for DC Servo Motor Systems Based on Mixed Optimization Strategy

127

Citations

26

References

2019

Year

Abstract

This article is concerned with the data-driven attack detection problem for cyber-physical systems with the actuator attacks and measurement noise. In most of existing data-driven detection methods, H <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">∞</sub> index is used to characterize the sensitivity performance. It is well-known that compared with the H <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">∞</sub> index, H_ index can significantly improve the diagnostic performance. However, the detection system design based on the H_/H <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">∞</sub> mixed optimization technique has not been solved within the data-driven framework. In this article, a residual generator is constructed from the available input-output (I/O) data. H <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">∞</sub> and H_ indices are defined from the viewpoint of time-domain to characterize the robustness of residual generator against measurement noise and sensitivity to attack signals, respectively. In particular, a novel weighting system, which is expressed as an I/O model, is designed to transform the H_ performance into an H <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">∞</sub> constraint, and the detection system design problem based on H_/H <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">∞</sub> mixed optimization technique is finally formulated into a constraint-type optimization one, which can be solved by the classical Lagrange multiplier method. Also, the proposed detection method is applied to a networked dc servo motor system to verify its advantages and effectiveness.

References

YearCitations

Page 1