A Modular Safety Filter for Safety-Certified Cyber-Physical Systems
Abstract: Nowadays, many control systems are networked and embed communication and computation capabilities. Such control architectures are prone to cyber attacks on the cyberinfrastructure. Consequently, there is an impellent need to develop solutions to preserve the plant's safety against potential attacks. To ensure safety, this paper introduces a modular safety filter approach that is effective for various cyber-attack types. This solution can be implemented in combination with existing control and detection algorithms, effectively separating safety from performance. The safety filter does not require information on the received command's reliability or the anomaly detector's feature. It can be implemented in conjunction with high-performance, resilient controllers to achieve both high performance during normal operation and safety during an attack. As an illustrative example, we have shown the effectiveness of the proposed design considering a multi-agent formation task involving 20 mobile robots. The simulation results testify that the safety filter operates effectively during undetectable, intelligent attacks.
- F. Pasqualetti, F. Dorfler, and F. Bullo, “Control-theoretic methods for cyber-physical security: Geometric principles for optimal cross-layer resilient control systems,” IEEE Control Systems Magazine, vol. 35, no. 1, pp. 110–127, 2015.
- S. M. Dibaji, M. Pirani, D. B. Flamholz, A. M. Annaswamy, K. H. Johansson, and A. Chakrabortty, “A systems and control perspective of CPS security,” Annual reviews in control, vol. 47, pp. 394–411, 2019.
- K. P. Wabersich, A. J. Taylor, J. J. Choi, K. Sreenath, C. J. Tomlin, A. D. Ames, and M. N. Zeilinger, “Data-driven safety filters: Hamilton-jacobi reachability, control barrier functions, and predictive methods for uncertain systems,” IEEE Control Systems Magazine, vol. 43, no. 5, pp. 137–177, 2023.
- K.-C. Hsu, H. Hu, and J. F. Fisac, “The safety filter: A unified view of safety-critical control in autonomous systems,” Annual Review of Control, Robotics, and Autonomous Systems, vol. 7, 2023.
- G. Franzè, D. Famularo, W. Lucia, and F. Tedesco, “Cyber–physical systems subject to false data injections: A model predictive control framework for resilience operations,” Automatica, vol. 152, p. 110957, 2023.
- H. Yang, L. Dai, H. Xie, Y. Shi, and Y. Xia, “Resilient MPC under severe attacks on both forward and feedback communication channels,” IEEE Transactions on Automation Science and Engineering, 2023.
- H. Wei, K. Zhang, H. Zhang, and Y. Shi, “Resilient and constrained consensus against adversarial attacks: A distributed MPC framework,” Automatica, vol. 160, p. 111417, 2024.
- K. Gheitasi and W. Lucia, “A worst-case approach to safety and reference tracking for cyber-physical systems under network attacks,” IEEE Transactions on Automatic Control, 2022.
- M. Attar and W. Lucia, “A data-driven safety preserving control architecture for constrained cyber-physical systems,” arXiv preprint arXiv:2312.00658, 2023.
- W. Liu, J. Sun, G. Wang, F. Bullo, and J. Chen, “Data-driven resilient predictive control under denial-of-service,” IEEE Transactions on Automatic Control, 2022.
- C. Escudero, C. Murguia, P. Massioni, and E. Zamaï, “Safety-preserving filters against stealthy sensor and actuator attacks,” in 2023 62nd IEEE Conference on Decision and Control. IEEE, 2023, pp. 5097–5104.
- W. Lucia, G. Franzè, and B. Sinopoli, “A supervisor-based control architecture for constrained cyber-physical systems subject to network attacks,” IEEE Transactions on Control of Network Systems, 2022.
- K. Gheitasi and W. Lucia, “A safety preserving control architecture for cyber-physical systems,” International Journal of Robust and Nonlinear Control, vol. 31, no. 8, pp. 3036–3053, 2021.
- Q. Zhang, K. Liu, Z. Pang, Y. Xia, and T. Liu, “Reachability analysis of cyber-physical systems under stealthy attacks,” IEEE Transactions on Cybernetics, vol. 52, no. 6, pp. 4926–4934, 2020.
- Y. Lin, M. S. Chong, and C. Murguia, “Secondary controller design for the safety of nonlinear systems via sum-of-squares programming,” arXiv preprint arXiv:2304.10359, 2023.
- A. Al Maruf, L. Niu, A. Clark, J. S. Mertoguno, and R. Poovendran, “A timing-based framework for designing resilient cyber-physical systems under safety constraint,” ACM Transactions on Cyber-Physical Systems, vol. 7, no. 3, pp. 1–25, 2023.
- K. P. Wabersich and M. N. Zeilinger, “A predictive safety filter for learning-based control of constrained nonlinear dynamical systems,” Automatica, vol. 129, p. 109597, 2021.
- L. Wang, A. D. Ames, and M. Egerstedt, “Safety barrier certificates for collisions-free multirobot systems,” IEEE Transactions on Robotics, vol. 33, no. 3, pp. 661–674, 2017.
- N. He, K. Ma, and H. Li, “Resilient predictive control strategy of cyber-physical systems against fdi attack,” IET Control Theory & Applications, vol. 16, no. 11, pp. 1098–1109, 2022.
- R. S. Smith, “Covert misappropriation of networked control systems: Presenting a feedback structure,” IEEE Control Systems Magazine, vol. 35, no. 1, pp. 82–92, 2015.
- J. A. Andersson, J. Gillis, G. Horn, J. B. Rawlings, and M. Diehl, “Casadi: a software framework for nonlinear optimization and optimal control,” Mathematical Programming Computation, vol. 11, pp. 1–36, 2019.
- K. P. Wabersich and M. N. Zeilinger, “Linear model predictive safety certification for learning-based control,” in 2018 IEEE Conference on Decision and Control. IEEE, 2018, pp. 7130–7135.
- A. D. Ames, S. Coogan, M. Egerstedt, G. Notomista, K. Sreenath, and P. Tabuada, “Control barrier functions: Theory and applications,” in 2019 18th European control conference. IEEE, 2019, pp. 3420–3431.
- S. Bansal, M. Chen, S. Herbert, and C. J. Tomlin, “Hamilton-jacobi reachability: A brief overview and recent advances,” in 2017 IEEE 56th Annual Conference on Decision and Control. IEEE, 2017, pp. 2242–2253.
- S. Muntwiler, K. P. Wabersich, A. Carron, and M. N. Zeilinger, “Distributed model predictive safety certification for learning-based control,” IFAC-PapersOnLine, vol. 53, no. 2, pp. 5258–5265, 2020.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.