Title | Solutions Verification for Cloud-Based Networked Control System using Karush-Kuhn-Tucker Conditions |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Ali, Yasir, Shen, Zhen, Zhu, Fenghua, Xiong, Gang, Chen, Shichao, Xia, Yuanqing, Wang, Fei-Yue |
Conference Name | 2018 Chinese Automation Congress (CAC) |
Keywords | Analysis of Solution verification for NCS, cloud computing, cloud computing technologies, cloud server, Cloud-based Control System, cloud-based networked control system, composability, Computational modeling, control engineering computing, control systems, Karush-Kuhn-Tucker conditions, KKT Conditions, local control system, Mathematical model, Metrics, NCS, network security challenges, networked control systems, Networked Control Systems Security, predictive control, pubcrawl, resilience, Resiliency, resource-constrained network control system, security, Security of NCS, Servers, stability |
Abstract | The rapid development of the Cloud Computing Technologies (CCTs) has amended the conventional design of resource-constrained Network Control System (NCS) to the powerful and flexible design of Cloud-Based Networked Control System (CB-NCS) by relocating the processing part to the cloud server. This arrangement has produced many internets based exquisite applications. However, this new arrangement has also raised many network security challenges for the cloud-based control system related to cyber-physical part of the system. In the absence of robust verification methodology, an attacker can launch the modification attack in order to destabilize or take control of NCS. It is desirable that there shall be a solution authentication methodology used to verify whether the incoming solutions are coming from the cloud or not. This paper proposes a methodology used for the verification of the receiving solution to the local control system from the cloud using Karush-Kuhn-Tucker (KKT) conditions, which is then applied to actuator after verification and thus ensure the stability in case of modification attack. |
DOI | 10.1109/CAC.2018.8623109 |
Citation Key | ali_solutions_2018 |