{"title":"Iterative learning robust security predictive tracking control for small delay batch processes: Deception attacks on unreliable network channel.","authors":"Hui Li, Shiqi Wang, Ping Li","doi":"10.1016/j.isatra.2024.10.001","DOIUrl":null,"url":null,"abstract":"<p><p>During the batch process, the need for security control is becoming increasingly urgent with the gradual penetration of network control technology. For small time delay batch processes subject to deception attacks, an iterative learning robust security predictive tracking control approach is developed. Reviewing previous studies for iterative learning control, the issue that the repetitive character of the batch process would mask the characteristics of deception attacks was not considered. Moreover, the gains of iterative learning control law are utilized offline, which makes large deviations for the system state as the operating time increases. This will lead to \"excessive-input\" conditions for control inputs, which means more consumption of energy and production resources. To address these challenges, we introduce robust security invariant sets to improve the robustness of the system by constraining the system state to be in a safe range. Also, the design of the iterative learning controller incorporates deception attack data for historical batches, which is continuously improved and optimized to withstand deception attacks. Meanwhile, by calculating stability conditions online, the real-time control law gain is obtained, which could make the control inputs adjusted online based on the real-time system's dynamic characteristics, avoiding excessive inputs and improving the efficiency of energy and resource utilization. Additionally, the stability analysis proves that the system is input to state stability. Ultimately, simulation verifies the effectiveness and feasibility of the developed method.</p>","PeriodicalId":94059,"journal":{"name":"ISA transactions","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ISA transactions","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1016/j.isatra.2024.10.001","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
During the batch process, the need for security control is becoming increasingly urgent with the gradual penetration of network control technology. For small time delay batch processes subject to deception attacks, an iterative learning robust security predictive tracking control approach is developed. Reviewing previous studies for iterative learning control, the issue that the repetitive character of the batch process would mask the characteristics of deception attacks was not considered. Moreover, the gains of iterative learning control law are utilized offline, which makes large deviations for the system state as the operating time increases. This will lead to "excessive-input" conditions for control inputs, which means more consumption of energy and production resources. To address these challenges, we introduce robust security invariant sets to improve the robustness of the system by constraining the system state to be in a safe range. Also, the design of the iterative learning controller incorporates deception attack data for historical batches, which is continuously improved and optimized to withstand deception attacks. Meanwhile, by calculating stability conditions online, the real-time control law gain is obtained, which could make the control inputs adjusted online based on the real-time system's dynamic characteristics, avoiding excessive inputs and improving the efficiency of energy and resource utilization. Additionally, the stability analysis proves that the system is input to state stability. Ultimately, simulation verifies the effectiveness and feasibility of the developed method.