Pub Date : 2023-08-02DOI: 10.1109/OJCSYS.2023.3301335
Victor Gaßmann;Matthias Althoff
We present a novel, correct-by-construction control approach for disturbed, nonlinear systems with continuous state feedback under state and input constraints. For the first time, we jointly synthesize a feedforward and feedback controller by solving a single non-convex, continuously differentiable approximation of the original synthesis problem, which we combine with a trust-region approach in an iterative manner to obtain non-conservative results. We ensure the formal correctness of our algorithm through reachability analysis and show that its computational complexity is polynomial in the state dimension for each trust-region iteration. In contrast to previous work, we also avoid the introduction of several algorithm parameters that require expert knowledge to tune, making the proposed synthesis approach easier to use for non-experts while guaranteeing state and input constraint satisfaction. Numerical benchmarks demonstrate the applicability of our novel synthesis approach.
{"title":"Polynomial Controller Synthesis of Nonlinear Systems With Continuous State Feedback Using Trust Regions","authors":"Victor Gaßmann;Matthias Althoff","doi":"10.1109/OJCSYS.2023.3301335","DOIUrl":"https://doi.org/10.1109/OJCSYS.2023.3301335","url":null,"abstract":"We present a novel, correct-by-construction control approach for disturbed, nonlinear systems with continuous state feedback under state and input constraints. For the first time, we jointly synthesize a feedforward and feedback controller by solving a single non-convex, continuously differentiable approximation of the original synthesis problem, which we combine with a trust-region approach in an iterative manner to obtain non-conservative results. We ensure the formal correctness of our algorithm through reachability analysis and show that its computational complexity is polynomial in the state dimension for each trust-region iteration. In contrast to previous work, we also avoid the introduction of several algorithm parameters that require expert knowledge to tune, making the proposed synthesis approach easier to use for non-experts while guaranteeing state and input constraint satisfaction. Numerical benchmarks demonstrate the applicability of our novel synthesis approach.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"2 ","pages":"310-324"},"PeriodicalIF":0.0,"publicationDate":"2023-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9552933/9973428/10202173.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50375006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-27DOI: 10.1109/OJCSYS.2023.3299521
Camilla Fioravanti;Valeria Bonagura;Gabriele Oliva;Christoforos N. Hadjicostis;Stefano Panzieri
Distributed cooperative multi-agent operations, which are emerging as effective solutions in countless application domains, are prone to eavesdropping by malicious entities due to their exposure on the network. Moreover, in several cases, agents are reluctant to disclose their initial conditions (even to legitimate neighbors) due to their sensitivity to private data. Providing security guarantees against external readings by malicious entities and the privacy of exchanged data while allowing agents to reach an agreement on some shared variables is an essential feature to foster the adoption of distributed protocols. In this article, we propose to implement a secure and privacy-preserving consensus strategy that exploits, for this purpose, the performance of synchronization of nonlinear continuous-time dynamical systems. This is achieved by splitting the initial conditions into two information fragments, one of which is subject to nonlinear manipulation. In this way, the information being exchanged in the network will always be subject to the influence of nonlinear dynamics. However, by exploiting the ability of such dynamics to synchronize, the combination of the two fragments still converges to a weighted average of each node's actual initial conditions. Furthermore, due to the dependence of the hidden dynamics on a coordinate transformation known only to the legitimate nodes, message security is ensured even once consensus is reached; our approach relies on the assumption that a secure communication channel is available during an initialization phase. The article is complemented by a simulation campaign aimed at numerically demonstrating the effectiveness of the proposed approach.
{"title":"Exploiting the Synchronization of Nonlinear Dynamics to Secure Distributed Consensus","authors":"Camilla Fioravanti;Valeria Bonagura;Gabriele Oliva;Christoforos N. Hadjicostis;Stefano Panzieri","doi":"10.1109/OJCSYS.2023.3299521","DOIUrl":"https://doi.org/10.1109/OJCSYS.2023.3299521","url":null,"abstract":"Distributed cooperative multi-agent operations, which are emerging as effective solutions in countless application domains, are prone to eavesdropping by malicious entities due to their exposure on the network. Moreover, in several cases, agents are reluctant to disclose their initial conditions (even to legitimate neighbors) due to their sensitivity to private data. Providing security guarantees against external readings by malicious entities and the privacy of exchanged data while allowing agents to reach an agreement on some shared variables is an essential feature to foster the adoption of distributed protocols. In this article, we propose to implement a secure and privacy-preserving consensus strategy that exploits, for this purpose, the performance of synchronization of nonlinear continuous-time dynamical systems. This is achieved by splitting the initial conditions into two information fragments, one of which is subject to nonlinear manipulation. In this way, the information being exchanged in the network will always be subject to the influence of nonlinear dynamics. However, by exploiting the ability of such dynamics to synchronize, the combination of the two fragments still converges to a weighted average of each node's actual initial conditions. Furthermore, due to the dependence of the hidden dynamics on a coordinate transformation known only to the legitimate nodes, message security is ensured even once consensus is reached; our approach relies on the assumption that a secure communication channel is available during an initialization phase. The article is complemented by a simulation campaign aimed at numerically demonstrating the effectiveness of the proposed approach.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"2 ","pages":"249-262"},"PeriodicalIF":0.0,"publicationDate":"2023-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9552933/9973428/10196002.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50226360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-26DOI: 10.1109/OJCSYS.2023.3299152
Negin Musavi;Dawei Sun;Sayan Mitra;Geir E. Dullerud;Sanjay Shakkottai
This article presents a new method for model-free verification of a general class of control systems with unknown nonlinear dynamics, where the state space has both a continuum-based and a discrete component. Specifically, we focus on finding what choices of initial states or parameters maximize a given probabilistic objective function over all choices of initial states or parameters from such hybrid state space, without having exact knowledge of the system dynamics. We introduce the notion of set initialized Markov chains