Event-triggering control scheme for discrete time Cyberphysical Systems in the presence of simultaneous hybrid stochastic attacks
ISA Transactions
Industry Revolution 4.0 pushes the industry to digitize all its operations. Cyberphysical Systems... more Industry Revolution 4.0 pushes the industry to digitize all its operations. Cyberphysical Systems (CPSs), such as autonomous automobile systems and medical monitoring are examples of this revolution. However, as these systems are interconnected via the Internet, they become more vulnerable to cyber-attacks and in particular, stealthy attacks. Cyber attacks could affect the operations of CPS and cause physical damages before any indication. So, there is a need to design a secure control system to withstand in these circumstances. In this article, an event-triggering control scheme is designed for discrete time CPSs contain random delays in measurements and actuation signals and subject to simultaneous hybrid distributed denial of service (DDoS) and deception attacks. The cyber attacks are designed as Bernoulli distributed white sequences with conditional probabilities that are variable. Moreover, An event-triggering control scheme is proposed for decreasing the communication overhead in the system, such that the measurements' signals are sent when a selected triggering condition is met. An observer based control is designed to maintain the stability of the CPS under all possible scenarios of single or hybrid simultaneous attacks in the forward and or backward communication. Linear matrix inequalities are used to represent the overall control scheme. At the end, two illustrative examples are presented and discussed to show the effectiveness of the presented scheme.
Secure Filter for Discrete-Time Delayed Systems Subject to Cyber Attacks
Cyber-Physical Systems, 2021
Cyber Physical Systems (CPSs) are defined as the integrations of computation, control, and commun... more Cyber Physical Systems (CPSs) are defined as the integrations of computation, control, and communication to obtain a prespecified behaviour of the physical processes. Due to their nature, CPSs coul...
Cyber-Physical Systems (CPS) are defined as integrations of computation, communication, and contr... more Cyber-Physical Systems (CPS) are defined as integrations of computation, communication, and control in order to achieve the desired performance of physical processes. Security threats have a high possibility of affecting CPS by several cyber attacks without providing any indication about failure. One important problem, especially in power systems, is the control problem of systems under cyber attacks. In this paper, a secure observer-based controller for discrete-time CPS subject to both cyber (denial of service (DoS) and deception) and physical attacks will be presented. The occurrences of the cyber and physical attacks will be considered as Bernoulli distributed white sequences with variable conditional probabilities. A sufficient condition is first derived under which the observer-based controller is guaranteed to have the desired security level using the stochastic analysis techniques. Then, the observer and controller gains will be designed by solving a linear matrix inequality using YALMIP and MATLAB. Finally, an illustrative example is provided to demonstrate the feasibility of the proposed system.
This is a PDF file of an unedited manuscript that has been accepted for publication. As a service... more This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain. Highlights • In general, the cyber-attacks in the literature can be classified into three main types: denial of service (DoS) attacks, deception attacks, and replay attacks. The focus of this paper will be on each of the aforementioned attacks such that the modeling and detection of each attack will be addressed, and the control of CPS under such attack will be discussed in details.
IAES International Journal of Robotics and Automation (IJRA), 2021
The teleoperation system is often composed of a human operator, a local master manipulator, and a... more The teleoperation system is often composed of a human operator, a local master manipulator, and a remote slave manipulator that are connected by a communication network. This paper proposes a survey on feedback control design for the bilateral teleoperation systems (BTSs) in nominal situations and in the presence of cyber-attacks. The main idea of the presented methods is to achieve the stability of a delayed bilateral teleoperation system in the presence of several kinds of cyber attacks. In this paper, a comprehensive survey on control systems for BTSs under cyber-attacks is discussed. Finally, we discuss the current and future problems in this field.
Advances in Artificial Intelligence and Machine Learning, 2021
This paper makes two scientific contributions to the field of exoskeleton-based action and moveme... more This paper makes two scientific contributions to the field of exoskeleton-based action and movement recognition. First, it presents a novel machine learning and pattern recognition-based framework that can detect a wide range of actions and movements-walking, walking upstairs, walking downstairs, sitting, standing, lying, stand to sit, sit to stand, sit to lie, lie to sit, stand to lie, and lie to stand, with an overall accuracy of 82.63%. Second, it presents a comprehensive comparative study of different learning approaches
Sunni and Dr. Moustafa Elshafei for their constructive guidance and technical support. Special th... more Sunni and Dr. Moustafa Elshafei for their constructive guidance and technical support. Special thanks are due to my senior colleagues at the university, who were always there to provide thoughtful solutions to the various problems encountered in my research. I would also like to thank all my friends, for a wonderful company and good memories that will last a life time. Finally, thanks are due to my parents, my sisters and brother as well as all my family members for their emotional and moral support throughout my academic career and also for their love, forbearance, encouragement and prayers. V
Uploads
Papers by Mutaz Hamdan