Match!
Helem Sabina Sánchez
Polytechnic University of Catalonia
Control engineeringPID controllerControl theoryMulti-objective optimizationControl theory
21Publications
4H-index
62Citations
What is this?
Publications 23
Newest
view all 4 authors...
Source
#1Damiano Rotondo (UPC: Polytechnic University of Catalonia)H-Index: 16
#2Helem Sabina Sánchez (UPC: Polytechnic University of Catalonia)H-Index: 4
Last. Joseba Jokin Quevedo Casín (UPC: Polytechnic University of Catalonia)H-Index: 27
view all 5 authors...
Abstract In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) attack. In particular, the malicious attacker is able to erase the data sent to one or more actuators. In order to achieve secure control, we propose a virtual actuator technique under the assu...
Source
Oct 23, 2019 in ICONS (International Conference on Systems)
#1Joseba Jokin Quevedo Casín (UPC: Polytechnic University of Catalonia)H-Index: 27
#2Helem Sabina Sánchez (UPC: Polytechnic University of Catalonia)H-Index: 4
Last. Vicenç Puig (UPC: Polytechnic University of Catalonia)H-Index: 37
view all 5 authors...
This paper presents some results related to the detection and isolation of cyber attacks in a recently proposed benchmark based on a two-tank system. The benchmark proposes some attack scenarios in which a malicious attacker alters the signals of the water level sensors in the tanks, in order to remain hidden while stealing water. This paper shows the difficulty to detect cyber attacks based only on the model-based residuals calculated using the measured variables. On the other hand, by using th...
Source
Oct 1, 2019 in ICONS (International Conference on Systems)
#1Helem Sabina Sánchez (UPC: Polytechnic University of Catalonia)H-Index: 4
#2Damiano Rotondo (CSIC: Spanish National Research Council)H-Index: 16
Last. Joseba Jokin Quevedo Casín (UPC: Polytechnic University of Catalonia)H-Index: 27
view all 4 authors...
Unmanned aerial vehicles (UAVs) are reported to be highly exposed as possible targets of cyber attacks, due to their strong strategic and economic value, and their increasing use in a wide range of operations. Among the most critical cyber attacks, replay attacks are performed by replacing the real data coming from the sensors with previously recorded data. In this way, the attacker may provoke performance degradation, cause instability, and allow to perform undetectable physical attacks. The ma...
Source
#1Carlos Trapiello (CSIC: Spanish National Research Council)
#2Damiano Rotondo (CSIC: Spanish National Research Council)H-Index: 16
Last. Vicenç Puig (CSIC: Spanish National Research Council)H-Index: 37
view all 4 authors...
This paper presents a replay attack detection method that addresses the performance loss of watermarking-based approaches. The proposed method injects a sinusoidal signal that affects a subset, chosen at random, of the system outputs. The presence of the signal in each one of the outputs is estimated by means of independent observers and its effect is compensated in the control loop. When a system output is affected by a replay attack, the loss of feedback of the associated observer destabilizes...
Source
#1Helem Sabina Sánchez (UPC: Polytechnic University of Catalonia)H-Index: 4
#2Damiano Rotondo (UPC: Polytechnic University of Catalonia)H-Index: 16
Last. Joseba Jokin Quevedo Casín (UPC: Polytechnic University of Catalonia)H-Index: 27
view all 6 authors...
Abstract This paper proposes a frequency-based approach for the detection of replay attacks affecting cyber-physical systems (CPS). In particular, the method employs a sinusoidal signal with a time-varying frequency (authentication signal) into the closed-loop system and checks whether the time profile of the frequency components in the output signal are compatible with the authentication signal or not. In order to carry out this target, the couplings between inputs and outputs are eliminated us...
4 CitationsSource
#1Helem Sabina Sánchez (UPC: Polytechnic University of Catalonia)H-Index: 4
#2Damiano Rotondo (UPC: Polytechnic University of Catalonia)H-Index: 16
Last. Joseba Jokin Quevedo Casín (UPC: Polytechnic University of Catalonia)H-Index: 27
view all 5 authors...
Abstract This paper presents a bibliographical review of definitions, classifications and applications concerning cyber attacks in networked control systems (NCSs) and cyber-physical systems (CPSs). This review tackles the topic from a control-oriented perspective, which is complementary to information or communication ones. After motivating the importance of developing new methods for attack detection and secure control, this review presents security objectives, attack modeling, and a character...
1 CitationsSource
#1Damiano Rotondo (CSIC: Spanish National Research Council)H-Index: 16
#2Helem Sabina Sánchez (UPC: Polytechnic University of Catalonia)H-Index: 4
Last. Vicenç Puig (UPC: Polytechnic University of Catalonia)H-Index: 37
view all 4 authors...
This paper presents a tutorial on analysis and design of linear parameter varying (LPV) systems using linear matrix inequalities (LMIs). Several specifications, such as D-stability, guaranteed H ∞ performance and guaranteed quadratic cost, as well as different control structures, such as state-feedback control, output-feedback control and observer-based control, are considered. A numerical example and a simplified model of a two-degrees-of-freedom helicopter (TRMS) are used to illustrate in a di...
1 CitationsSource
#1Helem Sabina Sánchez (UPC: Polytechnic University of Catalonia)H-Index: 4
#2Damiano Rotondo (UPC: Polytechnic University of Catalonia)H-Index: 16
view all 5 authors...
© 2018. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/ 10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes SAFEPROCESS 2018 Warsaw, Poland, 29–31 August 2018
1 CitationsSource
123