Skip to main content
  • Book
  • © 2019

Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks

Authors:

  • Presents uniquely secure control of networked systems from the perspectives of information security and control theory
  • Demonstrates the methods presented using practical experiments, not just numerical simulation and theoretical deduction
  • Considers the most practical issues in networked control systems (NCSs), e.g., communication constraints and cyber attacks, and proposes corresponding control strategies
  • Presents networked predictive control (NPC) methods in an easy-to-read and understandable way

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (12 chapters)

  1. Front Matter

    Pages i-xx
  2. Introduction and Preliminaries for Networked Predictive Control

    1. Front Matter

      Pages 1-1
    2. Introduction

      • Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 3-19
    3. Preliminaries for Networked Predictive Control

      • Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 21-29
  3. Networked Predictive Control of Systems with Communication Constraints

    1. Front Matter

      Pages 31-31
    2. Networked Predictive Control Based on Linear Input-Output Model

      • Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 33-56
    3. Incremental Networked Predictive Control Based on Linear Input–Output Model

      • Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 57-77
    4. Networked Predictive Control Based on Nonlinear Input–Output Model

      • Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 79-93
    5. Networked Predictive Control Based on State-Space Model

      • Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 95-104
    6. Networked Predictive Output Tracking Control Based on State-Space Model

      • Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 105-123
  4. Networked Predictive Control of Systems with Cyber Attacks and Communication Constraints

    1. Front Matter

      Pages 125-125
    2. A Data Secure Transmission Scheme for Deception Attacks

      • Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 127-146
    3. Secure Networked Control Under Deception Attacks

      • Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 147-163
    4. Secure Networked Predictive Control Under Deception Attacks

      • Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 165-179
    5. False Data Injection Attacks Against Networked Predictive Output Tracking Control Systems

      • Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 181-203
    6. Secure Networked Predictive Control Under DoS Attacks

      • Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
      Pages 205-219

About this book

This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered. For the former, it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter, it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore, it uses practical experiments to demonstrate the effectiveness and applicability of all the methods, bridging the gap between control theory and practical applications. The book is of interest to academic researchers, R&D engineers, and graduate students in control engineering, networked control systems and cyber-physical systems. 

Reviews

“The book would be of interest as to researchers and graduate students in the fields of NCSs and cyber-physical systems so to industrial practitioners in many areas such as automatic control, sensor/actuator networks, and robotics.” (Clementina Mladenova, zbMATH 1432.93002, 2020)

Authors and Affiliations

  • North China University of Technology, Beijing, China

    Zhong-Hua Pang, Dehui Sun

  • University of South Wales, Pontypridd, United Kingdom

    Guo-Ping Liu

  • Shandong University of Science and Technology, Qingdao, China

    Donghua Zhou

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access