Skip to main content

Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks

  • Book
  • © 2019

Overview

  • Presents uniquely secure control of networked systems from the perspectives of information security and control theory
  • Demonstrates the methods presented using practical experiments, not just numerical simulation and theoretical deduction
  • Considers the most practical issues in networked control systems (NCSs), e.g., communication constraints and cyber attacks, and proposes corresponding control strategies
  • Presents networked predictive control (NPC) methods in an easy-to-read and understandable way

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (12 chapters)

  1. Introduction and Preliminaries for Networked Predictive Control

  2. Networked Predictive Control of Systems with Communication Constraints

  3. Networked Predictive Control of Systems with Cyber Attacks and Communication Constraints

Keywords

About this book

This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered. For the former, it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter, it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore, it uses practical experiments to demonstrate the effectiveness and applicability of all the methods, bridging the gap between control theory and practical applications. The book is of interest to academic researchers, R&D engineers, and graduate students in control engineering, networked control systems and cyber-physical systems. 

Reviews

“The book would be of interest as to researchers and graduate students in the fields of NCSs and cyber-physical systems so to industrial practitioners in many areas such as automatic control, sensor/actuator networks, and robotics.” (Clementina Mladenova, zbMATH 1432.93002, 2020)

Authors and Affiliations

  • North China University of Technology, Beijing, China

    Zhong-Hua Pang, Dehui Sun

  • University of South Wales, Pontypridd, United Kingdom

    Guo-Ping Liu

  • Shandong University of Science and Technology, Qingdao, China

    Donghua Zhou

Bibliographic Information

Publish with us