Resilient Hierarchical Networked Control Systems: Secure Controls for Critical Locations and at Edge

Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review


Integration of information and communication technology (ICT) offers new opportunities in improving the management and operation of critical infrastructures such as power systems as it allows connection of different sensors and control components via a communication network, leading to the so-called networked control systems (NCS). However, the use of open and pervasive ICT such as the Internet or wireless communication technologies comes at a price of making NCS vulnerable to cyber intrusions/attacks which may cause physical damage. This chapter presents control algorithms to ensure resilient and safe operation of NCS under unknown cyberattacks. Specifically, a variant of dynamic watermarking strategies is presented by embedding encoding/decoding components of chaotic signals into the NCS for secure control for critical locations where the measurement/control signals are transmitted to/from the control center via a communication network. In addition, resilient cooperative control algorithms are discussed to ensure safe operation at edge of the NCS which consists of a large number of distributed controllable devices. Several numerical examples are provided to illustrate the proposed control strategies.

Original languageEnglish
Title of host publicationSecurity and Resilience of Control Systems
Subtitle of host publicationTheory and Applications
EditorsHideaki Ishii, Quanyan Zhu
Number of pages25
ISBN (Electronic)978-3-030-83236-0
ISBN (Print)978-3-030-83235-3
Publication statusPublished - 22 Jan 2022
Publication typeA3 Book chapter

Publication series

NameLecture Notes in Control and Information Sciences
ISSN (Print)0170-8643
ISSN (Electronic)1610-7411

Publication forum classification

  • Publication forum level 1

ASJC Scopus subject areas

  • Library and Information Sciences


Dive into the research topics of 'Resilient Hierarchical Networked Control Systems: Secure Controls for Critical Locations and at Edge'. Together they form a unique fingerprint.

Cite this