References of "Bezzaoucha, Souad 50008859"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailOn the Event-based Attack-tolerant Control: A Polytopic Representation
Bezzaoucha, Souad UL; Voos, Holger UL

in Bezzaoucha, Souad (Ed.) International Conference on Automation, Control and Robots (2019, October)

In the present contribution, we present a new event-based control representation. Based on the polytopic approach, more specifically the sector nonlinear transformation, an event-based attack-tolerant ... [more ▼]

In the present contribution, we present a new event-based control representation. Based on the polytopic approach, more specifically the sector nonlinear transformation, an event-based attack-tolerant control, and scheduling co-design strategy are proposed. From the event triggering definition (sample-and-hold strategy), polytopic writing of the event-triggered feedback control is first presented and then incorporated into the system dynamics for analysis. Our goal is to present a unique model that is able to deal with the co-design problem simultaneously and that can be handled by classical control synthesis tools. The novel representation, including data deception and attack tolerant control is formulated as a BMI optimization problem ensuring both stability and some level performance requirements (L2 attenuation of the cyber-attack). [less ▲]

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detailSimultaneous State and False-Data Injection Attacks Reconstruction for NonLinear Systems: an LPV Approach
Bezzaoucha, Souad UL; Voos, Holger UL

in Bezzaoucha, Souad (Ed.) International Conference on Automation, Control and Robots (2019, October)

The present contribution addresses simultaneous state and actuator/sensor false-data injection attacks reconstruction for nonlinear systems. The considered actuator/sensor attacks are modeled as time ... [more ▼]

The present contribution addresses simultaneous state and actuator/sensor false-data injection attacks reconstruction for nonlinear systems. The considered actuator/sensor attacks are modeled as time-varying parameters with a multiplicative effect on the actuator input signal and the sensor output signal, respectively. Based on the sector non-linearity approach and the convex polytopic transformation, the nonlinear model is written in a Linear Parameter-Varying (LPV) form, then an observer allowing both state and attack reconstruction is designed by solving an LMI optimization problem. [less ▲]

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detailStability Analysis of Power Networks under Cyber-Physical Attacks: an LPV-Descriptor Approach
Bezzaoucha, Souad UL; Voos, Holger UL

in Bezzaoucha, Souad (Ed.) International Conference on Control, Decision and Information Technologies (2019, April)

This paper proposes a unified and advanced framework for the modeling, stability study and stabilization of a Power Networks subject to an omniscient adversary (i.e. cyber-attack). From the system model ... [more ▼]

This paper proposes a unified and advanced framework for the modeling, stability study and stabilization of a Power Networks subject to an omniscient adversary (i.e. cyber-attack). From the system model developed in [24], based on the well-known sector non-linearity approach and the convex polytopic transformation, the attacked system (descriptor model) is re-written in a more convenient form (Linear Parameter Varying-LPV) with unmeasurable premise variables. The so-called Lyapunov-based methods are applied in order to study the stability and security problems despite the presence of cyber-attacks. The conditions will be given in terms of Linear- Bilinear Matrix Inequality LMI- BMI constraints. [less ▲]

Detailed reference viewed: 40 (0 UL)
Full Text
Peer Reviewed
See detailNew Trends in Observer-based Control: An Introduction to Design Approaches and Engineering Applications, Chapter 13: Observer-based Event-triggered Attack-Tolerant Control Design for Cyber-physical Systems
Bezzaoucha, Souad UL; Voos, Holger UL

in New Trends in Observer-based Control: An Introduction to Design Approaches and Engineering Applications, Chapter 13: Observer-based Event-triggered Attack-Tolerant Control Design for Cyber-physical Systems (2019)

In the following chapter, we first introduce an appropriate model associating paradigms from control theory and computer science (system subject to both physical attacks and sensors/actuators attacks via ... [more ▼]

In the following chapter, we first introduce an appropriate model associating paradigms from control theory and computer science (system subject to both physical attacks and sensors/actuators attacks via the connected network, i.e., false-data injection attacks on actuators/sensors). Then, inspired by a combination between the classical fault-tolerant control (FTC) approach and the event-triggered control, an observer-based attack-tolerant control solution is proposed. The aim of our work is, first, to establish theoretical foundations for the development of model-based monitoring and attack-tolerant control for reliable deployment of a large number of advanced Cyber-Physical Systems. [less ▲]

Detailed reference viewed: 72 (8 UL)
Full Text
Peer Reviewed
See detailVulnerability Analysis of Cyber Physical Systems under False-Data injection and disturbance attacks
Gerard, Benjamin; Bezzaoucha, Souad UL; Voos, Holger UL et al

in Vulnerability Analysis of Cyber Physical Systems under False-Data injection and disturbance attacks (2018, September)

In the present paper, the problem of attacks on cyber-physical systems via networked control system (NCS) subject to unmeasured disturbances is considered. The geometric approach is used to evaluate the ... [more ▼]

In the present paper, the problem of attacks on cyber-physical systems via networked control system (NCS) subject to unmeasured disturbances is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system. The presented work deals with the so-called false data injection attacks and shows how imperfectly known disturbances can be used to perform undetectable, or at least stealthy, attacks that can make the NCS vulnerable to attacks from malicious outsiders. A numerical example is given to illustrate the approach. [less ▲]

Detailed reference viewed: 61 (6 UL)
Full Text
Peer Reviewed
See detailA Contribution to Cyber-Physical Systems Security: an Event-based Attack-tolerant Control Approach
Bezzaoucha, Souad UL; Voos, Holger UL

in Proceedings of 10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, SAFEPROCESS 2018 (2018, August 29)

In the present paper, a model-based fault/attack tolerant scheme is proposed to deal with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback ... [more ▼]

In the present paper, a model-based fault/attack tolerant scheme is proposed to deal with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback control based on an event-triggered framework is given with control synthesis and condition on the switching time. An event-based implementation is proposed in order to achieve novel security strategy. Observer and controller gains are deduced by solving su cient Bilinear Matrix Inequality (BMI) condition. Simulation results on a real-time laboratory three tank system are given to show the attack-tolerant control ability despite data deception attacks on both actuators and sensors. [less ▲]

Detailed reference viewed: 155 (22 UL)
Full Text
Peer Reviewed
See detailCyber Security and Vulnerability Analysis of Networked Control System subject to False-Data injection
Gerard, Benjamin; Bezzaoucha, Souad UL; Voos, Holger UL et al

in Proceedings of the 2018 American Control Conference (2018, June 27)

In the present paper, the problem of networked control system (NCS) cyber security is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system ... [more ▼]

In the present paper, the problem of networked control system (NCS) cyber security is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system. The proposed results are about the so-called false data injection attacks and show how imperfectly known disturbances can be used to perform undetectable, or at least stealthy, attacks that can make the NCS vulnerable to attacks from malicious outsiders. A numerical example is given to illustrate the approach. [less ▲]

Detailed reference viewed: 155 (8 UL)
Full Text
Peer Reviewed
See detailA Decoupling Approach to Design Observers for Polytopic Takagi-Sugeno Models Subject to Unknown Inputs
Bezzaoucha, Souad UL; Voos, Holger UL; Davila, Jorge et al

in Proceedings of the 2018 American Control Conference (2018, June 27)

A decoupling approach for state estimation of nonlinear systems represented in the polytopic Takagi-Sugeno with unmeasurable premise variables subject to unknown inputs is proposed in this paper. The idea ... [more ▼]

A decoupling approach for state estimation of nonlinear systems represented in the polytopic Takagi-Sugeno with unmeasurable premise variables subject to unknown inputs is proposed in this paper. The idea consists in defining a state and unknown input transformations in order to divide the state vector into two parts, a measurable part and an observable one (decoupled from the unknown input). A classical Luenberger observer to estimate the unmeasurable part is then designed and given in terms of Linear Matrix Inequalities (LMIs) conditions. A numerical example is also presented in order to illustrate the proposed approach. [less ▲]

Detailed reference viewed: 111 (6 UL)
Full Text
Peer Reviewed
See detailAttack-tolerant Control and Observer-based Trajectory Tracking for Cyber-Physical Systems
Bezzaoucha, Souad UL; Voos, Holger UL; Darouach, Mohamed

in European Journal of Control (2018)

In the present paper, a model-based fault/attack tolerant scheme is proposed to cope with cyber-threats on Cyber-Physicals Systems. A common scheme based on observers is designed and a state feedback ... [more ▼]

In the present paper, a model-based fault/attack tolerant scheme is proposed to cope with cyber-threats on Cyber-Physicals Systems. A common scheme based on observers is designed and a state feedback control based on an aperiodic event-triggered framework is given with control synthesis and condition on the switching time. Classical fault tolerant control with Bi-linear Matrix Inequality () approaches are used to achieve novel and better security strategy based on an event-triggered control implementation. The purpose of using the event-based implementation would be to reduce (limit) the total number of transmissions to only instances when the networked control system (NCS) needs attention. Simulation results on a real-time laboratory three tank system are given to show the attack-tolerant control ability despite data deception attacks on both actuators and sensors. A detection/isolation scheme based on residual observers bank is also proposed. [less ▲]

Detailed reference viewed: 213 (5 UL)
Full Text
Peer Reviewed
See detailModel predictive cooperative localization control of multiple UAVs using potential function sensor constraints
Dentler, Jan Eric UL; Kannan, Somasundar UL; Bezzaoucha, Souad UL et al

in Autonomous Robots (2018)

The global localization of multiple mobile robots can be achieved cost efficiently by localizing one robot globally and the others in relation to it using local sensor data. However, the drawback of this ... [more ▼]

The global localization of multiple mobile robots can be achieved cost efficiently by localizing one robot globally and the others in relation to it using local sensor data. However, the drawback of this cooperative localization is the requirement of continuous sensor information. Due to a limited sensor perception space, the tracking task to continuously maintain this sensor information is challenging. To address this problem, this contribution is presenting a model predictive control (MPC) approach for such cooperative localization scenarios. In particular, the present work shows a novel workflow to describe sensor limitations with the help of potential functions. In addition, a compact motion model for multi-rotor drones is introduced to achieve MPC real-time capability. The effectiveness of the presented approach is demonstrated in a numerical simulation, an experimental indoor scenario with two quadrotors as well as multiple indoor scenarios of a quadrotor obstacle evasion maneuver. [less ▲]

Detailed reference viewed: 192 (34 UL)
Full Text
Peer Reviewed
See detailObserver-based Event-triggered Attack-Tolerant Control Design for Cyber-physical Systems
Bezzaoucha, Souad UL; Voos, Holger UL; Darouach, Mohamed

in 14th International Workshop on Advanced Control and Diagnosis, Bucharest, Romania, November 2017 (2017, November)

In the present paper, a model-based fault/attack tolerant scheme is proposed to cope with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback ... [more ▼]

In the present paper, a model-based fault/attack tolerant scheme is proposed to cope with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback control based on an aperiodic event-triggered framework is given with control synthesis and condition on the switching time. Classical fault tolerant control with Bilinear Matrix Inequality (BMI) approaches are used to achieve novel and better security strategy based on an event-triggered control implementation. The purpose in using the event-based implementation would be to reduce (limit) the total number of transmissions to only instances when the networked control system (NCS) needs attention. An illustrative example of the proposed approach applied to a three-tank system is presented. [less ▲]

Detailed reference viewed: 125 (5 UL)
Full Text
Peer Reviewed
See detailOn the Unknown Input Functional Observer Design via Polytopic Lyapunov Function: Application to a Quadrotor Aerial Robots Landing
Bezzaoucha, Souad UL; Voos, Holger UL; Darouach, Mohamed

in IFAC-PapersOnLine (2017, July)

In this paper, a constructive procedure to design functional unknown input observer for nonlinear continuous time systems under the Polytopic Takagi-Sugeno framework (also known as multiple models systems ... [more ▼]

In this paper, a constructive procedure to design functional unknown input observer for nonlinear continuous time systems under the Polytopic Takagi-Sugeno framework (also known as multiple models systems) is proposed. Applying the Lyapunov theory, Linear Matrix Inequalities (LMI)s conditions are deduced which are solved for feasibility to obtain observer design matrices. To reject the effect of unknown input, classical approach of decoupling the unknown input for the linear case is used. A comparative study between single and Polytopic Lyapunov function is made in order to prove the relaxation effect of the Multiple functions. A solver based solution is then proposed. It will be shown through applicative example (a Quadrotor Aerial Robots Landing) that even if the proposed LMIs solver based solution may look conservative, an adequate choice of the solver makes it suitable for the application of the proposed approach. [less ▲]

Detailed reference viewed: 47 (7 UL)
Full Text
Peer Reviewed
See detailA contribution to Cyber-Security of Networked Control Systems: an Event-based Control Approach
Bezzaoucha, Souad UL; Voos, Holger UL; Darouach, Mohamed

in Proceedings of 2017 3rd International Conference on Event-Based Control, Communication and Signal Processing (EBCCSP 2017) (2017, May)

In the present paper, a networked control system under both cyber and physical attacks is considered. An adapted formulation of the problem under physical attacks, data deception and false data injection ... [more ▼]

In the present paper, a networked control system under both cyber and physical attacks is considered. An adapted formulation of the problem under physical attacks, data deception and false data injection attacks, is used for controller synthesis. Based on the classical fault tolerant detection (FTD) tools, a residual generator for attack/fault detection based on observers is proposed. An event-triggered and Bilinear Matrix Inequality (BMI) implementation is proposed in order to achieve novel and better security strategy. The purpose in using this implementation would be to reduce (limit) the total number of transmissions to only instances when the networked control system (NCS) needs attention. It is important to note that the main contribution of this paper is to establish the adequate event-triggered and BMI-based methodology so that the particular structure of the mixed attacked/faulty structure can be re-formulated within the classical FTD paradigm. Experimental results are given to illustrate the developed approach efficiency on a pilot three-tank system. The plant model is presented and the proposed control design is applied to the system. [less ▲]

Detailed reference viewed: 104 (4 UL)
Full Text
Peer Reviewed
See detailUnknown Input Functional Observers Design for Polytopic Discrete Time Systems
Bezzaoucha, Souad UL; Voos, Holger UL; Darouach, Mohemed

in Proceedings of 6th IEEE International Conference on Systems and Control (ICSC) 2017 (2017, May)

In this paper, a step by step algorithm is given to design functional unknown input observer for nonlinear discrete time systems under the Polytopic Takagi-Sugeno framework (also known as multiple models ... [more ▼]

In this paper, a step by step algorithm is given to design functional unknown input observer for nonlinear discrete time systems under the Polytopic Takagi-Sugeno framework (also known as multiple models systems). Applying the Lyapunov theory and the L2 attenuation, Linear Matrix Inequalities (LMI)s conditions are deduced which are solved for feasibility to obtain observer design matrices. To reject the effect of unknown input, classical approach of decoupling the unknown input for the linear case is used. A solver based solution is proposed. The novelty of the proposed approach consists in solving simultaneously both structural constraints and LMIs, which ensure a mean for the efficient design of the gains of the observers. To illustrate the proposed theoretical results, an application example of model reference tracking control applied to an electro-mechanical model of a motor with a time varying parameter is discussed. [less ▲]

Detailed reference viewed: 36 (1 UL)
Full Text
Peer Reviewed
See detailA New Polytopic Approach for the Unknown Input Functional Observer Design
Bezzaoucha, Souad UL; Voos, Holger UL; Darouach, Mohamed

in International Journal of Control (2017)

In this paper, a constructive procedure to design Functional Unknown Input Observers for nonlin ear continuous time systems is proposed under the Polytopic Takagi-Sugeno framework. An equivalent ... [more ▼]

In this paper, a constructive procedure to design Functional Unknown Input Observers for nonlin ear continuous time systems is proposed under the Polytopic Takagi-Sugeno framework. An equivalent representation for the nonlinear model is achieved using the Sector Nonlinearity Transformation (SNT). Applying the Lyapunov theory and the L2 attenuation, Linear Matrix Inequalities (LMI)s conditions are deduced which are solved for feasibility to obtain the observer design matrices. To cope with the e ffect of unknown inputs, classical approach of decoupling the unknown input for the linear case is used. Both algebraic and solver based solutions are proposed (relaxed conditions). Necessary and su fficient conditions for the existence of the functional polytopic observer are given. For both approaches, the general and particular cases (measurable premise variables, full state estimation with full and reduced order cases) are considered and it is shown that the proposed conditions correspond to the one presented for standard linear case. To illustrate the proposed theoretical results, detailed numerical simulations are presented for a Quadrotor Aerial Robots Landing and a Waste Water Treatment Plant (WWTP). Both systems are highly nonlinear and represented in a T-S polytopic form with unmeasurable premise variables and unknown inputs. [less ▲]

Detailed reference viewed: 67 (2 UL)
Full Text
Peer Reviewed
See detailChapter 4:A Survey on The Polytopic Takagi-Sugeno Approach: Application to the Inverted Pendulum
Bezzaoucha, Souad UL; Voos, Holger UL; Darouach, Mohamed

in The Inverted Pendulum: From Theory to New Innovations in Control and Robotics (2017)

This book chapter gives a general scope, states the main results obtained and methods used for the Polytopic Takagi-Sugeno approach with a detailed application to the inverted pendulum. Modeling, observer ... [more ▼]

This book chapter gives a general scope, states the main results obtained and methods used for the Polytopic Takagi-Sugeno approach with a detailed application to the inverted pendulum. Modeling, observer and controller design will be considered. [less ▲]

Detailed reference viewed: 90 (10 UL)
Full Text
Peer Reviewed
See detailHierarchical control of aerial manipulation vehicle
Kannan, Somasundar UL; Bezzaoucha, Souad UL; Quintanar Guzman, Serket UL et al

in AIP Conference Proceedings (2017), 1798(1), 020069

Hierarchical Control of the Aerial Manipulator is treated here. The modelling aspect of the highly coupled Aerial Vehicle which includes Quadrotor and manipulator is discussed. The control design to ... [more ▼]

Hierarchical Control of the Aerial Manipulator is treated here. The modelling aspect of the highly coupled Aerial Vehicle which includes Quadrotor and manipulator is discussed. The control design to perform tasks in operational space is addressed along with stability discussion. The simulation studies are successfully performed to validate the design methodology. [less ▲]

Detailed reference viewed: 91 (13 UL)
Full Text
Peer Reviewed
See detailAdaptive Control of Hysteretic Robotic arm in Operational Space
Kannan, Somasundar UL; Quintanar Guzman, Serket UL; Bezzaoucha, Souad UL et al

in 5th International Conference on Mechatronics and Control Engineering ICMCE, venice, Italy, 2016 (2016, December 14)

The focus of the current article is on Operational Space Control of a single degree of freedom robotic arm with hysteretic joint behaviour due to actuation by a single Shape Memory Alloy (SMA) wire. A ... [more ▼]

The focus of the current article is on Operational Space Control of a single degree of freedom robotic arm with hysteretic joint behaviour due to actuation by a single Shape Memory Alloy (SMA) wire. A Closed Loop Inverse Kinematics Algorithm is used in the outer loop with Adaptive joint control in the inner loop. A composite stability analysis is used to analyse the stability of the closed loop system and finally successfully validated through simulation study. [less ▲]

Detailed reference viewed: 54 (7 UL)
Full Text
Peer Reviewed
See detailOn the Unknown Input Functional Observers Design: a Polytopic Takagi-Sugeno Approach
Bezzaoucha, Souad UL; Voos, Holger UL; Darouach, Mohamed

in 24th Mediterranean Conference on Control and Automation (MED), Athens, Greece, 2016 (2016, June)

In this paper, a step by step algorithm is given to design functional unknown input observer for continuous nonlinear systems under the Polytopic Takagi-Sugeno (T-S) framework. To nullify the effect of ... [more ▼]

In this paper, a step by step algorithm is given to design functional unknown input observer for continuous nonlinear systems under the Polytopic Takagi-Sugeno (T-S) framework. To nullify the effect of unknown input (UI), classical approach of decoupling the UI for the linear case is extended to the polytopic system. Applying the Lyapunov theory and the L2 attenuation, Linear Matrix Inequalities (LMI)s conditions are achieved which are solved for feasibility to obtain observer design matrices. The novelty of the proposed approach consists in solving simultaneously both structural constraints and LMIs, which ensure a mean for the efficient design of the gains of the observers. To illustrate the proposed theoretical results, simulation example of a Waste Water Treatment Plant (WWTP), which is highly nonlinear and represented in a T-S polytopic form with unmeasurable premise variables and unknown inputs, is discussed. [less ▲]

Detailed reference viewed: 231 (12 UL)
Full Text
Peer Reviewed
See detailA Flexible Move Blocking Strategy to Speed up Model-Predictive Control while Retaining a High Tracking Performance
Schwickart, Tim Klemens UL; Voos, Holger UL; Darouach, Mohamed et al

in 2016 European Control Conference (ECC), Aalborg, Denmark (2016, June)

This paper presents a strategy to reduce the complexity and thus the computational burden in modelpredictive control (MPC) by a flexible online input move blocking algorithm. Model-predictive sampled-data ... [more ▼]

This paper presents a strategy to reduce the complexity and thus the computational burden in modelpredictive control (MPC) by a flexible online input move blocking algorithm. Model-predictive sampled-data control of constrained, LTI plants is considered. Move blocking is an input parameterisation in MPC where the control input is forced to be constant over several prediction sample steps to reduce the dimensionality of the underlying optimisation problem. Typically, the prediction sample steps where the control input is not allowed to vary (i. e. the block distribution) is predetermined offline and is kept constant throughout the control operation. However, the control performance and computational efficiency can be improved if the block length is adjusted to the specific operating conditions. In this work, a heuristic method to adjust the block length online according to the initial state of the system, reference signals, measured disturbances and constraints is presented. A numerical example shows the effectiveness of the approach. [less ▲]

Detailed reference viewed: 66 (5 UL)