Learn More
This work addresses the problem of ensuring trustworthy computation in a linear consensus network. A solution to this problem is relevant for several tasks in multi-agent systems including motion coordination, clock synchronization , and cooperative estimation. In a linear consensus network, we allow for the presence of misbehaving agents, whose behavior(More)
Cyber-physical systems are ubiquitous in power systems, transportation networks, industrial process control and critical infrastructures. These systems need to operate reliably in the face of unforeseen failures and external malicious attacks. In this paper (i) we propose a mathematical framework for cyber-physical systems, attacks, and monitors; (ii) we(More)
—This paper studies the problem of controlling complex networks, that is, the joint problem of selecting a set of control nodes and of designing a control input to steer a network to a target state. For this problem (i) we propose a metric to quantify the difficulty of the control problem as a function of the required control energy, (ii) we derive bounds(More)
The subject of this work is the patrolling of an environment with the aid of a team of autonomous agents. We consider both the design of open-loop trajectories with optimal properties, and of distributed control laws converging to optimal trajectories. As performance criteria, the refresh time and the latency are considered, i.e., respectively, time gap(More)
— This work proposes algorithms to control the trajectory of a team of cameras for video surveillance. We consider a chain of cameras installed in an environment. These cameras are used to detect smart intruders, who are aware of the cameras' configuration at each time instant, and who schedule their motion to avoid detection, if possible. For this problem(More)
— This work proposes a novel metric to characterize the resilience of stochastic cyber-physical systems to attacks and faults. We consider a single-input single-output plant regulated by a control law based on the estimate of a Kalman filter. We allow for the presence of an attacker able to hijack and replace the control signal. The objective of the(More)
— This paper focuses on trustworthy computation systems and proposes a novel intrusion detection scheme for linear consensus networks with misbehaving nodes. This prototypical control problem is relevant in network security applications. The objective is for each node to detect and isolate the misbehaving nodes using only the information flow adopted by(More)
— Future power networks will be characterized by safe and reliable functionality against physical malfunctions and cyber attacks. This paper proposes a unified framework and advanced monitoring procedures to detect and identify network components malfunction or measurements corruption caused by an omniscient adversary. We model a power system under(More)
— This work is concerned with the security of a power network against components failure and external attacks. We model a power plant as a linear continuous-time descriptor system. We adopt the framework of structural control theory, and we associate a digraph with the power plant. We provide a necessary and sufficient graph theoretic condition for the(More)
—This work presents a distributed method for control centers to monitor the operating condition of a power network. Specifically we consider (static) state estimation problems, in which the state vector consists of the voltage magnitude and angle at all network buses. We consider the state to be linearly related to network measurements, which include power(More)