2024 |
Gyunghoon Park / Hyungbo Shim / Tomomichi Hagiwara On Existence of Uniformly Marginally Stable Zeros of Linear Sampled-data Systems and its Application to Stable Inversion-based Control Journal Article In: IEEE Access, vol. 12, pp. 49826 - 49836, 2024, ISSN: 2169-3536. Abstract | Links | BibTeX | Tags: Linear Systems, marginal stability, Sampled data system @article{nokey, This paper investigates a class of sampled-data systems in which at least one of the discretetime zeros remains on the unit circle regardless of the sampling period. This type of zero is referred to as an ‘‘uniformly marginally stable’’ (UMS) zero. Utilizing this novel concept, we present necessary conditions as well as sufficient conditions for the continuous-time plant whose sampled-data model has an UMS zero. The significance of the symmetry regarding the zeros and the poles of the continuous-time plant is highlighted as it plays a vital role in enforcing a discrete-time zero of the sampled-data system to be UMS, for both discretization zeros and intrinsic zeros. We develop the theory for sampled-data systems employing a conventional sampler and a zero-order hold together with a single-input single-output continuous-time plant, and then observe that certain results can be extended to the generalized holds. As an application, we establish a condition for sampled-data systems that allow for discrete-time stable inversion-based control where the absence of such an UMS zero is crucial in the design of such control systems. |
2023 |
Joowon Lee / Donggil Lee / Seungbeom Lee / Junsoo Kim / Hyungbo Shim Conversion of Controllers to Have Integer State Matrix for Encrypted Control: Non-Minimal Order Approach Proceedings Article In: 2023 62nd IEEE Conference on Decision and Control (CDC), pp. 5091-5096, IEEE Control Systems Society, Marina Bay Sands, Singapore, 2023, ISBN: 979-8-3503-0124-3. Abstract | Links | BibTeX | Tags: Controller encryption, Homomorphic encryption, Linear Systems @inproceedings{nokey, To implement an encrypted dynamic controller based on homomorphic encryption that operates for an infinite time horizon, it is essential for every component of the controller's state matrix to be an integer. In this paper, we tackle the challenge of converting a pre-designed controller into a new one with an integer state matrix while preserving its control performance in the closed-loop system. This enables encrypted dynamic systems to be realized without re-encryption and approximation of control parameters, compared to the previous results. To achieve this, we propose two approaches and provide sufficient conditions on the design parameter for each. The first approach is to design the new controller as an estimator of the original closed-loop system, and the conditions on the estimator gain are derived. Our second approach is to formulate a problem of finding certain polynomials, whose solution leads to the design of the new controller. In a special case when the numerator of the plant transfer function is a constant, we provide a constructive method to obtain such solution. |
Yongsoon Eun / Jaeho Lee / Hyungbo Shim Data-Driven Inverse of Linear Systems and Application to Disturbance Observer Proceedings Article In: 2023 American Control Conference (ACC), pp. 2806-2811, IEEE, San Diego, CA, USA, 2023, ISBN: 979-8-3503-2806-6. Abstract | Links | BibTeX | Tags: Data-driven control, Disturbance observer, Disturbance rejection, Linear Systems @inproceedings{nokeyt, This work develops a data-based construction of inverse dynamics for LTI systems. Specifically, the problem addressed here is to find an input sequence from the corresponding output sequence based on pre-collected input and output data. The problem can be considered as a reverse of the recent use of the behavioral approach, in which the output sequence is obtained for a given input sequence by solving an equation formed by pre-collected data. The condition under which the problem gives a solution is investigated and turns out to be L-delay invertibility of the plant and a certain degree of persistent excitation of the data input. The result is applied to form a data-driven disturbance observer. The plant dynamics augmented by the data-driven disturbance observer exhibits disturbance rejection without the model knowledge of the plant. |
2019 |
Jihan Kim / Gyunghoon Park / Hyungbo Shim / Yongsoon Eun Masking attack for sampled-data systems via input redundancy Journal Article In: IET Control Theory & Applications , vol. 13, no. 14, pp. 2300-2308, 2019, ISSN: 1751-8644. Abstract | Links | BibTeX | Tags: Linear Systems @article{KimParkShimEun19, This study discovers a new vulnerability of cyber-physical systems to malicious attack. It arises when the physical plant, that is modelled as a continuous-time LTI system, is controlled by a digital controller with periodic sampling and actuation. In the sampled-data framework, most anomaly detectors monitor the plant's output only at discrete time instants. Consequently, abnormal behaviour between sampling instants cannot be detected if output behaves normally at every sampling instant. This implies that if an actuator attack drives the plant's state to pass through the kernel of the output matrix at each sensing time, then the attack compromises the system while remaining stealthy. It is shown that this type of attack always exists when the sampled-data system has an input redundancy, i.e. the number of inputs being larger than that of outputs and/or the sampling rate of the actuators being higher than that of the sensors. Simulation results for the X-38 vehicle and other numerical examples illustrate this new attack strategy may result in disastrous consequences. |
2018 |
Junsoo Kim / Jin Gyu Lee / Chanhwa Lee / Hyungbo Shim / Jin H. Seo Local Identification of Sensor Attack and Distributed Resilient State Estimation for Linear System Proceedings Article In: Proc. of 2018 IEEE 57th Conference on Decision and Control, pp. 2056-2061, IEEE, Miami, USA, 2018. Abstract | Links | BibTeX | Tags: Linear Systems @inproceedings{KimLeeLeeShimSeo18, This paper presents a distributed attack-resilient state estimation scheme for continuous-time linear systems having redundant sensors when some of them are corrupted by adversaries. We first design a distributed state observer so that individual observers from each of output measurements communicate with their neighbors and cooperate to recover the full state of the system. Then, the observers are partitioned into disjoint groups and local monitoring systems are designed for each of them. Even though the system is not observable from measurements in each group, every influential attack is detected and identified by local monitors using only local information and local observer estimates within the local group, with the help of sensing redundancy. In process of local attack identification, a notion of sensor attack identifiability is introduced which does not require observability. Finally, all corrupted output measurements are removed from the observer communication and the distributed resilient state estimation is achieved |
2007 |
Dane Baang / Jin Young Choi / Hyungbo Shim Perfect tracking control for linear systems with state constraint Journal Article In: International Journal of Control Automation and Systems, vol. 5, no. 2, pp. 218-222, 2007, ISBN: 1598-6446. Abstract | BibTeX | Tags: Linear Systems @article{BaangChoiShim07, This paper presents a new Perfect Tracking Control (PTC) scheme for linear systems with state constraint. The proposed controller increases the number of the steps on-line for perfect tracking to satisfy the given ellipsoid-type state constraint. The unavoidable step delay that we impose is minimized by solving LMI feasibility problems and the possible feedback information loss is avoided. The proposed schemes are easy to develop, theoretically simple and clear, and include the conventional PTC as its special case. |
List of English Publication
2024 |
On Existence of Uniformly Marginally Stable Zeros of Linear Sampled-data Systems and its Application to Stable Inversion-based Control Journal Article In: IEEE Access, vol. 12, pp. 49826 - 49836, 2024, ISSN: 2169-3536. |
2023 |
Conversion of Controllers to Have Integer State Matrix for Encrypted Control: Non-Minimal Order Approach Proceedings Article In: 2023 62nd IEEE Conference on Decision and Control (CDC), pp. 5091-5096, IEEE Control Systems Society, Marina Bay Sands, Singapore, 2023, ISBN: 979-8-3503-0124-3. |
Data-Driven Inverse of Linear Systems and Application to Disturbance Observer Proceedings Article In: 2023 American Control Conference (ACC), pp. 2806-2811, IEEE, San Diego, CA, USA, 2023, ISBN: 979-8-3503-2806-6. |
2019 |
Masking attack for sampled-data systems via input redundancy Journal Article In: IET Control Theory & Applications , vol. 13, no. 14, pp. 2300-2308, 2019, ISSN: 1751-8644. |
2018 |
Local Identification of Sensor Attack and Distributed Resilient State Estimation for Linear System Proceedings Article In: Proc. of 2018 IEEE 57th Conference on Decision and Control, pp. 2056-2061, IEEE, Miami, USA, 2018. |
2007 |
Perfect tracking control for linear systems with state constraint Journal Article In: International Journal of Control Automation and Systems, vol. 5, no. 2, pp. 218-222, 2007, ISBN: 1598-6446. |