scispace - formally typeset
Search or ask a question

Showing papers by "Paulo Tabuada published in 2016"


Journal ArticleDOI
TL;DR: In this paper, the authors present a methodology that allows safety conditions ( expressed as control barrier functions) to be unified with performance objectives (represented as control Lyapunov functions) in the context of real-time optimization-based controllers.
Abstract: Safety critical systems involve the tight coupling between potentially conflicting control objectives and safety constraints. As a means of creating a formal framework for controlling systems of this form, and with a view toward automotive applications, this paper develops a methodology that allows safety conditions -- expressed as control barrier functions -- to be unified with performance objectives -- expressed as control Lyapunov functions -- in the context of real-time optimization-based controllers. Safety conditions are specified in terms of forward invariance of a set, and are verified via two novel generalizations of barrier functions; in each case, the existence of a barrier function satisfying Lyapunov-like conditions implies forward invariance of the set, and the relationship between these two classes of barrier functions is characterized. In addition, each of these formulations yields a notion of control barrier function (CBF), providing inequality constraints in the control input that, when satisfied, again imply forward invariance of the set. Through these constructions, CBFs can naturally be unified with control Lyapunov functions (CLFs) in the context of a quadratic program (QP); this allows for the achievement of control objectives (represented by CLFs) subject to conditions on the admissible states of the system (represented by CBFs). The mediation of safety and performance through a QP is demonstrated on adaptive cruise control and lane keeping, two automotive control problems that present both safety and performance considerations coupled with actuator bounds.

348 citations


Journal ArticleDOI
TL;DR: In this article, the authors describe two algorithms for state reconstruction from sensor measurements that are corrupted with sparse, but otherwise arbitrary, noise, motivated by the need to secure cyber-physical systems against a malicious adversary that can arbitrarily corrupt sensor measurements.
Abstract: This paper describes two algorithms for state reconstruction from sensor measurements that are corrupted with sparse, but otherwise arbitrary, “noise.” These results are motivated by the need to secure cyber-physical systems against a malicious adversary that can arbitrarily corrupt sensor measurements. The first algorithm reconstructs the state from a batch of sensor measurements while the second algorithm is able to incorporate new measurements as they become available, in the spirit of a Luenberger observer. A distinguishing point of these algorithms is the use of event-triggered techniques to improve the computational performance of the proposed algorithms.

320 citations


Journal ArticleDOI
TL;DR: Two different control software synthesis methods for adaptive cruise control are discussed, each of which produces a controller that is correct-by-construction, meaning that trajectories of the closed-loop systems provably meet the specification.
Abstract: Motivated by the challenge of developing control software provably meeting specifications for real-world problems, this paper applies formal methods to adaptive cruise control (ACC). Starting from a linear temporal logic specification for ACC, obtained by interpreting relevant ACC standards, we discuss in this paper two different control software synthesis methods. Each method produces a controller that is correct-by-construction, meaning that trajectories of the closed-loop systems provably meet the specification. Both methods rely on fixed-point computations of certain set-valued mappings. However, one of the methods performs these computations on the continuous state space whereas the other method operates on a finite-state abstraction. While controller synthesis is based on a low-dimensional model, each controller is tested on CarSim, an industry-standard vehicle simulator. Our results demonstrate several advantages over classical control design techniques. First, a formal approach to control design removes potential ambiguity in textual specifications by translating them into precise mathematical requirements. Second, because the resulting closed-loop system is known a priori to satisfy the specification, testing can then focus on the validity of the models used in control design and whether the specification captures the intended requirements. Finally, the set from where the specification (e.g., safety) can be enforced is explicitly computed and thus conditions for passing control to an emergency controller are clearly defined.

153 citations


Proceedings ArticleDOI
01 Dec 2016
TL;DR: A privacy-preserving protocol based on partially homomorphic encryption where each agent encrypts its own information before sending it to an untrusted cloud computing infrastructure to find the optimal solution.
Abstract: We consider a problem where multiple agents participate in solving a quadratic optimization problem subject to linear inequality constraints in a privacy-preserving manner. Several variables of the objective function as well as the constraints are privacy-sensitive and are known to different agents. We propose a privacy-preserving protocol based on partially homomorphic encryption where each agent encrypts its own information before sending it to an untrusted cloud computing infrastructure. To find the optimal solution the cloud applies a gradient descent algorithm on the encrypted data without the ability to decrypt it. The privacy of the proposed protocol against coalitions of colluding agents is analyzed using the cryptography notion of zero knowledge proofs.

93 citations


Journal ArticleDOI
TL;DR: A notion of robustness termed input-output dynamical stability for cyber-physical systems (CPS) which merges existing notions of robustity for continuous systems and discrete systems is introduced.
Abstract: Robustness as a system property describes the degree to which a system is able to function correctly in the presence of disturbances, i.e., unforeseen or erroneous inputs. In this paper, we introduce a notion of robustness termed input-output dynamical stability for cyber-physical systems (CPS) which merges existing notions of robustness for continuous systems and discrete systems. The notion captures two intuitive aims of robustness: bounded disturbances have bounded effects and the consequences of a sporadic disturbance disappear over time. We present a design methodology for robust CPS which is based on an abstraction and refinement process. We suggest several novel notions of simulation relations to ensure the soundness of the approach. In addition, we show how such simulation relations can be constructed compositionally. The different concepts and results are illustrated throughout the paper with examples.

46 citations


Posted Content
TL;DR: This paper develops a control approach with correctness guarantees for the simultaneous operation of lane keeping and adaptive cruise control, and employs an assume-guarantee formalism between these two subsystems, such that they can be considered individually.
Abstract: This paper develops a control approach with correctness guarantees for the simultaneous operation of lane keeping and adaptive cruise control. The safety specifications for these driver assistance modules are expressed in terms of set invariance. Control barrier functions are used to design a family of control solutions that guarantee the forward invariance of a set, which implies satisfaction of the safety specifications. The control barrier functions are synthesized through a combination of sum-of-squares program and physics-based modeling and optimization. A real-time quadratic program is posed to combine the control barrier functions with the performance-based controllers, which can be either expressed as control Lyapunov function conditions or as black-box legacy controllers. In both cases, the resulting feedback control guarantees the safety of the composed driver assistance modules in a formally correct manner. Importantly, the quadratic program admits a closed-form solution that can be easily implemented. The effectiveness of the control approach is demonstrated by simulations in the industry-standard vehicle simulator Carsim.

46 citations


Proceedings ArticleDOI
01 Jan 2016
TL;DR: In this article, the authors propose a robust version of the LTL fragment that only contains the always and eventually temporal operators, and apply it to the problem of specifying robustness in temporal logic.
Abstract: Although it is widely accepted that every system should be robust, in the sense that "small" violations of environment assumptions should lead to "small" violations of system guarantees, it is less clear how to make this intuitive notion of robustness mathematically precise. In this paper, we address the problem of how to specify robustness in temporal logic. Our solution consists of a robust version of the Linear Temporal Logic (LTL) fragment that only contains the always and eventually temporal operators.

42 citations


Proceedings ArticleDOI
01 Dec 2016
TL;DR: This work shows how to generate succinct explanations for the infeasibility of a discrete plan by exploiting a relaxation of the convex program that allows detecting the earliest possible occurrence of an infeasible transition between workspace regions.
Abstract: We present a scalable robot motion planning algorithm for reach-avoid problems. We assume a discrete-time, linear model of the robot dynamics and a workspace described by a set of obstacles and a target region, where both the obstacles and the region are polyhedra. Our goal is to construct a trajectory, and the associated control strategy, that steers the robot from its initial point to the target while avoiding obstacles. Differently from previous approaches, based on the discretization of the continuous state space or uniform discretization of the workspace, our approach, inspired by the lazy satisfiability modulo theory paradigm, decomposes the planning problem into smaller subproblems, which can be efficiently solved using specialized solvers. At each iteration, we use a coarse, obstacle-based discretization of the workspace to obtain candidate high-level, discrete plans that solve a set of Boolean constraints, while completely abstracting the low-level continuous dynamics. The feasibility of the proposed plans is then checked via a convex program, under constraints on both the system dynamics and the control inputs, and new candidate plans are generated until a feasible one is found. To achieve scalability, we show how to generate succinct explanations for the infeasibility of a discrete plan by exploiting a relaxation of the convex program that allows detecting the earliest possible occurrence of an infeasible transition between workspace regions. Simulation results show that our algorithm favorably compares with state-of-the-art techniques and scales well for complex systems, including robot dynamics with up to 50 continuous states.

33 citations


Proceedings ArticleDOI
01 Dec 2016
TL;DR: This paper answers the following two questions: among the several inputs available to the controller inside the winning set, are there inputs that are “better” than others?
Abstract: The synthesis of controllers enforcing safety properties is a well understood problem for which we have practical algorithms as well as a deep theoretical understanding. This problem is typically formulated as game between the controller seeking to enforce the safety property and the environment seeking to violate it. The solution of these games is given by a winning set: inside the winning set the controller can enforce the desired property as long as it chooses one of the many inputs that forces the system to remain inside the winning set; outside the winning set the environment can violate the winning property independently of the controller's actions. In this paper we answer the following two questions: (1) Among the several inputs available to the controller inside the winning set, are there inputs that are “better” than others? (2) What should the controller do when the state is outside the winning set? In answering these questions we are guided by a desire to be robust to unmodeled intermittent disturbances.

29 citations


Proceedings ArticleDOI
11 Apr 2016
TL;DR: A novel multi-modal Luenberger (MML) observer based on efficient Satisfiability Modulo Theory (SMT) solving is proposed and an efficient SMT-based decision procedure is developed able to reason about the estimates of the MML observer to detect at runtime which sets of sensors are attack-free, and use them to obtain a correct state estimate.
Abstract: We introduce a scalable observer architecture to estimate the states of a discrete-time linear-time-invariant (LTI) system whose sensors can be manipulated by an attacker. Given the maximum number of attacked sensors, we build on previous results on necessary and sufficient conditions for state estimation, and propose a novel multi-modal Luenberger (MML) observer based on efficient Satisfiability Modulo Theory (SMT) solving. We present two techniques to reduce the complexity of the estimation problem. As a first strategy, instead of a bank of distinct observers, we use a family of filters sharing a single dynamical equation for the states, but different output equations, to generate estimates corresponding to different subsets of sensors. Such an architecture can reduce the memory usage of the observer from an exponential to a linear function of the number of sensors. We then develop an efficient SMT-based decision procedure that is able to reason about the estimates of the MML observer to detect at runtime which sets of sensors are attack-free, and use them to obtain a correct state estimate. We provide proofs of convergence for our algorithm and report simulation results to compare its runtime performance with alternative techniques. Our algorithm scales well for large systems (including up to 5000 sensors) for which many previously proposed algorithms are not implementable due to excessive memory and time requirements. Finally, we illustrate the effectiveness of our algorithm on the design of resilient power distribution systems.

27 citations


Posted Content
21 Sep 2016
TL;DR: A methodology is developed that allows safety conditions—expressed as control barrier functions— to be unified with performance objectives—expression as control Lyapunov functions—in the context of real-time optimizationbased controllers.
Abstract: Safety critical systems involve the tight coupling between potentially conflicting control objectives and safety constraints. As a means of creating a formal framework for controlling systems of this form, and with a view toward automotive applications, this paper develops a methodology that allows safety conditions -- expressed as control barrier functions -- to be unified with performance objectives -- expressed as control Lyapunov functions -- in the context of real-time optimization-based controllers. Safety conditions are specified in terms of forward invariance of a set, and are verified via two novel generalizations of barrier functions; in each case, the existence of a barrier function satisfying Lyapunov-like conditions implies forward invariance of the set, and the relationship between these two classes of barrier functions is characterized. In addition, each of these formulations yields a notion of control barrier function (CBF), providing inequality constraints in the control input that, when satisfied, again imply forward invariance of the set. Through these constructions, CBFs can naturally be unified with control Lyapunov functions (CLFs) in the context of a quadratic program (QP); this allows for the achievement of control objectives (represented by CLFs) subject to conditions on the admissible states of the system (represented by CBFs). The mediation of safety and performance through a QP is demonstrated on adaptive cruise control and lane keeping, two automotive control problems that present both safety and performance considerations coupled with actuator bounds.

Proceedings ArticleDOI
14 Mar 2016
TL;DR: The schedulability and response-time analysis in the presence of self-triggered controllers is still an open problem and the topic of this paper.
Abstract: It is well known that event-triggered and self-triggered controllers implemented on dedicated platforms can provide the same performance as the traditional periodic controllers, while consuming considerably less bandwidth. However, since the majority of controllers are implemented by software tasks on shared platforms, on one hand, it might no longer be possible to grant access to the event-triggered controller upon request. On the other hand, due to the seemingly irregular requests from self-triggered controllers, other applications, while in reality schedulable, may be declared unschedulable, if not carefully analyzed. The schedulability and response-time analysis in the presence of self-triggered controllers is still an open problem and the topic of this paper.

Proceedings ArticleDOI
01 Dec 2016
TL;DR: This work considers the problem of system identification of linear time invariant systems when some of the sensor measurements are changed by a malicious adversary, and provides a precise characterization of the equivalence relation that identifies which models cannot be distinguished in the presence of attacks.
Abstract: We consider the problem of system identification of linear time invariant systems when some of the sensor measurements are changed by a malicious adversary. We treat adversaries as omniscient and impose no restrictions (statistical or otherwise) on how they can alter the measurements of the sensors under attack. Given a bound on the number of attacked sensors, and under a certain observability condition, we show that we can construct models that are useful for certain control purposes, e.g., stabilization. We also provide a precise characterization of the equivalence relation that identifies which models cannot be distinguished in the presence of attacks.

Proceedings ArticleDOI
01 Dec 2016
TL;DR: A method to decompose synthesis of controllers for safety specifications into smaller controller synthesis problems based on assume-guarantee reasoning is presented and is shown to be correct and complete.
Abstract: We present a method to decompose synthesis of controllers for safety specifications into smaller controller synthesis problems. The method applies to systems that we call decomposable, which means that their transition relations can be expressed as the meet of some number of transition relations over disjoint inputs. The method presented here is based on assume-guarantee reasoning and is shown to be correct and complete: a controller enforces the safety specification if and only if it can be obtained by this method.

Proceedings ArticleDOI
01 Oct 2016
TL;DR: This work proposes a novel framework called Underminer, an automated technique to identify non-converging behaviors in embedded control system designs that supports a multiplicity of convergence-like notions, such as those based on Lyapunov analysis and thosebased on temporal logic formulae.
Abstract: Evaluation of industrial embedded control system designs is a time-consuming and imperfect process. While an ideal process would apply a formal verification technique such as model checking or theorem proving, these techniques do not scale to industrial design problems, and it is often difficult to use these techniques to verify performance aspects of control system designs, such as stability or convergence. For industrial designs, engineers rely on testing processes to identify critical or unexpected behaviors. We propose a novel framework called Underminer to improve the testing process; this is an automated technique to identify non-converging behaviors in embedded control system designs. Underminer treats the system as a black box, and lets the designer indicate the model parameters, inputs and outputs that are of interest. It supports a multiplicity of convergence-like notions, such as those based on Lyapunov analysis and those based on temporal logic formulae. Underminer can be applied in the context of testing models created in the controller-design phase, and can also be applied in a scenario such as hardware-in-the-loop testing. We demonstrate the efficacy of Underminer by evaluating its performance on several examples.

Proceedings ArticleDOI
01 Sep 2016
TL;DR: This work identifies linear time-invariant systems in the presence of an adversarial agent that attacks sensor measurements in a noisy scenario where, in addition to the attacks, the sensor measurements are also affected by additive noise.
Abstract: This work is concerned with the identification of linear time-invariant systems in the presence of an adversarial agent that attacks sensor measurements. The attacker is omniscient and we impose no restrictions (statistical or otherwise) on how the adversary alters the sensor measurements. We work in a noisy scenario where, in addition to the attacks, the sensor measurements are also affected by additive noise. Given a bound on the number of attacked sensors, and under a certain observability condition, we show that we can still construct a model that is useful for stabilization. Furthermore, we show that this model is closely related to the original system.

Journal ArticleDOI
TL;DR: In this article, the authors consider controllable linear discrete-time systems with bounded perturbations and present two methods to compute robust controlled invariant sets, one tolerates an arbitrarily small constraint violation to compute an arbitrarily precise outer approximation of the maximal robust controlled set, while the second method provides an inner approximation.
Abstract: We consider controllable linear discrete-time systems with bounded perturbations and present two methods to compute robust controlled invariant sets. The first method tolerates an arbitrarily small constraint violation to compute an arbitrarily precise outer approximation of the maximal robust controlled invariant set, while the second method provides an inner approximation. The outer approximation scheme is $\delta$-complete, given that the constraint sets are formulated as finite unions of polytopes.

Journal ArticleDOI
TL;DR: In this article, a control barrier function can be combined with a control Lyapunov function in a quadratic program to achieve a control objective subject to safety guarantees, and conditions for the control law obtained by solving the program to be Lipschitz continuous and therefore to gives rise to well defined solutions of the resulting closed-loop system.
Abstract: Barrier functions (also called certificates) have been an important tool for the verification of hybrid systems, and have also played important roles in optimization and multi-objective control. The extension of a barrier function to a controlled system results in a control barrier function. This can be thought of as being analogous to how Sontag extended Lyapunov functions to control Lyapunov functions in order to enable controller synthesis for stabilization tasks. A control barrier function enables controller synthesis for safety requirements specified by forward invariance of a set using a Lyapunov-like condition. This paper develops several important extensions to the notion of a control barrier function. The first involves robustness under perturbations to the vector field defining the system. Input-to-State stability conditions are given that provide for forward invariance, when disturbances are present, of a "relaxation" of set rendered invariant without disturbances. A control barrier function can be combined with a control Lyapunov function in a quadratic program to achieve a control objective subject to safety guarantees. The second result of the paper gives conditions for the control law obtained by solving the quadratic program to be Lipschitz continuous and therefore to gives rise to well-defined solutions of the resulting closed-loop system.