Reinforcement Learning-based Optimal Control and Software Rejuvenation for Safe and Efficient UAV Navigation

A Chen, K Mitsopoulos… - 2023 62nd IEEE …, 2023 - ieeexplore.ieee.org
Unmanned autonomous vehicles (UAVs) rely on effective path planning and tracking control
to accomplish complex tasks in various domains. Reinforcement Learning (RL) methods are …

Software rejuvenation under persistent attacks in constrained environments

R Romagnoli, P Griffioen, BH Krogh, B Sinopoli - IFAC-PapersOnLine, 2020 - Elsevier
Software rejuvenation has been proposed to guarantee safety of cyber-physical systems
(CPSs) against cyber-attacks. Recent work has demonstrated how this method can be …

Runtime system support for cps software rejuvenation

R Romagnoli, BH Krogh, D de Niz… - … on Emerging Topics …, 2023 - ieeexplore.ieee.org
Software rejuvenation, which was originally introduced to deal with performance
degradation due to software aging, has recently been proposed as a mechanism to provide …

3rdParTEE: Securing third-party IoT services using the trusted execution environment

J Jang, BB Kang - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Advancements in the Internet of Things (IoT) have resulted in the connection and
deployment of numerous smart and embedded devices. Although such devices enable …

CSECMAS: An efficient and secure certificate signing based elliptic curve multiple authentication scheme for drone communication networks

L Li, X Lian, Y Wang, L Tan - Applied Sciences, 2022 - mdpi.com
With the rapid development of communication technology, unmanned aerial vehicles (UAVs)
have been widely used in the military, rescue, agricultural and other fields. The security and …

Innovation-Based Remote State Estimation Secrecy with no Acknowledgments

JM Kennedy, JJ Ford, DE Quevedo… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Secrecy encoding for remote state estimation in the presence of adversarial eavesdroppers
is a well studied problem. Typical existing secrecy encoding schemes rely on the …

Secure networked control for decentralized systems via software rejuvenation

P Griffioen, R Romagnoli, BH Krogh… - 2020 American …, 2020 - ieeexplore.ieee.org
Decentralized control systems exist in many scenarios where agents have the ability to fully
communicate with one another but do not do so for multiple reasons, including cost and the …

LQG reference tracking with safety and reachability guarantees under unknown false data injection attacks

Z Li, L Niu, A Clark - IEEE Transactions on Automatic Control, 2022 - ieeexplore.ieee.org
We investigate a linear quadratic Gaussian (LQG) tracking problem with safety and
reachability constraints in the presence of an adversary who mounts a false data injection …

Safety and liveness of software rejuvenation for secure tracking control

R Romagnoli, BH Krogh… - 2019 18th European …, 2019 - ieeexplore.ieee.org
Software rejuvenation is the concept of scheduling periodic system reboots to eliminate
sources of potential failures due to unanticipated states in the run-time system. It has been …

You Can't Always Check What You Wanted:: Selective Checking and Trusted Execution to Prevent False Actuations in Real-Time Internet-of-Things

M Hasan, S Mohan - 2023 IEEE 26th International Symposium …, 2023 - ieeexplore.ieee.org
Modern Internet-of-Things devices are vulnerable to attacks targeting outgoing actuation
commands that modify their physical behaviors. We present a “selective checking” …