Iman Shames
University of Melbourne
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Iman Shames.
Automatica | 2015
André Teixeira; Iman Shames; Karl Henrik Johansson
Cyber-secure networked control is modeled, analyzed, and experimentally illustrated in this paper. An attack space defined by the adversarys model knowledge, disclosure, and disruption resources is introduced. Adversaries constrained by these resources are modeled for a networked control system architecture. It is shown that attack scenarios corresponding to denial-of-service, replay, zero-dynamics, and bias injection attacks on linear time-invariant systems can be analyzed using this framework. Furthermore, the attack policy for each scenario is described and the attacks impact is characterized using the concept of safe sets. An experimental setup based on a quadruple-tank process controlled over a wireless network is used to illustrate the attack scenarios, their consequences, and potential counter-measures.
Automatica | 2011
Iman Shames; André Teixeira; Karl Henrik Johansson
In this paper, the existence of unknown input observers for networks of interconnected second-order linear time invariant systems is studied. Two classes of distributed control systems of large practical relevance are considered. It is proved that for these systems, one can construct a bank of unknown input observers, and use them to detect and isolate faults in the network. The result presents a distributed implementation. In particular, by exploiting the system structure, this work provides further insight into the design of UIO for networked systems. Moreover, the importance of certain network measurements is shown. Infeasibility results with respect to available measurements and faults are also provided, as well as methods to remove faulty agents from the network. Applications to power networks and robotic formations are presented. It is shown how the developed methodology apply to a power network described by the swing equation with a faulty bus. For a multi-robot system, it is illustrated how a faulty robot can be detected and removed.
IEEE Transactions on Automatic Control | 2015
Euhanna Ghadimi; André Teixeira; Iman Shames; Mikael Johansson
The alternating direction method of multipliers (ADMM) has emerged as a powerful technique for large-scale structured optimization. Despite many recent results on the convergence properties of ADMM, a quantitative characterization of the impact of the algorithm parameters on the convergence times of the method is still lacking. In this paper we find the optimal algorithm parameters that minimize the convergence factor of the ADMM iterates in the context of ℓ2-regularized minimization and constrained quadratic programming. Numerical examples show that our parameter selection rules significantly outperform existing alternatives in the literature.
IEEE Transactions on Automatic Control | 2012
Iman Shames; Soura Dasgupta; Baris Fidan; Brian D. O. Anderson
Consider an agent A at an unknown location, under going sufficiently slow drift, and a mobile agent B that must move to the vicinity of and then circumnavigate A at a prescribed distance from A. In doing so, B can only measure its distance from A, and knows its own position in some reference frame. This paper considers this problem, which has applications to surveillance and orbit maintenance. In many of these applications it is difficult for B to directly sense the location of A, e.g. when all that B can sense is the intensity of a signal emitted by A. This intensity does, however provide a measure of the distance. We propose a nonlinear periodic continuous time control law that achieves the objective using this distance measurement. Fundamentally, a) B must exploit its motion to estimate the location of A, and b) use its best instantaneous estimate of where A resides, to move itself to achieve the circum navigation objective. For a) we use an open loop algorithm formulated by us in an earlier paper. The key challenge tackled in this paper is to design a control law that closes the loop by marrrying the two goals. As long as the initial estimate of the source location is not coincident with the intial position of B, the algorithm is guaranteed to be exponentially convergent when A is stationary. Under the same condition, we establish that when A drifts with a sufficiently small, unknown velocity, B globally achieves its circumnavigation objective, to within a margin proportional to the drift velocity.
allerton conference on communication, control, and computing | 2012
André Teixeira; Iman Shames; Karl Henrik Johansson
In this paper the problem of revealing stealthy data-injection attacks on control systems is addressed. In particular we consider the scenario where the attacker performs zero-dynamics attacks on the system. First, we characterize and analyze the stealthiness properties of these attacks for linear time-invariant systems. Then we tackle the problem of detecting such attacks by modifying the systems structure. Our results provide necessary and sufficient conditions that the modifications should satisfy in order to detect the zero-dynamics attacks. The results and proposed detection methods are illustrated through numerical examples.
conference on decision and control | 2008
Giulia Piova; Iman Shames; Baris Fidan; Francesco Bullo; Brian D. O. Anderson
We develop a novel localization theory for planar networks of nodes that measure each other?s relative position, i.e., we assume that nodes do not have the ability to perform measurements expressed in a common reference frame. We begin with some basic definitions of frame localizability and orientation localizability. Based on some key kinematic relationships, we characterize orientation localizability for networks with angle-of-arrival sensing. We then address the orientation localization problem in the presence of noisy measurements. Our first algorithm computes a least-square estimate of the unknown node orientations in a ring network given angle-of-arrival sensing. For arbitrary connected graphs, our second algorithm exploits kinematic relationships among the orientation of node in loops in order to reduce the effect of noise. We establish the convergence of the algorithm, and through some simulations we show that the algorithm reduces the mean-square error due to the noisy measurements.
IEEE Transactions on Automatic Control | 2014
Mohammad Deghat; Iman Shames; Brian D. O. Anderson; Changbin Yu
The problem of localization and circumnavigation of a slowly moving target with unknown speed has been considered. The agent only knows its own position with respect to its initial frame, and the bearing angle to the target in that frame. We propose an estimator to localize the target and a control law that forces the agent to move on a circular trajectory around the target such that both the estimator and the control system are exponentially stable. We consider two different cases where the agents speed is constant and variable. The performance of the proposed algorithm is verified through simulations.
conference on decision and control | 2011
Adrian N. Bishop; Iman Shames; Brian D. O. Anderson
Direction-based formation shape control for a collection of autonomous agents involves the design of distributed control laws that ensure the formation moves so that certain relative bearing constraints achieve, and maintain, some desired value. This paper looks at the design of a distributed control scheme to solve the direction-based formation shape control problem. A gradient control law is proposed based on the notion of bearing-only constrained graph rigidity and parallel drawings. This work provides an interesting and novel contrast to much of the existing work in formation control where distance-only constraints are typically maintained. A stability analysis is sketched and a number of illustrative examples are also given.
SIAM Journal on Discrete Mathematics | 2010
Brian D. O. Anderson; Iman Shames; Guoqiang Mao; Baris Fidan
Graph theory has been used to characterize the solvability of the sensor network localization problem. If sensors correspond to vertices and edges correspond to sensor pairs between which the distance is known, a significant result in the theory of range-based sensor network localization is that if the graph underlying the sensor network is generically globally rigid and there is a suitable set of anchors at known positions, then the network can be localized, i.e., a unique set of sensor positions can be determined that is consistent with the data. In particular, for planar problems, provided the sensor network has three or more noncollinear anchors at known points, all sensors are located at generic points, and the intersensor distances corresponding to the graph edges are precisely known rather than being subject to measurement noise, generic global rigidity of the graph is necessary and sufficient for the network to be localizable (in the absence of any further information). In practice, however, distance measurements will never be exact, and the equations whose solutions deliver sensor positions in the noiseless case in general no longer have a solution. This paper then argues that if the distance measurement errors are not too great and otherwise the associated graph is generically globally rigid and there are three or more noncollinear anchors, the network will be approximately localizable, in the sense that estimates can be found for the sensor positions which are near the correct values; in particular, a bound on the position errors can be found in terms of a bound on the distance errors. The sensor positions in this case can be found by minimizing a cost function which, although nonconvex, does have a global minimum.
IEEE Transactions on Systems, Man, and Cybernetics | 2014
André Teixeira; Iman Shames; Karl Henrik Johansson
The ability to maintain state awareness in the face of unexpected and unmodeled errors and threats is a defining feature of a resilient control system. Therefore, in this paper, we study the problem of distributed fault detection and isolation (FDI) in large networked systems with uncertain system models. The linear networked system is composed of interconnected subsystems and may be represented as a graph. The subsystems are represented by nodes, while the edges correspond to the interconnections between subsystems. Considering faults that may occur on the interconnections and subsystems, as our first contribution, we propose a distributed scheme to jointly detect and isolate faults occurring in nodes and edges of the system. As our second contribution, we analyze the behavior of the proposed scheme under model uncertainties caused by the addition or removal of edges. Additionally, we propose a novel distributed FDI scheme based on local models and measurements that is resilient to changes outside of the local subsystem and achieves FDI. Our third contribution addresses the complexity reduction of the distributed FDI method, by characterizing the minimum amount of model information and measurements needed to achieve FDI and by reducing the number of monitoring nodes. The proposed methods can be fused to design a scalable and resilient distributed FDI architecture that achieves local FDI despite unknown changes outside the local subsystem. The proposed approach is illustrated by numerical experiments on the IEEE 118-bus power network benchmark.