7,483 results on '"Cyber-physical systems"'
Search Results
2. Oblivious Monitoring for Discrete-Time STL via Fully Homomorphic Encryption
- Author
-
Waga, Masaki, Matsuoka, Kotaro, Suwa, Takashi, Matsumoto, Naoki, Banno, Ryotaro, Bian, Song, Suenaga, Kohei, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Ábrahám, Erika, editor, and Abbas, Houssam, editor
- Published
- 2025
- Full Text
- View/download PDF
3. Dynamic, Multi-objective Specification and Falsification of Autonomous CPS
- Author
-
Chang, Kevin Kai-Chun, Xu, Kaifei, Kim, Edward, Sangiovanni-Vincentelli, Alberto, Seshia, Sanjit A., Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Ábrahám, Erika, editor, and Abbas, Houssam, editor
- Published
- 2025
- Full Text
- View/download PDF
4. Multimodal Anomaly Detection for Autonomous Cyber-Physical Systems Empowering Real-World Evaluation
- Author
-
Noorani, Mahshid, Puthanveettil, Tharun V., Zoulkarni, Asim, Mirenzi, Jack, Grody, Charles D., Baras, John S., Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Sinha, Arunesh, editor, Fu, Jie, editor, Zhu, Quanyan, editor, and Zhang, Tao, editor
- Published
- 2025
- Full Text
- View/download PDF
5. Energy efficient and low-latency spiking neural networks on embedded microcontrollers through spiking activity tuning.
- Author
-
Barchi, Francesco, Parisi, Emanuele, Zanatta, Luca, Bartolini, Andrea, and Acquaviva, Andrea
- Subjects
- *
ARTIFICIAL neural networks , *STRUCTURAL health monitoring , *MICROCONTROLLERS , *CYBER physical systems , *COMPUTER systems - Abstract
In this work, we target the efficient implementation of spiking neural networks (SNNs) for low-power and low-latency applications. In particular, we propose a methodology for tuning SNN spiking activity with the objective of reducing computation cycles and energy consumption. We performed an analysis to devise key hyper-parameters, and then we show the results of tuning such parameters to obtain a low-latency and low-energy embedded LSNN (eLSNN) implementation. We demonstrate that it is possible to adapt the firing rate so that the samples belonging to the most frequent class are processed with less spikes. We implemented the eLSNN on a microcontroller-based sensor node and we evaluated its performance and energy consumption using a structural health monitoring application processing a stream of vibrations for damage detection (i.e. binary classification). We obtained a cycle count reduction of 25% and an energy reduction of 22% with respect to a baseline implementation. We also demonstrate that our methodology is applicable to a multi-class scenario, showing that we can reduce spiking activity between 68 and 85% at iso-accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Enhancing resilience in complex energy systems through real-time anomaly detection: a systematic literature review.
- Author
-
Aghazadeh Ardebili, Ali, Hasidi, Oussama, Bendaouia, Ahmed, Khalil, Adem, Khalil, Sabri, Luceri, Dalila, Longo, Antonella, Abdelwahed, El Hassan, Qassimi, Sara, and Ficarella, Antonio
- Subjects
MACHINE learning ,ANOMALY detection (Computer security) ,TECHNOLOGICAL innovations ,INFRASTRUCTURE (Economics) ,CYBER physical systems - Abstract
As real-time data sources expand, the need for detecting anomalies in streaming data becomes increasingly critical for cutting edge data-driven applications. Real-time anomaly detection faces various challenges, requiring automated systems that adapt continuously to evolving data patterns due to the impracticality of human intervention. This study focuses on energy systems (ES), critical infrastructures vulnerable to disruptions from natural disasters, cyber attacks, equipment failures, or human errors, leading to power outages, financial losses, and risks to other sectors. Early anomaly detection ensures energy supply continuity, minimizing disruption impacts, an enhancing system resilience against cyber threats. A systematic literature review (SLR) is conducted to answer 5 essential research questions in anomaly detection due to the lack of standardized knowledge and the rapid evolution of emerging technologies replacing conventional methods. A detailed review of selected literature, extracting insights and synthesizing results has been conducted in order to explore anomaly types that can be detected using Machine Learning algorithms in the scope of Energy Systems, the factors influencing this detection success, the deployment algorithms and security measurement to take in to consideration. This paper provides a comprehensive review and listing of advanced machine learning models, methods to enhance detection performance, methodologies, tools, and enabling technologies for real-time implementation. Furthermore, the study outlines future research directions to improve anomaly detection in smart energy systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. A data‐driven safety preserving control architecture for constrained cyber‐physical systems.
- Author
-
Attar, Mehran and Lucia, Walter
- Subjects
- *
PLANT evolution , *PREDICTION models , *COMPUTER simulation , *DETECTORS , *ARGUMENT - Abstract
In this article, we propose a data‐driven networked control architecture for unknown and constrained cyber‐physical systems capable of detecting networked false‐data‐injection attacks and ensuring plant's safety. In particular, on the controller's side, we design a novel robust anomaly detector that can discover the presence of network attacks using a data‐driven outer approximation of the expected robust one‐step reachable set. On the other hand, on the plant's side, we design a data‐driven safety verification module, which resorts to worst‐case arguments to determine if the received control input is safe for the plant's evolution. Whenever necessary, the same module is in charge of replacing the networked controller with a local data‐driven set‐theoretic model predictive controller, whose objective is to keep the plant's trajectory in a pre‐established safe configuration until an attack‐free condition is recovered. Numerical simulations involving a two‐tank water system illustrate the features and capabilities of the proposed control architecture. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Optimal strategy of data tampering attacks for FIR system identification with average entropy and binary‐valued observations.
- Author
-
Bai, Zhongwei, Liu, Yan, Wang, Yinghui, and Guo, Jin
- Subjects
- *
ONLINE algorithms , *SYSTEM identification , *TELECOMMUNICATION systems , *DATA transmission systems , *ENTROPY - Abstract
Summary: In the era of digitalization boom, cyber‐physical system (CPS) has been widely used in several fields. However, malicious data tampering in communication networks may lead to degradation of the state estimation performance, which may affect the control decision and cause significant losses. In this paper, for the identification of finite impluse response (FIR) systems with binary‐valued observations under data tampering attack, an optimal attack strategy based on the average entropy is designed from the perspective of the attacker. In the case of unknown parameters, the regression matrix is used to give the estimation method of the system parameters, the algorithmic flow of the data tampering attack for the implementation of the on‐line attack is designed. Finally, the effectiveness of the algorithm and the reliability of the conclusions is verified through the examples. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. ミッションクリティカルなCPSサービス収容に 向けた協調型インフラ基盤.
- Author
-
東信博, 小野孝太郎, 鍔木拓磨, 河野太一, 東條琢也, and 桑原健
- Abstract
Copyright of NTT Gijutsu Journal is the property of Nippon Telegraph & Telephone Corporation and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
10. Scalable and efficient digital twins for model-based design of cyber-physical systems.
- Author
-
Cimino, Chiara, Terraneo, Federico, Ferretti, Gianni, and Leva, Alberto
- Abstract
The optimised design, operation and management of complex, large-size Cyber Physical Systems (CPSs) – like modern manufacturing and logistic assets – calls for Digital Twins (DTs) in which dynamic modelling and simulation play a relevant role. In such simulation-based DTs computational efficiency is crucial. According to the present state of the art, the said efficiency is hindered by the way the Cyber part of a CPS is represented, which in the manufacturing case practically corresponds to representing digital controls. This paper proposes a modelling framework for an efficient and scalable representation of the Cyber part in a DT of a CPS. The presented solution is based on Object-Oriented Modelling (OOM) and IEC industrial standards. Motivating and explanatory examples are provided, and a proof-of-concept case study is discussed to support the framework potential and industrial viability. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Artificial intelligence for cybersecurity monitoring of cyber-physical power electronic converters: a DC/DC power converter case study.
- Author
-
Habibi, Mohammad Reza, Guerrero, Josep M., and Vasquez, Juan C.
- Abstract
Power electronic converters are widely implemented in many types of power applications such as microgrids. Power converters can make a physical connection between the power resources and the power application. To control a power converter, required data such as the voltage and the current of that should be measured to be used in a control application. Therefore, a communication-based structure including sensors and communication links can be used to measure the desired data and transmit that to the controllers. So, a power converter-based system can be considered as a type of cyber-physical system, and it can be vulnerable to cyber-attacks. Then, it can strongly be recommended to use a strategy for a power converter-based system to monitor the system and identify the existence of cyber-attack in the system. In this study, artificial intelligence (AI) is deployed to calculate the value of the false data (i.e., constant false data, and time-varying false data) and detect false data injection cyber-attacks on power converters. Besides, to have a precise technical evaluation of the proposed methodology, that is evaluated under other issues, i.e., noise, and communication link delay. In the case of noise, the proposed strategy is examined under noises with different signal-to-noise ratios. Further, for the case of the communication delay, the system is examined under both symmetrical (i.e., same communication delay on all inputs) and unsymmetrical communication delays (i.e., different communication delay/delays on the inputs). In this work, artificial neural networks are implemented as the AI-based application, and two types of the networks, i.e., feedforward (as a basic type) and long short-term memory (LSTM)-based network as a more complex network are tested. Finally, three important AI-based techniques (regression, classification, and clustering) are examined. Based on the obtained results, this work can properly identify and calculate the false data in the system. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Security establishment using deep convolutional network model in cyber-physical systems.
- Author
-
Meganathan, R., B, Manjunath, Anand, R., and Murugesh, V.
- Subjects
RECURRENT neural networks ,DENIAL of service attacks ,CYBER physical systems ,SUPPORT vector machines ,DEEP learning ,BOTNETS - Abstract
This study develops an active security control strategy for Cyber-Physical Systems (CPSs) that are subject to attacks known as Denial-of-Service (DoS), which can target both channels from the controller to the actuator and from the controller to the sensor. Due to attack cost restrictions, the linked channels are subject to a limit on the number of continuous DoS attacks. A proactive security control method is then developed to combat two-channel DoS attacks, depending on a method for identifying IoT intrusions. Using the CICIDS dataset for attack detection, we examined the effectiveness of the Deep Convolutional Network Model (DCNM), a suggested deep learning model. The addressed CPS can be asymptotically stable against DoS assaults under the security controller's active security control technique without sacrificing control performance. Recent tests and simulations show how effective the security control strategy is active. The proposed model gives better trade-off compared to existing approaches like Deep Belief Networks (DBN), Recurrent Neural Networks (RNN), Support Vector Machines (SVM), Supervised Neural Networks (SNN) and Feed Forward Neural Networks (FNN). The proposed model gives 99.3%, 99.5%, 99.5%, 99.6%, 99%, 98.9%, 99% accuracy with normal attack detection, botnet attack detection, Brute force attack detection, DoS attack detection, Infiltration attack detection, Portscan attack detection and web attack detection respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. A novel approach of botnet detection using hybrid deep learning for enhancing security in IoT networks.
- Author
-
Ali, Shamshair, Ghazal, Rubina, Qadeer, Nauman, Saidani, Oumaima, Alhayan, Fatimah, Masood, Anum, Saleem, Rabia, Khan, Muhammad Attique, and Gupta, Deepak
- Subjects
PATTERN recognition systems ,COMPUTER network security ,MULTILAYER perceptrons ,CYBER physical systems ,DEEP learning ,BOTNETS - Abstract
In an era dominated by the Internet of Things (IoT), protecting interconnected devices from botnets has become essential. This study introduces an innovative hybrid deep learning model that synergizes LSTM Auto Encoders and Multilayer Perceptrons in detecting botnets in IoTs. The fusion of these technologies facilitates the analysis of sequential data and pattern recognition, enabling the model to detect intricate botnet activities within IoT networks. The proposed model's performance was carefully evaluated on two large IoT traffic datasets, N-BAIoT2018 and UNSW-NB15, where it demonstrated exceptional accuracy of 99.77 % and 99.67 % respectively for botnet detection. These results not only demonstrate the model's superior performance over existing botnet detection systems but also highlight its potential as a robust solution for IoT network security. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Distributed multivariate‐observer‐based robust consensus control of nonlinear multiagent systems against time‐varying attacks on actuators and sensors.
- Author
-
Dong, Lewei, Park, Ju H., Wei, Xinjiang, and Hu, Xin
- Subjects
- *
LINEAR matrix inequalities , *ROBUST control , *NONLINEAR systems , *NONLINEAR estimation , *MULTIAGENT systems , *NONLINEAR equations - Abstract
This article investigates the robust consensus problem for nonlinear multiagent systems against time‐varying false data injection attacks on actuators and sensors. First, the root‐mean‐square (RMS) theory is used to extend the assumption of the slow‐varying or constant attack signals to the case of time‐varying attack signals. Second, a novel distributed multivariate observer (DMO) is designed to estimate the followers' system states and the time‐varying attack signals on actuators and sensors. With the help of the outputs of DMO, a distributed robust consensus control arithmetic is proposed, which can compensate for actuator attacks and isolate sensor attacks so that exponential consensus and robust consensus are achieved. In particular, the robust performance of estimation errors and consensus errors is ensured by establishing the RMS gain index via linear matrix inequality, in which the zero initial conditions of estimation errors and consensus errors are not required. Finally, two simulation examples, including a network of four aircraft longitudinal dynamic systems, are given to verify the effectiveness of the proposed arithmetic. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Preview Control for Cyber–Physical Systems under Periodic Denial-of-Service Attacks.
- Author
-
Wu, Jiang, Xie, Hao, Liang, Jinming, and Li, Zhiqiang
- Subjects
- *
DENIAL of service attacks , *AUTONOMOUS vehicles , *COMPUTER simulation , *SIGNALS & signaling - Abstract
In this paper, the preview control problem for cyber–physical systems (CPSs) under denial-of-service (DOS) attacks is studied. First, we employ an attack-tolerant strategy to design an augmented error system (AES) for scenarios where both state and reference signal channels are subject to periodic attacks. We then discuss the stochastic stability conditions for the AES and derive the corresponding controller. Subsequently, the preview controller for the original system is developed. Finally, the effectiveness of the obtained results is demonstrated through a numerical simulation using an unmanned ground vehicle (UGV) model, indicating the practical applicability of the proposed control strategy. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Memory‐based event‐triggered control for networked control system under cyber‐attacks.
- Author
-
Nafir, Noureddine, Khemissat, Abdel Mouneim, Farrag, Mohamed Emad, and Rouamel, Mohamed
- Subjects
- *
LINEAR matrix inequalities , *LINEAR control systems , *LINEAR systems , *STOCHASTIC systems , *DATA transmission systems - Abstract
This article focuses on the problem of stability for a class of linear networked control systems (NCSs) subjected to network communication delays and random deception attacks. A new memory event‐triggered mechanism (METM) is proposed to reduce the unnecessary transmitted data through the communication channel and then enhance the network resources. In this context, a new memory stochastic state feedback controller is proposed to stabilize the closed‐loop networked control system. A new randomly occurring deception attacks model is employed to deal with the security problem of NCSs. Sufficient stability conditions are derived based on a suitable Lyapunov‐Krasovskii functional (LKF). The designed methodology is proposed in terms of linear matrix inequality to synthesize both event‐triggered parameters and controller gains, and to reduce the conservatism of the system some integral lemma are exploited to bind the time derivative of the LKF. Finally, two numerical examples are presented to illustrate the effectiveness of the proposed method which provides a maximal upper bound value of the network‐induced delay and less transmitted packet regarding the maximal value delay obtained in other works, so less conservatism results are obtained, compared to previous ones in the literature. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. SoK: Security in Real-Time Systems.
- Author
-
Hasan, Monowar, Kashinath, Ashish, Chen, Chien-Ying, and Mohan, Sibin
- Published
- 2024
- Full Text
- View/download PDF
18. Detection, reconstruction and mitigation of deception attacks in nonlinear cyber‐physical systems.
- Author
-
Shahriari‐kahkeshi, Maryam, Alem, Sayed Amirhosein, and Shi, Peng
- Subjects
- *
BACKSTEPPING control method , *NONLINEAR systems , *DECEPTION - Abstract
Summary: This paper proposes a new detection, reconstruction and mitigation scheme for nonlinear cyber‐physical systems experiencing deception attacks in controller‐actuator channel. For early detection of attacks, an anomaly detection unit based on the diagnostic observer is designed. After residual generation and evaluation, attack is detected. Upon attack detection, an adaptive fuzzy wavelet network (FWN) as an online nonlinear estimator is activated to reconstruct the detected malicious attack. Then, attack mitigation mechanism based on the command filtered backstepping approach and reconstructed attack is activated to mitigate the adverse effect of the detected attack. Stability analysis of the suggested strategy is presented and simulation results are provided to show the effectiveness of the suggested scheme. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. Software Update Methodologies for Feature-Based Product Lines: A Combined Design Approach.
- Author
-
Bazzi, Abir, Shaout, Adnan, and Ma, Di
- Subjects
PRODUCT lines ,SOFTWARE architecture ,AUTOMOBILE industry ,BUSINESS development ,DIGITAL signage - Abstract
The automotive industry is experiencing a significant shift, transitioning from traditional hardware-centric systems to more advanced software-defined architectures. This change is enabling enhanced autonomy, connectivity, safety, and improved in-vehicle experiences. Service-oriented architecture is crucial for achieving software-defined vehicles and creating new business opportunities for original equipment manufacturers. A software update approach that is rich in variability and based on a Merkle tree approach is proposed for new vehicle architecture requirements. Given the complexity of software updates in vehicles, particularly when dealing with multiple distributed electronic control units, this software-centric approach can be optimized to handle various architectures and configurations, ensuring consistency across all platforms. In this paper, our software update approach is expanded to cover the solution space of the feature-based product line engineering, and we show how to combine our approach with product line engineering in creative and unique ways to form a software-defined vehicle modular architecture. Then, we offer insights into the design of the Merkle trees utilized in our approach, emphasizing the relationship among the software modules, with a focus on their impact on software update performance. This approach streamlines the software update process and ensures that the safety as well as the security of the vehicle are continuously maintained. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. Towards Non-Destructive Quality Testing of Complex Biomedical Devices—A Generalized Closed-Loop System Approach Utilizing Real-Time In-Line Process Analytical Technology.
- Author
-
Guha, Bikash, Moore, Sean, and Huyghe, Jacques
- Subjects
CARDIOVASCULAR diseases ,SURGICAL stents ,CATHETER manufacturing ,REAL-time control ,PRODUCT quality - Abstract
This study addresses the critical issue of cardiovascular diseases (CVDs) as the leading cause of death globally, emphasizing the importance of stent delivery catheter manufacturing. Traditional manufacturing processes, reliant on destructive end-of-batch sampling, present significant financial and quality challenges. This research addresses this challenge by proposing a novel approach: a closed-loop cyber-physical production system (CPPS) employing non-destructive process analytical technology (PAT). Through a mixed-method approach combining a comprehensive literature review and the development of a CPPS prototype, the study demonstrates the potential for real-time quality control, reduced production costs, and increased manufacturing efficiency. Initial findings showcase the system's effectiveness in streamlining production, enhancing stability, and minimizing defects, translating to substantial financial savings and improved product quality. This work extends the author's previous research by comparing the validated system's performance to that of pre-implementation manual workflows and inspections, highlighting tangible and intangible improvements brought by the new system. This paves the way for advanced control strategies to revolutionize medical device manufacturing. Furthermore, the study proposes a generalized CPPS framework applicable across diverse regulated environments, ensuring optimal processing conditions and adherence to stringent regulatory standards. The research concludes with the successful demonstration of innovative approaches and technologies, leading to improved product quality, patient safety, and operational efficiency in the medical device industry. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. Performance-based event-triggered observer design for security control of cyber-physical systems with malice attacks through adaptive sliding mode approach.
- Author
-
Lou, Haocheng, Jiang, Baoping, Wu, Zhengtian, Fan, Songli, and Li, Xingliang
- Subjects
SLIDING mode control ,ADAPTIVE control systems ,CYBER physical systems ,LINEAR matrix inequalities ,CLOSED loop systems - Abstract
This study explores the security control challenges encountered in cyber-physical systems when facing unknown nonlinearities and network attacks. It adopts an approach integrating observer-based adaptive sliding mode control and a threshold-changing event-triggered mechanism. Initially, a sliding mode function is formulated utilizing observer state, leading to the derivation of error dynamics and sliding mode dynamics. Subsequently, conditions ensuring stability of the closed-loop system are established through Lyapunov theory, expressed in terms of linear matrix inequalities. To achieve finite-time reaching of the predefined sliding surface, an observer-based adaptive controller is designed. Finally, the effectiveness of the proposed methodology is validated through a practical example. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. Perception simplex: Verifiable collision avoidance in autonomous vehicles amidst obstacle detection faults.
- Author
-
Bansal, Ayoosh, Kim, Hunmin, Yu, Simon, Li, Bo, Hovakimyan, Naira, Caccamo, Marco, and Sha, Lui
- Subjects
ARTIFICIAL neural networks ,SOFTWARE reliability ,FAULT tolerance (Engineering) ,AUTONOMOUS vehicles ,ARCHITECTURAL design ,DEEP learning - Abstract
Advances in deep learning have revolutionized cyber‐physical applications, including the development of autonomous vehicles. However, real‐world collisions involving autonomous control of vehicles have raised significant safety concerns regarding the use of deep neural networks (DNNs) in safety‐critical tasks, particularly perception. The inherent unverifiability of DNNs poses a key challenge in ensuring their safe and reliable operation. In this work, we propose perception simplex (PS), a fault‐tolerant application architecture designed for obstacle detection and collision avoidance. We analyse an existing LiDAR‐based classical obstacle detection algorithm to establish strict bounds on its capabilities and limitations. Such analysis and verification have not been possible for deep learning‐based perception systems yet. By employing verifiable obstacle detection algorithms, PS identifies obstacle existence detection faults in the output of unverifiable DNN‐based object detectors. When faults with potential collision risks are detected, appropriate corrective actions are initiated. Through extensive analysis and software‐in‐the‐loop simulations, we demonstrate that PS provides deterministic fault tolerance against obstacle existence detection faults, establishing a robust safety guarantee. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Analysis and Modeling of Mobile Phone Activity Data Using Interactive Cyber-Physical Social System.
- Author
-
Amin, Farhan and Choi, Gyu Sang
- Subjects
UBIQUITOUS computing ,COMPUTER systems ,SMART cities ,DATA management ,SOCIAL systems - Abstract
Mobile networks possess significant information and thus are considered a gold mine for the researcher's community. The call detail records (CDR) of a mobile network are used to identify the network's efficacy and the mobile user's behavior. It is evident from the recent literature that cyber-physical systems (CPS) were used in the analytics and modeling of telecom data. In addition, CPS is used to provide valuable services in smart cities. In general, a typical telecom company has millions of subscribers and thus generates massive amounts of data. From this aspect, data storage, analysis, and processing are the key concerns. To solve these issues, herein we propose a multilevel cyber-physical social system (CPSS) for the analysis and modeling of large internet data. Our proposed multilevel system has three levels and each level has a specific functionality. Initially, raw Call Detail Data (CDR) was collected at the first level. Herein, the data preprocessing, cleaning, and error removal operations were performed. In the second level, data processing, cleaning, reduction, integration, processing, and storage were performed. Herein, suggested internet activity record measures were applied. Our proposed system initially constructs a graph and then performs network analysis. Thus proposed CPSS system accurately identifies different areas of internet peak usage in a city (Milan city). Our research is helpful for the network operators to plan effective network configuration, management, and optimization of resources. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. A Review on Security and Privacy Issues Pertaining to Cyber-Physical Systems in the Industry 5.0 Era.
- Author
-
Alabdulatif, Abdullah, Thilakarathne, Navod Neranjan, and Lawal, Zaharaddeen Karami
- Subjects
CYBER physical systems ,DATA privacy ,INDUSTRIAL ecology ,DATA protection ,MACHINERY industry - Abstract
The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems (CPSs) seamlessly integrate physical processes with advanced digital technologies. However, as industries become increasingly interconnected and reliant on smart digital technologies, the intersection of physical and cyber domains introduces novel security considerations, endangering the entire industrial ecosystem. The transition towards a more cooperative setting, including humans and machines in Industry 5.0, together with the growing intricacy and interconnection of CPSs, presents distinct and diverse security and privacy challenges. In this regard, this study provides a comprehensive review of security and privacy concerns pertaining to CPSs in the context of Industry 5.0. The review commences by providing an outline of the role of CPSs in Industry 5.0 and then proceeds to conduct a thorough review of the different security risks associated with CPSs in the context of Industry 5.0. Afterward, the study also presents the privacy implications inherent in these systems, particularly in light of the massive data collection and processing required. In addition, the paper delineates potential avenues for future research and provides countermeasures to surmount these challenges. Overall, the study underscores the imperative of adopting comprehensive security and privacy strategies within the context of Industry 5.0. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. A Multilayer Architecture towards the Development and Distribution of Multimodal Interface Applications on the Edge.
- Author
-
Malamas, Nikolaos, Panayiotou, Konstantinos, Karabatea, Apostolia, Tsardoulias, Emmanouil, and Symeonidis, Andreas L.
- Subjects
- *
THIRD-party software , *APPLICATION stores , *NATURAL languages , *USER experience , *INTERNET of things - Abstract
Today, Smart Assistants (SAs) are supported by significantly improved Natural Language Processing (NLP) and Natural Language Understanding (NLU) engines as well as AI-enabled decision support, enabling efficient information communication, easy appliance/device control, and seamless access to entertainment services, among others. In fact, an increasing number of modern households are being equipped with SAs, which promise to enhance user experience in the context of smart environments through verbal interaction. Currently, the market in SAs is dominated by products manufactured by technology giants that provide well designed off-the-shelf solutions. However, their simple setup and ease of use come with trade-offs, as these SAs abide by proprietary and/or closed-source architectures and offer limited functionality. Their enforced vendor lock-in does not provide (power) users with the ability to build custom conversational applications through their SAs. On the other hand, employing an open-source approach for building and deploying an SA (which comes with a significant overhead) necessitates expertise in multiple domains and fluency in the multimodal technologies used to build the envisioned applications. In this context, this paper proposes a methodology for developing and deploying conversational applications on the edge on top of an open-source software and hardware infrastructure via a multilayer architecture that simplifies low-level complexity and reduces learning overhead. The proposed approach facilitates the rapid development of applications by third-party developers, thereby enabling the establishment of a marketplace of customized applications aimed at the smart assisted living domain, among others. The supporting framework supports application developers, device owners, and ecosystem administrators in building, testing, uploading, and deploying applications, remotely controlling devices, and monitoring device performance. A demonstration of this methodology is presented and discussed focusing on health and assisted living applications for the elderly. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. Modeling more software performance antipatterns in cyber-physical systems.
- Author
-
Pinciroli, Riccardo, Smith, Connie U., and Trubiani, Catia
- Subjects
- *
CYBER physical systems , *SENSOR networks , *NETWORK performance , *SENSITIVITY analysis , *COMPUTER software , *SOFTWARE refactoring - Abstract
The design of cyber-physical systems (CPS) is challenging due to the heterogeneity of software and hardware components that operate in uncertain environments (e.g., fluctuating workloads), hence they are prone to performance issues. Software performance antipatterns could be a key means to tackle this challenge since they recognize design problems that may lead to unacceptable system performance. This manuscript focuses on modeling and analyzing a variegate set of software performance antipatterns with the goal of quantifying their performance impact on CPS. Starting from the specification of eight software performance antipatterns, we build a baseline queuing network performance model that is properly extended to account for the corresponding bad practices. The approach is applied to a CPS consisting of a network of sensors and experimental results show that performance degradation can be traced back to software performance antipatterns. Sensitivity analysis investigates the peculiar characteristics of antipatterns, such as the frequency of checking the status of resources, that provides quantitative information to software designers to help them identify potential performance problems and their root causes. Quantifying the performance impact of antipatterns on CPS paves the way for future work enabling the automated refactoring of systems to remove these bad practices. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. Immersive Robot Teleoperation Based on User Gestures in Mixed Reality Space †.
- Author
-
Esaki, Hibiki and Sekiyama, Kosuke
- Subjects
- *
MIXED reality , *OBJECT manipulation , *CYBER physical systems , *VIRTUAL reality , *REMOTE control - Abstract
Recently, research has been conducted on mixed reality (MR), which provides immersive visualization and interaction experiences, and on mapping human motions directly onto a robot in a mixed reality (MR) space to achieve a high level of immersion. However, even though the robot is mapped onto the MR space, their surrounding environment is often not mapped sufficiently; this makes it difficult to comfortably perform tasks that require precise manipulation of the objects that are difficult to see from the human perspective. Therefore, we propose a system that allows users to operate a robot in real space by mapping the task environment around the robot on the MR space and performing operations within the MR space. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. CFDI: Coordinated false data injection attack in active distribution network.
- Author
-
Liu, Yang, Yang, Chenyang, Yu, Nanpeng, Wang, Jiazhou, Tian, Jue, Huang, Hao, Zhou, Yadong, and Liu, Ting
- Subjects
- *
POWER distribution networks , *POWER resources , *CYBERTERRORISM , *VOLTAGE control , *RELIABILITY in engineering - Abstract
The active distribution network (ADN) can obtain measurement data, estimate system states, and control distributed energy resources (DERs) and flexible loads to ensure voltage stability. However, the ADN is more vulnerable to cyber attacks due to the recent wave of digitization and automation efforts. In this article, false data injection (FDI) attacks are focused on and they are classified into two types, that is, type I attacks on measurement data and type II attacks on control commands. After studying the impact of these two FDI attacks on the ADN, a new threat is revealed called coordinated FDI attack, which can maximize the voltage deviation by coordinating type I and type II FDI attacks. From the attacker's perspective, the scheme of CFDI is proposed and an algorithm is developed to find the optimal attack strategy. The feasibility of CFDI attacks has been validated on a smart distribution testbed. Moreover, simulation results on an ADN benchmark have demonstrated that CFDI attacks could cause remarkable voltage deviation that may deteriorate the stability of the distribution network. Moreover, the impact of CFDI attacks is higher than pure type I or type II attacks. To mitigate the threat, some countermeasures against CFDI attacks are also proposed. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. Frequency control using fuzzy active disturbance rejection control and machine learning in a two‐area microgrid under cyberattacks.
- Author
-
Rahnamayian Jelodar, Soheil, Heidary, Jalal, Rahmani, Reza, Vahidi, Behrooz, and Askarian‐Abyaneh, Hossein
- Subjects
- *
OPTIMIZATION algorithms , *RENEWABLE energy sources , *FUZZY control systems , *HEURISTIC algorithms , *MACHINE learning , *CYBER physical systems - Abstract
There is a change in the traditional power system structure as a result of the increased incorporation of microgrids (MGs) into the grid. Multi‐area MGs will emerge as a result, and issues related to them will need to be addressed. Load frequency control (LFC) is a challenge in such structures, which are more complicated due to variations in demand and the stochastic characteristics of renewable energy sources. This paper presents a cascade fuzzy active disturbance rejection control technique to deal with the LFC problem. In order to tune different parameters of controllers, a newly developed heuristic algorithm called the Gazelle optimization algorithm (GOA) is also employed. Moreover, due to the fact that multi‐area MGs are regarded as cyber‐physical systems (CPSs), a relatively new concern for LFC problems is their resilience to cyberattacks such as false data injection (FDI) and denial of service (DoS) attacks. Therefore, this research also presents a novel machine learning approach called parallel attack resilience detection system (PARDS) to deal with the LFC problem in the presence of cyberattacks. The efficiency of the proposed strategy is investigated under different scenarios, such as non‐linearities in the power system or server cyberattacks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Network intrusion detection system for DDoS attacks in ICS using deep autoencoders.
- Author
-
Ortega-Fernandez, Ines, Sestelo, Marta, Burguillo, Juan C., and Piñón-Blanco, Camilo
- Subjects
- *
DENIAL of service attacks , *INDUSTRIAL controls manufacturing , *INTELLECTUAL property theft , *ANOMALY detection (Computer security) , *FACTORIES , *INTRUSION detection systems (Computer security) , *FALSE alarms , *CYBER physical systems - Abstract
Anomaly detection in industrial control and cyber-physical systems has gained much attention over the past years due to the increasing modernisation and exposure of industrial environments. Current dangers to the connected industry include the theft of industrial intellectual property, denial of service, or the compromise of cloud components; all of which might result in a cyber-attack across the operational network. However, most scientific work employs device logs, which necessitate substantial understanding and preprocessing before they can be used in anomaly detection. In this paper, we propose a network intrusion detection system (NIDS) architecture based on a deep autoencoder trained on network flow data, which has the advantage of not requiring prior knowledge of the network topology or its underlying architecture. Experimental results show that the proposed model can detect anomalies, caused by distributed denial of service attacks, providing a high detection rate and low false alarms, outperforming the state-of-the-art and a baseline model in an unsupervised learning environment. Furthermore, the deep autoencoder model can detect abnormal behaviour in legitimate devices after an attack. We also demonstrate the suitability of the proposed NIDS in a real industrial plant from the alimentary sector, analysing the false positive rate and the viability of the data generation, filtering and preprocessing procedure for a near real time scenario. The suggested NIDS architecture is a low-cost solution that uses only fifteen network-based features, requires minimal processing, operates in unsupervised mode, and is straightforward to deploy in real-world scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. A distributed intelligence framework for enhancing resilience and data privacy in dynamic cyber-physical systems.
- Author
-
Azeri, Nabila, Hioual, Ouided, and Hioual, Ouassila
- Subjects
- *
DATA privacy , *CYBER physical systems , *ELECTRONIC data processing , *DATA security failures , *INFRASTRUCTURE (Economics) - Abstract
Cyber-Physical Systems (CPS) are integral components of modern, interconnected environments, playing a crucial role in various applications such as smart infrastructure and autonomous systems. These systems operate in complex and ever-evolving settings, where resilience is an essential characteristic. Recently, several Machine Learning (ML) techniques have been proposed to design and implement resilience in CPS. However, this approach has often prioritized performance gains and adaptability enhancements, leading to a disregard for the potential dangers linked to centralized data processing, including data breaches and privacy infringements. To harness the full potential of ML in CPS, this paper introduces a distributed intelligence framework that equally prioritizes security, data privacy, and adaptability. The proposed framework is implemented through the integration of Federated Machine Learning techniques, where the CPS architecture is decentralized, allowing data processing to occur locally on individual nodes or devices. This decentralized approach facilitates the aggregation of insights from multiple sources without the need for centralized data processing, thereby minimizing the risks associated with data breaches and privacy violations. We further validate the viability of the proposed framework through its successful implementation in a real-world industrial CPS application, specifically focused on fault prediction within industrial CPS environments. In addition to its privacy and security benefits, our approach also achieved promising results in terms of accuracy and precision. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. Filter design for cyber‐physical systems against DoS attacks and unreliable networks: A Markovian approach.
- Author
-
Oliveira, Pedro M., Palma, Jonathan M., and Lacerda, Márcio J.
- Subjects
- *
DENIAL of service attacks , *PROCESS control systems , *UNCERTAIN systems , *LINEAR systems , *POWER resources - Abstract
This article proposes a novel approach for designing a mode‐dependent H∞$\mathcal {H}_\infty$ full‐order dynamic filter for a cyber‐physical system (CPS) that is subject to polytopic uncertainties. The CPS operates on an unreliable network that is susceptible to transmission failures and Denial of Service (DoS) attacks. The attackers have limited energy resources, and the duration of the DoS attack is limited to a maximum number of consecutive time instants. The network is modeled after a proposed non‐homogeneous Markov chain whose transition probability matrix may feature uncertain and unknown probabilities, which are dependent on time‐varying parameters. The design conditions for the filter are obtained using parameter‐dependent linear matrix inequalities. The proposed filter is shown to be effective in reducing the impact of DoS attacks and transmission failures on the CPS. Numerical experiments are presented to illustrate the efficacy of the proposed filter design method, demonstrating its ability to mitigate the effects of uncertainties and attacks on the CPS. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. A data model for enabling deep learning practices on discovery services of cyber‐physical systems.
- Author
-
Llopis, Juan Alberto, Fernández‐García, Antonio Jesús, Criado, Javier, Iribarne, Luis, and Corral, Antonio
- Subjects
CYBER physical systems ,DEEP learning ,DATA modeling ,KEYWORD searching ,TRANSFORMER models ,DATA science - Abstract
The W3C Web of Things (WoT) is a leading technology that facilitates dynamic information management in the Internet of Things (IoT). In most IoT scenarios, devices and their associated information change continuously, generating a large amount of data. Hence, to correctly use the information and the data generated by different devices, a new perspective of managing and ensuring data quality is recommended. Applying Data Science techniques to create the data model can help to manage and ensure data quality by creating a common schema that can be reused in future projects, as well as producing recommendations to facilitate Service Discovery. In addition, due to the dynamic devices that change over time or under specific circumstances, the data model created must be sufficiently abstract to add new instances and to support new requirements that devices should incorporate. The use of models helps to raise the abstraction level, adapting it to the continuous changes of devices by defining instances associated with the data model. This paper proposes two data models: one for Cyber‐Physical Systems (CPS) to define device information fetched by a Discovery Service, and another for applying Deep Learning in natural language problems through a Transformer approach. The latter matches user queries in natural language sentences with WoT devices or services. These data models expand the Thing Description model to help find similar CPSs by giving a confidence level to each CPS based on features such as security and the number of times the device was accessed. The results show how the proposed models support the search process of CPSs in syntactic and natural language searches. Furthermore, the four levels of the FAIR principles are validated for the proposed data models, thus ensuring the data's transparency, reproducibility, and reusability. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. Finite-Time Fuzzy Adaptive Output Feedback Resilient Control of Nonlinear Cyber-Physical Systems with Sensor Attacks and Actuator Faults.
- Author
-
Fan, Xianrui, Li, Yongming, and Tong, Shaocheng
- Abstract
This paper studies the finite-time fuzzy adaptive output feedback resilient control problem for nonlinear cyber-physical systems (CPSs) with sensor attacks and actuator faults. Fuzzy logic systems (FLSs) are used to approximate the unknown nonlinear functions, and a fuzzy state observer is constructed to estimate the unmeasured states. By combining the Nussbaum function with the backstepping control design technique, a fuzzy adaptive resilient control scheme is designed to successfully address the effects of sensor attacks and actuator faults. It is proved that the controlled system is semi-global practical finite-time stability (SGPFS), and the tracking error converges to a small neighborhood of the origin in a finite time interval. Finally, the simulation and comparison results further demonstrate the effectiveness of the designed control method. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. Multimodal immersive digital twin platform for cyber–physical robot fleets in nuclear environments.
- Author
-
Baniqued, Paul Dominick E., Bremner, Paul, Sandison, Melissa, Harper, Samuel, Agrawal, Subham, Bolarinwa, Joseph, Blanche, Jamie, Jiang, Zhengyi, Johnson, Thomas, Mitchell, Daniel, Pulgarin, Erwin Jose Lopez, West, Andrew, Willis, Melissa, Yao, Kanzhong, Flynn, David, Giuliani, Manuel, Groves, Keir, Lennox, Barry, and Watson, Simon
- Subjects
DIGITAL twins ,NUCLEAR energy safety measures ,DIGITAL technology ,CYBER physical systems ,CONSCIOUSNESS raising ,MOBILE robots ,ROBOTS - Abstract
The nuclear energy sector can benefit from mobile robots for remote inspection and handling, reducing human exposure to radiation. Advances in cyber–physical systems have improved robotic platforms in this sector through digital twin (DT) technology. DTs enhance situational awareness for robot operators, crucial for safety in the nuclear energy sector, and their value is anticipated to increase with the growing complexity of cyber–physical systems. The primary motivation of this work is to rapidly develop and evaluate a robot fleet interface that accounts for these benefits in the context of nuclear environments. Here, we introduce a multimodal immersive DT platform for cyber–physical robot fleets based on the ROS‐Unity 3D framework. The system design enables fleet monitoring and management by integrating building information models, mission parameters, robot sensor data, and multimodal user interaction through traditional and virtual reality interfaces. A modified heuristic evaluation approach, which accounts for the positive and negative aspects of the interface, was introduced to accelerate the iterative design process of our DT platform. Robot operators from leading nuclear research institutions (Sellafield Ltd. and the Japan Atomic Energy Agency) performed a simulated robot inspection mission while providing valuable insights into the design elements of the cyber–physical system. The three usability themes that emerged and inspired our design recommendations for future developers include increasing the interface's flexibility, considering each robot's individuality, and adapting the platform to expand sensor visualization capabilities. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. Enhancing resilience in complex energy systems through real-time anomaly detection: a systematic literature review
- Author
-
Ali Aghazadeh Ardebili, Oussama Hasidi, Ahmed Bendaouia, Adem Khalil, Sabri Khalil, Dalila Luceri, Antonella Longo, El Hassan Abdelwahed, Sara Qassimi, and Antonio Ficarella
- Subjects
Anomaly detection ,Smart energy ,Cyber-physical systems ,Cyber-physical security ,Machine learning application ,Anomalies ,Energy industries. Energy policy. Fuel trade ,HD9502-9502.5 - Abstract
Abstract As real-time data sources expand, the need for detecting anomalies in streaming data becomes increasingly critical for cutting edge data-driven applications. Real-time anomaly detection faces various challenges, requiring automated systems that adapt continuously to evolving data patterns due to the impracticality of human intervention. This study focuses on energy systems (ES), critical infrastructures vulnerable to disruptions from natural disasters, cyber attacks, equipment failures, or human errors, leading to power outages, financial losses, and risks to other sectors. Early anomaly detection ensures energy supply continuity, minimizing disruption impacts, an enhancing system resilience against cyber threats. A systematic literature review (SLR) is conducted to answer 5 essential research questions in anomaly detection due to the lack of standardized knowledge and the rapid evolution of emerging technologies replacing conventional methods. A detailed review of selected literature, extracting insights and synthesizing results has been conducted in order to explore anomaly types that can be detected using Machine Learning algorithms in the scope of Energy Systems, the factors influencing this detection success, the deployment algorithms and security measurement to take in to consideration. This paper provides a comprehensive review and listing of advanced machine learning models, methods to enhance detection performance, methodologies, tools, and enabling technologies for real-time implementation. Furthermore, the study outlines future research directions to improve anomaly detection in smart energy systems.
- Published
- 2024
- Full Text
- View/download PDF
37. Artificial intelligence for cybersecurity monitoring of cyber-physical power electronic converters: a DC/DC power converter case study
- Author
-
Mohammad Reza Habibi, Josep M. Guerrero, and Juan C. Vasquez
- Subjects
Artificial Intelligence ,Cyber-physical systems ,Cybersecurity ,False data injection attacks ,Power converters ,Medicine ,Science - Abstract
Abstract Power electronic converters are widely implemented in many types of power applications such as microgrids. Power converters can make a physical connection between the power resources and the power application. To control a power converter, required data such as the voltage and the current of that should be measured to be used in a control application. Therefore, a communication-based structure including sensors and communication links can be used to measure the desired data and transmit that to the controllers. So, a power converter-based system can be considered as a type of cyber-physical system, and it can be vulnerable to cyber-attacks. Then, it can strongly be recommended to use a strategy for a power converter-based system to monitor the system and identify the existence of cyber-attack in the system. In this study, artificial intelligence (AI) is deployed to calculate the value of the false data (i.e., constant false data, and time-varying false data) and detect false data injection cyber-attacks on power converters. Besides, to have a precise technical evaluation of the proposed methodology, that is evaluated under other issues, i.e., noise, and communication link delay. In the case of noise, the proposed strategy is examined under noises with different signal-to-noise ratios . Further, for the case of the communication delay, the system is examined under both symmetrical (i.e., same communication delay on all inputs) and unsymmetrical communication delays (i.e., different communication delay/delays on the inputs). In this work, artificial neural networks are implemented as the AI-based application, and two types of the networks, i.e., feedforward (as a basic type) and long short-term memory (LSTM)-based network as a more complex network are tested. Finally, three important AI-based techniques (regression, classification, and clustering) are examined. Based on the obtained results, this work can properly identify and calculate the false data in the system.
- Published
- 2024
- Full Text
- View/download PDF
38. Memory‐based event‐triggered control for networked control system under cyber‐attacks
- Author
-
Noureddine Nafir, Abdel Mouneim Khemissat, Mohamed Emad Farrag, and Mohamed Rouamel
- Subjects
cyber‐physical systems ,linear matrix inequalities ,linear systems ,networked control systems ,stability ,stochastic systems ,Control engineering systems. Automatic machinery (General) ,TJ212-225 - Abstract
Abstract This article focuses on the problem of stability for a class of linear networked control systems (NCSs) subjected to network communication delays and random deception attacks. A new memory event‐triggered mechanism (METM) is proposed to reduce the unnecessary transmitted data through the communication channel and then enhance the network resources. In this context, a new memory stochastic state feedback controller is proposed to stabilize the closed‐loop networked control system. A new randomly occurring deception attacks model is employed to deal with the security problem of NCSs. Sufficient stability conditions are derived based on a suitable Lyapunov‐Krasovskii functional (LKF). The designed methodology is proposed in terms of linear matrix inequality to synthesize both event‐triggered parameters and controller gains, and to reduce the conservatism of the system some integral lemma are exploited to bind the time derivative of the LKF. Finally, two numerical examples are presented to illustrate the effectiveness of the proposed method which provides a maximal upper bound value of the network‐induced delay and less transmitted packet regarding the maximal value delay obtained in other works, so less conservatism results are obtained, compared to previous ones in the literature.
- Published
- 2024
- Full Text
- View/download PDF
39. A novel approach of botnet detection using hybrid deep learning for enhancing security in IoT networks
- Author
-
Shamshair Ali, Rubina Ghazal, Nauman Qadeer, Oumaima Saidani, Fatimah Alhayan, Anum Masood, Rabia Saleem, Muhammad Attique Khan, and Deepak Gupta
- Subjects
Cyber security ,IoT Botnets ,Unknown cyber-attacks ,IoT networks ,Cyber-physical systems ,Zero-day vulnerability ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
In an era dominated by the Internet of Things (IoT), protecting interconnected devices from botnets has become essential. This study introduces an innovative hybrid deep learning model that synergizes LSTM Auto Encoders and Multilayer Perceptrons in detecting botnets in IoTs. The fusion of these technologies facilitates the analysis of sequential data and pattern recognition, enabling the model to detect intricate botnet activities within IoT networks. The proposed model's performance was carefully evaluated on two large IoT traffic datasets, N-BAIoT2018 and UNSW-NB15, where it demonstrated exceptional accuracy of 99.77 % and 99.67 % respectively for botnet detection. These results not only demonstrate the model's superior performance over existing botnet detection systems but also highlight its potential as a robust solution for IoT network security.
- Published
- 2024
- Full Text
- View/download PDF
40. Software Update Methodologies for Feature-Based Product Lines: A Combined Design Approach
- Author
-
Abir Bazzi, Adnan Shaout, and Di Ma
- Subjects
cyber–physical systems ,coupling ,cohesion ,digital signatures ,distributed software development ,Merkle tree ,Computer software ,QA76.75-76.765 - Abstract
The automotive industry is experiencing a significant shift, transitioning from traditional hardware-centric systems to more advanced software-defined architectures. This change is enabling enhanced autonomy, connectivity, safety, and improved in-vehicle experiences. Service-oriented architecture is crucial for achieving software-defined vehicles and creating new business opportunities for original equipment manufacturers. A software update approach that is rich in variability and based on a Merkle tree approach is proposed for new vehicle architecture requirements. Given the complexity of software updates in vehicles, particularly when dealing with multiple distributed electronic control units, this software-centric approach can be optimized to handle various architectures and configurations, ensuring consistency across all platforms. In this paper, our software update approach is expanded to cover the solution space of the feature-based product line engineering, and we show how to combine our approach with product line engineering in creative and unique ways to form a software-defined vehicle modular architecture. Then, we offer insights into the design of the Merkle trees utilized in our approach, emphasizing the relationship among the software modules, with a focus on their impact on software update performance. This approach streamlines the software update process and ensures that the safety as well as the security of the vehicle are continuously maintained.
- Published
- 2024
- Full Text
- View/download PDF
41. CFDI: Coordinated false data injection attack in active distribution network
- Author
-
Yang Liu, Chenyang Yang, Nanpeng Yu, Jiazhou Wang, Jue Tian, Hao Huang, Yadong Zhou, and Ting Liu
- Subjects
cyber‐physical systems ,distribution networks ,power distribution reliability ,power system security ,voltage control ,Distribution or transmission of electric power ,TK3001-3521 ,Production of electric energy or power. Powerplants. Central stations ,TK1001-1841 - Abstract
Abstract The active distribution network (ADN) can obtain measurement data, estimate system states, and control distributed energy resources (DERs) and flexible loads to ensure voltage stability. However, the ADN is more vulnerable to cyber attacks due to the recent wave of digitization and automation efforts. In this article, false data injection (FDI) attacks are focused on and they are classified into two types, that is, type I attacks on measurement data and type II attacks on control commands. After studying the impact of these two FDI attacks on the ADN, a new threat is revealed called coordinated FDI attack, which can maximize the voltage deviation by coordinating type I and type II FDI attacks. From the attacker's perspective, the scheme of CFDI is proposed and an algorithm is developed to find the optimal attack strategy. The feasibility of CFDI attacks has been validated on a smart distribution testbed. Moreover, simulation results on an ADN benchmark have demonstrated that CFDI attacks could cause remarkable voltage deviation that may deteriorate the stability of the distribution network. Moreover, the impact of CFDI attacks is higher than pure type I or type II attacks. To mitigate the threat, some countermeasures against CFDI attacks are also proposed.
- Published
- 2024
- Full Text
- View/download PDF
42. Frequency control using fuzzy active disturbance rejection control and machine learning in a two‐area microgrid under cyberattacks
- Author
-
Soheil Rahnamayian Jelodar, Jalal Heidary, Reza Rahmani, Behrooz Vahidi, and Hossein Askarian‐Abyaneh
- Subjects
cyber‐physical systems ,fuzzy active disturbance rejection ,Gazalle optimization algorithm ,Load ferequency control ,microgrids ,Distribution or transmission of electric power ,TK3001-3521 ,Production of electric energy or power. Powerplants. Central stations ,TK1001-1841 - Abstract
Abstract There is a change in the traditional power system structure as a result of the increased incorporation of microgrids (MGs) into the grid. Multi‐area MGs will emerge as a result, and issues related to them will need to be addressed. Load frequency control (LFC) is a challenge in such structures, which are more complicated due to variations in demand and the stochastic characteristics of renewable energy sources. This paper presents a cascade fuzzy active disturbance rejection control technique to deal with the LFC problem. In order to tune different parameters of controllers, a newly developed heuristic algorithm called the Gazelle optimization algorithm (GOA) is also employed. Moreover, due to the fact that multi‐area MGs are regarded as cyber‐physical systems (CPSs), a relatively new concern for LFC problems is their resilience to cyberattacks such as false data injection (FDI) and denial of service (DoS) attacks. Therefore, this research also presents a novel machine learning approach called parallel attack resilience detection system (PARDS) to deal with the LFC problem in the presence of cyberattacks. The efficiency of the proposed strategy is investigated under different scenarios, such as non‐linearities in the power system or server cyberattacks.
- Published
- 2024
- Full Text
- View/download PDF
43. Data-Driven Generative Design (dGD) of a Soft Robot Digital Twin by an Intuitional Evolutionary Algorithm(iEA).
- Author
-
Chenxi Tao, Jiao, Roger J., and Seung-Kyum Choi
- Subjects
EVOLUTIONARY algorithms ,DIGITAL twins ,MACHINE learning ,DIGITAL technology ,ARTIFICIAL intelligence ,TECHNOLOGICAL innovations - Abstract
The digital twin concept is pivotal in Industrial 4.0, integrates physical and cyber spaces to address product design challenges. In the early design phase, digital twins offer valuable insights, while topology optimization, often integrated with digital twins, is prevalent during the optimization process. However, traditional topology optimization methods may fall short for soft robots due to their complex physical constraints and the high costs associated with physical simulations. Evolutionary algorithms, with their inherent adaptability, hold promise for autonomous optimization of soft robots based on available data. These algorithms are well-suited for generative design, potentially enabling data-driven generative approaches. This study introduces an intuitional evolutionary algorithm (iEA) to explore a generative optimization method for product design within the context of the digital twin. This paper presents a case study involving the design of soft robots for a speed competition in a simulated 3D environment, demonstrating the viability of combining the iEA with a data-driven generative design (dGD) model to develop a fast- walking soft robot. The results include learning curves and convergence diagrams, illustrating the efficacy of the design solution. The paper will also discuss information hierarchy, requirement analysis and functional modeling of the dGD model. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
44. A proposed framework using systems engineering to design human-centric manufacturing systems for novel products to reduce complexity and risk.
- Author
-
Hagström, Malin Hane and Bergsjö, Dag
- Subjects
SYSTEMS engineering ,CYBER physical systems ,AUTOMOBILE power trains ,SYSTEMS design ,EMOTIONS - Abstract
The environment for powertrain production system engineers is changing radically. This initial prescriptive study proposes a systems engineering framework based on two previous case studies which are under review for publication concerning design of battery plants. The framework was developed based on ISO/IEC/IEEE 15288 standard using Concept of Operations and Model-Based Systems Engineering in a workshop setting, with a focus on visualisation to understand the practical and emotional needs of the humans in the system. The framework was validated by twelve senior project members. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. Challenges for capturing data within data-driven design processes.
- Author
-
Langner, Christopher, Paliyenko, Yevgeni, Müller, Benedikt, Roth, Daniel, Guertler, Matthias R., and Kreimeyer, Matthias
- Subjects
INTERNET of things ,DATA science ,INTERNET security ,EMISSION control ,THREE-dimensional printing - Abstract
Cyber-Physical-Systems provide extensive data gathering opportunities along the lifecycle, enabling data-driven design to improve the design process. However, its implementation faces challenges, particularly in the initial data capturing stage. To identify those, a comprehensive approach combining a systematic literature review and an industry survey was applied. Four groups of interrelated challenges were identified as most relevant to practitioners: data selection, data availability in systems, knowledge about data science processes and tools, and guiding users in targeted data capturing. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
46. How the technologies underlying cyber-physical systems support the reconfigurability capability in manufacturing: a literature review.
- Author
-
Napoleone, Alessia, Negri, Elisa, Macchi, Marco, and Pozzetti, Alessandro
- Subjects
CYBER physical systems ,LITERATURE reviews ,LIFE cycles (Biology) ,MANUFACTURING processes ,PRODUCT life cycle - Abstract
Nowadays, manufacturing firms need the reconfigurability capability to be responsive in the current context characterised by unpredictable and frequent market changes and the reduction of product life cycle. Despite the relevance of the subject, a challenge for practitioners is the development of a strategy aimed to increase the level of reconfigurability with long-term goals of customisation and responsiveness. Moreover, traditional manufacturing paradigms are disrupted by the transformation of manufacturing systems in cyber-physical systems (CPS), thus introducing innovative means also to increase the level of reconfigurability in manufacturing systems. This study investigates how the technologies underlying CPS support the reconfigurability capability along system life cycle. Thus the technologies underlying CPS are classified into seven categories and it is shown how they enable the sequence of utilisation of the reconfigurability characteristics (modularity, integrability, diagnosability, scalability, convertibility and customisation) along the system life cycle. The results of the study can guide practitioners in developing reconfigurability as a strategic capability. Moreover, different directions for future research can be considered, as discussed in the conclusion. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
47. Human machine interactions: from past to future- a systematic literature review
- Author
-
Jain, Namita, Gupta, Vikas, Temperini, Valerio, Meissner, Dirk, and D’angelo, Eugenio
- Published
- 2024
- Full Text
- View/download PDF
48. Detection‐based resilient control for cyber‐physical systems against two‐channel false data injection attacks.
- Author
-
Li, Jinyan, Li, Xiaomeng, Ren, Hongru, and Li, Hongyi
- Abstract
This paper focuses on a detection‐based resilient control issue for cyber‐physical systems (CPSs) subject to false data injection (FDI) attacks, where FDI attacks occur in the communication channels from the sensor‐to‐controller and controller‐to‐actuator. Firstly, to reduce the adverse impacts of FDI attacks on estimation performance, an unbiased estimator is constructed by tackling the equality‐constrained optimization problem. Then, an effective attack detection mechanism is devised by introducing a pseudo‐innovation sequence to formulate the detection function, which can successfully detect two‐channel FDI attacks. Based on these detection results, a resilient controller combining linear quadratic Gaussian and H∞$$ {H}_{\infty } $$ controllers is provided to guarantee the mean‐square asymptotic stability of CPSs with H∞$$ {H}_{\infty } $$ performance. Finally, the validity of the proposed resilient control approach is demonstrated by a simulation involving satellite control system. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
49. Towards Autonomous Programming of Micro-Assembly Robotics.
- Author
-
Wiemann, Rolf, Terei, Niklas, and Raatz, Annika
- Abstract
Due to the strive towards miniaturized systems and the growing field of optical technologies, micro-assembly is becoming increasingly important. Micro-assembly is characterized by challenging processes that require sub-micron level positioning accuracy regardless of modeling and calibration errors in the manipulator system. Automating these processes requires not only profound expertise about the process itself but also highly skilled personnel for programming the micro-assembly robot since current interfaces lack intuitive programming methods and simulation capabilities. In this paper, we outline a roadmap towards autonomous programming by combining intuitive programming approaches with intelligent and self-learning algorithms. Following this roadmap, the user will be supported progressively by autonomous and intelligent sub-processes until the machine can finally program itself autonomously. Based on a systematic review of the current state of automated micro-assembly and simulation frameworks, we show the capabilities of current approaches and identify key enablers for an autonomous assembly. From these enablers, we derive modules building our proposed framework. Central aspects are the development of a holistic simulation and a data management, which include not only the robot with its sensor systems but also assembly-components. These form the foundation for offline programming and the usage of machine learning algorithms. In order to facilitate future research, we propose the utilization of the Robot Operating System 2 framework (ROS2) as a basis for autonomous programming adhering the principles of open-source and enabling seamless integration. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
50. Practical Deployment of BIM-Interoperable Voice-Based Intelligent Virtual Agent Support Construction Worker Productivity.
- Author
-
Linares-Garcia, Daniel Antonio and Roofigari-Esfahan, Nazila
- Subjects
- *
LABOR market , *WEBSITES , *LABOR productivity , *CONSTRUCTION workers , *INTELLIGENT agents - Abstract
The architecture, engineering, and construction (AEC) industry in the US faces increasing labor shortages while accumulating downward productivity trends. Previous research efforts have shown that lack of timely access to information is one of the main factors hindering construction workers' productivity, and prompt information extraction (IE) from BIM sources can help address this issue. This study develops a BIM-web interoperable system, featuring a voice-based intelligent virtual agent (VIVA), to provide workers with information on-demand when conducting their activities on the jobsite. VIVA integrates construction digital sources with web platforms to enable real-time data communication between the users, workers in this case, and BIM platforms. The voice interaction feature of VIVA provides an intuitive and safe tool that can easily be used by workers with varying ranges of experience, with minimal need for training. The responsiveness and accuracy of VIVA is evaluated through two proof-of-concept case studies. Results indicate that the BIM-VIVA link and underlying natural language understanding (NLU) algorithms in the Google Actions platform accurately understand user queries, with a performance of 97.50% correct responses. As a result, VIVA achieves superior performance compared with previous research works based on NLU algorithms with text-based queries. The developments made in this research not only contribute to improving the safety and productivity of construction workers but also can open the door for easier onboarding of less-experienced workers, thus addressing the industry's severe skilled labor shortage issue. Practical Applications: This study introduces an innovative web-based system featuring VIVA to address the pressing labor shortage and diminishing productivity in the AEC industry. VIVA seamlessly integrates construction digital sources with web platforms, enabling real-time communication with construction workers and facilitating their on-demand information retrieval. The intuitive voice interaction feature of VIVA offers a safe and easily navigable tool that demands minimal training for workers with diverse backgrounds and experience levels. This feature also makes VIVA a practical tool for hands-free communication and information retrieval on jobsites, which minimizes the imposed distraction inherent in technological solutions. Construction workers can use voice commands to access project plans, schedules, and safety protocols, allowing them to retrieve critical information without having to stop work or use their hands. This intuitive interface reduces the need for complex user interfaces or manual input, making it easier for workers to interact with technology while focusing on their tasks. Hence, VIVA promises to improve productivity and safety of diverse group of workers without causing distraction or safety issues itself, which is a common concern when implementing technology to assist workers in hazardous and ever-changing construction jobsites. Beyond enhancing safety and productivity, widespread use of VIVA can help address the AEC sector's severe skilled labor shortage by providing an accessible means to onboard less-experienced workers. As such, VIVA provides opportunities to augment efficiency for seasonal/nonnative workers, thus facilitating the integration of a broader workforce and addressing the industry's pressing labor challenges. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.