2014 7th International Symposium on Resilient Control Systems (ISRCS)最新文献

筛选
英文 中文
Quantifying cyber-resilience against resource-exhaustion attacks 量化针对资源耗尽攻击的网络弹性
2014 7th International Symposium on Resilient Control Systems (ISRCS) Pub Date : 2014-09-18 DOI: 10.1109/ISRCS.2014.6900093
Glenn A. Fink, Richard L. Griswold, Zachary W. Beech
{"title":"Quantifying cyber-resilience against resource-exhaustion attacks","authors":"Glenn A. Fink, Richard L. Griswold, Zachary W. Beech","doi":"10.1109/ISRCS.2014.6900093","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900093","url":null,"abstract":"Resilience in the information sciences is notoriously difficult to define much less to measure. But in mechanical engineering, the resilience of a substance is mathematically well-defined as an area under the stress-strain curve. We combined inspiration from mechanics of materials and axioms from queuing theory in an attempt to define resilience precisely for information systems. We first examine the meaning of resilience in linguistic and engineering terms and then translate these definitions to information sciences. As a general assessment of our approach's fitness, we quantify how resilience may be measured in a simple queuing system. By using a very simple model we allow clear application of established theory while being flexible enough to apply to many other engineering contexts in information science and cyber security. We tested our definitions of resilience via simulation and analysis of networked queuing systems. We conclude with a discussion of the results and make recommendations for future work.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130906099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Time scale analysis and synthesis for Model Predictive Control under stochastic environments 随机环境下模型预测控制的时间尺度分析与综合
2014 7th International Symposium on Resilient Control Systems (ISRCS) Pub Date : 2014-09-18 DOI: 10.1109/ISRCS.2014.6900085
Yan Zhang, D. Subbaram Naidu, H. M. Nguyen, Chenxiao Cai, Y. Zou
{"title":"Time scale analysis and synthesis for Model Predictive Control under stochastic environments","authors":"Yan Zhang, D. Subbaram Naidu, H. M. Nguyen, Chenxiao Cai, Y. Zou","doi":"10.1109/ISRCS.2014.6900085","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900085","url":null,"abstract":"This paper presents a method of time-scale analysis and synthesis for Model Predictive Control (MPC) under stochastic environment. A high-order plant is decoupled into slow and fast subsystems using time-scale method with high-order accuracy. Based on the two subsystems, Kalman filters and sub-controllers are designed separately for the subsystems. Then a composite model predictive controller is obtained. The method is illustrated by applying the proposed method to wind energy conversion system. The response of the output from the composite model predictive controller is compared to that of the original MPC showing the simplicity and reduction in computation effort of the proposed method for Model Predictive Control.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127937248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Priority-based broadcasting of sensitive data in error-prone wireless networks 易出错无线网络中基于优先级的敏感数据广播
2014 7th International Symposium on Resilient Control Systems (ISRCS) Pub Date : 2014-09-18 DOI: 10.1109/ISRCS.2014.6900087
P. Ostovari, Jie Wu, Ying Dai
{"title":"Priority-based broadcasting of sensitive data in error-prone wireless networks","authors":"P. Ostovari, Jie Wu, Ying Dai","doi":"10.1109/ISRCS.2014.6900087","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900087","url":null,"abstract":"Providing reliable transmission in wireless communication networks is an important problem which is typically addressed using feedback and acknowledgment messages. In the networks where using feedbacks is not possible, such as real-time systems, an alternative approach is to maximize the possible gain that the destination nodes are expected to receive. In this paper, we consider transmission of data with different priorities, and study the problem of maximizing the total gain in the case that partial data retrieval is acceptable. We propose an optimal solution that benefits from network coding. We also consider the case of burst errors and discuss how can we make our proposed method robust to this type of error. We evaluate our proposed priority-based data transmission method using both simulations and results from the implementation on a USRP testbed.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117208643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of an authentication mechanism in time-triggered networked control systems 时间触发网络控制系统中认证机制的性能评估
2014 7th International Symposium on Resilient Control Systems (ISRCS) Pub Date : 2014-09-18 DOI: 10.1109/ISRCS.2014.6900098
Gonçalo Martins, Anirban Bhattacharjee, A. Dubey, X. Koutsoukos
{"title":"Performance evaluation of an authentication mechanism in time-triggered networked control systems","authors":"Gonçalo Martins, Anirban Bhattacharjee, A. Dubey, X. Koutsoukos","doi":"10.1109/ISRCS.2014.6900098","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900098","url":null,"abstract":"An important challenge in networked control systems is to ensure the confidentiality and integrity of the message in order to secure the communication and prevent attackers or intruders from compromising the system. However, security mechanisms may jeopardize the temporal behavior of the network data communication because of the computation and communication overhead. In this paper, we study the effect of adding Hash Based Message Authentication (HMAC) to a time-triggered networked control system. Time Triggered Architectures (TTAs) provide a deterministic and predictable timing behavior that is used to ensure safety, reliability and fault tolerance properties. The paper analyzes the computation and communication overhead of adding HMAC and the impact on the performance of the time-triggered network. Experimental validation and performance evaluation results using a TTEthernet network are also presented.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116430392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nonlinear Model Predictive Control for regulation of a class of Nonlinear Singularly Perturbed discrete-time systems 一类非线性奇摄动离散系统的非线性模型预测控制
2014 7th International Symposium on Resilient Control Systems (ISRCS) Pub Date : 2014-09-18 DOI: 10.1109/ISRCS.2014.6900104
Yan Zhang, D. Subbaram Naidu, Chenxiao Cai, Y. Zou
{"title":"Nonlinear Model Predictive Control for regulation of a class of Nonlinear Singularly Perturbed discrete-time systems","authors":"Yan Zhang, D. Subbaram Naidu, Chenxiao Cai, Y. Zou","doi":"10.1109/ISRCS.2014.6900104","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900104","url":null,"abstract":"In this paper, a class of discrete-time nonlinear systems having two-time-scale property is investigated. Using the theory of singular perturbations and time scales, the nonlinear system is decoupled into reduced slow and fast (boundary layer) subsystems. Then, a Nonlinear Model Predictive Control (NMPC) method is developed using the state-dependent Riccati equation for the slow and fast subsystems. It is proved that the original, closed-loop system with a composite control composed of slow and fast MPC subcontrollers, is locally asymptotically stable. Finally, an example is given to show the effectiveness of the developed method.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129233403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aptitude testing for selection, specialization, and training, of airport security X-ray imaging operators (X-APT) 为甄选、专门化及训练机场保安x光造影操作员而进行的能力倾向测试
2014 7th International Symposium on Resilient Control Systems (ISRCS) Pub Date : 2014-09-18 DOI: 10.1109/ISRCS.2014.6900089
R. Lanier, Sacha Duff, Jesse Flint, N. Nguyen, Stephen Young, Bonnie Kudrick
{"title":"Aptitude testing for selection, specialization, and training, of airport security X-ray imaging operators (X-APT)","authors":"R. Lanier, Sacha Duff, Jesse Flint, N. Nguyen, Stephen Young, Bonnie Kudrick","doi":"10.1109/ISRCS.2014.6900089","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900089","url":null,"abstract":"X-ray image analysis and interpretation of carry-on items at airports is a primary responsibility for security personnel. This task is one of the most difficult and critical in ensuring the safety of commercial air travel for the public. There are several factors that contribute to the difficulty. X-ray imaging aptitude testing (X-APT) is focused on the individual aptitudes that are influential in acquiring, performing and retaining the perceptual and cognitive skills that are associated with the airport check-point X-ray threat detection. X-APT is a computer based battery of assessment tests derived from validated psychometric assessment tools. The battery is presented on a self-contained portable Tablet, with interactive graphics to increase user engagement. A pilot study of the X-APT prototype was conducted with current Transportation Security Administration X-ray imaging operators to refine and validate the system design. A full scale field evaluation is being conducted at several major airports. The evaluation compares X-APT performance aptitude based predictions with archived image analysis performance results. X-APT provides a valid tool for selection and classification of security personnel, and has the potential to enable self-paced training and skills improvement.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125259174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A framework for resilient remote monitoring 弹性远程监控框架
2014 7th International Symposium on Resilient Control Systems (ISRCS) Pub Date : 2014-09-18 DOI: 10.1109/ISRCS.2014.6900090
M. Atighetchi, A. Adler
{"title":"A framework for resilient remote monitoring","authors":"M. Atighetchi, A. Adler","doi":"10.1109/ISRCS.2014.6900090","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900090","url":null,"abstract":"Today's activities in cyber space are more connected than ever before, driven by the ability to dynamically interact and share information with a changing set of partners over a wide variety of networks. To support dynamic sharing, computer systems and network are stood up on a continuous basis to support changing mission critical functionality. However, configuration of these systems remains a manual activity, with misconfigurations staying undetected for extended periods, unneeded systems remaining in place long after they are needed, and systems not getting updated to include the latest protections against vulnerabilities. This environment provides a rich environment for targeted cyber attacks that remain undetected for weeks to months and pose a serious national security threat. To counter this threat, technologies have started to emerge to provide continuous monitoring across any network-attached device for the purpose of increasing resiliency by virtue of identifying and then mitigating targeted attacks. For these technologies to be effective, it is of utmost importance to avoid any inadvertent increase in the attack surface of the monitored system. This paper describes the security architecture of Gestalt, a next-generation cyber information management platform that aims to increase resiliency by providing ready and secure access to granular cyber event data available across a network. Gestalt's federated monitoring architecture is based on the principles of strong isolation, least-privilege policies, defense-in-depth, crypto-strong authentication and encryption, and self-regeneration. Remote monitoring functionality is achieved through an orchestrated workflow across a distributed set of components, linked via a specialized secure communication protocol, that together enable unified access to cyber observables in a secure and resilient way.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129801180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Isolating trust in an industrial control system-on-chip architecture 隔离信任在工业控制系统芯片架构
2014 7th International Symposium on Resilient Control Systems (ISRCS) Pub Date : 2014-09-18 DOI: 10.1109/ISRCS.2014.6900096
Zane R. Franklin, C. Patterson, L. Lerner, R.J. Prado
{"title":"Isolating trust in an industrial control system-on-chip architecture","authors":"Zane R. Franklin, C. Patterson, L. Lerner, R.J. Prado","doi":"10.1109/ISRCS.2014.6900096","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900096","url":null,"abstract":"A distributed industrial control system (ICS) also distributes trust across many software and hardware components. There is a need for some malware countermeasures to be independent of application, supervisory or driver software, which can introduce vulnerabilities. We describe the Trustworthy Autonomic Interface Guardian Architecture (TAIGA) that provides an on-chip, digital, security version of classic mechanical interlocks. In order to enhance trust in critical embedded processes, TAIGA redistributes responsibilities and authorities between a Programmable Logic Controller (PLC) processor and a hardware-implemented interface controller, simplifying PLC software without significantly degrading performance while separating trusted components from updatable software. The interface controller is synthesized from C code, formally analyzed, and permits runtime checked, authenticated updates to certain system parameters but not code. TAIGA's main focus is ensuring process stability even if this requires overriding commands from the processor or supervisory nodes. The TAIGA architecture is mapped to a commercial, configurable system-on-chip platform.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133812514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Hovering synchronization of a fleet of quadcopters 四轴飞行器舰队的悬停同步
2014 7th International Symposium on Resilient Control Systems (ISRCS) Pub Date : 2014-09-18 DOI: 10.1109/ISRCS.2014.6900102
Bogdan Niemoczynski, S. Biswas, J. Kollmer, F. Ferrese
{"title":"Hovering synchronization of a fleet of quadcopters","authors":"Bogdan Niemoczynski, S. Biswas, J. Kollmer, F. Ferrese","doi":"10.1109/ISRCS.2014.6900102","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900102","url":null,"abstract":"Multi-agent concepts are applied to a fleet of quadcopters for a synchronized hovering flight. Each quadcopter system is represented by a simple dynamic model which is linearized with respect to a hovering state. A two stage controller is proposed consisting of a local feedback loop for stabilization of individual platforms, and a global system-level feedback loop for synchronization. It is shown that with appropriate feedback, the fleet maintains stability of hovering formation. It is also shown that the controller maintains collective stability of the fleet in the event of failure of individual quadcopters. Simulation results are presented showing synchronized hovering in the horizontal and vertical planes.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115968455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A BDI multi-agent approach for power restoration 电力恢复的BDI多智能体方法
2014 7th International Symposium on Resilient Control Systems (ISRCS) Pub Date : 2014-09-18 DOI: 10.1109/ISRCS.2014.6900105
Qiangguo Ren, Li Bai, S. Biswas, F. Ferrese, Q. Dong
{"title":"A BDI multi-agent approach for power restoration","authors":"Qiangguo Ren, Li Bai, S. Biswas, F. Ferrese, Q. Dong","doi":"10.1109/ISRCS.2014.6900105","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900105","url":null,"abstract":"The objective of this paper is to design and develop a Belief-Desire-Intention (BDI) agent-based approach for power system restoration. We describe a multiple bus electrical power system (multi-bus power system) as a market environment that consists of BDI bus agents representing two different characters, consumer and producer. These bus agents are able to balance the power system between power generation and load consumption while consumers explore the market and trade the power resource with producers. In addition, the power system will be naturally and efficiently split into power branches by the bus agents. When a fault occurs in the system, the bus agents can maximize the capacity of the served loads or minimize the loss of power loads (when load shedding may be the only option) in a timely manner. The proposed BDI multi-agent approach can be applied to any size or structure of the multi-bus power systems. It is shown from our simulation and results comparison that the proposed approach becomes more effective and efficient when the scale of the multi-bus power system expands.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132628003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信