{"title":"State estimation and stabilisation of nonlinear networked control systems with mixed time-delay","authors":"Bo Zhang, Xiaoyu Su","doi":"10.1080/23335777.2020.1811382","DOIUrl":"https://doi.org/10.1080/23335777.2020.1811382","url":null,"abstract":"ABSTRACT In this paper, the problems of time-delay, packet loss and quantisation for network control with global Lipschitz nonlinearity are investigated. The packet losses between the forward and backward channels are considered, and two independent Bernoulli distributions are modelled respectively. An appropriate compensation strategy is proposed to reduce the buffeting and response time of the system. A controller based on differential proportional observer is proposed. The information of estimation errors is used to optimise state estimations. Finally, a simulation example illustrates the feasibility of the method, and the comparisons with existing discrete time-delay system and distributed time-delay system prove the superiority of the method.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"60 1","pages":"114 - 132"},"PeriodicalIF":0.0,"publicationDate":"2020-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91166112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leveraging the power of quantum computing for breaking RSA encryption","authors":"Moolchand Sharma, Vikas Choudhary, R. Bhatia, Sahil Malik, Anshuman Raina, Harshit Khandelwal","doi":"10.1080/23335777.2020.1811384","DOIUrl":"https://doi.org/10.1080/23335777.2020.1811384","url":null,"abstract":"ABSTRACT Encryption is the process of securing confidential data that bars a third party’s access to the information.RSA encryption utilises the property of complexity classes wherein the problem of prime integer factorization lies inside the Non-Polynomial time (NP-Hard) class, which makes it impervious to classical computers. Since it is so hard to break even for a computer, it becomes important to do encryption for all the secure transactions. Although it lies outside the capabilities of traditional computing, the recent developments in the field of quantum computing can be utilised to break RSA Encryption. The approach involves mapping of qubits used in a quantum machine to a constraint satisfaction problem (CSP) and then using them to check for factors. This consists of the use of a Multiplicative Boolean circuit in which the qubits utilised by the machine replaces the variables. These Qubits are then mapped as per the gates involved, and the factorization problem is thus transformed into a CSP problem, through which, the factors can be easily found. Once known, these factors can be used to calculate the public and private keys effectively breaking the encryption security. We provide a novel approach to highlight the importance of developing Post-Quantum cryptography techniques for providing a secure channel of communication.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"61 1","pages":"73 - 92"},"PeriodicalIF":0.0,"publicationDate":"2020-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89573360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Optimal Intrusion Detection System using GWO-CSA-DSAE Model","authors":"P. Keserwani, M. C. Govil, Emmanuel S. Pilli","doi":"10.1080/23335777.2020.1811383","DOIUrl":"https://doi.org/10.1080/23335777.2020.1811383","url":null,"abstract":"ABSTRACT In the high demand of the cloud computing environment, intrusion detection in a cloud network playing a big role in maintaining the faith of the client(s). Due to the increasing complexity of the cloud environment, the existing approaches which use the conventional neural networks are not able to utilise the relevant information from the network traffic, which leads to a low detection rate. This reduces the stability of the existing approaches in this changing environment. In this paper, an anomaly-based cloud intrusion detection system (IDS) is proposed for finding the intrusions in a cloud network. The proposed system uses a hybrid metaheuristic algorithm for feature selection and a deep learning approach for classification. For feature selection, grey wolf optimisation (GWO) is hybrid with a crow search algorithm (CSA), which extracts relevant features from the cloud network connection to be processed more effectively in the deep learning classifier section. A deep sparse auto-encoder (DSAE) is employed for the classification purpose. For the performance comparison, the considered metrics are accuracy, precision, recall or detection rate (DR), and F1 Score. Three publically well-known available datasets namely NSL-KDD, UNSW-NB15, and CICIDS 2017 have been considered for analysing the performance of the proposed GWO-CSA-DSAE model for intrusion detection in a cloud network. The experimental results of the proposed model have been compared with the results of existing recent approaches in the case of binary classification and multi-class classification. It is found that GWO-CSA-DSAE model is better for intrusion detection, which is the proposed model for intrusion detection in a cloud network.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"9 1","pages":"197 - 220"},"PeriodicalIF":0.0,"publicationDate":"2020-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73392793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Result attack: a privacy breaching attack for personal data through K-means algorithm","authors":"Sharath Yaji, Neelima Bayyapu","doi":"10.1080/23335777.2020.1811380","DOIUrl":"https://doi.org/10.1080/23335777.2020.1811380","url":null,"abstract":"ABSTRACT Protecting data privacy concerns the most significant challenge of the present era. This paper is an attempt to demonstrate how machine learning can be used by an attacker to compromise data privacy. To demonstrate, we have chosen an attack on handwritten signatures. The attacker utilizes available signatures for training and appends malicious signatures to be used in the testing process until he gets the desired result. The attacker manipulates the achieved result to perform the malicious attack. We propose, result attack to highlight the need for ensuring the secrecy of the genuine signature. An illustration is performed by applying the K-means algorithm to the MNIST dataset. Differential Privacy (DP) is adopted for defense discussion. The illustration of DP is produced by aggregating red or white noise to the MNIST dataset. Observation shows, the aggregation of noise to personal data successfully delivers defense against the result attack. We get the area under the receiver operating characteristic curve for the original dataset as 0.878719, original dataset vs aggregated red noise as 0.4999901, and original dataset vs white noise as 0.4448475. This concludes for the defense model, aggregating white noise is better than red noise, i.e. white noise aggregation is 11% better than red noise.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"1 1","pages":"11 - 40"},"PeriodicalIF":0.0,"publicationDate":"2020-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79819247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Moving least squares approximation-based online control optimised by the team game algorithm for Duffing-Holmes chaotic problems","authors":"M. Mahmoodabadi","doi":"10.1080/23335777.2020.1811385","DOIUrl":"https://doi.org/10.1080/23335777.2020.1811385","url":null,"abstract":"ABSTRACT In this paper, an online optimal adaptive robust fuzzy controller based on the Moving Least Squares (MLS) and Team Game Algorithm (TGA) is introduced to control uncertain chaotic nonlinear systems. At first, a robust supervisory stabiliser and a fuzzy adaptive PID controller are designed and combined to handle a Duffing-Holmes chaotic oscillator. Next, the TGA is utilised to optimise the parameters of the designed fuzzy adaptive robust controller for different values of system disturbances. Then, to adapt the optimum design parameters of the controller with the uncertain values of the external disturbances, the MLS approximation is implemented. In order to evaluate the performance of the proposed technique, it is applied on a Duffing-Holmes chaotic nonlinear oscillator with different initial conditions. The results and the analysis prove the efficiency of the proposed controller with regard to uncertain systems’ challenging external disturbances that impair the stability, accuracy and optimality of the system.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"42 1","pages":"93 - 113"},"PeriodicalIF":0.0,"publicationDate":"2020-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85094791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. J. Mahanta, Abhilash Chakraborty, Ajoy Kumar Khan
{"title":"Design and verification of improved CMERE against power analysis attacks","authors":"H. J. Mahanta, Abhilash Chakraborty, Ajoy Kumar Khan","doi":"10.1080/23335777.2020.1769735","DOIUrl":"https://doi.org/10.1080/23335777.2020.1769735","url":null,"abstract":"ABSTRACT The CMERE algorithm was designed to resist DPA attacks on modular exponentiation. It was implemented and tested at the algorithmic level for different key sizes of the RSA cryptosystems. The strength of CMERE lied on the facts that it could be implemented both on left-to-right and right-to-left binary methods for modular exponentiation without any changes in the original algorithm. Also, the execution of modular exponentiation was completely bit independent making it a very strong countermeasure against simple and differential power analysis attacks. In this paper, we have verified the CMERE algorithm at hardware level using VHDL. During formal verification with VHDL on FPGA, the algorithm was modified for practical implementation. However, the overall strength of the improved CMERE algorithm remains the same as the original algorithm.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"16 1","pages":"165 - 179"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85153255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Public goods game with the moral dual process theory","authors":"Yanbo Zhang, Zidong Chai, Xiaobo Liu, Ruonan Xing, Mengjin Zhao, Danhua Li, Xinyu Zhang, Yu Hao, Aliaksei Vasilyeu","doi":"10.1080/23335777.2020.1769736","DOIUrl":"https://doi.org/10.1080/23335777.2020.1769736","url":null,"abstract":"ABSTRACT It is the objective law of development of nature that natural selection and survival of the fittest are incorporated. As the reason that cooperation is not a predeterminate process or results, it is interesting to study the emergent phenomena of cooperation. Although providing a punishment option to community members of the public goods game (PGG) has been shown to effectively promote cooperation . In real life, people will sometimes help others even at the expense of their own costs. Reward behaviour is an important phenomenon of social, which emerges as a result of the interactions among individuals. In this article, we carry out the representative expansion for both positive and negative reciprocit ies to the PGG, which is based on the dual-process theory of morality. We research the evolution of group cooperation about PGG under the condition that punishment and reward exist. This result indicates that punishment and reward are significant in the emergence and stabilisation of cooperation. Our experimental results also provide valuable information about strategies for theories of evolutionary games and social dynamics.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"127 1","pages":"1 - 10"},"PeriodicalIF":0.0,"publicationDate":"2020-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76225986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vision-based formation control of multiple UAVs with event-triggered integral sliding mode control","authors":"Siqing Chen, Xin Jin, Wenle Zhang, Yang Tang","doi":"10.1080/23335777.2020.1750054","DOIUrl":"https://doi.org/10.1080/23335777.2020.1750054","url":null,"abstract":"ABSTRACT Vision-based formation control offers an alternate solution for unmanned aerial vehicles (UAVs) to work together in the external position system denied environment. In this paper, we present a vision-based formation control strategy with the advantages of high tracking performance and low consumption of communication resources. A vision-based multi-robot localisation methods is applied to get precise position information, and the extended Kalman filter (EKF) is used to fuse measurement data from different sensors. The integral sliding mode controller (ISMC) is utilised to ensure the fast convergence and robustness to the desired formation, and the event-triggered communication scheme is employed to reduce redundant transmission of state information used in the formation controller. The simulation results in Gazebo with a team of three UAVs are given to illustrate the effectness of the proposed control strategy.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"95 1","pages":"231 - 251"},"PeriodicalIF":0.0,"publicationDate":"2020-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86018828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of a social media process model for fashion and apparel supply chain decisions","authors":"Samaneh Beheshti-Kashi","doi":"10.1080/23335777.2019.1680577","DOIUrl":"https://doi.org/10.1080/23335777.2019.1680577","url":null,"abstract":"ABSTRACT Fashion and apparel supply chains are complex and volatile. Thiscauses uncertainties for supply chain decisions. For reducing the uncertainty, decision-maker use different information sources. Typically, historical sales data is consulted for enhancing the decision base. Customer preferences are mostly publicly accessible via different social media channels. Motivated by the increased availability of customer preferences, this paper proposesa process model for exploiting social media data for fashion andapparel supply chain decisions. Characteristics of fashion andapparel supply chains and social media data are illustrated. Basedon these characteristics, functional requirements for a processmodel are elaborated. In particular, the veracity feature is takeninto consideration. Following these requirements, a process modelconsisting of the three main layers: process, social media and textmining is developed. A case study is framed around conducted following the proposed process model. Two years of fashion blogdata is extracted, and dictionary-based keyword extraction, rulebased classification, as well as automatic frequency analyses, areconducted. The proposed process model enables structural andtargeted exploitation of social media data for fashion and apparel supply chain decisions.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"6 1","pages":"76 - 95"},"PeriodicalIF":0.0,"publicationDate":"2020-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87311001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nonlinear optimal control for the inertia wheel inverted pendulum","authors":"G. Rigatos, M. Abbaszadeh, M. Hamida","doi":"10.1080/23335777.2019.1678199","DOIUrl":"https://doi.org/10.1080/23335777.2019.1678199","url":null,"abstract":"ABSTRACT Due to underactuation and nonlinearities, the control of the inertia wheel inverted pendulum is a non-trivial problem. The article proposes a nonlinear optimal control approach for the inertia wheel inverted pendulum. First, the dynamic model of the pendulum undergoes approximate linearisation around a temporary operating point which is recomputed at each time-step of the control method. The linearisation procedure makes use of first-order Taylor series expansion and requires the computation of the system’s Jacobian matrices. For the approximately linearised model of the pendulum, a stabilising H-infinity feedback controller is designed. To compute the controller’s feedback gains an algebraic Riccati equation is repetitively solved at each iteration of the control algorithm. The stability properties of the control scheme are proven through Lyapunov analysis. It is demonstrated that the control method satisfies the H-infinity tracking performance criterion, which signifies robustness against model uncertainty and external perturbations. Next, it is proven that the control loop is globally asymptotically stable. The nonlinear optimal control method retains the advantages of typical optimal control, that is fast and accurate tracking of the reference setpoints under moderate variations of the control input.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"1 1","pages":"55 - 75"},"PeriodicalIF":0.0,"publicationDate":"2020-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79767519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}