Honglei Li, Jing Geng, Yongkang Liu, M. Kashef, R. Candell, S. Bhattacharyya
{"title":"Design Space Exploration for Wireless-Integrated Factory Automation Systems","authors":"Honglei Li, Jing Geng, Yongkang Liu, M. Kashef, R. Candell, S. Bhattacharyya","doi":"10.1109/WFCS.2019.8757954","DOIUrl":"https://doi.org/10.1109/WFCS.2019.8757954","url":null,"abstract":"Recent years have brought significantly increased interest in integrating wireless communication capability within factory automation systems. Such integration motivates the study of interactions among the physical layout of factory workcells, wireless communication among workcells, and improving the overall factory system performance. In this paper, we develop methods for modeling and simulating these interactions, and implement these methods into the experimental study of complex design spaces for factory automation systems. The proposed methodology for modeling, simulation, and design space exploration can be used to gain insight into approaches for improving the configuration (e.g., physical layout or wireless protocol settings) of existing factory systems, and for understanding trade-offs in the design of new systems.","PeriodicalId":373657,"journal":{"name":"2019 15th IEEE International Workshop on Factory Communication Systems (WFCS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131514626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrija Goranovic, M. Meisel, S. Wilker, T. Sauter
{"title":"Hyperledger Fabric Smart Grid Communication Testbed on Raspberry PI ARM Architecture","authors":"Andrija Goranovic, M. Meisel, S. Wilker, T. Sauter","doi":"10.1109/WFCS.2019.8758000","DOIUrl":"https://doi.org/10.1109/WFCS.2019.8758000","url":null,"abstract":"Necessary energy policy targets trying to limit climate change effects are very ambitious. New technologies and combinations of available technologies are needed to achieve the goals by 2030/2050. A promising technology being explored in smart grids communications is the Blockchain, allowing peer-to-peer contractual-like or monetary-like interactions without the need for trust for an intermediary. This paper describes a Smart Grid Controller Blockchain Platform, allowing to simulate Virtual Power Plants communication along load profiles or smart meter measurement data. The communication requirements of these recent advances are similar to industrial cyber-physical systems, hence, applicable in other research domains.","PeriodicalId":373657,"journal":{"name":"2019 15th IEEE International Workshop on Factory Communication Systems (WFCS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114063911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS-Aware Ring Redundancy Protocol (QoS-ARRP) for High-Availability Ethernet Networks","authors":"Ahmed Amari, A. Mifdaoui","doi":"10.1109/WFCS.2019.8758022","DOIUrl":"https://doi.org/10.1109/WFCS.2019.8758022","url":null,"abstract":"During the last decade, Ethernet’s significance has increased in many embedded systems application areas, such as automotive, avionics and automation. However, guaranteeing the required availability level for such applications on Ethernet is still a hot research topic. In this specific area, we propose in this paper a new redundancy protocol for high availability Ethernet networks, called QoS-Aware Ring Redundancy Protocol (QoS-ARRP). First, the specifications of such a protocol are detailed, including the frame redundancy and filtering management, the auto-configuration mechanisms, as well as the maximum recovery time analysis. Second, the numerical results of the recovery time have shown the impact of the protocol parameters to tune and the trade-off between availability and scalability of the network. Moreover, we have benchmarked the state-of-the-art results on the recovery time against ours. A noticeable enhancement of the maximum recovery time with our proposal, thus of the availability level, has been highlighted.","PeriodicalId":373657,"journal":{"name":"2019 15th IEEE International Workshop on Factory Communication Systems (WFCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120980552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Radio-Map clustering Algorithm for RSS based Localization using Directional Antennas","authors":"A. Nagy, Thomas Bigler, A. Treytl, T. Sauter","doi":"10.1109/WFCS.2019.8757938","DOIUrl":"https://doi.org/10.1109/WFCS.2019.8757938","url":null,"abstract":"Position determination of nodes in wireless networks is becoming a prerequisite in industrial environments to fulfill various application and network needs ranging from device localization to safety or real-time behavior. Received Signal Strength (RSS) based localization techniques have been a research topic for many years, yet suffer from various physical effects. Usage of directed antennas could increase the localization performance and suppress disturbing effects, yet dramatically increase the complexity of localization especially in large scale networks. In this paper we propose a machine-learning aided approach for clustering the RSS map that significantly optimizes the position estimation of nodes in environments with antennas having arbitrary antenna patterns.","PeriodicalId":373657,"journal":{"name":"2019 15th IEEE International Workshop on Factory Communication Systems (WFCS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121183555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Emre Aydoğan, Selim Yılmaz, Sevil Şen, I. Butun, Stefan Forsström, M. Gidlund
{"title":"A Central Intrusion Detection System for RPL-Based Industrial Internet of Things","authors":"Emre Aydoğan, Selim Yılmaz, Sevil Şen, I. Butun, Stefan Forsström, M. Gidlund","doi":"10.1109/WFCS.2019.8758024","DOIUrl":"https://doi.org/10.1109/WFCS.2019.8758024","url":null,"abstract":"Although Internet-of-Things (IoT) is revolutionizing the IT sector, it is not mature yet as several technologies are still being offered to be candidates for supporting the backbone of this system. IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is one of those promising candidate technologies to be adopted by IoT and Industrial IoT (IIoT). Attacks against RPL have shown to be possible, as the attackers utilize the unauthorized parent selection system of the RLP protocol. In this work, we are proposing a methodology and architecture to detect intrusions against IIoT. Especially, we are targeting to detect attacks against RPL by using genetic programming. Our results indicate that the developed framework can successfully (with high accuracy, along with high true positive and low false positive rates) detect routing attacks in RPL-based Industrial IoT networks.","PeriodicalId":373657,"journal":{"name":"2019 15th IEEE International Workshop on Factory Communication Systems (WFCS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130503805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Machine Learning and Schedulability Analysis Method for the Verification of TSN Networks","authors":"Tieu Long Mai, N. Navet, J. Migge","doi":"10.1109/WFCS.2019.8757948","DOIUrl":"https://doi.org/10.1109/WFCS.2019.8757948","url":null,"abstract":"Machine learning (ML), and supervised learning in particular, can be used to learn what makes it hard for a network to be feasible and try to predict whether a network configuration will be feasible without executing a conventional schedulability analysis. A disadvantage of ML-based timing verification with respect to schedulability analysis is the possibility of “false positives”: configurations deemed feasible while they are not. In this work, in order to minimize the rate of false positives, we propose the use of a measure of the uncertainty of the prediction to drop it when the uncertainty is too high, and rely instead on schedulability analysis. In this hybrid verification strategy, the clear-cut decisions are taken by ML, while the more difficult ones are taken by a conventional schedulability analysis. Importantly, the trade-off achieved between prediction accuracy and computing time can be controlled. We apply this hybrid verification method to Ethernet TSN networks and obtain, for instance in the case of priority scheduling with 8 traffic classes, a 99% prediction accuracy with a speedup factor of 5.7 with respect to conventional schedulability analysis and a reduction of 46% of the false positives compared to ML alone.","PeriodicalId":373657,"journal":{"name":"2019 15th IEEE International Workshop on Factory Communication Systems (WFCS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128862996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luka Lednicki, G. Bag, K. Landernäs, Niclas Ericsson, Larisa Rizvanovic, Kristian Sandström, J. Torsner, C. Curescu, B. Skubic
{"title":"Industrial IoT with Distributed Cloud Experiments using 5G LTE","authors":"Luka Lednicki, G. Bag, K. Landernäs, Niclas Ericsson, Larisa Rizvanovic, Kristian Sandström, J. Torsner, C. Curescu, B. Skubic","doi":"10.1109/WFCS.2019.8758014","DOIUrl":"https://doi.org/10.1109/WFCS.2019.8758014","url":null,"abstract":"With the evolution of 5G it is envisioned that industrial applications with different requirements on latency and availability can be offloaded to a distributed cloud infrastructure. For example, some applications with stringent timing requirements can be hosted at the edge of the mobile network, closer to the control hardware, whereas some applications with relaxed timing requirements can be hosted in a cloud located geographically further away.This paper presents a feasibility study of hosting control applications based on OPC UA communication in a distributed cloud with LTE connectivity to the control hardware. The study includes measurements of communication round-trip time and availability of the network comparing cases where the application is hosted at a local or regional cloud. The results indicate that it is feasible to deploy industrial applications in a distributed cloud with timing requirements in the order of 100ms.","PeriodicalId":373657,"journal":{"name":"2019 15th IEEE International Workshop on Factory Communication Systems (WFCS)","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132373787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Nast, Björn Butzin, F. Golatowski, D. Timmermann
{"title":"Performance Analysis of a Secured BACnet/IP Network","authors":"M. Nast, Björn Butzin, F. Golatowski, D. Timmermann","doi":"10.1109/WFCS.2019.8758009","DOIUrl":"https://doi.org/10.1109/WFCS.2019.8758009","url":null,"abstract":"The Building Automation and Control networks (BACnet) protocol is one of the most widely used protocols in the building automation domain. In order to meet growing security requirements, an optional security architecture is defined in the BACnet standard. The purpose of this paper is to carry out a performance analysis on a BACnet/IP network, which is secured according to this security architecture. The additional time costs for client and server devices as well as the transmission costs are evaluated with regard to all levels of security defined in the standard. In this context, message signing with HMAC in combination with MD5 or SHA-256 and message encryption with AES-128 is investigated. To the best of the authors’ knowledge there are no works dealing with the performance of secured BACnet networks. The results should serve for further comparison with BACnet Secure Connect (BACnet/SC), which is currently under development and makes use of state-of-the-art security mechanisms like the Transport Layer Security (TLS).","PeriodicalId":373657,"journal":{"name":"2019 15th IEEE International Workshop on Factory Communication Systems (WFCS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129287105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Work in Progress: Systematic Derivation of Accurate Analytic Markov Channel Models for Industrial Control","authors":"Amal Alrish, Yu Lun, A. D’innocenzo, F. Santucci","doi":"10.1109/WFCS.2019.8757917","DOIUrl":"https://doi.org/10.1109/WFCS.2019.8757917","url":null,"abstract":"The motivation of this work is to systematically derive an accurate Markov channel model suitable to represent any industrial communication protocol. This model accounts for both channel and control dynamics. Our analytic model is derived by taking into account multiple interferers and physical phenomena characterizing a communication link. Our finite-state Markov channel model matches both average packet error probability and worst case bursty behavior of the accurate analytic model of the channel.","PeriodicalId":373657,"journal":{"name":"2019 15th IEEE International Workshop on Factory Communication Systems (WFCS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123211151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model-based simulation and threat analysis of in-vehicle networks","authors":"A. Lekidis, I. Barosan","doi":"10.1109/WFCS.2019.8757968","DOIUrl":"https://doi.org/10.1109/WFCS.2019.8757968","url":null,"abstract":"Automotive systems are currently undergoing a rapid evolution through the integration of the Internet of Things (IoT) and Software Defined Networking (SDN) technologies. The main focus of this evolution is to improve the driving experience, including automated controls, intelligent navigation and safety systems. Moreover, the extremely rapid pace that such technologies are brought into the vehicles, necessitates the presence of adequate testing of new features to avoid operational errors. Apart from testing though, IoT and SDN technologies also widen the threat landscape of cyber-security risks due to the amount of connectivity interfaces that are nowadays exposed in vehicles. In this paper we present a new method, based on OMNET++, for testing new in-vehicle features and assessing security risks through network simulation. The method is demonstrated through a case-study on a Toyota Prius, whose network data are analyzed for the detection of anomalies caused from security threats or operational errors.","PeriodicalId":373657,"journal":{"name":"2019 15th IEEE International Workshop on Factory Communication Systems (WFCS)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122886346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}