{"title":"Reputation-based Intrusion Detection System for wireless sensor networks","authors":"Keldor Gerrigagoitia, Roberto Uribeetxeberria, Urko Zurutuza, Ignacio Arenaza","doi":"10.1109/CompEng.2012.6242969","DOIUrl":"https://doi.org/10.1109/CompEng.2012.6242969","url":null,"abstract":"Wireless Sensor Networks (WSNs) can be used in a broad range of applications from complex military operations to simple domestic environments. This makes security a vital characteristic in WSNs. There have been numerous studies in the field of security in sensor networks, being Intrusion Detection System (IDS) among the most used tools in this area. This study proposes a new IDS design based on reputation and trust of the different nodes of a network for decision-making and analysis of possible sources of malicious attacks.","PeriodicalId":434660,"journal":{"name":"2012 Complexity in Engineering (COMPENG). Proceedings","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127753446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A MATLAB graphical user interface for nonintrusive polynomial chaos theory","authors":"Kanali Togawa, A. Benigni, A. Monti","doi":"10.1109/CompEng.2012.6242955","DOIUrl":"https://doi.org/10.1109/CompEng.2012.6242955","url":null,"abstract":"Polynomial chaos theory is a sophisticated method for the analysis of uncertainty propagation in dynamic systems, which is considerably faster than Monte Carlo methods in systems with few random parameters. Classically, all system laws are re-formulated into a deterministic set of equations, but in recent years, a nonintrusive variation has been developed to apply polynomial chaos to black boxes. However, a major constraint for the application of this concept is the depth of its mathematical foundations, followed by many adjustments. After a brief introduction of this concept, we would therefore like to present a graphical user interface which facilitates its use. Through this tool, the numerous difficulties in applying polynomial chaos become irrelevant for the user. Additionally, we show possible applications using the example of a buck converter, with a custom made interface tool between the commercial simulation environments MATLAB and SimulationX.","PeriodicalId":434660,"journal":{"name":"2012 Complexity in Engineering (COMPENG). Proceedings","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123972617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Lehfuss, G. Lauss, P. Kotsampopoulos, N. Hatziargyriou, P. Crolla, A. Roscoe
{"title":"Comparison of multiple power amplification types for power Hardware-in-the-Loop applications","authors":"F. Lehfuss, G. Lauss, P. Kotsampopoulos, N. Hatziargyriou, P. Crolla, A. Roscoe","doi":"10.1109/CompEng.2012.6242959","DOIUrl":"https://doi.org/10.1109/CompEng.2012.6242959","url":null,"abstract":"This Paper discusses Power Hardware-in-the-Loop simulations from an important point of view: an intrinsic and integral part of PHIL simulation - the power amplification. In various publications PHIL is discussed either in a very theoretical approach or it is briefly featured as the used method. In neither of these publication types the impact of the power amplification to the total PHIL simulation is discussed deeply. This paper extends this discussion into the comparison of three different power amplification units and their usability for PHIL simulations. Finally in the conclusion it is discussed which type of power amplification is best for which type of PHIL experiment.","PeriodicalId":434660,"journal":{"name":"2012 Complexity in Engineering (COMPENG). Proceedings","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131423866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigating system's voltage instability through wide-area early warning signals and real-time HVDC control","authors":"Kim Weyrich, R. Leelaruji, W. Kuehn, L. Vanfretti","doi":"10.1109/CompEng.2012.6242954","DOIUrl":"https://doi.org/10.1109/CompEng.2012.6242954","url":null,"abstract":"Two sequential approaches to prevent voltage instability are proposed in this article. The first approach utilizes synchrophasors in order to establish when the system is leading to a voltage instability and also to trigger the operation of HVDCs to relieve the system's stress. The second approach is used to ensure that HVDCs will operate securely when their transfer is pushed towards the maximum transferable power level.","PeriodicalId":434660,"journal":{"name":"2012 Complexity in Engineering (COMPENG). Proceedings","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117171806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Stoyanova, P. Matthes, H. Harb, Christoph Molitor, M. Marin, Rita Streblow, A. Monti, D. Müller
{"title":"Challenges in modeling a multi-energy system at city quarter level","authors":"I. Stoyanova, P. Matthes, H. Harb, Christoph Molitor, M. Marin, Rita Streblow, A. Monti, D. Müller","doi":"10.1109/CompEng.2012.6242964","DOIUrl":"https://doi.org/10.1109/CompEng.2012.6242964","url":null,"abstract":"In order to build reliable and robust structures for the future power supply, flexibilities of electrical generation, consumption and storage have to be increased. Within Dual Demand Side Management, the feasibility of a city quarter to manage locally its energy supply and to stabilize the regional grid is investigated. The concept focuses on the potential thermal storage systems provided by the existing building stock and on heat pumps as well as combined heat and power systems as generation and flexible storage units. Further, the physical building model and the distribution grid model will be coupled to a multi-energy simulation platform, to investigate the energy management options and the load shifting potential. In this paper we present the challenges met in process of system modeling. The chosen approaches are presented in two main sections, modeling and simulation requirements, together with discussed alternative solutions, drawbacks and limitations. The section Modeling deals with the user model and electricity demand forecasting, the building and electrical models. Main issues in the development of the building model concern the lack of available information of residents' behavior and building characteristics for its parameterization. Computational issues regarding the multi-energy simulation platform are discussed separately for the model coupling, the electrical and thermal simulation in the section Simulation Requirements.","PeriodicalId":434660,"journal":{"name":"2012 Complexity in Engineering (COMPENG). Proceedings","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129934184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Perelman, Jonathan Arad, N. Oliker, A. Ostfeld, M. Housh
{"title":"Water distribution systems event detection","authors":"L. Perelman, Jonathan Arad, N. Oliker, A. Ostfeld, M. Housh","doi":"10.1109/CompEng.2012.6242956","DOIUrl":"https://doi.org/10.1109/CompEng.2012.6242956","url":null,"abstract":"Since the events of 9/11 2001 in the US the world public awareness to possible terrorist attacks on water supply systems has increased dramatically, causing the security of drinking water distribution systems to become a major concern around the globe. Among the different threats, a deliberate chemical or biological contaminant injection is the most difficult to address, both as a consequence of the uncertainty surrounding the type of the injected contaminant and its consequences, as well as the uncertainty of location and time of the injection. In principle, a pollutant can be injected at any water distribution system connection (node) using a pump or a mobile pressurized tank. Although backflow preventers provide an obstacle to such actions, they do not exist at all connections, and at some might not be functional. This paper describes recent effort modeling of Avi Ostfeld's research team on water distribution systems event detection. The basic event detection framework is entitled AEDA (Aquatic Event Detection Algorithm) which utilizes Artificial Neural Networks (ANNs) for studying the interactions between multivariate water quality parameters and detecting possible outliers. Other layers on top of AEDA explore tradeoffs among contamination event parameters and improving its performance capabilities. Those and AEDA are reviewed in this paper.","PeriodicalId":434660,"journal":{"name":"2012 Complexity in Engineering (COMPENG). Proceedings","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127545461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing DMA through virtualization","authors":"Oliver Schwarz, C. Gehrmann","doi":"10.1109/CompEng.2012.6242958","DOIUrl":"https://doi.org/10.1109/CompEng.2012.6242958","url":null,"abstract":"We present a solution for preventing guests in a virtualized system from using direct memory access (DMA) to access memory regions of other guests. The principles we suggest, and that we also have implemented, are purely based on software and standard hardware. No additional virtualization hardware such as an I/O Memory Management Unit (IOMMU) is needed. Instead, the protection of the DMA controller is realized with means of a common ARM MMU only. Overhead occurs only in pre- and postprocessing of DMA transfers and is limited to a few microseconds. The solution was designed with focus on security and the abstract concept of the approach was formally verified.","PeriodicalId":434660,"journal":{"name":"2012 Complexity in Engineering (COMPENG). Proceedings","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131541854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pietro Morerio, K. Dabcevic, L. Marcenaro, C. Regazzoni
{"title":"Distributed cognitive radio architecture with automatic frequency switching","authors":"Pietro Morerio, K. Dabcevic, L. Marcenaro, C. Regazzoni","doi":"10.1109/CompEng.2012.6242968","DOIUrl":"https://doi.org/10.1109/CompEng.2012.6242968","url":null,"abstract":"The employment of sophisticated tools for data analysis in distributed or structurally complex systems requires the development of specific architectures and data fusion strategies in order to integrate heterogeneous information coming from the environmental sensors. Recently, intelligent sensor networks have been widely deployed for various purposes concerning both security- and safety-oriented systems. Military and civil applications ranging from border surveillance and public spaces monitoring to ambient intelligence and road safety are examples of such various applications. The architecture presented in this article is based on the Cognitive Node (CN) - a module able to receive data from the sensors, process it in order to find potentially harmful or anomalous events and situations and, in some cases, to interact with the environment itself or contact the human operator. The cognitive model was studied and exploited, focusing on the analysis and decision blocks which represent the crucial phases for assessing potentially unsecure/unsafe events and/or situations. The scalability of the model with regards to different application domains was investigated during the research activity. Proposed results show the capability of the given architecture for analysis and assessment of the occurring interactions, with the goal of maintaining proper security/safety levels in the monitored environment.","PeriodicalId":434660,"journal":{"name":"2012 Complexity in Engineering (COMPENG). Proceedings","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121795808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Meucci, S. Nicola, K. Al-Naimee, S. Abdalah, F. Arecchi
{"title":"Polarization spatial dynamics in a transverse multimode CO2 laser with optical feedback","authors":"R. Meucci, S. Nicola, K. Al-Naimee, S. Abdalah, F. Arecchi","doi":"10.1109/CompEng.2012.6242957","DOIUrl":"https://doi.org/10.1109/CompEng.2012.6242957","url":null,"abstract":"We experimentally study the polarization dynamics in a quasi isotropic CO2 laser emitting on the TEM*01 mode subjected to an optical feedback. We observe a complex dynamics in which spatial mode and polarization competition are involved. The observed dynamic is well reproduced by means of a model that provides a quantitative discrimination between the intrinsic asymmetry due to the kinetic coupling of molecules with different angular momenta and the anisotropy induced by the polarization feedback. Possible applications to polarization coding and synchronization will be presented.","PeriodicalId":434660,"journal":{"name":"2012 Complexity in Engineering (COMPENG). Proceedings","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129882261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kuang-Hui Chi, Yu-Yuan Hsu, Ji-Han Jiang, Li-Hsing Yen
{"title":"On complexity in wireless network localization","authors":"Kuang-Hui Chi, Yu-Yuan Hsu, Ji-Han Jiang, Li-Hsing Yen","doi":"10.1109/CompEng.2012.6242965","DOIUrl":"https://doi.org/10.1109/CompEng.2012.6242965","url":null,"abstract":"Considerable literature on wireless network localization has assumed that each wireless station has a spherical radio range. This assumption, however, is generally untenable because wireless signals are subject to physical reflection, diffraction, refraction, and scattering of electromagnetic waves. In consequence, radio signals become irregular, making position assessment complex and susceptible to nontrivial errors. As a remedy, this study presents a convex hull-based localization scheme allowing for radio coverage irregularity. We exploit a mobile anchor node to assist in locating target stations in a non-idealized space containing obstacles. Our scheme operates without reliance upon any ranging measurements about angle, distance, and received signal strength indication between radio transceivers. Qualitative and quantitative comparisons indicate that our approach outperforms counterpart schemes in terms of localization accuracy, yet at the expense of insignificant overhead. Overall performance evaluation concludes that our scheme can get fielded promisingly in practice.","PeriodicalId":434660,"journal":{"name":"2012 Complexity in Engineering (COMPENG). Proceedings","volume":"225 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113998574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}