Achieving Secure On-Orbit Anomaly Identification and Query of Wind Turbines

IF 9.9 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS IEEE Transactions on Industrial Informatics Pub Date : 2025-01-10 DOI:10.1109/TII.2024.3523556
Qinglei Kong;Songnian Zhang;Shuna Wen;Bo Chen;Xiaohong Wang
{"title":"Achieving Secure On-Orbit Anomaly Identification and Query of Wind Turbines","authors":"Qinglei Kong;Songnian Zhang;Shuna Wen;Bo Chen;Xiaohong Wang","doi":"10.1109/TII.2024.3523556","DOIUrl":null,"url":null,"abstract":"Low Earth orbit satellite constellations with seamless network coverage and onboard computers enable autonomous on-orbit anomaly identification of remote wind turbines. However, they face several challenges. First, limited visible periods caused by orbital characteristics mandate that one satellite holds anomalies and the other collects surveillance data. Second, passively injected satellites could intercept and grasp onboard message flows. Third, a restricted onboard energy supply budget restrains intersatellite communications and onboard computations. With the above challenges, we propose a secure on-orbit anomaly identification (SOAI) scheme between a pair of satellites through an <inline-formula><tex-math>$\\text{XOR}$</tex-math></inline-formula> filter, which further exploits laconic private set intersection to eliminate false positives. The secure on-orbit anomaly querying scheme achieves the verifiable querying of anomalies derived from <inline-formula><tex-math>$\\text{SOAI}$</tex-math></inline-formula>. Comprehensive security analysis shows that the <inline-formula><tex-math>$\\text{SOAI}$</tex-math></inline-formula> scheme achieves confidentiality under a simulation-based real/ideal world model. Moreover, we compare the <inline-formula><tex-math>$\\text{SOAI}$</tex-math></inline-formula> scheme with two baseline schemes in terms of communication overheads and computational costs, and evaluation results show that our scheme outperforms the compared schemes, and our scheme is feasible in the OneWeb constellation near the polar regions.","PeriodicalId":13301,"journal":{"name":"IEEE Transactions on Industrial Informatics","volume":"21 4","pages":"3147-3156"},"PeriodicalIF":9.9000,"publicationDate":"2025-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Industrial Informatics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10836847/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Low Earth orbit satellite constellations with seamless network coverage and onboard computers enable autonomous on-orbit anomaly identification of remote wind turbines. However, they face several challenges. First, limited visible periods caused by orbital characteristics mandate that one satellite holds anomalies and the other collects surveillance data. Second, passively injected satellites could intercept and grasp onboard message flows. Third, a restricted onboard energy supply budget restrains intersatellite communications and onboard computations. With the above challenges, we propose a secure on-orbit anomaly identification (SOAI) scheme between a pair of satellites through an $\text{XOR}$ filter, which further exploits laconic private set intersection to eliminate false positives. The secure on-orbit anomaly querying scheme achieves the verifiable querying of anomalies derived from $\text{SOAI}$. Comprehensive security analysis shows that the $\text{SOAI}$ scheme achieves confidentiality under a simulation-based real/ideal world model. Moreover, we compare the $\text{SOAI}$ scheme with two baseline schemes in terms of communication overheads and computational costs, and evaluation results show that our scheme outperforms the compared schemes, and our scheme is feasible in the OneWeb constellation near the polar regions.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
风电机组在轨异常安全识别与查询的实现
具有无缝网络覆盖和机载计算机的低地球轨道卫星星座能够自动识别远程风力涡轮机的在轨异常。然而,他们面临着一些挑战。首先,轨道特性造成的可见周期有限,要求一颗卫星保持异常,另一颗卫星收集监视数据。其次,被动注入卫星可以拦截和掌握机载信息流。第三,有限的星上能源供应预算限制了星间通信和星上计算。针对上述挑战,我们提出了一种基于$\text{XOR}$滤波器的安全在轨异常识别(SOAI)方案,该方案进一步利用简洁的私有集交集来消除误报。安全在轨异常查询方案实现了对$\text{SOAI}$派生的异常的可验证查询。综合安全性分析表明,$\text{SOAI}$方案在基于仿真的真实/理想世界模型下实现了保密性。此外,我们将$\text{SOAI}$方案与两种基准方案在通信开销和计算成本方面进行了比较,评估结果表明我们的方案优于比较方案,并且我们的方案在靠近极地区域的OneWeb星座中是可行的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Industrial Informatics
IEEE Transactions on Industrial Informatics 工程技术-工程:工业
CiteScore
24.10
自引率
8.90%
发文量
1202
审稿时长
5.1 months
期刊介绍: The IEEE Transactions on Industrial Informatics is a multidisciplinary journal dedicated to publishing technical papers that connect theory with practical applications of informatics in industrial settings. It focuses on the utilization of information in intelligent, distributed, and agile industrial automation and control systems. The scope includes topics such as knowledge-based and AI-enhanced automation, intelligent computer control systems, flexible and collaborative manufacturing, industrial informatics in software-defined vehicles and robotics, computer vision, industrial cyber-physical and industrial IoT systems, real-time and networked embedded systems, security in industrial processes, industrial communications, systems interoperability, and human-machine interaction.
期刊最新文献
Adaptive Dynamic Programming With Unscented Kalman Filtering for Nonlinear Hysteresis Compensation in Magnetic Shielding Systems A Lightweight Transformer-KAN Framework for Fault Diagnosis in Power Conversion Circuits Multiobjective Optimization for Uncertain Integrated Energy Systems: Aggregating EVs in Demand Response via Photovoltaic-Energy Storage Knowledge-Enhanced Industrial Fault Detection via FMEA Graph Learning and Cross-Modal Feature Alignment Distributed Prescribed-Time Unknown Input Observer for LTI Systems With Event-Triggered Communication
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1