Pub Date : 2009-09-18DOI: 10.1109/ISRCS.2009.5251340
K. Villez, V. Venkatasubramanian, S. Narasimhan
In this contribution, we present initial developments in view of model-based fault-tolerant control (FTC). In this context, we use an original method based on the Kalman-filter by which fault detection, diagnosis and accommodation is possible provided that an accurate model is available. Since this is not generally true, we attempt to alleviate this necessity by means of accounting for uncertainty, in both model as well as in the measurements used for fault diagnosis. Our preliminary results are focused on the diagnosis step in the FTC scheme.
{"title":"Bayesian inference for fault-tolerant control","authors":"K. Villez, V. Venkatasubramanian, S. Narasimhan","doi":"10.1109/ISRCS.2009.5251340","DOIUrl":"https://doi.org/10.1109/ISRCS.2009.5251340","url":null,"abstract":"In this contribution, we present initial developments in view of model-based fault-tolerant control (FTC). In this context, we use an original method based on the Kalman-filter by which fault detection, diagnosis and accommodation is possible provided that an accurate model is available. Since this is not generally true, we attempt to alleviate this necessity by means of accounting for uncertainty, in both model as well as in the measurements used for fault diagnosis. Our preliminary results are focused on the diagnosis step in the FTC scheme.","PeriodicalId":158186,"journal":{"name":"2009 2nd International Symposium on Resilient Control Systems","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116024031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-18DOI: 10.1109/ISRCS.2009.5251374
Johanna Oxstarnd, R. Boring
This paper presents work in progress on a project to develop a process for integrating human reliability analysis (HRA) into the design process used in nuclear power plant modernization and upgrade projects. Human factors, probabilistic risk, and human-system interface design experts were interviewed, resulting in six principles for the use of HRA in design. These principles are: (i) early implementation, (ii) tailored methods, (iii) scalable methods, (iv) better use of qualitative information, (v) HRA design criteria, and (vi) better HRA sensitivity to human-machine interface issues. Future efforts will center on adapting HRA techniques to meet these principles and implementing HRA as part of a plant upgrade process.
{"title":"Human reliability for design applications at a Swedish nuclear power plant","authors":"Johanna Oxstarnd, R. Boring","doi":"10.1109/ISRCS.2009.5251374","DOIUrl":"https://doi.org/10.1109/ISRCS.2009.5251374","url":null,"abstract":"This paper presents work in progress on a project to develop a process for integrating human reliability analysis (HRA) into the design process used in nuclear power plant modernization and upgrade projects. Human factors, probabilistic risk, and human-system interface design experts were interviewed, resulting in six principles for the use of HRA in design. These principles are: (i) early implementation, (ii) tailored methods, (iii) scalable methods, (iv) better use of qualitative information, (v) HRA design criteria, and (vi) better HRA sensitivity to human-machine interface issues. Future efforts will center on adapting HRA techniques to meet these principles and implementing HRA as part of a plant upgrade process.","PeriodicalId":158186,"journal":{"name":"2009 2nd International Symposium on Resilient Control Systems","volume":"083 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129018192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-18DOI: 10.1109/ISRCS.2009.5251365
Jason L. Wright, M. Manic
Time synchronization and event time correlation are important in wireless sensor networks. In particular, time is used to create a sequence events or time line to answer questions of cause and effect. Time is also used as a basis for determining the freshness of received packets and the validity of cryptographic certificates. This paper presents secure method of time synchro-nization and event time correlation for TESLA-based hierarchical wireless sensor networks. The method demonstrates that events in a TESLA network can be accurately timestamped by adding only a few pieces of data to the existing protocol.
{"title":"Time synchronization in hierarchical TESLA wireless sensor networks","authors":"Jason L. Wright, M. Manic","doi":"10.1109/ISRCS.2009.5251365","DOIUrl":"https://doi.org/10.1109/ISRCS.2009.5251365","url":null,"abstract":"Time synchronization and event time correlation are important in wireless sensor networks. In particular, time is used to create a sequence events or time line to answer questions of cause and effect. Time is also used as a basis for determining the freshness of received packets and the validity of cryptographic certificates. This paper presents secure method of time synchro-nization and event time correlation for TESLA-based hierarchical wireless sensor networks. The method demonstrates that events in a TESLA network can be accurately timestamped by adding only a few pieces of data to the existing protocol.","PeriodicalId":158186,"journal":{"name":"2009 2nd International Symposium on Resilient Control Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134581213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-18DOI: 10.1109/ISRCS.2009.5252518
H. Kang, H. Kang
In this paper, we consider robust stability of interval polynomials of which stability region is the special left sector. The argument of the boundary of the special left sector is expressible as an irrational number multiplied by the circle ratio. We show that a family of interval polynomials is robustly stable if and only if a small set of vertex polynomials are robustly stable. This new result comes from the construction algorithm of the value set and the zero exclusion principle.
{"title":"Extreme point result for robust stability of interval polynomials to the special left sector","authors":"H. Kang, H. Kang","doi":"10.1109/ISRCS.2009.5252518","DOIUrl":"https://doi.org/10.1109/ISRCS.2009.5252518","url":null,"abstract":"In this paper, we consider robust stability of interval polynomials of which stability region is the special left sector. The argument of the boundary of the special left sector is expressible as an irrational number multiplied by the circle ratio. We show that a family of interval polynomials is robustly stable if and only if a small set of vertex polynomials are robustly stable. This new result comes from the construction algorithm of the value set and the zero exclusion principle.","PeriodicalId":158186,"journal":{"name":"2009 2nd International Symposium on Resilient Control Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122743002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-18DOI: 10.1109/ISRCS.2009.5251361
A. Giani, S. Sastry, K. Johansson, H. Sandberg
This paper presents the work on resilient and secure power transmission and distribution developed within the VIKING (Vital Infrastructure, networKs, INformation and control system ManaGement) project. VIKING receives funding from the European Community's Seventh Framework Program. We will present the consortium, the motivation behind this research, the main objective of the project together with the current status.
{"title":"The VIKING project: An initiative on resilient control of power networks","authors":"A. Giani, S. Sastry, K. Johansson, H. Sandberg","doi":"10.1109/ISRCS.2009.5251361","DOIUrl":"https://doi.org/10.1109/ISRCS.2009.5251361","url":null,"abstract":"This paper presents the work on resilient and secure power transmission and distribution developed within the VIKING (Vital Infrastructure, networKs, INformation and control system ManaGement) project. VIKING receives funding from the European Community's Seventh Framework Program. We will present the consortium, the motivation behind this research, the main objective of the project together with the current status.","PeriodicalId":158186,"journal":{"name":"2009 2nd International Symposium on Resilient Control Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124908480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-18DOI: 10.1109/ISRCS.2009.5251378
Abhishek Rakshit, Xinming Ou
Computerized control systems perform vital functions across many critical infrastructures throughout the nation. These systems can be vulnerable to a variety of attacks leading to devastating consequences like loss of production, interruption in distribution of public utilities and most importantly endangering public safety. This calls for an approach to halt attacks in their tracks before being able to do any harm to these systems. Vulnerability assessment performed on these systems can identify and assess potential vulnerabilities in a control system network, before they are exploited by malicious intruders. An effective vulnerability assessment architecture should assimilate security knowledge from multiple sources to uncover all the vulnerabilities present on a host. Legitimate concerns arise since host-based security scanners typically need to run at administrative privileges, and takes input from external knowledge sources for the analysis making it imperative that the scanner be trustworthy. Intentionally or otherwise, ill-formed input may compromise the scanner and the whole system if the scanner is susceptible to, or carries one or more vulnerability itself. We have implemented the scanning architecture in the context of an enterprise-level security analyzer.The analyzer finds security vulnerabilities present on a host according to the third-party security knowledge specified in Open Vulnerability Assessment Language(OVAL). This paper presents an architecture where a host-based security scanner's code base can be minimized to an extent where its correctness can be verified by adequate vetting. Moreover, the architecture also allows for leveraging third-party security knowledge efficiently and supports various higher-level security analysis.
{"title":"A host-based security assessment architecture for Industrial Control systems","authors":"Abhishek Rakshit, Xinming Ou","doi":"10.1109/ISRCS.2009.5251378","DOIUrl":"https://doi.org/10.1109/ISRCS.2009.5251378","url":null,"abstract":"Computerized control systems perform vital functions across many critical infrastructures throughout the nation. These systems can be vulnerable to a variety of attacks leading to devastating consequences like loss of production, interruption in distribution of public utilities and most importantly endangering public safety. This calls for an approach to halt attacks in their tracks before being able to do any harm to these systems. Vulnerability assessment performed on these systems can identify and assess potential vulnerabilities in a control system network, before they are exploited by malicious intruders. An effective vulnerability assessment architecture should assimilate security knowledge from multiple sources to uncover all the vulnerabilities present on a host. Legitimate concerns arise since host-based security scanners typically need to run at administrative privileges, and takes input from external knowledge sources for the analysis making it imperative that the scanner be trustworthy. Intentionally or otherwise, ill-formed input may compromise the scanner and the whole system if the scanner is susceptible to, or carries one or more vulnerability itself. We have implemented the scanning architecture in the context of an enterprise-level security analyzer.The analyzer finds security vulnerabilities present on a host according to the third-party security knowledge specified in Open Vulnerability Assessment Language(OVAL). This paper presents an architecture where a host-based security scanner's code base can be minimized to an extent where its correctness can be verified by adequate vetting. Moreover, the architecture also allows for leveraging third-party security knowledge efficiently and supports various higher-level security analysis.","PeriodicalId":158186,"journal":{"name":"2009 2nd International Symposium on Resilient Control Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117327815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-18DOI: 10.1109/ISRCS.2009.5251353
M. Co, Clark L. Coleman, J. Davidson, S. Ghosh, Jason Hiser, J. Knight, A. Nguyen-Tuong
Designing and building software that is free of defects that can be exploited by malicious adversaries is a difficult task. Despite extensive efforts via the application of formal methods, use of automated software engineering tools, and performing extensive pre-deployment testing, exploitable errors still appear in software. The problem of cyber resilience is further compounded by the growing sophistication of adversaries who can marshal substantial resources to compromise systems. This paper describes a novel, promising approach to improving the resilience of software. The approach is to impose a process-level software control system that continuously monitors an application for signs of attack or failure and responds accordingly. The system uses software dynamic translation to seamlessly insert arbitrary sensors and actuators into an executing binary. The control system employs the sensors to detect attacks and the actuators to effect an appropriate response. Using this approach, several novel monitoring and response systems have been developed. The paper describes our light-weight process-level software control system, our experience using it to increase the resilience of systems, and discusses future research directions for extending and enhancing this powerful approach to achieving cyber awareness and resilience.
{"title":"A lightweight software control system for cyber awareness and security","authors":"M. Co, Clark L. Coleman, J. Davidson, S. Ghosh, Jason Hiser, J. Knight, A. Nguyen-Tuong","doi":"10.1109/ISRCS.2009.5251353","DOIUrl":"https://doi.org/10.1109/ISRCS.2009.5251353","url":null,"abstract":"Designing and building software that is free of defects that can be exploited by malicious adversaries is a difficult task. Despite extensive efforts via the application of formal methods, use of automated software engineering tools, and performing extensive pre-deployment testing, exploitable errors still appear in software. The problem of cyber resilience is further compounded by the growing sophistication of adversaries who can marshal substantial resources to compromise systems. This paper describes a novel, promising approach to improving the resilience of software. The approach is to impose a process-level software control system that continuously monitors an application for signs of attack or failure and responds accordingly. The system uses software dynamic translation to seamlessly insert arbitrary sensors and actuators into an executing binary. The control system employs the sensors to detect attacks and the actuators to effect an appropriate response. Using this approach, several novel monitoring and response systems have been developed. The paper describes our light-weight process-level software control system, our experience using it to increase the resilience of systems, and discusses future research directions for extending and enhancing this powerful approach to achieving cyber awareness and resilience.","PeriodicalId":158186,"journal":{"name":"2009 2nd International Symposium on Resilient Control Systems","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130140858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-18DOI: 10.1109/ISRCS.2009.5251370
N. Kottenstette, G. Karsai, J. Sztipanovits
Resilient control systems play a special role in the area of cyber-physical systems, where the design must address the question how complex dynamic plants are to be controlled safely and reliably when a control system is under a cyber attack. In this paper we describe a control theoretical framework based on the concept of passivity for designing a control network which can tolerate, for instance, denial-of-service attacks on networks used in the closed loop. In particular, we demonstrate how the resilient power junction structure could be applied, and provide simulated results.
{"title":"A passivity-based framework for resilient cyber physical systems","authors":"N. Kottenstette, G. Karsai, J. Sztipanovits","doi":"10.1109/ISRCS.2009.5251370","DOIUrl":"https://doi.org/10.1109/ISRCS.2009.5251370","url":null,"abstract":"Resilient control systems play a special role in the area of cyber-physical systems, where the design must address the question how complex dynamic plants are to be controlled safely and reliably when a control system is under a cyber attack. In this paper we describe a control theoretical framework based on the concept of passivity for designing a control network which can tolerate, for instance, denial-of-service attacks on networks used in the closed loop. In particular, we demonstrate how the resilient power junction structure could be applied, and provide simulated results.","PeriodicalId":158186,"journal":{"name":"2009 2nd International Symposium on Resilient Control Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126070837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-18DOI: 10.1109/ISRCS.2009.5251344
O. Linda, E. William, Matthew Huff, M. Manic, Vishu Gupta, J. Nance, H. Hess, F. Rufus, Ash Thakker, Justin Govar
The State Of Charge Indicator (SOCI) for the Lithium Poly Carbon Monoflouride (Li/CFx) battery has a wide range of applications. However, the dynamic environmental conditions, such as the ambient temperature, can alter the characteristic response of the battery and introduce non-linear behavior. This paper discusses the in-lab development of an Artificial Neural Network (ANN) based SOCI for the Li/CFx battery. The ANN is trained on the recorded data - voltage, current and ambient temperature, to produce a non-linear model and to accurately predict the State Of Charge (SOC) of the battery. The SOC prediction is based on the recent behavior of the battery. Preliminary experimental results using recorded datasets from the Battery Design Studio are presented for the Lithium Ion battery. The working model for the Li/CFx is currently under development. The reported results demonstrated good performance of the developed SOCI, with less than 2% average relative error on data at previously observed ambient temperatures.
{"title":"Intelligent neural network implementation for SOCI development of Li/CFx batteries","authors":"O. Linda, E. William, Matthew Huff, M. Manic, Vishu Gupta, J. Nance, H. Hess, F. Rufus, Ash Thakker, Justin Govar","doi":"10.1109/ISRCS.2009.5251344","DOIUrl":"https://doi.org/10.1109/ISRCS.2009.5251344","url":null,"abstract":"The State Of Charge Indicator (SOCI) for the Lithium Poly Carbon Monoflouride (Li/CFx) battery has a wide range of applications. However, the dynamic environmental conditions, such as the ambient temperature, can alter the characteristic response of the battery and introduce non-linear behavior. This paper discusses the in-lab development of an Artificial Neural Network (ANN) based SOCI for the Li/CFx battery. The ANN is trained on the recorded data - voltage, current and ambient temperature, to produce a non-linear model and to accurately predict the State Of Charge (SOC) of the battery. The SOC prediction is based on the recent behavior of the battery. Preliminary experimental results using recorded datasets from the Battery Design Studio are presented for the Lithium Ion battery. The working model for the Li/CFx is currently under development. The reported results demonstrated good performance of the developed SOCI, with less than 2% average relative error on data at previously observed ambient temperatures.","PeriodicalId":158186,"journal":{"name":"2009 2nd International Symposium on Resilient Control Systems","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124932072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-18DOI: 10.1109/ISRCS.2009.5251357
T. Vollmer, M. Manic
An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Ethernet network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.
{"title":"Computationally efficient Neural Network Intrusion Security Awareness","authors":"T. Vollmer, M. Manic","doi":"10.1109/ISRCS.2009.5251357","DOIUrl":"https://doi.org/10.1109/ISRCS.2009.5251357","url":null,"abstract":"An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Ethernet network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.","PeriodicalId":158186,"journal":{"name":"2009 2nd International Symposium on Resilient Control Systems","volume":"22 S1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132870045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}