Pub Date : 2023-04-17DOI: 10.1109/SysCon53073.2023.10131063
Jay Gohil, R. Kashef
The past decade has experienced an exponential rise in online purchases along with using credit cards and associated financial tools. This widespread e-commerce use has resulted in an unprecedented surge in frauds that range from financial frauds to fake online-shop frauds. Consequently. The detection and safeguarding of users from such frauds have been a vital goal to achieve for many organizations and enterprises, most of which aim to achieve the same through the application of machine learning to build classifier models that detect and classify data (transactions, online shops, and other e-commerce data) into fraudulent and legit classes. This survey paper aims to understand the advancements made in the last decade in the field to understand the progress made along with the gaps associated with the current research work. Moreover, the hurdles or challenges pertaining to widespread implementation are also discussed with potential solutions and prospects comprehensively; while providing insights on the most feasible ML algorithm(s) based on the survey, followed by future directions of research work to make it equipped for real-world implementation.
{"title":"Counterfeit Detection in the e-Commerce Industry Using Machine Learning: A Review","authors":"Jay Gohil, R. Kashef","doi":"10.1109/SysCon53073.2023.10131063","DOIUrl":"https://doi.org/10.1109/SysCon53073.2023.10131063","url":null,"abstract":"The past decade has experienced an exponential rise in online purchases along with using credit cards and associated financial tools. This widespread e-commerce use has resulted in an unprecedented surge in frauds that range from financial frauds to fake online-shop frauds. Consequently. The detection and safeguarding of users from such frauds have been a vital goal to achieve for many organizations and enterprises, most of which aim to achieve the same through the application of machine learning to build classifier models that detect and classify data (transactions, online shops, and other e-commerce data) into fraudulent and legit classes. This survey paper aims to understand the advancements made in the last decade in the field to understand the progress made along with the gaps associated with the current research work. Moreover, the hurdles or challenges pertaining to widespread implementation are also discussed with potential solutions and prospects comprehensively; while providing insights on the most feasible ML algorithm(s) based on the survey, followed by future directions of research work to make it equipped for real-world implementation.","PeriodicalId":169296,"journal":{"name":"2023 IEEE International Systems Conference (SysCon)","volume":"34 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120994619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-17DOI: 10.1109/SysCon53073.2023.10131056
A. Alghamdi, Mohammadreza Torkjazi, Arturo J. Davila-Andino, A. K. Zaidi
We propose a step-by-step Model-Based Systems Engineering (MBSE) process for the creation and simulation of an executable Unified Architecture Framework (UAF) model for evaluation purposes. The roll-up of Technical Performance Measures (TPMs) to Measures of Effectiveness (MOEs) is necessary for such a process, and has not been documented for the UAF. This paper is the first attempt to address this gap by demonstrating how interdependencies between these technical measures can be traced across the domains of a UAF architecture according to the ISO/IEC/IEEE 15288:2015 standard, the guidelines from the INCOSE Systems Engineering Handbook, and the UAF Enterprise Architecture Guide. The proposed process employs traceability and parametric diagrams within the UAF to produce an executable model that aids in evaluating the effectiveness of a system’s architecture. Additionally, we describe how to build a simulation within the UAF to assess a parametric diagram containing random values of TPMs. The process identifies UAF views, their constituent model elements, and the relationships that are required to build this model. We also present an illustrative example of a forest firefighting system to demonstrate the implementation and effectiveness of the proposed process. This paper is intended as a resource for systems engineering practitioners.
{"title":"Employing UAF Inter-Domain Traceability for Performance and Effectiveness Evaluation","authors":"A. Alghamdi, Mohammadreza Torkjazi, Arturo J. Davila-Andino, A. K. Zaidi","doi":"10.1109/SysCon53073.2023.10131056","DOIUrl":"https://doi.org/10.1109/SysCon53073.2023.10131056","url":null,"abstract":"We propose a step-by-step Model-Based Systems Engineering (MBSE) process for the creation and simulation of an executable Unified Architecture Framework (UAF) model for evaluation purposes. The roll-up of Technical Performance Measures (TPMs) to Measures of Effectiveness (MOEs) is necessary for such a process, and has not been documented for the UAF. This paper is the first attempt to address this gap by demonstrating how interdependencies between these technical measures can be traced across the domains of a UAF architecture according to the ISO/IEC/IEEE 15288:2015 standard, the guidelines from the INCOSE Systems Engineering Handbook, and the UAF Enterprise Architecture Guide. The proposed process employs traceability and parametric diagrams within the UAF to produce an executable model that aids in evaluating the effectiveness of a system’s architecture. Additionally, we describe how to build a simulation within the UAF to assess a parametric diagram containing random values of TPMs. The process identifies UAF views, their constituent model elements, and the relationships that are required to build this model. We also present an illustrative example of a forest firefighting system to demonstrate the implementation and effectiveness of the proposed process. This paper is intended as a resource for systems engineering practitioners.","PeriodicalId":169296,"journal":{"name":"2023 IEEE International Systems Conference (SysCon)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127134725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-17DOI: 10.1109/SysCon53073.2023.10131101
N. Mohamed, J. Al-Jaroodi, I. Jawhar, Nader Kesserwan
The introduction of the digital twin technology created enormous potential for several industrial sectors to improve their operations. Accordingly, they can enhance their productivity, cost-effectiveness, reliability, quality, and flexibility. One important sector that can successfully benefit from this advanced technology is healthcare systems. This paper investigates how healthcare systems engineering can benefit from utilizing digital twins. Healthcare systems engineering applies the systems view of engineering analysis and design principles to enhance healthcare services. Digital twins can enable many advantages to improve the processes and outcomes of healthcare systems. This paper discusses how digital twins can be utilized for healthcare systems engineering. It also discusses the impact of this utilization on achieving the goals of healthcare systems engineering.
{"title":"How Healthcare Systems Engineering can Benefit from Digital Twins?","authors":"N. Mohamed, J. Al-Jaroodi, I. Jawhar, Nader Kesserwan","doi":"10.1109/SysCon53073.2023.10131101","DOIUrl":"https://doi.org/10.1109/SysCon53073.2023.10131101","url":null,"abstract":"The introduction of the digital twin technology created enormous potential for several industrial sectors to improve their operations. Accordingly, they can enhance their productivity, cost-effectiveness, reliability, quality, and flexibility. One important sector that can successfully benefit from this advanced technology is healthcare systems. This paper investigates how healthcare systems engineering can benefit from utilizing digital twins. Healthcare systems engineering applies the systems view of engineering analysis and design principles to enhance healthcare services. Digital twins can enable many advantages to improve the processes and outcomes of healthcare systems. This paper discusses how digital twins can be utilized for healthcare systems engineering. It also discusses the impact of this utilization on achieving the goals of healthcare systems engineering.","PeriodicalId":169296,"journal":{"name":"2023 IEEE International Systems Conference (SysCon)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127374762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-17DOI: 10.1109/SysCon53073.2023.10131225
Zamira Daw, Scott F. Beecher
Fast development and adoption of new technologies has outpaced the development of new aerospace certification standards. Overarching Properties (OPs) have emerged as a promising flexible framework for proposing alternative Means of Compliance. The hope is that the FAA may eventually establish an Advisory Circular that offers the OPs for safety critical approvals by showing the product possesses the three OPs: In-tent (specification of the intended behavior), Correctness (implementation of the intended behavior), and Innocuity (safety of unintended behavior). However, there is a lack of industrial case studies that evaluate its applicability and scalability. This paper provides an experience report of using OPs for jointly seeking software and system certification approval for an industrial Auxiliary Power Unit (APU) Control System. This project results in a certification argument that allows to use of an efficient model-based system engineering (MBSE) approach for developing airworthy system. The proposed MBSE approach is currently not supported by certification standards. We combine textual and graphical notation for specifying the argument to facilitate its assessment by the evaluation team. This paper highlights important aspects for the creation and evaluation for these arguments. These aspects show that the greater the scope of the certification and more novel the technology, the more detailed the argument must be. Keywords— Overarching Properties, Certification, Arguments, Assurance Cases.
{"title":"Assuring safety in a flexible aerospace certification — Lessons learned on applying OPs at the system level—","authors":"Zamira Daw, Scott F. Beecher","doi":"10.1109/SysCon53073.2023.10131225","DOIUrl":"https://doi.org/10.1109/SysCon53073.2023.10131225","url":null,"abstract":"Fast development and adoption of new technologies has outpaced the development of new aerospace certification standards. Overarching Properties (OPs) have emerged as a promising flexible framework for proposing alternative Means of Compliance. The hope is that the FAA may eventually establish an Advisory Circular that offers the OPs for safety critical approvals by showing the product possesses the three OPs: In-tent (specification of the intended behavior), Correctness (implementation of the intended behavior), and Innocuity (safety of unintended behavior). However, there is a lack of industrial case studies that evaluate its applicability and scalability. This paper provides an experience report of using OPs for jointly seeking software and system certification approval for an industrial Auxiliary Power Unit (APU) Control System. This project results in a certification argument that allows to use of an efficient model-based system engineering (MBSE) approach for developing airworthy system. The proposed MBSE approach is currently not supported by certification standards. We combine textual and graphical notation for specifying the argument to facilitate its assessment by the evaluation team. This paper highlights important aspects for the creation and evaluation for these arguments. These aspects show that the greater the scope of the certification and more novel the technology, the more detailed the argument must be. Keywords— Overarching Properties, Certification, Arguments, Assurance Cases.","PeriodicalId":169296,"journal":{"name":"2023 IEEE International Systems Conference (SysCon)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122753213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-17DOI: 10.1109/SysCon53073.2023.10131104
J. Perrin, Stanislav Gankov, Walter Downing, S. Rengarajan, Scott Hotz, Piyush S Bhagdikar, Joshua Alden
Eco-driving algorithms enabled by Vehicle to Everything (V2X) communications in Connected and Automated Vehicles (CAVs) can reduce energy consumption by generating energy-efficient speed trajectories. One of the key challenges from an implementation perspective is to be able to execute the desired speed or acceleration commands closely. A SAE Level 4 CAV is being developed in conjunction with eco-driving to help address this issue. A custom drive-by-wire (DBW) system was built for a Honda Clarity plug-in hybrid electric vehicle (PHEV) to enable precise actuation of accelerator, brake, and steering. Transient vehicle data collected over a variety of drive cycles was synthesized to model pedal characteristics as a function of speed and target acceleration. The developed transfer functions enabled feed-forward control of the accelerator and brake pedals with a closed-loop controller handling the rest. Low speed steering maneuvers were performed to characterize the required steering torque to maintain a steady-state steering angle at different vehicle speeds. Advanced vehicle simulation software was used to understand vehicle dynamics and wheel angle response at different speeds. The development of a model based DBW system along with implementation details and results are presented.
{"title":"Development of a Model-Based Drive-By-Wire System for Level 4 Automated Vehicles","authors":"J. Perrin, Stanislav Gankov, Walter Downing, S. Rengarajan, Scott Hotz, Piyush S Bhagdikar, Joshua Alden","doi":"10.1109/SysCon53073.2023.10131104","DOIUrl":"https://doi.org/10.1109/SysCon53073.2023.10131104","url":null,"abstract":"Eco-driving algorithms enabled by Vehicle to Everything (V2X) communications in Connected and Automated Vehicles (CAVs) can reduce energy consumption by generating energy-efficient speed trajectories. One of the key challenges from an implementation perspective is to be able to execute the desired speed or acceleration commands closely. A SAE Level 4 CAV is being developed in conjunction with eco-driving to help address this issue. A custom drive-by-wire (DBW) system was built for a Honda Clarity plug-in hybrid electric vehicle (PHEV) to enable precise actuation of accelerator, brake, and steering. Transient vehicle data collected over a variety of drive cycles was synthesized to model pedal characteristics as a function of speed and target acceleration. The developed transfer functions enabled feed-forward control of the accelerator and brake pedals with a closed-loop controller handling the rest. Low speed steering maneuvers were performed to characterize the required steering torque to maintain a steady-state steering angle at different vehicle speeds. Advanced vehicle simulation software was used to understand vehicle dynamics and wheel angle response at different speeds. The development of a model based DBW system along with implementation details and results are presented.","PeriodicalId":169296,"journal":{"name":"2023 IEEE International Systems Conference (SysCon)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117011876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-17DOI: 10.1109/SysCon53073.2023.10131095
J. Caddell, Roshi Rose Nilchiani
Organizations spend a considerable amount of time designing their organizational structure. These structures generally reflect the priorities and functions of the organization and deserve attention. However, research has reinforced the power of informal networks to affect performance and communication. The ability of a person to leverage their weak ties to build a coalition, find a key piece of information, or signal a warning has appreciable impacts on an organization’s ability to perform. This paper explores an informal structure and offers methods to re-enforce its resilience. In this unique network, the nodes represent people and their edges represent the overlap of tenure throughout their career. We define the resilience of this organization by exploring its error tolerance and offer a procedure that leverages the ClusterRank centrality for improving resilience through targeted internal assignments and the strengthening of informal ties. Interventions demonstrate promising results with appreciable shifts in the critical threshold with minimal adjustments. By utilizing these tools, organizations can better understand and address possible deficiencies in their informal structure’s resilience and remain better postured to respond to perturbations.
{"title":"Quantifying and Improving Resilience in the Informal Social Networks of Organizations","authors":"J. Caddell, Roshi Rose Nilchiani","doi":"10.1109/SysCon53073.2023.10131095","DOIUrl":"https://doi.org/10.1109/SysCon53073.2023.10131095","url":null,"abstract":"Organizations spend a considerable amount of time designing their organizational structure. These structures generally reflect the priorities and functions of the organization and deserve attention. However, research has reinforced the power of informal networks to affect performance and communication. The ability of a person to leverage their weak ties to build a coalition, find a key piece of information, or signal a warning has appreciable impacts on an organization’s ability to perform. This paper explores an informal structure and offers methods to re-enforce its resilience. In this unique network, the nodes represent people and their edges represent the overlap of tenure throughout their career. We define the resilience of this organization by exploring its error tolerance and offer a procedure that leverages the ClusterRank centrality for improving resilience through targeted internal assignments and the strengthening of informal ties. Interventions demonstrate promising results with appreciable shifts in the critical threshold with minimal adjustments. By utilizing these tools, organizations can better understand and address possible deficiencies in their informal structure’s resilience and remain better postured to respond to perturbations.","PeriodicalId":169296,"journal":{"name":"2023 IEEE International Systems Conference (SysCon)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130546409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-17DOI: 10.1109/SysCon53073.2023.10131111
Raymond K. Jonkers
In large complex defense projects, a significant portion of technology and product costs are committed prior to detailed design when little is known about the product. The lack of information, knowledge and design flexibility early in the design can postpone design change decisions when it becomes more expensive and difficult to implement these changes. With adjustment to just a few key process levers, knowledge can be gained early in design and system ease-of- change increased, leading to a robust design, reduced design change costs and reduced schedule delays. The characteristics of the knowledge and ease-of-change management curves, and their levers of influence, can be described using system dynamics and statistical techniques. This paper presents an approach to optimizing these levers of influence from a cost-benefit perspective. Statistical techniques such as Monte Carlo analysis are used to predict variability in system performance attributes. Validation of this approach can be achieved through comparing the predicted effect of levers against actual performance of the management curves. The performance of the knowledge curve may be assessed using a standard knowledge management maturity assessment tool; the performance of the ease- of-change curve may be assessed through monitoring the variability of system performance attributes over the lifecycle.
{"title":"Optimization of Key Levers of Influence In Knowledge and Ease-of-Change Management and Addressing Variability in Design","authors":"Raymond K. Jonkers","doi":"10.1109/SysCon53073.2023.10131111","DOIUrl":"https://doi.org/10.1109/SysCon53073.2023.10131111","url":null,"abstract":"In large complex defense projects, a significant portion of technology and product costs are committed prior to detailed design when little is known about the product. The lack of information, knowledge and design flexibility early in the design can postpone design change decisions when it becomes more expensive and difficult to implement these changes. With adjustment to just a few key process levers, knowledge can be gained early in design and system ease-of- change increased, leading to a robust design, reduced design change costs and reduced schedule delays. The characteristics of the knowledge and ease-of-change management curves, and their levers of influence, can be described using system dynamics and statistical techniques. This paper presents an approach to optimizing these levers of influence from a cost-benefit perspective. Statistical techniques such as Monte Carlo analysis are used to predict variability in system performance attributes. Validation of this approach can be achieved through comparing the predicted effect of levers against actual performance of the management curves. The performance of the knowledge curve may be assessed using a standard knowledge management maturity assessment tool; the performance of the ease- of-change curve may be assessed through monitoring the variability of system performance attributes over the lifecycle.","PeriodicalId":169296,"journal":{"name":"2023 IEEE International Systems Conference (SysCon)","volume":"474 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123972219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-17DOI: 10.1109/SysCon53073.2023.10131142
I. J. Tapia-Tamayo, P. Grogan
Distributed Spacecraft Mission simulations are long-running simulations for mission tradespace exploration. The simulation running time increases as the number of satellites, simulation duration, and target points increases. Future Earth Observing DSM simulations utilize GEOS-5 Nature Run data. The GEOS-5 database provides weather simulation data for two years with a 30-minute timestep and storms are represented as target points. Simulating DSMs with the GEOS-5 database leads to the need for an efficient coverage method that reduces simulation run time because the GEOS-5 database provides thousands of target points to observe by a mission. We develop a new and efficient coverage methodology that performs faster than the current minimum elevation angle coverage method. The new approach uses two projection methods to create a coverage area on a 2D map. The two projections methods (circular and line) rely on collecting ground track position over a time interval and projecting sensor swath over each ground track position. The results show that the methodology provides a configuration with a speedup factor of approximately 950 and relatively high accuracy for a one-hour simulation with about 1700 target points distributed globally. This study presents a trade-off analysis for these two coverage methods to minimize simulation run time while maximizing accuracy.
{"title":"Efficient Coverage Methods for Earth Observing Tradespace Analysis","authors":"I. J. Tapia-Tamayo, P. Grogan","doi":"10.1109/SysCon53073.2023.10131142","DOIUrl":"https://doi.org/10.1109/SysCon53073.2023.10131142","url":null,"abstract":"Distributed Spacecraft Mission simulations are long-running simulations for mission tradespace exploration. The simulation running time increases as the number of satellites, simulation duration, and target points increases. Future Earth Observing DSM simulations utilize GEOS-5 Nature Run data. The GEOS-5 database provides weather simulation data for two years with a 30-minute timestep and storms are represented as target points. Simulating DSMs with the GEOS-5 database leads to the need for an efficient coverage method that reduces simulation run time because the GEOS-5 database provides thousands of target points to observe by a mission. We develop a new and efficient coverage methodology that performs faster than the current minimum elevation angle coverage method. The new approach uses two projection methods to create a coverage area on a 2D map. The two projections methods (circular and line) rely on collecting ground track position over a time interval and projecting sensor swath over each ground track position. The results show that the methodology provides a configuration with a speedup factor of approximately 950 and relatively high accuracy for a one-hour simulation with about 1700 target points distributed globally. This study presents a trade-off analysis for these two coverage methods to minimize simulation run time while maximizing accuracy.","PeriodicalId":169296,"journal":{"name":"2023 IEEE International Systems Conference (SysCon)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124108427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-17DOI: 10.1109/SysCon53073.2023.10131059
Jonathan Plangger, Hariram Ravichandran, Sarat Chandran Rodin, M. Atia
Indoor localization and tracking poses a uniquely challenging aspect for asset tracking. Unreliability of traditional positioning systems, such as GNSS, in indoor applications calls for specialized systems to attain similar levels of accuracy and precision. To this end, Real Time Location System (RTLS) based on deployable anchors and tags are typically employed for these applications. The precision and accuracy of such RTLS systems is limited by the chosen anchors and tags. In this paper, the performance of DecaWave’s Ultra-wide-band (UWB) MDEK1001 is evaluated and tested under ideal Line-of-Sight (LOS) and non-LOS (NLOS) scenarios. The effect of obstacles and anchor bias on accuracy is also evaluated. Different anchor deployment configurations are tested to determine the impact of anchor quantity and position on tag position accuracy. Additionally, this paper provides an overview of EMSLab-RTLS client-server generated for real-time location applications.
{"title":"System Design and Performance Analysis of Indoor Real-time Localization using UWB Infrastructure","authors":"Jonathan Plangger, Hariram Ravichandran, Sarat Chandran Rodin, M. Atia","doi":"10.1109/SysCon53073.2023.10131059","DOIUrl":"https://doi.org/10.1109/SysCon53073.2023.10131059","url":null,"abstract":"Indoor localization and tracking poses a uniquely challenging aspect for asset tracking. Unreliability of traditional positioning systems, such as GNSS, in indoor applications calls for specialized systems to attain similar levels of accuracy and precision. To this end, Real Time Location System (RTLS) based on deployable anchors and tags are typically employed for these applications. The precision and accuracy of such RTLS systems is limited by the chosen anchors and tags. In this paper, the performance of DecaWave’s Ultra-wide-band (UWB) MDEK1001 is evaluated and tested under ideal Line-of-Sight (LOS) and non-LOS (NLOS) scenarios. The effect of obstacles and anchor bias on accuracy is also evaluated. Different anchor deployment configurations are tested to determine the impact of anchor quantity and position on tag position accuracy. Additionally, this paper provides an overview of EMSLab-RTLS client-server generated for real-time location applications.","PeriodicalId":169296,"journal":{"name":"2023 IEEE International Systems Conference (SysCon)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128913775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-17DOI: 10.1109/SysCon53073.2023.10131048
Patrick Cousineau, Brian Lachine
Past cyber-attacks have demonstrated that Industrial Control and SCADA Systems are high-value targets for modern threat actors. In order to defend these classes of systems, it is necessary to detect and eliminate any pre-existing vulnerabilities before they can be leveraged into zero-day exploits. Different methods exist to find exploitable vulnerabilities in the software that runs these systems, one of which is known as fuzzing – wherein a system under test is exposed to a variety of input streams while simultaneously observed for unexpected behaviours, exceptions, or crashes. The aim of this research is to extend the Boofuzz network protocol-based fuzzing framework in order to effectively monitor a closed-source SCADA HMI endpoint during fuzz testing. Effective monitoring in this context is defined as the automated detection of target crashes during fuzzing which are recorded with an exception description, reproducing steps, and call stack trace. This data minimizes the time required for vulnerabilities discovered during fuzzing to be reproduced, investigated, and rectified by the software vendor. In order to accomplish this aim, our SCADA HMI is first analyzed to identify the fuzzing target and its runtime behaviours. A protocol fuzzer is then custom built for it using Boofuzz, with the existing target process monitor class extended to introduce new log file and debugger-based monitors. These extensions are then tested through fuzz tests of the SCADA HMI, the results from which demonstrate that vulnerabilities can be both automatically detected and recorded with the sufficient level of detail to expedite rectification.
{"title":"Enhancing Boofuzz Process Monitoring for Closed-Source SCADA System Fuzzing","authors":"Patrick Cousineau, Brian Lachine","doi":"10.1109/SysCon53073.2023.10131048","DOIUrl":"https://doi.org/10.1109/SysCon53073.2023.10131048","url":null,"abstract":"Past cyber-attacks have demonstrated that Industrial Control and SCADA Systems are high-value targets for modern threat actors. In order to defend these classes of systems, it is necessary to detect and eliminate any pre-existing vulnerabilities before they can be leveraged into zero-day exploits. Different methods exist to find exploitable vulnerabilities in the software that runs these systems, one of which is known as fuzzing – wherein a system under test is exposed to a variety of input streams while simultaneously observed for unexpected behaviours, exceptions, or crashes. The aim of this research is to extend the Boofuzz network protocol-based fuzzing framework in order to effectively monitor a closed-source SCADA HMI endpoint during fuzz testing. Effective monitoring in this context is defined as the automated detection of target crashes during fuzzing which are recorded with an exception description, reproducing steps, and call stack trace. This data minimizes the time required for vulnerabilities discovered during fuzzing to be reproduced, investigated, and rectified by the software vendor. In order to accomplish this aim, our SCADA HMI is first analyzed to identify the fuzzing target and its runtime behaviours. A protocol fuzzer is then custom built for it using Boofuzz, with the existing target process monitor class extended to introduce new log file and debugger-based monitors. These extensions are then tested through fuzz tests of the SCADA HMI, the results from which demonstrate that vulnerabilities can be both automatically detected and recorded with the sufficient level of detail to expedite rectification.","PeriodicalId":169296,"journal":{"name":"2023 IEEE International Systems Conference (SysCon)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133740460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}