首页 > 最新文献

2018 Resilience Week (RWS)最新文献

英文 中文
Measurement and Analysis of Cyber Resilience for Control Systems: An Illustrative Example 控制系统网络弹性的测量和分析:一个说明性例子
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473549
N. Jacobs, S. Hossain-McKenzie, E. Vugrin
Control systems for critical infrastructure are becoming increasingly interconnected while cyber threats against critical infrastructure are becoming more sophisticated and difficult to defend against. Historically, cyber security has emphasized building defenses to prevent loss of confidentiality, integrity, and availability in digital information and systems, but in recent years cyber attacks have demonstrated that no system is impenetrable and that control system operation may be detrimentally impacted. Cyber resilience has emerged as a complementary priority that seeks to ensure that digital systems can maintain essential performance levels, even while capabilities are degraded by a cyber attack. This paper examines how cyber security and cyber resilience may be measured and quantified in a control system environment. Load Frequency Control is used as an illustrative example to demonstrate how cyber attacks may be represented within mathematical models of control systems, to demonstrate how these events may be quantitatively measured in terms of cyber security or cyber resilience, and the differences and similarities between the two mindsets. These results demonstrate how various metrics are applied, the extent of their usability, and how it is important to analyze cyber-physical systems in a comprehensive manner that accounts for all the various parts of the system.
关键基础设施的控制系统日益互联,而针对关键基础设施的网络威胁变得越来越复杂和难以防御。从历史上看,网络安全强调建立防御,以防止数字信息和系统的保密性、完整性和可用性的丧失,但近年来的网络攻击表明,没有任何系统是不可渗透的,控制系统的运行可能受到不利影响。网络弹性已成为一项补充优先事项,旨在确保数字系统即使在能力因网络攻击而下降时也能保持基本性能水平。本文探讨了如何在控制系统环境中测量和量化网络安全和网络弹性。负载频率控制被用作一个说明性示例,以演示如何在控制系统的数学模型中表示网络攻击,演示如何根据网络安全或网络弹性对这些事件进行定量测量,以及两种思维模式之间的差异和相似之处。这些结果展示了各种度量是如何应用的,它们的可用性程度,以及以一种综合的方式分析网络物理系统的重要性,这种方式考虑了系统的所有不同部分。
{"title":"Measurement and Analysis of Cyber Resilience for Control Systems: An Illustrative Example","authors":"N. Jacobs, S. Hossain-McKenzie, E. Vugrin","doi":"10.1109/RWEEK.2018.8473549","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473549","url":null,"abstract":"Control systems for critical infrastructure are becoming increasingly interconnected while cyber threats against critical infrastructure are becoming more sophisticated and difficult to defend against. Historically, cyber security has emphasized building defenses to prevent loss of confidentiality, integrity, and availability in digital information and systems, but in recent years cyber attacks have demonstrated that no system is impenetrable and that control system operation may be detrimentally impacted. Cyber resilience has emerged as a complementary priority that seeks to ensure that digital systems can maintain essential performance levels, even while capabilities are degraded by a cyber attack. This paper examines how cyber security and cyber resilience may be measured and quantified in a control system environment. Load Frequency Control is used as an illustrative example to demonstrate how cyber attacks may be represented within mathematical models of control systems, to demonstrate how these events may be quantitatively measured in terms of cyber security or cyber resilience, and the differences and similarities between the two mindsets. These results demonstrate how various metrics are applied, the extent of their usability, and how it is important to analyze cyber-physical systems in a comprehensive manner that accounts for all the various parts of the system.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121287444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Blockchain for Supply Chain Cybersecurity, Optimization and Compliance 供应链网络安全、优化和合规的区块链
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473517
M. Mylrea, S. Gourisetti
The U.S. power grid is a complex system of systems that requires a trustworthy, reliable, and secure global supply chain. A formidable challenge considering the increasing number of networked industrial control systems (ICS) and energy delivery systems (EDS) and growing number of intermediary distributors, vendors and integrators involved. Grid modernization has increased the use of “smart” energy devices that automate, digitize, network, and bring together the cyber-physical energy supply chain. In the current Energy Internet of Things (EIoT) environment, the growth of data speed and size requirements as well as the number of critical cyber assets has generated new North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) compliance requirements and cyber supply chain security challenges for vendors, regulators, and utilities. The issuance of Order No. 829 by the Federal Energy Regulatory Commission (FERC) instructed the North American Electric Reliability Corporation (NERC) to confront cybersecurity supply chain risk management for ICS software and hardware, as well as the networking and computing services associated with Bulk Electric System (BES) operations. To meet these goals, current technology and processes must be improved to better identify, monitor, and audit vulnerable EIoT environments. This paper examines how blockchain technology can enable NERC CIP compliance as well as aid in the security of the BES supply chain through an immutable cryptographically signed distributed ledger that allows for improved data security, provenance and auditability.
美国电网是一个复杂的系统,需要一个值得信赖、可靠和安全的全球供应链。考虑到越来越多的网络化工业控制系统(ICS)和能源输送系统(EDS)以及越来越多的中间分销商、供应商和集成商,这是一个艰巨的挑战。电网现代化增加了“智能”能源设备的使用,这些设备可以自动化、数字化、网络化,并将网络-物理能源供应链整合在一起。在当前的能源物联网(EIoT)环境中,数据速度和大小需求的增长以及关键网络资产的数量已经为供应商、监管机构和公用事业公司带来了新的北美电力可靠性公司(NERC)关键基础设施保护(CIP)合规要求和网络供应链安全挑战。美国联邦能源监管委员会(FERC)发布了第829号命令,指示北美电力可靠性公司(NERC)应对ICS软件和硬件的网络安全供应链风险管理,以及与大容量电力系统(BES)运营相关的网络和计算服务。为了实现这些目标,必须改进当前的技术和流程,以便更好地识别、监视和审计易受攻击的EIoT环境。本文研究了区块链技术如何通过不可变的加密签名分布式账本来实现NERC CIP合规性,以及如何帮助BES供应链的安全性,从而提高数据安全性、来源和可审计性。
{"title":"Blockchain for Supply Chain Cybersecurity, Optimization and Compliance","authors":"M. Mylrea, S. Gourisetti","doi":"10.1109/RWEEK.2018.8473517","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473517","url":null,"abstract":"The U.S. power grid is a complex system of systems that requires a trustworthy, reliable, and secure global supply chain. A formidable challenge considering the increasing number of networked industrial control systems (ICS) and energy delivery systems (EDS) and growing number of intermediary distributors, vendors and integrators involved. Grid modernization has increased the use of “smart” energy devices that automate, digitize, network, and bring together the cyber-physical energy supply chain. In the current Energy Internet of Things (EIoT) environment, the growth of data speed and size requirements as well as the number of critical cyber assets has generated new North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) compliance requirements and cyber supply chain security challenges for vendors, regulators, and utilities. The issuance of Order No. 829 by the Federal Energy Regulatory Commission (FERC) instructed the North American Electric Reliability Corporation (NERC) to confront cybersecurity supply chain risk management for ICS software and hardware, as well as the networking and computing services associated with Bulk Electric System (BES) operations. To meet these goals, current technology and processes must be improved to better identify, monitor, and audit vulnerable EIoT environments. This paper examines how blockchain technology can enable NERC CIP compliance as well as aid in the security of the BES supply chain through an immutable cryptographically signed distributed ledger that allows for improved data security, provenance and auditability.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124145729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Phishing During and After Disaster: Hurricane Harvey 灾难期间和之后的网络钓鱼:飓风哈维
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473509
Rakesh M. Verma, D. Crane., O. Gnawali
Hurricane Harvey was a major disaster that struck Texas in August 2017. We wondered whether such disasters are being exploited by phishers, as phishing is one of the most popular attacks. In October 2017, we surveyed the University of Houston population to study their experiences and behavior during/after the storm. Over 300 responses were received. This paper discusses our study design and the results from that survey. Results show that the storm did cause about 6.3% of the participants to change their behavior, i.e., they clicked on links or downloaded attachments they normally would NOT have. An analysis using the symmetric Jensen-Shannon divergence shows that the increased email volume and the timing of arrival or non-arrival of hurricane-related spam had the biggest impacts.
飓风哈维是2017年8月袭击德克萨斯州的一场重大灾难。我们想知道这些灾难是否被网络钓鱼者利用,因为网络钓鱼是最流行的攻击之一。2017年10月,我们调查了休斯顿大学的人口,研究他们在风暴期间/之后的经历和行为。收到了300多份答复。本文讨论了我们的研究设计和调查结果。结果显示,这场风暴确实导致约6.3%的参与者改变了他们的行为,即他们点击了通常不会点击的链接或下载了附件。使用对称Jensen-Shannon散度的分析表明,增加的电子邮件数量以及与飓风相关的垃圾邮件到达或未到达的时间产生了最大的影响。
{"title":"Phishing During and After Disaster: Hurricane Harvey","authors":"Rakesh M. Verma, D. Crane., O. Gnawali","doi":"10.1109/RWEEK.2018.8473509","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473509","url":null,"abstract":"Hurricane Harvey was a major disaster that struck Texas in August 2017. We wondered whether such disasters are being exploited by phishers, as phishing is one of the most popular attacks. In October 2017, we surveyed the University of Houston population to study their experiences and behavior during/after the storm. Over 300 responses were received. This paper discusses our study design and the results from that survey. Results show that the storm did cause about 6.3% of the participants to change their behavior, i.e., they clicked on links or downloaded attachments they normally would NOT have. An analysis using the symmetric Jensen-Shannon divergence shows that the increased email volume and the timing of arrival or non-arrival of hurricane-related spam had the biggest impacts.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134273062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
[Title page] (标题页)
Pub Date : 2018-08-01 DOI: 10.1109/rweek.2018.8473468
{"title":"[Title page]","authors":"","doi":"10.1109/rweek.2018.8473468","DOIUrl":"https://doi.org/10.1109/rweek.2018.8473468","url":null,"abstract":"","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"36 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129394360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methodology to Estimate Attack Graph System State from a Simulation of a Nuclear Research Reactor 核研究堆仿真攻击图系统状态估计方法
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473465
Will Nichols, P. Hawrylak, John Hale, M. Papa
Hybrid attack graphs are a powerful tool when analyzing the cybersecurity of a cyber-physical system. However, it is important to ensure that this tool correctly models reality, particularly when modelling safety-critical applications, such as a nuclear reactor. By automatically verifying that a simulation reaches the state predicted by an attack graph by analyzing the final state of the simulation, this verification procedure can be accomplished. As such, a mechanism to estimate if a simulation reaches the expected state in a hybrid attack graph is proposed here for the nuclear reactor domain.
混合攻击图是分析网络物理系统网络安全的有力工具。然而,重要的是要确保该工具正确地模拟现实,特别是在对安全关键应用(如核反应堆)进行建模时。通过分析仿真的最终状态,自动验证仿真是否达到攻击图所预测的状态,就可以完成这一验证过程。因此,本文提出了一种用于核反应堆领域的混合攻击图仿真是否达到预期状态的估计机制。
{"title":"Methodology to Estimate Attack Graph System State from a Simulation of a Nuclear Research Reactor","authors":"Will Nichols, P. Hawrylak, John Hale, M. Papa","doi":"10.1109/RWEEK.2018.8473465","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473465","url":null,"abstract":"Hybrid attack graphs are a powerful tool when analyzing the cybersecurity of a cyber-physical system. However, it is important to ensure that this tool correctly models reality, particularly when modelling safety-critical applications, such as a nuclear reactor. By automatically verifying that a simulation reaches the state predicted by an attack graph by analyzing the final state of the simulation, this verification procedure can be accomplished. As such, a mechanism to estimate if a simulation reaches the expected state in a hybrid attack graph is proposed here for the nuclear reactor domain.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122662875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Title page] (标题页)
Pub Date : 2018-08-01 DOI: 10.1109/rweek.2018.8473563
{"title":"[Title page]","authors":"","doi":"10.1109/rweek.2018.8473563","DOIUrl":"https://doi.org/10.1109/rweek.2018.8473563","url":null,"abstract":"","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127323575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Title page] (标题页)
Pub Date : 2018-08-01 DOI: 10.1109/rweek.2018.8473498
{"title":"[Title page]","authors":"","doi":"10.1109/rweek.2018.8473498","DOIUrl":"https://doi.org/10.1109/rweek.2018.8473498","url":null,"abstract":"","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125277361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Collaborative Defense for Securing Protective Relay Settings in Electrical Cyber Physical Systems 电子网络物理系统中保护继电器设置的协同防御
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473536
R. Nuqui, Junho Hong, A. Kondabathini, D. Ishchenko, D. Coats
Modern power systems today are protected and controlled increasingly by embedded systems of computing technologies with a great degree of collaboration enabled by communication. Energy cyber-physical systems such as power systems infrastructures are increasingly vulnerable to cyber-attacks on the protection and control layer. We present a method of securing protective relays from malicious change in protective relay settings via collaboration of devices. Each device checks the proposed setting changes of its neighboring devices for consistency and coordination with its own settings using setting rules based on relay coordination principles. The method is enabled via peer-to-peer communication between IEDs. It is validated in a cyber-physical test bed containing a real time digital simulator and actual relays that communicate via IEC 61850 GOOSE messages. Test results showed improvement in cyber physical security by using domain based rules to block malicious changes in protection settings caused by simulated cyber-attacks. The method promotes the use of defense systems that are aware of the physical systems which they are designed to secure.
现代电力系统越来越多地受到嵌入式计算技术系统的保护和控制,通过通信实现了高度的协作。能源网络物理系统(如电力系统基础设施)越来越容易受到保护和控制层的网络攻击。我们提出了一种通过设备协作保护继电器设置免受恶意更改保护继电器的方法。每台设备使用基于中继协调原理的设置规则,检查相邻设备的设置变化是否与自己的设置一致和协调。该方法通过ied之间的点对点通信实现。在包含实时数字模拟器和通过IEC 61850 GOOSE消息通信的实际继电器的网络物理测试台上进行了验证。测试结果表明,通过使用基于域的规则来阻止由模拟网络攻击引起的保护设置的恶意更改,可以改善网络物理安全性。该方法促进了防御系统的使用,这些防御系统了解其设计要保护的物理系统。
{"title":"A Collaborative Defense for Securing Protective Relay Settings in Electrical Cyber Physical Systems","authors":"R. Nuqui, Junho Hong, A. Kondabathini, D. Ishchenko, D. Coats","doi":"10.1109/RWEEK.2018.8473536","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473536","url":null,"abstract":"Modern power systems today are protected and controlled increasingly by embedded systems of computing technologies with a great degree of collaboration enabled by communication. Energy cyber-physical systems such as power systems infrastructures are increasingly vulnerable to cyber-attacks on the protection and control layer. We present a method of securing protective relays from malicious change in protective relay settings via collaboration of devices. Each device checks the proposed setting changes of its neighboring devices for consistency and coordination with its own settings using setting rules based on relay coordination principles. The method is enabled via peer-to-peer communication between IEDs. It is validated in a cyber-physical test bed containing a real time digital simulator and actual relays that communicate via IEC 61850 GOOSE messages. Test results showed improvement in cyber physical security by using domain based rules to block malicious changes in protection settings caused by simulated cyber-attacks. The method promotes the use of defense systems that are aware of the physical systems which they are designed to secure.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114923650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Framework for Data Driven Health Monitoring of Cyber-Physical Systems 数据驱动的网络物理系统健康监测框架
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473535
Kasun Amarasinghe, Chathurika S. Wickramasinghe, Daniel L. Marino, C. Rieger, Milos Manicl
Modern infrastructure is heavily reliant on systems with interconnected computational and physical resources, named Cyber-Physical Systems (CPSs). Hence, building resilient CPSs is a prime need and continuous monitoring of the CPS operational health is essential for improving resilience. This paper presents a framework for calculating and monitoring of health in CPSs using data driven techniques. The main advantages of this data driven methodology is that the ability of leveraging heterogeneous data streams that are available from the CPSs and the ability of performing the monitoring with minimal a priori domain knowledge. The main objective of the framework is to warn the operators of any degradation in cyber, physical or overall health of the CPS. The framework consists of four components: 1) Data acquisition and feature extraction, 2) state identification and real time state estimation, 3) cyber-physical health calculation and 4) operator warning generation. Further, this paper presents an initial implementation of the first three phases of the framework on a CPS testbed involving a Microgrid simulation and a cyber-network which connects the grid with its controller. The feature extraction method and the use of unsupervised learning algorithms are discussed. Experimental results are presented for the first two phases and the results showed that the data reflected different operating states and visualization techniques can be used to extract the relationships in data features.
现代基础设施严重依赖于具有互联计算和物理资源的系统,称为信息物理系统(cps)。因此,建设有复原力的CPS是首要需求,持续监测CPS的运行状况对于提高复原力至关重要。本文提出了一个使用数据驱动技术计算和监测cps健康状况的框架。这种数据驱动方法的主要优点是能够利用来自cps的异构数据流,并且能够以最少的先验领域知识执行监视。该框架的主要目的是警告运营商CPS在网络、物理或整体健康方面的任何退化。该框架由四个部分组成:1)数据采集和特征提取,2)状态识别和实时状态估计,3)网络物理健康计算,4)操作员预警生成。此外,本文还介绍了该框架前三个阶段在CPS试验台上的初步实现,该试验台涉及微电网仿真和将电网与其控制器连接起来的网络网络。讨论了特征提取方法和无监督学习算法的应用。给出了前两个阶段的实验结果,结果表明数据反映了不同的运行状态,可以使用可视化技术提取数据特征之间的关系。
{"title":"Framework for Data Driven Health Monitoring of Cyber-Physical Systems","authors":"Kasun Amarasinghe, Chathurika S. Wickramasinghe, Daniel L. Marino, C. Rieger, Milos Manicl","doi":"10.1109/RWEEK.2018.8473535","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473535","url":null,"abstract":"Modern infrastructure is heavily reliant on systems with interconnected computational and physical resources, named Cyber-Physical Systems (CPSs). Hence, building resilient CPSs is a prime need and continuous monitoring of the CPS operational health is essential for improving resilience. This paper presents a framework for calculating and monitoring of health in CPSs using data driven techniques. The main advantages of this data driven methodology is that the ability of leveraging heterogeneous data streams that are available from the CPSs and the ability of performing the monitoring with minimal a priori domain knowledge. The main objective of the framework is to warn the operators of any degradation in cyber, physical or overall health of the CPS. The framework consists of four components: 1) Data acquisition and feature extraction, 2) state identification and real time state estimation, 3) cyber-physical health calculation and 4) operator warning generation. Further, this paper presents an initial implementation of the first three phases of the framework on a CPS testbed involving a Microgrid simulation and a cyber-network which connects the grid with its controller. The feature extraction method and the use of unsupervised learning algorithms are discussed. Experimental results are presented for the first two phases and the results showed that the data reflected different operating states and visualization techniques can be used to extract the relationships in data features.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122026710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Preamble-Free Binary Polarization Shift Keying in Frequency Selective Channels 频率选择信道中无前导二元偏振移键控
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473551
T. Pratt, Eric M. Jesse, Joseph L. Loof
Spectrum sharing is enabled through different strategies at the physical and medium access layers, including reduction of the required average transmit energy per good bit. In this work, we propose a preamble-free communications technique that is feasible with coherent MIMO systems. At the transmitter, packets comprising multicarrier symbols with cyclic prefixes are transmitted, but without preambles typically required for channel estimation and carrier frequency offset estimation. At the receiver, classification methods are used to demodulate the signal without need for channel estimation. We illustrate the approach for a simple coherent MIMO technique, binary PolSK, and demonstrate its efficacy by demodulating preamble-free packets transmitted in over-the-air experiments in multi-path channels.
频谱共享是通过物理层和介质接入层的不同策略实现的,包括降低每有效位所需的平均传输能量。在这项工作中,我们提出了一种适用于相干MIMO系统的无序言通信技术。在发送端,包含带有循环前缀的多载波符号的数据包被传输,但没有通常用于信道估计和载波频偏估计的前导。在接收端,采用分类方法对信号进行解调,而不需要进行信道估计。我们举例说明了一种简单的相干MIMO技术的方法,二进制PolSK,并通过解调多径信道中无线实验中传输的无前导数据包来证明其有效性。
{"title":"Preamble-Free Binary Polarization Shift Keying in Frequency Selective Channels","authors":"T. Pratt, Eric M. Jesse, Joseph L. Loof","doi":"10.1109/RWEEK.2018.8473551","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473551","url":null,"abstract":"Spectrum sharing is enabled through different strategies at the physical and medium access layers, including reduction of the required average transmit energy per good bit. In this work, we propose a preamble-free communications technique that is feasible with coherent MIMO systems. At the transmitter, packets comprising multicarrier symbols with cyclic prefixes are transmitted, but without preambles typically required for channel estimation and carrier frequency offset estimation. At the receiver, classification methods are used to demodulate the signal without need for channel estimation. We illustrate the approach for a simple coherent MIMO technique, binary PolSK, and demonstrate its efficacy by demodulating preamble-free packets transmitted in over-the-air experiments in multi-path channels.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116724625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 Resilience Week (RWS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1