首页 > 最新文献

2022 International Siberian Conference on Control and Communications (SIBCON)最新文献

英文 中文
Low-Temperature JFET OpAmp Based On a Folded-Cascode with High Static Regime Symmetry of Transistors That Determine the Systematic Constituent of the Offset-Voltage 基于折叠级联码的低温JFET运放,其高静态区域对称性决定了失调电压的系统组成
Pub Date : 2022-11-17 DOI: 10.1109/SIBCON56144.2022.10002991
V. Chumakov, A. Bugakova, A. Titov
The original architecture of operational amplifiers (OpAmps) implemented on complementary JFETs or depletion-mode complementary MOS is considered. The feature of the proposed OpAmps is differential input stage and folded-cascode special designs, which have a high symmetry of the FETs static regime from terms of gate-to-drain voltages. Computer-based simulations of the OpAmp in the LTspice-XVII was conducted between -197 and 27 degrees Celsius. The proposed circuit solutions reduce the systematic constituent of the offset-voltage (up to 10 $mu mathrm{V}$) and increase voltage gain (up to 87 dB) of the open-loop OpAmp. The explored OpAmps are recommended by the authors of the article for analogue, including low-noise, and analogue-to-digital devices, for example, active filters, comparators, actuators, and others, which are used in systems of communication and management, such as at cryogenic temperatures, and/or under radiation conditions.
考虑了在互补jfet或耗尽模式互补MOS上实现运算放大器(OpAmps)的原始架构。所提出的运放的特点是差分输入级和折叠级串的特殊设计,从栅极到漏极电压的角度来看,它们具有高度对称的fet静态状态。LTspice-XVII中OpAmp的计算机模拟在-197到27摄氏度之间进行。所提出的电路解决方案降低了偏置电压的系统组成(高达10 $mu maththrm {V}$)并增加了开环OpAmp的电压增益(高达87 dB)。本文的作者建议将探索的opamp用于模拟,包括低噪声和模数设备,例如有源滤波器,比较器,致动器等,用于通信和管理系统,例如低温和/或辐射条件下。
{"title":"Low-Temperature JFET OpAmp Based On a Folded-Cascode with High Static Regime Symmetry of Transistors That Determine the Systematic Constituent of the Offset-Voltage","authors":"V. Chumakov, A. Bugakova, A. Titov","doi":"10.1109/SIBCON56144.2022.10002991","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10002991","url":null,"abstract":"The original architecture of operational amplifiers (OpAmps) implemented on complementary JFETs or depletion-mode complementary MOS is considered. The feature of the proposed OpAmps is differential input stage and folded-cascode special designs, which have a high symmetry of the FETs static regime from terms of gate-to-drain voltages. Computer-based simulations of the OpAmp in the LTspice-XVII was conducted between -197 and 27 degrees Celsius. The proposed circuit solutions reduce the systematic constituent of the offset-voltage (up to 10 $mu mathrm{V}$) and increase voltage gain (up to 87 dB) of the open-loop OpAmp. The explored OpAmps are recommended by the authors of the article for analogue, including low-noise, and analogue-to-digital devices, for example, active filters, comparators, actuators, and others, which are used in systems of communication and management, such as at cryogenic temperatures, and/or under radiation conditions.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128139405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scheduling PD-NOMA with Round-Robin, Equal-Rate and Proportional-Fair Strategies 基于轮循、等速率和比例公平策略的PD-NOMA调度
Pub Date : 2022-11-17 DOI: 10.1109/SIBCON56144.2022.10002960
Andrey A. Brovkin, Y. Kryukov, D. Pokamestov, E. Rogozhnikov, Georgiy Shalin, A. S. Shinkevich
The paper discusses the distribution of radio resources for a hybrid communication system adaptively using orthogonal (OMA) and non-orthogonal (NOMA) multiple access, which is the power domain NOMA (PD-NOMA) method. The problem of radio resource allocation in PD-NOMA systems remains topical because the additional degree of freedom (power domain) significantly increases the number of possible approaches, and it is required to find the optimal approach among them. We offer our own approach to radio resource planning and compare it with the existing. Moreover, we use the Monte Carlo simulation to compare the OMA and the hybrid OMA/NOMA systems. The comparison criterion is the amount of transmitted traffic. For the hybrid system, there is a proprietary table of paired signal-code constructions proposed to jointly assign modulation and coding schemes (MCS) to NOMA users and carry out multiplexing in the power domain.
本文讨论了一种基于正交(OMA)和非正交(NOMA)多址自适应混合通信系统的无线电资源分配,即功率域NOMA (PD-NOMA)方法。PD-NOMA系统的无线电资源分配问题一直是人们关注的焦点,因为额外的自由度(功率域)显著增加了可能的方法数量,并且需要在其中找到最优方法。我们提出了自己的无线电资源规划方法,并将其与现有的方法进行比较。此外,我们使用蒙特卡罗模拟比较了OMA和混合OMA/NOMA系统。比较的标准是传输的流量。对于混合系统,提出了一种专有的配对信号编码结构表,用于为NOMA用户共同分配调制和编码方案(MCS),并在功率域进行复用。
{"title":"Scheduling PD-NOMA with Round-Robin, Equal-Rate and Proportional-Fair Strategies","authors":"Andrey A. Brovkin, Y. Kryukov, D. Pokamestov, E. Rogozhnikov, Georgiy Shalin, A. S. Shinkevich","doi":"10.1109/SIBCON56144.2022.10002960","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10002960","url":null,"abstract":"The paper discusses the distribution of radio resources for a hybrid communication system adaptively using orthogonal (OMA) and non-orthogonal (NOMA) multiple access, which is the power domain NOMA (PD-NOMA) method. The problem of radio resource allocation in PD-NOMA systems remains topical because the additional degree of freedom (power domain) significantly increases the number of possible approaches, and it is required to find the optimal approach among them. We offer our own approach to radio resource planning and compare it with the existing. Moreover, we use the Monte Carlo simulation to compare the OMA and the hybrid OMA/NOMA systems. The comparison criterion is the amount of transmitted traffic. For the hybrid system, there is a proprietary table of paired signal-code constructions proposed to jointly assign modulation and coding schemes (MCS) to NOMA users and carry out multiplexing in the power domain.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121055956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Selection and Research of Methods Increasing Optical Boundaries Determining Accuracy of Objects Suitable for Further FPGA Implementation 适合FPGA进一步实现的提高目标光边界确定精度的方法选择与研究
Pub Date : 2022-11-17 DOI: 10.1109/SIBCON56144.2022.10002988
Y. Chursin, Ruslan A. Nurmukhametov
The article describes an optical method for obtaining the geometric parameters of an object, based on the analysis of the boundaries of the object’s shadow in a divergent light flux. One of the main tasks that arises when using this method is filtering a noisy signal in real time with a high frequency. The article discusses and compares two photo signal filtering methods using FPGAs.
本文介绍了一种在发散光通量下,通过对物体阴影边界的分析,获得物体几何参数的光学方法。使用这种方法时出现的主要任务之一是实时过滤高频噪声信号。本文讨论并比较了两种采用fpga的光信号滤波方法。
{"title":"Selection and Research of Methods Increasing Optical Boundaries Determining Accuracy of Objects Suitable for Further FPGA Implementation","authors":"Y. Chursin, Ruslan A. Nurmukhametov","doi":"10.1109/SIBCON56144.2022.10002988","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10002988","url":null,"abstract":"The article describes an optical method for obtaining the geometric parameters of an object, based on the analysis of the boundaries of the object’s shadow in a divergent light flux. One of the main tasks that arises when using this method is filtering a noisy signal in real time with a high frequency. The article discusses and compares two photo signal filtering methods using FPGAs.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116222793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of the Quality of Brick Products by the Method of Machine Vision 基于机器视觉的砖产品质量评价
Pub Date : 2022-11-17 DOI: 10.1109/SIBCON56144.2022.10002973
M. Kataev, Eugeny Kartashov, R. Karpov
At present, no one doubts that machine vision significantly increases the efficiency, quality and reliability of solving numerous problems, including the detection of various product defects. Machine vision acts as a replacement for the complex and time-consuming work of specialists who search for defects using visual inspection. However, for the application of machine vision methods, several conditions must be met, which are associated with lighting and a suitable photographic apparatus, in order to obtain high-quality images, as well as the method of their processing. Image processing and analysis are important elements of a quality control system and obtaining information about defects. This study provides a problem statement for assessing the quality of the surface of bricks and describes the proposed approach to image processing and analysis. The results of processing real images obtained at a brick factory are presented.
目前,没有人怀疑机器视觉显著提高了解决众多问题的效率、质量和可靠性,包括各种产品缺陷的检测。机器视觉代替了使用视觉检查来寻找缺陷的复杂而耗时的专家工作。然而,对于机器视觉方法的应用,必须满足几个条件,这些条件与照明和合适的摄影设备有关,以获得高质量的图像,以及它们的处理方法。图像处理和分析是质量控制系统和获取缺陷信息的重要组成部分。本研究提供了评估砖表面质量的问题陈述,并描述了提出的图像处理和分析方法。给出了对某砖厂实测图像的处理结果。
{"title":"Assessment of the Quality of Brick Products by the Method of Machine Vision","authors":"M. Kataev, Eugeny Kartashov, R. Karpov","doi":"10.1109/SIBCON56144.2022.10002973","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10002973","url":null,"abstract":"At present, no one doubts that machine vision significantly increases the efficiency, quality and reliability of solving numerous problems, including the detection of various product defects. Machine vision acts as a replacement for the complex and time-consuming work of specialists who search for defects using visual inspection. However, for the application of machine vision methods, several conditions must be met, which are associated with lighting and a suitable photographic apparatus, in order to obtain high-quality images, as well as the method of their processing. Image processing and analysis are important elements of a quality control system and obtaining information about defects. This study provides a problem statement for assessing the quality of the surface of bricks and describes the proposed approach to image processing and analysis. The results of processing real images obtained at a brick factory are presented.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128605714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Functional Modeling as a Basis for Classifying Security Threats 功能建模作为安全威胁分类的基础
Pub Date : 2022-11-17 DOI: 10.1109/SIBCON56144.2022.10003024
A. Konev
Building a threat model plays one of the key roles in assessing the security of information systems. In this case, a rather important point is to establish a connection between the description of the protected object (functions of processing the protected information) and the list of threats directed at the protected object. One of the possible ways to describe the protected processes in information systems is to build a functional model. The proposed study examines the relationship between the IDEF0 functional modeling methodology and various classes of threats. The basic idea is as follows: different types of arrows in the IDEF0 notation correspond to different types of threats. The horizontal arrows correspond to threats of confidentiality and integrity violation of data, storage media, and other objects. Mechanism arrows correspond to threats and attacks directed at components of information systems (disabling components, introducing malware, etc.). Control arrows correspond to threats related to system trust (errors during development, implementation of undocumented features). The article provides a classification of threats based on the typing of arrows in the IDEF0 notation, and examples of threats for typical functions of processing protected information.
建立威胁模型是信息系统安全评估的关键问题之一。在这种情况下,相当重要的一点是在受保护对象的描述(处理受保护信息的功能)和针对受保护对象的威胁列表之间建立联系。描述信息系统中受保护进程的一种可能方法是建立功能模型。本研究探讨了IDEF0功能建模方法与各类威胁之间的关系。其基本思想是:IDEF0符号中不同类型的箭头对应不同类型的威胁。水平箭头对应于对数据、存储介质和其他对象的机密性和完整性的威胁。机制箭头对应于针对信息系统组件的威胁和攻击(禁用组件、引入恶意软件等)。控制箭头对应于与系统信任相关的威胁(开发期间的错误、未记录特性的实现)。本文提供了基于IDEF0符号中箭头类型的威胁分类,以及针对处理受保护信息的典型功能的威胁示例。
{"title":"Functional Modeling as a Basis for Classifying Security Threats","authors":"A. Konev","doi":"10.1109/SIBCON56144.2022.10003024","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10003024","url":null,"abstract":"Building a threat model plays one of the key roles in assessing the security of information systems. In this case, a rather important point is to establish a connection between the description of the protected object (functions of processing the protected information) and the list of threats directed at the protected object. One of the possible ways to describe the protected processes in information systems is to build a functional model. The proposed study examines the relationship between the IDEF0 functional modeling methodology and various classes of threats. The basic idea is as follows: different types of arrows in the IDEF0 notation correspond to different types of threats. The horizontal arrows correspond to threats of confidentiality and integrity violation of data, storage media, and other objects. Mechanism arrows correspond to threats and attacks directed at components of information systems (disabling components, introducing malware, etc.). Control arrows correspond to threats related to system trust (errors during development, implementation of undocumented features). The article provides a classification of threats based on the typing of arrows in the IDEF0 notation, and examples of threats for typical functions of processing protected information.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129928895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method for Selecting Indicators of Data Compromise 数据泄露指标选择方法
Pub Date : 2022-11-17 DOI: 10.1109/SIBCON56144.2022.10002962
V. Kartak, Nail Bashmakov
This work is devoted to the consideration of the use of indicators of compromise at the process of cyber intelligence. When used correctly, lists of indicators of compromise (feeds) can reveal malicious activity in the infrastructure. Nevertheless, to achieve their effective implementation is not easy-there are certain limitations and subtleties. The paper proposes a method for generating a set of indicators of compromise applicable to the infrastructure, and an experiment is carried out. Its results indicate that a set of feeds and indicators must be selected for each infrastructure, depending on its composition and tasks set during the implementation of the cyber threat intelligence process.
这项工作致力于考虑在网络情报过程中使用妥协指标。如果使用得当,泄露指标列表(提要)可以揭示基础设施中的恶意活动。然而,要实现它们的有效实施并不容易——有一定的局限性和微妙之处。本文提出了一种生成一套适用于基础设施的妥协指标的方法,并进行了实验。其结果表明,必须为每个基础设施选择一组提要和指标,这取决于其组成和在实施网络威胁情报过程中设置的任务。
{"title":"Method for Selecting Indicators of Data Compromise","authors":"V. Kartak, Nail Bashmakov","doi":"10.1109/SIBCON56144.2022.10002962","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10002962","url":null,"abstract":"This work is devoted to the consideration of the use of indicators of compromise at the process of cyber intelligence. When used correctly, lists of indicators of compromise (feeds) can reveal malicious activity in the infrastructure. Nevertheless, to achieve their effective implementation is not easy-there are certain limitations and subtleties. The paper proposes a method for generating a set of indicators of compromise applicable to the infrastructure, and an experiment is carried out. Its results indicate that a set of feeds and indicators must be selected for each infrastructure, depending on its composition and tasks set during the implementation of the cyber threat intelligence process.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117350768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of the Step-Down DC-DC converter with Si-and SiC-diodes 硅和硅二极管降压DC-DC变换器的仿真
Pub Date : 2022-11-17 DOI: 10.1109/SIBCON56144.2022.10003010
Nikita Yu. Burtsev, O. Kozhemyak
The article presents the results of simulation of pulse DC-DC step-down converter with different types of diodes. Simulations have shown that the use of a silicon carbide diode instead of convenient silicon diode gives the best performance. It also shown, the parasitic inductances in the circuit significantly increase the power losses when the diode is switched-off and reduce the losses when the transistor is switched-on.
本文给出了采用不同类型二极管的脉冲DC-DC降压变换器的仿真结果。仿真结果表明,采用碳化硅二极管代替普通硅二极管可获得最佳的性能。它还表明,电路中的寄生电感显着增加了二极管关闭时的功率损耗,并减少了晶体管打开时的损耗。
{"title":"Simulation of the Step-Down DC-DC converter with Si-and SiC-diodes","authors":"Nikita Yu. Burtsev, O. Kozhemyak","doi":"10.1109/SIBCON56144.2022.10003010","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10003010","url":null,"abstract":"The article presents the results of simulation of pulse DC-DC step-down converter with different types of diodes. Simulations have shown that the use of a silicon carbide diode instead of convenient silicon diode gives the best performance. It also shown, the parasitic inductances in the circuit significantly increase the power losses when the diode is switched-off and reduce the losses when the transistor is switched-on.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129151062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Subordinate Control System of Buck Converter Buck变换器的从属控制系统
Pub Date : 2022-11-17 DOI: 10.1109/SIBCON56144.2022.10003006
D. Lyapunov, S. Lyapushkin, A. Yudintsev
This paper delves into the problem of designing a buck converter, serving as the key element for testing sets, also known as load simulators. These simulators impose varying electric load onto power supplies that may be employed in harsh environments and under temperatures below 00C. This provides ground testing for such supplies over a wide range of electric loads as well as creating the proper voltage waveform on the supply terminals. For this purpose, we implement a subordinate control system containing an internal inductor current loop and main output voltage feedback of the buck converter topology. Within the present research frameworks, a methodology of the control system designing, have been outlined. The resulting voltage and current waveforms confirm the correctness of the presented methodology and applicability of the buck converter with subordinate control system as a functional component of load simulators.
本文研究了buck变换器的设计问题,buck变换器作为测试装置的关键元件,也被称为负载模拟器。这些模拟器对可能在恶劣环境和低于00℃的温度下使用的电源施加不同的电负载。这为这种电源在大范围的电力负载上提供了接地测试,并在电源端子上创建了适当的电压波形。为此,我们实现了一个包含内部电感电流环和降压变换器拓扑的主输出电压反馈的从属控制系统。在目前的研究框架内,已经概述了控制系统设计的方法。所得到的电压和电流波形验证了所提方法的正确性,以及带从属控制系统的降压变换器作为负载模拟器功能部件的适用性。
{"title":"Subordinate Control System of Buck Converter","authors":"D. Lyapunov, S. Lyapushkin, A. Yudintsev","doi":"10.1109/SIBCON56144.2022.10003006","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10003006","url":null,"abstract":"This paper delves into the problem of designing a buck converter, serving as the key element for testing sets, also known as load simulators. These simulators impose varying electric load onto power supplies that may be employed in harsh environments and under temperatures below 00C. This provides ground testing for such supplies over a wide range of electric loads as well as creating the proper voltage waveform on the supply terminals. For this purpose, we implement a subordinate control system containing an internal inductor current loop and main output voltage feedback of the buck converter topology. Within the present research frameworks, a methodology of the control system designing, have been outlined. The resulting voltage and current waveforms confirm the correctness of the presented methodology and applicability of the buck converter with subordinate control system as a functional component of load simulators.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132761732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer Attacks Simulation in IIoT Systems 工业物联网系统中的计算机攻击模拟
Pub Date : 2022-11-17 DOI: 10.1109/SIBCON56144.2022.10002952
Kirill Tsimbalov, Dmitry Bragin, Vitalii Moseichuk, Artur Mitsel
Modern IIoT systems include a huge number of sensors and actuators designed to control the processes of technological production. Trusted interaction, which involves the guaranteed transmission of data within such systems, is a key aspect in the operation of such systems. However, the currently available industrial protocols contain a certain number of vulnerabilities, which can destabilize the operations of IIoT systems. That’swhy, when designing such systems, additional attention should be paid to the protection of transmitted data. The current article presents the modeling of computer attacks on the IIoT system, using the industrial Modbus TCP protocol. This protocol is widely used in the design of IIoT systems, also has a number of vulnerabilities
现代工业物联网系统包括大量用于控制技术生产过程的传感器和执行器。可信交互涉及在此类系统内保证数据传输,是此类系统运行的一个关键方面。然而,目前可用的工业协议包含一定数量的漏洞,这些漏洞可能会破坏工业物联网系统的运行。这就是为什么在设计这类系统时,应额外注意对传输数据的保护。本文介绍了利用工业Modbus TCP协议对工业物联网系统进行计算机攻击的建模。该协议广泛应用于工业物联网系统的设计中,但也存在一些漏洞
{"title":"Computer Attacks Simulation in IIoT Systems","authors":"Kirill Tsimbalov, Dmitry Bragin, Vitalii Moseichuk, Artur Mitsel","doi":"10.1109/SIBCON56144.2022.10002952","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10002952","url":null,"abstract":"Modern IIoT systems include a huge number of sensors and actuators designed to control the processes of technological production. Trusted interaction, which involves the guaranteed transmission of data within such systems, is a key aspect in the operation of such systems. However, the currently available industrial protocols contain a certain number of vulnerabilities, which can destabilize the operations of IIoT systems. That’swhy, when designing such systems, additional attention should be paid to the protection of transmitted data. The current article presents the modeling of computer attacks on the IIoT system, using the industrial Modbus TCP protocol. This protocol is widely used in the design of IIoT systems, also has a number of vulnerabilities","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131155673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determination of the Steepness of the Discriminatory Characteristic for the Meter of non-Energy Parameters of the Signal 信号非能量参数计的判别特征陡度的确定
Pub Date : 2022-11-17 DOI: 10.1109/SIBCON56144.2022.10003028
V. M. Artyushenko, V. I. Volovach
The simultaneous influence of multiplicative and additive noises on the steepness of the discriminative characteristic of a two-channel discriminator is analyzed. A coherent signal and a sequence of incoherent pulses are used as input signals. It is assumed that, at a relatively low level of noise, the tracking meter is considered as a linear system. Conditions are obtained when systematic measurement errors are absent. The expressions for determining the steepness of the discriminative characteristic affected by multiplicative noise depending on the additive noise level are obtained. It is shown that multiplicative noise has a greater influence on the steepness of the discriminative characteristic when the level of additive noise is higher. Coefficients determining the normalizing effect of the automatic gain control are obtained. It is shown that the type of the input signal does not change the physical nature of the influence of multiplicative and additive noises on the steepness of the discriminative characteristic.
分析了乘性噪声和加性噪声对双通道鉴别器判别特性陡度的同时影响。使用相干信号和非相干脉冲序列作为输入信号。假设在相对较低的噪声水平下,跟踪仪被认为是一个线性系统。得到了系统测量误差不存在的条件。得到了判别特性受乘性噪声影响的陡度随加性噪声电平的表达式。结果表明,当加性噪声水平越高时,乘性噪声对判别特征的陡度影响越大。得到了决定自动增益控制归一化效果的系数。结果表明,输入信号的类型不改变乘性噪声和加性噪声对判别特征陡度影响的物理性质。
{"title":"Determination of the Steepness of the Discriminatory Characteristic for the Meter of non-Energy Parameters of the Signal","authors":"V. M. Artyushenko, V. I. Volovach","doi":"10.1109/SIBCON56144.2022.10003028","DOIUrl":"https://doi.org/10.1109/SIBCON56144.2022.10003028","url":null,"abstract":"The simultaneous influence of multiplicative and additive noises on the steepness of the discriminative characteristic of a two-channel discriminator is analyzed. A coherent signal and a sequence of incoherent pulses are used as input signals. It is assumed that, at a relatively low level of noise, the tracking meter is considered as a linear system. Conditions are obtained when systematic measurement errors are absent. The expressions for determining the steepness of the discriminative characteristic affected by multiplicative noise depending on the additive noise level are obtained. It is shown that multiplicative noise has a greater influence on the steepness of the discriminative characteristic when the level of additive noise is higher. Coefficients determining the normalizing effect of the automatic gain control are obtained. It is shown that the type of the input signal does not change the physical nature of the influence of multiplicative and additive noises on the steepness of the discriminative characteristic.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129234094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 International Siberian Conference on Control and Communications (SIBCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1