首页 > 最新文献

Proceedings of the 3rd international conference on High confidence networked systems最新文献

英文 中文
Safety envelope for security 安全信封
A. Tiwari, B. Dutertre, Dejan Jovanovic, Thomas de Candia, P. Lincoln, J. Rushby, Dorsa Sadigh, S. Seshia
We present an approach for detecting sensor spoofing attacks on a cyber-physical system. Our approach consists of two steps. In the first step, we construct a safety envelope of the system. Under nominal conditions (that is, when there are no attacks), the system always stays inside its safety envelope. In the second step, we build an attack detector: a monitor that executes synchronously with the system and raises an alarm whenever the system state falls outside the safety envelope. We synthesize safety envelopes using a modifed machine learning procedure applied on data collected from the system when it is not under attack. We present experimental results that show effectiveness of our approach, and also validate the several novel features that we introduced in our learning procedure.
我们提出了一种检测网络物理系统上传感器欺骗攻击的方法。我们的方法包括两个步骤。在第一步中,我们构造了系统的安全包络。在名义条件下(即没有攻击时),系统始终保持在其安全信封内。在第二步中,我们构建一个攻击检测器:一个与系统同步执行的监视器,每当系统状态超出安全范围时,它就会发出警报。我们使用改进的机器学习程序合成安全信封,该程序应用于从系统收集的数据,当系统未受到攻击时。我们给出的实验结果显示了我们的方法的有效性,并验证了我们在学习过程中引入的几个新特征。
{"title":"Safety envelope for security","authors":"A. Tiwari, B. Dutertre, Dejan Jovanovic, Thomas de Candia, P. Lincoln, J. Rushby, Dorsa Sadigh, S. Seshia","doi":"10.1145/2566468.2566483","DOIUrl":"https://doi.org/10.1145/2566468.2566483","url":null,"abstract":"We present an approach for detecting sensor spoofing attacks on a cyber-physical system. Our approach consists of two steps. In the first step, we construct a safety envelope of the system. Under nominal conditions (that is, when there are no attacks), the system always stays inside its safety envelope. In the second step, we build an attack detector: a monitor that executes synchronously with the system and raises an alarm whenever the system state falls outside the safety envelope. We synthesize safety envelopes using a modifed machine learning procedure applied on data collected from the system when it is not under attack. We present experimental results that show effectiveness of our approach, and also validate the several novel features that we introduced in our learning procedure.","PeriodicalId":339979,"journal":{"name":"Proceedings of the 3rd international conference on High confidence networked systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125294580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Is this a good time?: deciding when to launch attacks on process control systems 现在方便吗?决定何时对过程控制系统发起攻击
M. Krotofil, A. Cárdenas
We introduce a new problem formulation for understanding the threats and vulnerabilities of process control systems. In particular, we consider an adversary that has compromised sensor or actuator signals of a control system and needs to identify the best time to launch an attack. We have previously shown that attackers might not be able to reach if the timing of their Denial-of-Service (DoS) attacks is not chosen strategically: Therefore, if the timing of a DoS attack is not chosen correctly, the attack can have limited impact; however, if the timing of the attack is chosen carefully, the attack has higher chances of succeeding. We formulate the problem of selecting a good time to launch DoS attacks as an optimal stopping problem that the adversary has to solve in real-time. In particular, we use the theory for the Best-Choice Problem to identify an optimal stopping criteria and then use a low pass filter to identify when the time series of a process variable has reached its peak. We identify some of the complexities associated with solving the problem and outline directions for future work.
我们引入了一个新的问题公式来理解过程控制系统的威胁和漏洞。特别是,我们考虑攻击者已经破坏了控制系统的传感器或执行器信号,并且需要确定发动攻击的最佳时间。我们之前已经表明,如果拒绝服务(DoS)攻击的时间选择不正确,攻击者可能无法到达:因此,如果拒绝服务攻击的时间选择不正确,攻击的影响可能有限;然而,如果攻击的时机选择得很仔细,攻击成功的几率就会更高。我们将选择一个好时机发起DoS攻击的问题表述为对手必须实时解决的最佳停止问题。特别是,我们使用最佳选择问题的理论来确定最佳停止标准,然后使用低通滤波器来确定过程变量的时间序列何时达到峰值。我们确定了与解决问题相关的一些复杂性,并概述了未来工作的方向。
{"title":"Is this a good time?: deciding when to launch attacks on process control systems","authors":"M. Krotofil, A. Cárdenas","doi":"10.1145/2566468.2576852","DOIUrl":"https://doi.org/10.1145/2566468.2576852","url":null,"abstract":"We introduce a new problem formulation for understanding the threats and vulnerabilities of process control systems. In particular, we consider an adversary that has compromised sensor or actuator signals of a control system and needs to identify the best time to launch an attack. We have previously shown that attackers might not be able to reach if the timing of their Denial-of-Service (DoS) attacks is not chosen strategically: Therefore, if the timing of a DoS attack is not chosen correctly, the attack can have limited impact; however, if the timing of the attack is chosen carefully, the attack has higher chances of succeeding. We formulate the problem of selecting a good time to launch DoS attacks as an optimal stopping problem that the adversary has to solve in real-time. In particular, we use the theory for the Best-Choice Problem to identify an optimal stopping criteria and then use a low pass filter to identify when the time series of a process variable has reached its peak. We identify some of the complexities associated with solving the problem and outline directions for future work.","PeriodicalId":339979,"journal":{"name":"Proceedings of the 3rd international conference on High confidence networked systems","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124117305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Energy-based attack detection in networked control systems 网络化控制系统中基于能量的攻击检测
E. Eyisi, X. Koutsoukos
The increased prevalence of attacks on Cyber-Physical Systems(CPS) as well as the safety-critical nature of these systems, has resulted in increased concerns regarding the security of CPS. In an effort towards the security of CPS, we consider the detection of attacks based on the fundamental notion of a system's energy. We propose a discrete-time Energy-Based Attack Detection mechanism for networked cyber-physical systems that are dissipative or passive in nature. We present analytical results to show that the detection mechanism is effective in detecting a class of attack models in networked control systems (NCS). Finally, using simulations we illustrate the effectiveness of the proposed approach in detecting attacks.
对网络物理系统(CPS)的攻击越来越普遍,以及这些系统的安全关键性质,导致对CPS安全性的担忧日益增加。为了提高CPS的安全性,我们考虑基于系统能量的基本概念来检测攻击。我们提出了一种基于离散时间能量的攻击检测机制,用于网络网络物理系统的耗散或被动性质。分析结果表明,该检测机制在检测网络控制系统(NCS)中的一类攻击模型方面是有效的。最后,通过仿真验证了该方法在检测攻击方面的有效性。
{"title":"Energy-based attack detection in networked control systems","authors":"E. Eyisi, X. Koutsoukos","doi":"10.1145/2566468.2566472","DOIUrl":"https://doi.org/10.1145/2566468.2566472","url":null,"abstract":"The increased prevalence of attacks on Cyber-Physical Systems(CPS) as well as the safety-critical nature of these systems, has resulted in increased concerns regarding the security of CPS. In an effort towards the security of CPS, we consider the detection of attacks based on the fundamental notion of a system's energy. We propose a discrete-time Energy-Based Attack Detection mechanism for networked cyber-physical systems that are dissipative or passive in nature. We present analytical results to show that the detection mechanism is effective in detecting a class of attack models in networked control systems (NCS). Finally, using simulations we illustrate the effectiveness of the proposed approach in detecting attacks.","PeriodicalId":339979,"journal":{"name":"Proceedings of the 3rd international conference on High confidence networked systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117175606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Resilient multidimensional sensor fusion using measurement history 基于测量历史的弹性多维传感器融合
Radoslav Ivanov, M. Pajic, Insup Lee
This work considers the problem of performing resilient sensor fusion using past sensor measurements. In particular, we consider a system with n sensors measuring the same physical variable where some sensors might be attacked or faulty. We consider a setup in which each sensor provides the controller with a set of possible values for the true value. Here, more precise sensors provide smaller sets. Since a lot of modern sensors provide multidimensional measurements (e.g. position in three dimensions), the sets considered in this work are multidimensional polyhedra. Given the assumption that some sensors can be attacked or faulty, the paper provides a sensor fusion algorithm that obtains a fusion polyhedron which is guaranteed to contain the true value and is minimal in size. A bound on the volume of the fusion polyhedron is also proved based on the number of faulty or attacked sensors. In addition, we incorporate system dynamics in order to utilize past measurements and further reduce the size of the fusion polyhedron. We describe several ways of mapping previous measurements to current time and compare them, under different assumptions, using the volume of the fusion polyhedron. Finally, we illustrate the implementation of the best of these methods and show its effectiveness using a case study with sensor values from a real robot.
这项工作考虑了使用过去的传感器测量执行弹性传感器融合的问题。特别地,我们考虑一个有n个传感器测量相同物理变量的系统,其中一些传感器可能受到攻击或出现故障。我们考虑一种设置,其中每个传感器为控制器提供一组真实值的可能值。在这里,更精确的传感器提供更小的集合。由于许多现代传感器提供多维测量(例如三维位置),因此本工作中考虑的集合是多维多面体。在假设某些传感器可能被攻击或故障的情况下,本文提出了一种传感器融合算法,该算法得到的融合多面体保证包含真实值且尺寸最小。基于故障或受攻击传感器的数量,给出了融合多面体的体积边界。此外,为了利用过去的测量结果并进一步减小融合多面体的尺寸,我们结合了系统动力学。我们描述了几种将以前的测量映射到当前时间的方法,并在不同的假设下,使用融合多面体的体积对它们进行了比较。最后,我们举例说明了这些方法中的最佳方法的实现,并通过一个真实机器人的传感器值的案例研究显示了其有效性。
{"title":"Resilient multidimensional sensor fusion using measurement history","authors":"Radoslav Ivanov, M. Pajic, Insup Lee","doi":"10.1145/2566468.2566475","DOIUrl":"https://doi.org/10.1145/2566468.2566475","url":null,"abstract":"This work considers the problem of performing resilient sensor fusion using past sensor measurements. In particular, we consider a system with n sensors measuring the same physical variable where some sensors might be attacked or faulty. We consider a setup in which each sensor provides the controller with a set of possible values for the true value. Here, more precise sensors provide smaller sets. Since a lot of modern sensors provide multidimensional measurements (e.g. position in three dimensions), the sets considered in this work are multidimensional polyhedra. Given the assumption that some sensors can be attacked or faulty, the paper provides a sensor fusion algorithm that obtains a fusion polyhedron which is guaranteed to contain the true value and is minimal in size. A bound on the volume of the fusion polyhedron is also proved based on the number of faulty or attacked sensors. In addition, we incorporate system dynamics in order to utilize past measurements and further reduce the size of the fusion polyhedron. We describe several ways of mapping previous measurements to current time and compare them, under different assumptions, using the volume of the fusion polyhedron. Finally, we illustrate the implementation of the best of these methods and show its effectiveness using a case study with sensor values from a real robot.","PeriodicalId":339979,"journal":{"name":"Proceedings of the 3rd international conference on High confidence networked systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130976525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A module for anomaly detection in ICS networks ICS网络异常检测模块
Matti Mantere, Mirko Sailio, S. Noponen
Network security monitoring using machine learning algorithms is a topic that has been well researched and found to be difficult to use. We propose to use a specific approach in restricted IP network environments and leverage the network state information and information from individual connections for increased level of sensitivity. The approach is meant for use in restricted IP networks which exhibit a level of determinism that enables the use of machine learning approach. In this work we use algorithm called Self-Organizing Maps. We introduce an implementation of self-organizing maps engine built on top of the Bro network security monitor. An implemented selection of initial features for the Self-Organizing Maps is provided and a sample sub-set is used when training a SOM lattice for network data from an industrial control system environment. The anomaly detection prototype described in this paper is meant as a complementary mechanism, not a standalone solution for network security monitoring.
使用机器学习算法进行网络安全监控是一个已经被充分研究并发现难以使用的主题。我们建议在受限制的IP网络环境中使用一种特定的方法,并利用网络状态信息和来自单个连接的信息来提高灵敏度。该方法适用于受限制的IP网络,这种网络表现出一定程度的确定性,可以使用机器学习方法。在这项工作中,我们使用了一种叫做自组织地图的算法。本文介绍了一种基于Bro网络安全监视器的自组织地图引擎的实现。提供了自组织映射的初始特征的实现选择,并在训练来自工业控制系统环境的网络数据的SOM格时使用了样本子集。本文描述的异常检测原型是一种补充机制,而不是网络安全监控的独立解决方案。
{"title":"A module for anomaly detection in ICS networks","authors":"Matti Mantere, Mirko Sailio, S. Noponen","doi":"10.1145/2566468.2566478","DOIUrl":"https://doi.org/10.1145/2566468.2566478","url":null,"abstract":"Network security monitoring using machine learning algorithms is a topic that has been well researched and found to be difficult to use. We propose to use a specific approach in restricted IP network environments and leverage the network state information and information from individual connections for increased level of sensitivity. The approach is meant for use in restricted IP networks which exhibit a level of determinism that enables the use of machine learning approach. In this work we use algorithm called Self-Organizing Maps. We introduce an implementation of self-organizing maps engine built on top of the Bro network security monitor. An implemented selection of initial features for the Self-Organizing Maps is provided and a sample sub-set is used when training a SOM lattice for network data from an industrial control system environment. The anomaly detection prototype described in this paper is meant as a complementary mechanism, not a standalone solution for network security monitoring.","PeriodicalId":339979,"journal":{"name":"Proceedings of the 3rd international conference on High confidence networked systems","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114074921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
From CRCs to resilient control systems: differentiating between reliability and security for the protection of cyber-physical systems 从crc到弹性控制系统:区分网络物理系统保护的可靠性和安全性
A. Cárdenas
In this talk I will discuss the need to establish clear differences between reliability and security for protecting cyber-physical systems (CPS). This is particularly important given the recent interest from researchers in exploring the vulnerability of a CPS when an attacker has partial control of the sensor or actuator signals, which has led to the proposal of several anomaly detection schemes for CPS by using data collected from physical sensors (as opposed to traditional network sensors). In the general setting, data obtained from normal behavior of the system is used to create a model and then any outlier is considered an anomaly and a potential failure or attack; however, this line of research is very similar to the fault-detection, and safety mechanisms that have been deployed in control systems for decades. In particular, the protection of control systems has traditionally been enforced by several safety mechanisms, which include bad data detection, protective relays, safety shutdowns, interlock systems, robust control, and fault-tolerant control; however, so far there has not been a systematic study that tries to identify how much these protection mechanisms can help against attacks (as opposed to failures or accidents), and how can they be broken by an attacker and potentially fixed by a system designer that incorporates attack models in the design of their system. In this talk I describe how current protection mechanisms are analogous to how error correcting codes are used in communications: they protect against a vast majority of random faults and accidents; however they are not secure against attacks - the way cryptographic hash functions are. As a community we need to revisit protection mechanisms available from control theory and then analyze them from a security perspective, giving new guidelines on security metrics and new ways to design attack-resilient CPS. In addition, we also need to avoid falling into the trap of proposing security mechanisms that are evaluated using similar tools from reliability.
在这次演讲中,我将讨论在保护网络物理系统(CPS)的可靠性和安全性之间建立明确区别的必要性。考虑到最近研究人员对探索攻击者部分控制传感器或执行器信号时CPS的漏洞感兴趣,这一点尤为重要,这导致了通过使用从物理传感器(与传统网络传感器相反)收集的数据为CPS提出了几种异常检测方案。在一般情况下,从系统的正常行为中获得的数据用于创建模型,然后将任何异常值视为异常和潜在的故障或攻击;然而,这条研究路线与几十年来在控制系统中部署的故障检测和安全机制非常相似。特别是,控制系统的保护传统上是通过几种安全机制来实施的,包括坏数据检测、保护继电器、安全关闭、联锁系统、鲁棒控制和容错控制;然而,到目前为止,还没有一个系统的研究,试图确定这些保护机制在多大程度上有助于抵御攻击(与失败或事故相反),以及它们如何被攻击者破坏,以及如何被在系统设计中包含攻击模型的系统设计师潜在地修复。在这次演讲中,我将描述当前的保护机制如何类似于通信中使用的纠错码:它们可以防止绝大多数随机故障和事故;然而,它们并不像加密散列函数那样安全,无法抵御攻击。作为一个社区,我们需要重新审视控制理论中可用的保护机制,然后从安全的角度分析它们,给出安全指标的新指导方针和设计抗攻击CPS的新方法。此外,我们还需要避免落入这样的陷阱,即建议使用从可靠性出发的类似工具来评估安全机制。
{"title":"From CRCs to resilient control systems: differentiating between reliability and security for the protection of cyber-physical systems","authors":"A. Cárdenas","doi":"10.1145/2566468.2566469","DOIUrl":"https://doi.org/10.1145/2566468.2566469","url":null,"abstract":"In this talk I will discuss the need to establish clear differences between reliability and security for protecting cyber-physical systems (CPS). This is particularly important given the recent interest from researchers in exploring the vulnerability of a CPS when an attacker has partial control of the sensor or actuator signals, which has led to the proposal of several anomaly detection schemes for CPS by using data collected from physical sensors (as opposed to traditional network sensors). In the general setting, data obtained from normal behavior of the system is used to create a model and then any outlier is considered an anomaly and a potential failure or attack; however, this line of research is very similar to the fault-detection, and safety mechanisms that have been deployed in control systems for decades. In particular, the protection of control systems has traditionally been enforced by several safety mechanisms, which include bad data detection, protective relays, safety shutdowns, interlock systems, robust control, and fault-tolerant control; however, so far there has not been a systematic study that tries to identify how much these protection mechanisms can help against attacks (as opposed to failures or accidents), and how can they be broken by an attacker and potentially fixed by a system designer that incorporates attack models in the design of their system. In this talk I describe how current protection mechanisms are analogous to how error correcting codes are used in communications: they protect against a vast majority of random faults and accidents; however they are not secure against attacks - the way cryptographic hash functions are. As a community we need to revisit protection mechanisms available from control theory and then analyze them from a security perspective, giving new guidelines on security metrics and new ways to design attack-resilient CPS. In addition, we also need to avoid falling into the trap of proposing security mechanisms that are evaluated using similar tools from reliability.","PeriodicalId":339979,"journal":{"name":"Proceedings of the 3rd international conference on High confidence networked systems","volume":"15 5-6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120892039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the cost of differential privacy in distributed control systems 分布式控制系统差分隐私代价研究
Zhenqi Huang, Yu Wang, S. Mitra, G. Dullerud
Individuals sharing information can improve the cost or performance of a distributed control system. But, sharing may also violate privacy. We develop a general framework for studying the cost of differential privacy in systems where a collection of agents, with coupled dynamics, communicate for sensing their shared environment while pursuing individual preferences. First, we propose a communication strategy that relies on adding carefully chosen random noise to agent states and show that it preserves differential privacy. Of course, the higher the standard deviation of the noise, the higher the cost of privacy. For linear distributed control systems with quadratic cost functions, the standard deviation becomes independent of the number agents and it decays with the maximum eigenvalue of the dynamics matrix. Furthermore, for stable dynamics, the noise to be added is independent of the number of agents as well as the time horizon up to which privacy is desired. Finally, we show that the cost of ε-differential privacy up to time T, for a linear stable system with N agents, is upper bounded by O(T3⁄ Nε2).
个人共享信息可以提高分布式控制系统的成本或性能。但是,共享也可能侵犯隐私。我们开发了一个通用框架,用于研究系统中差异隐私的成本,其中一组具有耦合动态的代理在追求个人偏好的同时进行通信以感知其共享环境。首先,我们提出了一种通信策略,该策略依赖于向代理状态添加精心选择的随机噪声,并表明它保留了差异隐私。当然,噪音的标准差越高,隐私的成本就越高。对于具有二次代价函数的线性分布式控制系统,标准差与智能体数量无关,并随动力学矩阵的最大特征值而衰减。此外,对于稳定的动态,要添加的噪声与代理的数量以及期望隐私的时间范围无关。最后,我们证明了对于一个有N个agent的线性稳定系统,ε-微分隐私在T时刻的代价上界为O(T3 / Nε2)。
{"title":"On the cost of differential privacy in distributed control systems","authors":"Zhenqi Huang, Yu Wang, S. Mitra, G. Dullerud","doi":"10.1145/2566468.2566474","DOIUrl":"https://doi.org/10.1145/2566468.2566474","url":null,"abstract":"Individuals sharing information can improve the cost or performance of a distributed control system. But, sharing may also violate privacy. We develop a general framework for studying the cost of differential privacy in systems where a collection of agents, with coupled dynamics, communicate for sensing their shared environment while pursuing individual preferences. First, we propose a communication strategy that relies on adding carefully chosen random noise to agent states and show that it preserves differential privacy. Of course, the higher the standard deviation of the noise, the higher the cost of privacy. For linear distributed control systems with quadratic cost functions, the standard deviation becomes independent of the number agents and it decays with the maximum eigenvalue of the dynamics matrix. Furthermore, for stable dynamics, the noise to be added is independent of the number of agents as well as the time horizon up to which privacy is desired. Finally, we show that the cost of ε-differential privacy up to time T, for a linear stable system with N agents, is upper bounded by O(T3⁄ Nε2).","PeriodicalId":339979,"journal":{"name":"Proceedings of the 3rd international conference on High confidence networked systems","volume":"29 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120903488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Decisions for autonomous vehicles: integrating sensors, communication, and control 自动驾驶汽车的决策:集成传感器、通信和控制
K. Driggs-Campbell, Victor Shia, R. Bajcsy
This paper details the work in progress to formalize methods and algorithms for autonomous decision making, focusing on the implementation of autonomous vehicles. Many different scenarios are to be considered while focusing on a heterogeneous environment of human driven, semi-autonomous, and fully autonomous vehicles. As this work is in its early stages of development, this paper summarizes the work that has been done in the areas of vehicle to vehicle communication with control applications and high-level decision making for autonomous vehicles. The proposed method to be implemented is also presented, which aims to guarantee feasibility, safety, and stability of autonomous systems.
本文详细介绍了自主决策的形式化方法和算法,重点介绍了自动驾驶汽车的实现。在关注人类驾驶、半自动驾驶和全自动驾驶汽车的异构环境时,需要考虑许多不同的场景。由于这项工作还处于发展的早期阶段,本文总结了在自动驾驶汽车控制应用的车对车通信和高层决策领域所做的工作。提出了一种实现方法,旨在保证自治系统的可行性、安全性和稳定性。
{"title":"Decisions for autonomous vehicles: integrating sensors, communication, and control","authors":"K. Driggs-Campbell, Victor Shia, R. Bajcsy","doi":"10.1145/2566468.2576850","DOIUrl":"https://doi.org/10.1145/2566468.2576850","url":null,"abstract":"This paper details the work in progress to formalize methods and algorithms for autonomous decision making, focusing on the implementation of autonomous vehicles. Many different scenarios are to be considered while focusing on a heterogeneous environment of human driven, semi-autonomous, and fully autonomous vehicles. As this work is in its early stages of development, this paper summarizes the work that has been done in the areas of vehicle to vehicle communication with control applications and high-level decision making for autonomous vehicles. The proposed method to be implemented is also presented, which aims to guarantee feasibility, safety, and stability of autonomous systems.","PeriodicalId":339979,"journal":{"name":"Proceedings of the 3rd international conference on High confidence networked systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123106599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Distributed switching control to achieve resilience to deep fades in leader-follower nonholonomic systems 基于分布式开关控制的领导-从众非完整系统抗深度衰退能力研究
B. Hu, M. Lemmon
Leader-follower formation control is a widely used distributed control strategy that often needs systems to exchange information over a wireless radio communication network to coordinate their formations. These wireless networks are subject to deep fades, where a severe drop in the quality of the communication link occurs. Such deep fades may significantly impact the formation's performance and stability, and cause unexpected safety problems. In many applications, however, the variation in channel state is a function of the system's kinematic states. This suggests that channel state information can be used as a feedback signal to recover the performance loss caused by a deep fade. Assuming an exponentially bursty channel model, this paper proposes a distributed switching scheme under which a string of leader-follower nonholonomic system is almost surely practical stable in the presence of deep fades. Sufficient conditions are derived for each vehicle in the leader follower chain to decide which controller is placed in the feedback loop to assure almost sure practical stability. Simulation results are used to illustrate the main findings in the paper.
Leader-follower编队控制是一种广泛应用的分布式控制策略,通常需要系统通过无线通信网络交换信息来协调编队。这些无线网络受到深度衰减的影响,在这种情况下,通信链路的质量会严重下降。这种深度衰减可能会严重影响地层的性能和稳定性,并导致意想不到的安全问题。然而,在许多应用中,通道状态的变化是系统运动状态的函数。这表明信道状态信息可以用作反馈信号来恢复由深衰落引起的性能损失。在一个指数突发信道模型下,本文提出了一种分布式交换方案,在该方案下,一串主从非完整系统在存在深度衰落时几乎肯定是实际稳定的。给出了各车辆在前导从动链上选择控制器的充分条件,以保证系统的实际稳定性。仿真结果说明了本文的主要研究结果。
{"title":"Distributed switching control to achieve resilience to deep fades in leader-follower nonholonomic systems","authors":"B. Hu, M. Lemmon","doi":"10.1145/2566468.2566473","DOIUrl":"https://doi.org/10.1145/2566468.2566473","url":null,"abstract":"Leader-follower formation control is a widely used distributed control strategy that often needs systems to exchange information over a wireless radio communication network to coordinate their formations. These wireless networks are subject to deep fades, where a severe drop in the quality of the communication link occurs. Such deep fades may significantly impact the formation's performance and stability, and cause unexpected safety problems. In many applications, however, the variation in channel state is a function of the system's kinematic states. This suggests that channel state information can be used as a feedback signal to recover the performance loss caused by a deep fade. Assuming an exponentially bursty channel model, this paper proposes a distributed switching scheme under which a string of leader-follower nonholonomic system is almost surely practical stable in the presence of deep fades. Sufficient conditions are derived for each vehicle in the leader follower chain to decide which controller is placed in the feedback loop to assure almost sure practical stability. Simulation results are used to illustrate the main findings in the paper.","PeriodicalId":339979,"journal":{"name":"Proceedings of the 3rd international conference on High confidence networked systems","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132866609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Energy efficiency via incentive design and utility learning 通过激励设计和效用学习提高能源效率
L. Ratliff, Roy Dong, Henrik Ohlsson, S. Sastry
Utility companies have many motivations for modifying energy consumption patterns of consumers such as revenue decoupling and demand response programs. We model the utility company-consumer interaction as a principal-agent problem and present an iterative algorithm for designing incentives while estimating the consumer's utility function.
公用事业公司有许多动机来改变消费者的能源消费模式,如收入脱钩和需求响应计划。我们将公用事业公司与消费者的互动建模为一个委托代理问题,并提出了一种迭代算法来设计激励,同时估计消费者的效用函数。
{"title":"Energy efficiency via incentive design and utility learning","authors":"L. Ratliff, Roy Dong, Henrik Ohlsson, S. Sastry","doi":"10.1145/2566468.2576849","DOIUrl":"https://doi.org/10.1145/2566468.2576849","url":null,"abstract":"Utility companies have many motivations for modifying energy consumption patterns of consumers such as revenue decoupling and demand response programs. We model the utility company-consumer interaction as a principal-agent problem and present an iterative algorithm for designing incentives while estimating the consumer's utility function.","PeriodicalId":339979,"journal":{"name":"Proceedings of the 3rd international conference on High confidence networked systems","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126932249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 3rd international conference on High confidence networked systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1