Pub Date : 2023-04-26DOI: 10.1109/WFCS57264.2023.10144249
R. J. Bril, Hamid Hassani, P. Cuijpers, Geoffrey Nelissen
The existing worst-case response time (WCRT) analysis for individual priority classes under credit-based shaping (CBS) in Ethernet AVB based on so-called eligible intervals is both independent and tight. This WCRT analysis does not rely on any assumptions on interfering inter-priority streams other than those enforced by the Ethernet standard. A major advantage of this independent analysis is that CBS may be viewed as resource reservation, where allocated bandwidth is both guaranteed and enforced. Although independent analysis provides inter-priority class robustness, it comes at a cost of over-provisioning bandwidth. We illustrate this cost of inter-priority class robustness by means of an example that requires 7.8 times the amount of bandwidth reservation for a given set of streams compared to a different analysis that takes knowledge of inter-priority streams into account.
{"title":"Cost of Robustness of Independent WCRT Analysis for CBS of Ethernet AVB Using Eligible Intervals","authors":"R. J. Bril, Hamid Hassani, P. Cuijpers, Geoffrey Nelissen","doi":"10.1109/WFCS57264.2023.10144249","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144249","url":null,"abstract":"The existing worst-case response time (WCRT) analysis for individual priority classes under credit-based shaping (CBS) in Ethernet AVB based on so-called eligible intervals is both independent and tight. This WCRT analysis does not rely on any assumptions on interfering inter-priority streams other than those enforced by the Ethernet standard. A major advantage of this independent analysis is that CBS may be viewed as resource reservation, where allocated bandwidth is both guaranteed and enforced. Although independent analysis provides inter-priority class robustness, it comes at a cost of over-provisioning bandwidth. We illustrate this cost of inter-priority class robustness by means of an example that requires 7.8 times the amount of bandwidth reservation for a given set of streams compared to a different analysis that takes knowledge of inter-priority streams into account.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134299794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-26DOI: 10.1109/WFCS57264.2023.10144230
Luis M. Bartolín-Arnau, J. Vera-Pérez, V. Sempere-Payá, J. Silvestre-Blanes
The introduction of the Factory of the Future, Artificial Intelligence, Big Data and the cloud computing paradigm in industrial use cases means that new communication systems to support their requirements must be developed. The fifth generation of cellular networks (5G) has become one of the most relevant alternatives in this field. Within 5G network infrastructures, there are public networks along with private 5G networks, which allow a private entity to have its own local 5G network to cover its needs. However, the regulations in place in Europe, and the spectrum reserved for private 5G, mean that it cannot meet the requirements of some of the industrial applications for which it was intended. Therefore, it is necessary to analyze the parameters of the 5G network to find the operating thresholds according to the requirements set by 3GPP.
{"title":"Private 5G Networks for Cyber-Physical Control Applications in Vertical Domains","authors":"Luis M. Bartolín-Arnau, J. Vera-Pérez, V. Sempere-Payá, J. Silvestre-Blanes","doi":"10.1109/WFCS57264.2023.10144230","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144230","url":null,"abstract":"The introduction of the Factory of the Future, Artificial Intelligence, Big Data and the cloud computing paradigm in industrial use cases means that new communication systems to support their requirements must be developed. The fifth generation of cellular networks (5G) has become one of the most relevant alternatives in this field. Within 5G network infrastructures, there are public networks along with private 5G networks, which allow a private entity to have its own local 5G network to cover its needs. However, the regulations in place in Europe, and the spectrum reserved for private 5G, mean that it cannot meet the requirements of some of the industrial applications for which it was intended. Therefore, it is necessary to analyze the parameters of the 5G network to find the operating thresholds according to the requirements set by 3GPP.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134356214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-26DOI: 10.1109/WFCS57264.2023.10144121
J. Haxhibeqiri, Xianjun Jiao, Pablo Avila-Campos, I. Moerman, J. Hoebeke
End-to-end low-latency deterministic communication, next to high-reliability communication, is one of the key features that communication systems are expected to provide for industrial systems. To achieve time-sensitive networking (TSN), a set of standards have already been designed and deployed for wired industrial communication systems, coexisting or replacing other long-living technologies such as Fieldbus, Profibus, or Modbus. Wireless time-sensitive networking (W-TSN) is getting traction with the development of the newest WiFi generation (IEEE 802.11be) as well as advances in cellular networking. One of the challenges in W-TSN is scheduling and isolation of time-critical traffic in the shared wireless medium. In this paper we present a solution, called dynamic traffic classification, to give faster dedicated access to the wireless medium for packets of highly-time-sensitive flows, that can be generated randomly. Dynamic traffic classification utilizes so-called shadow queues implemented in FPGA-based WiFi baseband SDR platform, openwifi, to prioritize channel access of certain packets over others. We show that the channel access latency in the case of dynamic traffic classification does not depend on the scheduling cycle, but on the distribution of dedicated time slots inside the schedule cycle. As such we achieve to decrease the end-to-end latency by 75% in case of longer communication cycles with wider space between communication time slots.
{"title":"To Update or Not: Dynamic Traffic Classification for High Priority Traffic in Wireless TSN","authors":"J. Haxhibeqiri, Xianjun Jiao, Pablo Avila-Campos, I. Moerman, J. Hoebeke","doi":"10.1109/WFCS57264.2023.10144121","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144121","url":null,"abstract":"End-to-end low-latency deterministic communication, next to high-reliability communication, is one of the key features that communication systems are expected to provide for industrial systems. To achieve time-sensitive networking (TSN), a set of standards have already been designed and deployed for wired industrial communication systems, coexisting or replacing other long-living technologies such as Fieldbus, Profibus, or Modbus. Wireless time-sensitive networking (W-TSN) is getting traction with the development of the newest WiFi generation (IEEE 802.11be) as well as advances in cellular networking. One of the challenges in W-TSN is scheduling and isolation of time-critical traffic in the shared wireless medium. In this paper we present a solution, called dynamic traffic classification, to give faster dedicated access to the wireless medium for packets of highly-time-sensitive flows, that can be generated randomly. Dynamic traffic classification utilizes so-called shadow queues implemented in FPGA-based WiFi baseband SDR platform, openwifi, to prioritize channel access of certain packets over others. We show that the channel access latency in the case of dynamic traffic classification does not depend on the scheduling cycle, but on the distribution of dedicated time slots inside the schedule cycle. As such we achieve to decrease the end-to-end latency by 75% in case of longer communication cycles with wider space between communication time slots.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127551046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-26DOI: 10.1109/WFCS57264.2023.10144235
F. Quitin, M. Osée
The Control Area Network (CAN) standard is a communication standard for cabled bus networks that is widely used in industrial environments. The CAN protocol implements the Carrier Sense Multiple Access/Non Destructive Arbitration (CSMA/NDA) protocol for medium access control. Since CSMA/NDA requires full-duplex transceivers, it was widely believed that CAN communications could not be implemented with wireless transceivers. In this paper, we demonstrate that it is possible to implement the CSMA/NDA protocol using On-Off Keying (OOK) modulation. We realize a proof-of-concept implementation using off-the-shelf wireless OOK transceivers, and show that our wireless transceivers are fully compatible with CAN controllers available on most micro-controller systems.
控制区域网络(CAN)标准是广泛应用于工业环境的有线总线网络的通信标准。CAN协议实现CSMA/NDA (Carrier Sense Multiple Access/Non - Destructive Arbitration)协议,用于介质访问控制。由于CSMA/NDA需要全双工收发器,因此人们普遍认为CAN通信无法通过无线收发器实现。在本文中,我们证明了使用开关键控(OOK)调制实现CSMA/NDA协议是可能的。我们使用现成的无线OOK收发器实现了概念验证,并表明我们的无线收发器与大多数微控制器系统上可用的CAN控制器完全兼容。
{"title":"A Wireless Transceiver for Control Area Networks: Proof-of-Concept Implementation","authors":"F. Quitin, M. Osée","doi":"10.1109/WFCS57264.2023.10144235","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144235","url":null,"abstract":"The Control Area Network (CAN) standard is a communication standard for cabled bus networks that is widely used in industrial environments. The CAN protocol implements the Carrier Sense Multiple Access/Non Destructive Arbitration (CSMA/NDA) protocol for medium access control. Since CSMA/NDA requires full-duplex transceivers, it was widely believed that CAN communications could not be implemented with wireless transceivers. In this paper, we demonstrate that it is possible to implement the CSMA/NDA protocol using On-Off Keying (OOK) modulation. We realize a proof-of-concept implementation using off-the-shelf wireless OOK transceivers, and show that our wireless transceivers are fully compatible with CAN controllers available on most micro-controller systems.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130436177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-26DOI: 10.1109/WFCS57264.2023.10144118
Xiaojing Fan, T. Zheng, Shangpeng Sun, M. Gidlund, J. Åkerberg
The rise of technologies such as 6G networks, edge computing, and the Industrial Internet has led to a dramatic increase in the amount of data that needs to be transmitted over heterogeneous integrated networks. The resources of embedded devices limit the ability of the Industrial Internet to transmit data. While the multipath transmission mechanism can mitigate data transmission issues of low reliability and low real-time performance from the network-level perspective. As the complexity of industry applications increases, however, the phenomenon that the high-quality data transmission is subject to the influence of the underlying layer is becoming increasingly apparent. The paper aims to explores the possibility of multipath transmission protocol running on a real-time kernel from the perspective of the operating system, as there is a lack of research and reports in this area. Based on RT-Preempt, a real-time system RT-Linux suitable for the “NXP i.MX6Q” ARM integrated board has been proposed, which replaces the native Linux kernel to optimize and enhance its real-time performance. As described in the experiment part, the original standard Linux system OR-Linux and the new RT-Linux are tested with single-threaded and multi-threaded load experiments, respectively. The results of the analysis show that this paper provides a way of validating the trial data and ensuring its accuracy using the lognormal distribution model, which is a statistical distribution used to model variables that are positive and skewed to the right. The RT-Linux scheme has better real-time performance and is more stable than the OR-Linux scheme after real-time processing, showing the viability of the scheme.
{"title":"Can Embedded Real-Time Linux System Effectively Support Multipath Transmission? An Experimental Study","authors":"Xiaojing Fan, T. Zheng, Shangpeng Sun, M. Gidlund, J. Åkerberg","doi":"10.1109/WFCS57264.2023.10144118","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144118","url":null,"abstract":"The rise of technologies such as 6G networks, edge computing, and the Industrial Internet has led to a dramatic increase in the amount of data that needs to be transmitted over heterogeneous integrated networks. The resources of embedded devices limit the ability of the Industrial Internet to transmit data. While the multipath transmission mechanism can mitigate data transmission issues of low reliability and low real-time performance from the network-level perspective. As the complexity of industry applications increases, however, the phenomenon that the high-quality data transmission is subject to the influence of the underlying layer is becoming increasingly apparent. The paper aims to explores the possibility of multipath transmission protocol running on a real-time kernel from the perspective of the operating system, as there is a lack of research and reports in this area. Based on RT-Preempt, a real-time system RT-Linux suitable for the “NXP i.MX6Q” ARM integrated board has been proposed, which replaces the native Linux kernel to optimize and enhance its real-time performance. As described in the experiment part, the original standard Linux system OR-Linux and the new RT-Linux are tested with single-threaded and multi-threaded load experiments, respectively. The results of the analysis show that this paper provides a way of validating the trial data and ensuring its accuracy using the lognormal distribution model, which is a statistical distribution used to model variables that are positive and skewed to the right. The RT-Linux scheme has better real-time performance and is more stable than the OR-Linux scheme after real-time processing, showing the viability of the scheme.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133143030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-26DOI: 10.1109/WFCS57264.2023.10144236
E. Peter, W. Endemann, R. Kays
Parallel sequence spread spectrum (PSSS) is a novel physical layer (PHY) technique allowing a flexible resource allocation through code multiplexing. This broadband technique is designed for high data rates in industrial applications, as it offers benefits in fading environments at a relatively low hardware complexity. In this paper we compare different approaches for the equalization of wireless channels in a PSSS communication system. For this purpose we employ multiple baseband impulse responses representing diverse transmission conditions. We analyze the performance of the cyclic prefix based PSSS design from previous work and compare it with our more efficient equalization approaches.
{"title":"PSSS Design for Efficient Equalization","authors":"E. Peter, W. Endemann, R. Kays","doi":"10.1109/WFCS57264.2023.10144236","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144236","url":null,"abstract":"Parallel sequence spread spectrum (PSSS) is a novel physical layer (PHY) technique allowing a flexible resource allocation through code multiplexing. This broadband technique is designed for high data rates in industrial applications, as it offers benefits in fading environments at a relatively low hardware complexity. In this paper we compare different approaches for the equalization of wireless channels in a PSSS communication system. For this purpose we employ multiple baseband impulse responses representing diverse transmission conditions. We analyze the performance of the cyclic prefix based PSSS design from previous work and compare it with our more efficient equalization approaches.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127526006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-26DOI: 10.1109/WFCS57264.2023.10144240
Joseba Osa, N. Björsell, P. Ängskog, I. Val, M. Mendicute
Communication systems are a key element for the industry 4.0 revolution, where the remote access to the machinery is a fundamental part for the automation of tasks related to monitoring and control of the different industrial processes. There is an increasing interest in performing such communications using a wireless medium, as they offer several advantages as a lower cost, greater flexibility or the ability to operate in moving elements. However, existing works have showed that the achievable performance in the sub-6 GHz frequency bands is insufficient to cope with all the requirements, which motivated the analysis of the millimeter wave spectrum for these use cases. Industrial environments present a harsh condition for electromagnetic wave propagation, where the abundance of reflective surfaces can present difficulties to properly exchange information. Thus, a thorough analysis and characterization of the propagation through this kind of environment is necessary to develop protocols and standards accordingly. This work provides the results of measurements carried out in two industrial facilities, which are a university workshop and a pit oven building from a steel company. Metrics of the results are computed and discussed as well, where a significantly larger losses can be seen for the pit oven measurements compared to other industrial scenarios.
{"title":"60 GHz mmWave Signal Propagation Characterization in Workshop and Steel Industry","authors":"Joseba Osa, N. Björsell, P. Ängskog, I. Val, M. Mendicute","doi":"10.1109/WFCS57264.2023.10144240","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144240","url":null,"abstract":"Communication systems are a key element for the industry 4.0 revolution, where the remote access to the machinery is a fundamental part for the automation of tasks related to monitoring and control of the different industrial processes. There is an increasing interest in performing such communications using a wireless medium, as they offer several advantages as a lower cost, greater flexibility or the ability to operate in moving elements. However, existing works have showed that the achievable performance in the sub-6 GHz frequency bands is insufficient to cope with all the requirements, which motivated the analysis of the millimeter wave spectrum for these use cases. Industrial environments present a harsh condition for electromagnetic wave propagation, where the abundance of reflective surfaces can present difficulties to properly exchange information. Thus, a thorough analysis and characterization of the propagation through this kind of environment is necessary to develop protocols and standards accordingly. This work provides the results of measurements carried out in two industrial facilities, which are a university workshop and a pit oven building from a steel company. Metrics of the results are computed and discussed as well, where a significantly larger losses can be seen for the pit oven measurements compared to other industrial scenarios.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114493528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-26DOI: 10.1109/WFCS57264.2023.10144114
H. Ochiai, Md. Delwar Hossain, Y. Kadobayashi, H. Esaki
Cyber-attacks on industrial control systems (ICSs) may cause huge damage to our society and our lives. RS-485 is a backbone network for many ICSs deployed worldwide as a standard. Attack detection in the RS-485 network has been studied in the past. However, the operator still needs to identify and eliminate the attacker in the network after detected, which may require a huge downtime of the system. We propose an attacker localization framework for RS-485 networks. This framework uses (1) a current transformer for monitoring the analog signals of the communication line and (2) machine learning for detecting and localizing the attacker. We have carried out a performance evaluation on a 200-meter scale testbed and found that regression-based localization model performed the best with an averaging aggregator. It could estimate the location of the attacker with about 100% accuracy if we could obtain 6 or 10 attacker points in the training dataset. It could also estimate the location with 93%-96% accuracy with only 4 attacker training points, which would be still practically useful for finding the attacker in RS-485 network.
{"title":"Attacker Localization with Machine Learning in RS-485 Industrial Control Networks","authors":"H. Ochiai, Md. Delwar Hossain, Y. Kadobayashi, H. Esaki","doi":"10.1109/WFCS57264.2023.10144114","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144114","url":null,"abstract":"Cyber-attacks on industrial control systems (ICSs) may cause huge damage to our society and our lives. RS-485 is a backbone network for many ICSs deployed worldwide as a standard. Attack detection in the RS-485 network has been studied in the past. However, the operator still needs to identify and eliminate the attacker in the network after detected, which may require a huge downtime of the system. We propose an attacker localization framework for RS-485 networks. This framework uses (1) a current transformer for monitoring the analog signals of the communication line and (2) machine learning for detecting and localizing the attacker. We have carried out a performance evaluation on a 200-meter scale testbed and found that regression-based localization model performed the best with an averaging aggregator. It could estimate the location of the attacker with about 100% accuracy if we could obtain 6 or 10 attacker points in the training dataset. It could also estimate the location with 93%-96% accuracy with only 4 attacker training points, which would be still practically useful for finding the attacker in RS-485 network.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128317710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-26DOI: 10.1109/WFCS57264.2023.10144237
M. Maliosz, I. Moldován, M. Máté, Csaba Simon, J. Harmatos
Time Sensitive Networking (TSN) is a key enabler technology for Industry 4.0. TSN provides the basic building block for network convergence: instead of having multiple, parallel communication networks for each traffic type in the factory, it provides a common ground that can fulfill the Quality-of-Service requirements of all existing networks with a single, shared infrastructure. The next step on this path is the convergence of the computing infrastructure, where on-premises cloud technology will be used to aggregate the different process controllers into a cloud computing environment. In this paper, we highlight some of the challenges in the cloudification of TSN traffic endpoints, and present an architecture design for TSN and cloud integration. We have set up a testbed and carried out measurements to show how the requirements of an industrial network can be met with cloudified TSN functions.
{"title":"Deterministic Local Cloud for Industrial Applications","authors":"M. Maliosz, I. Moldován, M. Máté, Csaba Simon, J. Harmatos","doi":"10.1109/WFCS57264.2023.10144237","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144237","url":null,"abstract":"Time Sensitive Networking (TSN) is a key enabler technology for Industry 4.0. TSN provides the basic building block for network convergence: instead of having multiple, parallel communication networks for each traffic type in the factory, it provides a common ground that can fulfill the Quality-of-Service requirements of all existing networks with a single, shared infrastructure. The next step on this path is the convergence of the computing infrastructure, where on-premises cloud technology will be used to aggregate the different process controllers into a cloud computing environment. In this paper, we highlight some of the challenges in the cloudification of TSN traffic endpoints, and present an architecture design for TSN and cloud integration. We have set up a testbed and carried out measurements to show how the requirements of an industrial network can be met with cloudified TSN functions.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"285 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124550676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-26DOI: 10.1109/WFCS57264.2023.10144120
O. Abraham, H. Ochiai, Md. Delwar Hossain, Yuzo Taenaka, Y. Kadobayashi
Electricity thefts are conventionally manually detected by inspections, accusations, and the failure of meters. However, the recent evolution of machine learning may allow the automatic detection of electricity theft only from the patterns of meter readings. Electric consumption heavily relies on many factors, e.g., the lifestyle of the day and the weather, and thus the accuracy of detection is questioned. We propose an electricity theft detection framework for smart homes with knowledge-based synthetic attack data. This allows training of the attack classifier only from the legitimate power consumption data, i.e, without attack actions and associated labels. We identified five attack patterns as the knowledge which consisted of smart attacks and legacy attacks. We have conducted comprehensive evaluations with nine machine learning models using the Almanac of Minutely Power dataset version 2 (AMPds2) dataset fine-grained time-series data of a smart home. We found that Gradient Boosting-based algorithms achieved the best, and Random Forest performed alternatively with almost 100% accuracy for detecting and classifying legacy attacks. Some smart attacks were not detected, but those algorithms achieved good performance in detection and classification.
电力盗窃通常是通过检查、指控和仪表故障来手动检测的。然而,最近机器学习的发展可能只允许从电表读数模式自动检测电力盗窃。电力消耗严重依赖于许多因素,例如,一天的生活方式和天气,因此检测的准确性受到质疑。我们提出了一种基于知识的综合攻击数据的智能家居窃电检测框架。这允许仅从合法的功耗数据训练攻击分类器,也就是说,不需要攻击动作和相关标签。我们确定了五种攻击模式作为知识,包括智能攻击和遗留攻击。我们利用一个智能家居的细粒度时间序列数据集AMPds2 (Almanac of minetulypower dataset version 2)对9个机器学习模型进行了综合评估。我们发现基于梯度增强的算法达到了最好的效果,而随机森林在检测和分类遗留攻击方面的准确率几乎为100%。一些智能攻击没有被检测到,但这些算法在检测和分类方面取得了很好的效果。
{"title":"Electricity Theft Detection for Smart Homes with Knowledge-Based Synthetic Attack Data","authors":"O. Abraham, H. Ochiai, Md. Delwar Hossain, Yuzo Taenaka, Y. Kadobayashi","doi":"10.1109/WFCS57264.2023.10144120","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144120","url":null,"abstract":"Electricity thefts are conventionally manually detected by inspections, accusations, and the failure of meters. However, the recent evolution of machine learning may allow the automatic detection of electricity theft only from the patterns of meter readings. Electric consumption heavily relies on many factors, e.g., the lifestyle of the day and the weather, and thus the accuracy of detection is questioned. We propose an electricity theft detection framework for smart homes with knowledge-based synthetic attack data. This allows training of the attack classifier only from the legitimate power consumption data, i.e, without attack actions and associated labels. We identified five attack patterns as the knowledge which consisted of smart attacks and legacy attacks. We have conducted comprehensive evaluations with nine machine learning models using the Almanac of Minutely Power dataset version 2 (AMPds2) dataset fine-grained time-series data of a smart home. We found that Gradient Boosting-based algorithms achieved the best, and Random Forest performed alternatively with almost 100% accuracy for detecting and classifying legacy attacks. Some smart attacks were not detected, but those algorithms achieved good performance in detection and classification.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"27 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120909927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}