首页 > 最新文献

2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)最新文献

英文 中文
Cost of Robustness of Independent WCRT Analysis for CBS of Ethernet AVB Using Eligible Intervals 基于合格区间的以太网AVB CBS独立WCRT分析鲁棒性代价
Pub Date : 2023-04-26 DOI: 10.1109/WFCS57264.2023.10144249
R. J. Bril, Hamid Hassani, P. Cuijpers, Geoffrey Nelissen
The existing worst-case response time (WCRT) analysis for individual priority classes under credit-based shaping (CBS) in Ethernet AVB based on so-called eligible intervals is both independent and tight. This WCRT analysis does not rely on any assumptions on interfering inter-priority streams other than those enforced by the Ethernet standard. A major advantage of this independent analysis is that CBS may be viewed as resource reservation, where allocated bandwidth is both guaranteed and enforced. Although independent analysis provides inter-priority class robustness, it comes at a cost of over-provisioning bandwidth. We illustrate this cost of inter-priority class robustness by means of an example that requires 7.8 times the amount of bandwidth reservation for a given set of streams compared to a different analysis that takes knowledge of inter-priority streams into account.
现有的基于信用整形(CBS)的以太网AVB中各优先级的最坏情况响应时间(WCRT)分析是独立且严格的。这个WCRT分析不依赖于任何关于干扰优先级间流的假设,而不是以太网标准所强制的假设。这种独立分析的一个主要优点是,CBS可以被视为资源预留,其中分配的带宽得到保证和强制执行。尽管独立分析提供了优先级间类的健壮性,但它的代价是带宽供应过剩。我们通过一个示例来说明优先级间类鲁棒性的成本,该示例与考虑优先级间流知识的不同分析相比,需要7.8倍于给定流集的带宽预留量。
{"title":"Cost of Robustness of Independent WCRT Analysis for CBS of Ethernet AVB Using Eligible Intervals","authors":"R. J. Bril, Hamid Hassani, P. Cuijpers, Geoffrey Nelissen","doi":"10.1109/WFCS57264.2023.10144249","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144249","url":null,"abstract":"The existing worst-case response time (WCRT) analysis for individual priority classes under credit-based shaping (CBS) in Ethernet AVB based on so-called eligible intervals is both independent and tight. This WCRT analysis does not rely on any assumptions on interfering inter-priority streams other than those enforced by the Ethernet standard. A major advantage of this independent analysis is that CBS may be viewed as resource reservation, where allocated bandwidth is both guaranteed and enforced. Although independent analysis provides inter-priority class robustness, it comes at a cost of over-provisioning bandwidth. We illustrate this cost of inter-priority class robustness by means of an example that requires 7.8 times the amount of bandwidth reservation for a given set of streams compared to a different analysis that takes knowledge of inter-priority streams into account.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134299794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Private 5G Networks for Cyber-Physical Control Applications in Vertical Domains 面向垂直领域网络物理控制应用的5G专用网络
Pub Date : 2023-04-26 DOI: 10.1109/WFCS57264.2023.10144230
Luis M. Bartolín-Arnau, J. Vera-Pérez, V. Sempere-Payá, J. Silvestre-Blanes
The introduction of the Factory of the Future, Artificial Intelligence, Big Data and the cloud computing paradigm in industrial use cases means that new communication systems to support their requirements must be developed. The fifth generation of cellular networks (5G) has become one of the most relevant alternatives in this field. Within 5G network infrastructures, there are public networks along with private 5G networks, which allow a private entity to have its own local 5G network to cover its needs. However, the regulations in place in Europe, and the spectrum reserved for private 5G, mean that it cannot meet the requirements of some of the industrial applications for which it was intended. Therefore, it is necessary to analyze the parameters of the 5G network to find the operating thresholds according to the requirements set by 3GPP.
在工业用例中引入未来工厂、人工智能、大数据和云计算范式意味着必须开发新的通信系统来支持它们的需求。第五代蜂窝网络(5G)已成为该领域最相关的替代方案之一。在5G网络基础设施中,有公共网络和私有5G网络,允许私有实体拥有自己的本地5G网络来满足其需求。然而,欧洲现有的法规以及为私有5G保留的频谱意味着它无法满足某些工业应用的要求。因此,有必要对5G网络的参数进行分析,根据3GPP设定的要求找到运行阈值。
{"title":"Private 5G Networks for Cyber-Physical Control Applications in Vertical Domains","authors":"Luis M. Bartolín-Arnau, J. Vera-Pérez, V. Sempere-Payá, J. Silvestre-Blanes","doi":"10.1109/WFCS57264.2023.10144230","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144230","url":null,"abstract":"The introduction of the Factory of the Future, Artificial Intelligence, Big Data and the cloud computing paradigm in industrial use cases means that new communication systems to support their requirements must be developed. The fifth generation of cellular networks (5G) has become one of the most relevant alternatives in this field. Within 5G network infrastructures, there are public networks along with private 5G networks, which allow a private entity to have its own local 5G network to cover its needs. However, the regulations in place in Europe, and the spectrum reserved for private 5G, mean that it cannot meet the requirements of some of the industrial applications for which it was intended. Therefore, it is necessary to analyze the parameters of the 5G network to find the operating thresholds according to the requirements set by 3GPP.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134356214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
To Update or Not: Dynamic Traffic Classification for High Priority Traffic in Wireless TSN 更新还是不更新:无线TSN中高优先级流量的动态流量分类
Pub Date : 2023-04-26 DOI: 10.1109/WFCS57264.2023.10144121
J. Haxhibeqiri, Xianjun Jiao, Pablo Avila-Campos, I. Moerman, J. Hoebeke
End-to-end low-latency deterministic communication, next to high-reliability communication, is one of the key features that communication systems are expected to provide for industrial systems. To achieve time-sensitive networking (TSN), a set of standards have already been designed and deployed for wired industrial communication systems, coexisting or replacing other long-living technologies such as Fieldbus, Profibus, or Modbus. Wireless time-sensitive networking (W-TSN) is getting traction with the development of the newest WiFi generation (IEEE 802.11be) as well as advances in cellular networking. One of the challenges in W-TSN is scheduling and isolation of time-critical traffic in the shared wireless medium. In this paper we present a solution, called dynamic traffic classification, to give faster dedicated access to the wireless medium for packets of highly-time-sensitive flows, that can be generated randomly. Dynamic traffic classification utilizes so-called shadow queues implemented in FPGA-based WiFi baseband SDR platform, openwifi, to prioritize channel access of certain packets over others. We show that the channel access latency in the case of dynamic traffic classification does not depend on the scheduling cycle, but on the distribution of dedicated time slots inside the schedule cycle. As such we achieve to decrease the end-to-end latency by 75% in case of longer communication cycles with wider space between communication time slots.
端到端低延迟确定性通信,仅次于高可靠性通信,是通信系统有望为工业系统提供的关键特性之一。为了实现时间敏感网络(TSN),人们已经为有线工业通信系统设计和部署了一套标准,以共存或取代其他长期存在的技术,如现场总线、Profibus或Modbus。随着最新一代WiFi (IEEE 802.11be)的发展以及蜂窝网络的进步,无线时间敏感网络(W-TSN)正得到越来越多的关注。W-TSN面临的挑战之一是在共享无线媒体中调度和隔离时间关键型流量。在本文中,我们提出了一种称为动态流量分类的解决方案,以便为随机生成的高度时间敏感流的数据包提供更快的专用访问无线介质。动态流量分类利用基于fpga的WiFi基带SDR平台openwifi中实现的所谓影子队列,将某些数据包的通道访问优先于其他数据包。研究表明,动态流分类情况下的信道访问延迟与调度周期无关,而与调度周期内专用时隙的分布有关。因此,在通信周期较长、通信时隙间隔较宽的情况下,我们实现了端到端延迟减少75%。
{"title":"To Update or Not: Dynamic Traffic Classification for High Priority Traffic in Wireless TSN","authors":"J. Haxhibeqiri, Xianjun Jiao, Pablo Avila-Campos, I. Moerman, J. Hoebeke","doi":"10.1109/WFCS57264.2023.10144121","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144121","url":null,"abstract":"End-to-end low-latency deterministic communication, next to high-reliability communication, is one of the key features that communication systems are expected to provide for industrial systems. To achieve time-sensitive networking (TSN), a set of standards have already been designed and deployed for wired industrial communication systems, coexisting or replacing other long-living technologies such as Fieldbus, Profibus, or Modbus. Wireless time-sensitive networking (W-TSN) is getting traction with the development of the newest WiFi generation (IEEE 802.11be) as well as advances in cellular networking. One of the challenges in W-TSN is scheduling and isolation of time-critical traffic in the shared wireless medium. In this paper we present a solution, called dynamic traffic classification, to give faster dedicated access to the wireless medium for packets of highly-time-sensitive flows, that can be generated randomly. Dynamic traffic classification utilizes so-called shadow queues implemented in FPGA-based WiFi baseband SDR platform, openwifi, to prioritize channel access of certain packets over others. We show that the channel access latency in the case of dynamic traffic classification does not depend on the scheduling cycle, but on the distribution of dedicated time slots inside the schedule cycle. As such we achieve to decrease the end-to-end latency by 75% in case of longer communication cycles with wider space between communication time slots.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127551046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Wireless Transceiver for Control Area Networks: Proof-of-Concept Implementation 一种用于控制区域网络的无线收发器:概念验证实现
Pub Date : 2023-04-26 DOI: 10.1109/WFCS57264.2023.10144235
F. Quitin, M. Osée
The Control Area Network (CAN) standard is a communication standard for cabled bus networks that is widely used in industrial environments. The CAN protocol implements the Carrier Sense Multiple Access/Non Destructive Arbitration (CSMA/NDA) protocol for medium access control. Since CSMA/NDA requires full-duplex transceivers, it was widely believed that CAN communications could not be implemented with wireless transceivers. In this paper, we demonstrate that it is possible to implement the CSMA/NDA protocol using On-Off Keying (OOK) modulation. We realize a proof-of-concept implementation using off-the-shelf wireless OOK transceivers, and show that our wireless transceivers are fully compatible with CAN controllers available on most micro-controller systems.
控制区域网络(CAN)标准是广泛应用于工业环境的有线总线网络的通信标准。CAN协议实现CSMA/NDA (Carrier Sense Multiple Access/Non - Destructive Arbitration)协议,用于介质访问控制。由于CSMA/NDA需要全双工收发器,因此人们普遍认为CAN通信无法通过无线收发器实现。在本文中,我们证明了使用开关键控(OOK)调制实现CSMA/NDA协议是可能的。我们使用现成的无线OOK收发器实现了概念验证,并表明我们的无线收发器与大多数微控制器系统上可用的CAN控制器完全兼容。
{"title":"A Wireless Transceiver for Control Area Networks: Proof-of-Concept Implementation","authors":"F. Quitin, M. Osée","doi":"10.1109/WFCS57264.2023.10144235","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144235","url":null,"abstract":"The Control Area Network (CAN) standard is a communication standard for cabled bus networks that is widely used in industrial environments. The CAN protocol implements the Carrier Sense Multiple Access/Non Destructive Arbitration (CSMA/NDA) protocol for medium access control. Since CSMA/NDA requires full-duplex transceivers, it was widely believed that CAN communications could not be implemented with wireless transceivers. In this paper, we demonstrate that it is possible to implement the CSMA/NDA protocol using On-Off Keying (OOK) modulation. We realize a proof-of-concept implementation using off-the-shelf wireless OOK transceivers, and show that our wireless transceivers are fully compatible with CAN controllers available on most micro-controller systems.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130436177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can Embedded Real-Time Linux System Effectively Support Multipath Transmission? An Experimental Study 嵌入式实时Linux系统能有效支持多径传输吗?实验研究
Pub Date : 2023-04-26 DOI: 10.1109/WFCS57264.2023.10144118
Xiaojing Fan, T. Zheng, Shangpeng Sun, M. Gidlund, J. Åkerberg
The rise of technologies such as 6G networks, edge computing, and the Industrial Internet has led to a dramatic increase in the amount of data that needs to be transmitted over heterogeneous integrated networks. The resources of embedded devices limit the ability of the Industrial Internet to transmit data. While the multipath transmission mechanism can mitigate data transmission issues of low reliability and low real-time performance from the network-level perspective. As the complexity of industry applications increases, however, the phenomenon that the high-quality data transmission is subject to the influence of the underlying layer is becoming increasingly apparent. The paper aims to explores the possibility of multipath transmission protocol running on a real-time kernel from the perspective of the operating system, as there is a lack of research and reports in this area. Based on RT-Preempt, a real-time system RT-Linux suitable for the “NXP i.MX6Q” ARM integrated board has been proposed, which replaces the native Linux kernel to optimize and enhance its real-time performance. As described in the experiment part, the original standard Linux system OR-Linux and the new RT-Linux are tested with single-threaded and multi-threaded load experiments, respectively. The results of the analysis show that this paper provides a way of validating the trial data and ensuring its accuracy using the lognormal distribution model, which is a statistical distribution used to model variables that are positive and skewed to the right. The RT-Linux scheme has better real-time performance and is more stable than the OR-Linux scheme after real-time processing, showing the viability of the scheme.
6G网络、边缘计算和工业互联网等技术的兴起,导致需要通过异构集成网络传输的数据量急剧增加。嵌入式设备的资源限制了工业互联网传输数据的能力。而多路径传输机制可以从网络层面缓解数据传输的低可靠性和低实时性问题。然而,随着行业应用复杂性的增加,高质量的数据传输受到底层影响的现象也越来越明显。本文旨在从操作系统的角度探讨多路径传输协议在实时内核上运行的可能性,这方面的研究和报道还比较缺乏。基于rt -抢占,提出了一种适用于“NXP i.MX6Q”ARM集成板的实时系统RT-Linux,取代了原有的Linux内核,优化和提高了其实时性能。如实验部分所述,我们分别在原有的标准Linux系统OR-Linux和新的RT-Linux上进行单线程和多线程负载实验。分析结果表明,本文提供了一种利用对数正态分布模型验证试验数据并确保其准确性的方法,对数正态分布模型是一种用于对正向右偏的变量进行建模的统计分布。RT-Linux方案具有更好的实时性,并且经过实时处理后比OR-Linux方案更加稳定,显示了该方案的可行性。
{"title":"Can Embedded Real-Time Linux System Effectively Support Multipath Transmission? An Experimental Study","authors":"Xiaojing Fan, T. Zheng, Shangpeng Sun, M. Gidlund, J. Åkerberg","doi":"10.1109/WFCS57264.2023.10144118","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144118","url":null,"abstract":"The rise of technologies such as 6G networks, edge computing, and the Industrial Internet has led to a dramatic increase in the amount of data that needs to be transmitted over heterogeneous integrated networks. The resources of embedded devices limit the ability of the Industrial Internet to transmit data. While the multipath transmission mechanism can mitigate data transmission issues of low reliability and low real-time performance from the network-level perspective. As the complexity of industry applications increases, however, the phenomenon that the high-quality data transmission is subject to the influence of the underlying layer is becoming increasingly apparent. The paper aims to explores the possibility of multipath transmission protocol running on a real-time kernel from the perspective of the operating system, as there is a lack of research and reports in this area. Based on RT-Preempt, a real-time system RT-Linux suitable for the “NXP i.MX6Q” ARM integrated board has been proposed, which replaces the native Linux kernel to optimize and enhance its real-time performance. As described in the experiment part, the original standard Linux system OR-Linux and the new RT-Linux are tested with single-threaded and multi-threaded load experiments, respectively. The results of the analysis show that this paper provides a way of validating the trial data and ensuring its accuracy using the lognormal distribution model, which is a statistical distribution used to model variables that are positive and skewed to the right. The RT-Linux scheme has better real-time performance and is more stable than the OR-Linux scheme after real-time processing, showing the viability of the scheme.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133143030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PSSS Design for Efficient Equalization 高效均衡的PSSS设计
Pub Date : 2023-04-26 DOI: 10.1109/WFCS57264.2023.10144236
E. Peter, W. Endemann, R. Kays
Parallel sequence spread spectrum (PSSS) is a novel physical layer (PHY) technique allowing a flexible resource allocation through code multiplexing. This broadband technique is designed for high data rates in industrial applications, as it offers benefits in fading environments at a relatively low hardware complexity. In this paper we compare different approaches for the equalization of wireless channels in a PSSS communication system. For this purpose we employ multiple baseband impulse responses representing diverse transmission conditions. We analyze the performance of the cyclic prefix based PSSS design from previous work and compare it with our more efficient equalization approaches.
并行序列扩频(PSSS)是一种新的物理层(PHY)技术,可以通过代码复用实现灵活的资源分配。这种宽带技术是为工业应用中的高数据速率而设计的,因为它在衰落环境中以相对较低的硬件复杂性提供了好处。在本文中,我们比较了在PSSS通信系统中实现无线信道均衡的不同方法。为此,我们采用代表不同传输条件的多个基带脉冲响应。我们从之前的工作中分析了基于循环前缀的PSSS设计的性能,并将其与更有效的均衡方法进行了比较。
{"title":"PSSS Design for Efficient Equalization","authors":"E. Peter, W. Endemann, R. Kays","doi":"10.1109/WFCS57264.2023.10144236","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144236","url":null,"abstract":"Parallel sequence spread spectrum (PSSS) is a novel physical layer (PHY) technique allowing a flexible resource allocation through code multiplexing. This broadband technique is designed for high data rates in industrial applications, as it offers benefits in fading environments at a relatively low hardware complexity. In this paper we compare different approaches for the equalization of wireless channels in a PSSS communication system. For this purpose we employ multiple baseband impulse responses representing diverse transmission conditions. We analyze the performance of the cyclic prefix based PSSS design from previous work and compare it with our more efficient equalization approaches.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127526006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
60 GHz mmWave Signal Propagation Characterization in Workshop and Steel Industry 60ghz毫米波信号在车间和钢铁工业中的传播特性
Pub Date : 2023-04-26 DOI: 10.1109/WFCS57264.2023.10144240
Joseba Osa, N. Björsell, P. Ängskog, I. Val, M. Mendicute
Communication systems are a key element for the industry 4.0 revolution, where the remote access to the machinery is a fundamental part for the automation of tasks related to monitoring and control of the different industrial processes. There is an increasing interest in performing such communications using a wireless medium, as they offer several advantages as a lower cost, greater flexibility or the ability to operate in moving elements. However, existing works have showed that the achievable performance in the sub-6 GHz frequency bands is insufficient to cope with all the requirements, which motivated the analysis of the millimeter wave spectrum for these use cases. Industrial environments present a harsh condition for electromagnetic wave propagation, where the abundance of reflective surfaces can present difficulties to properly exchange information. Thus, a thorough analysis and characterization of the propagation through this kind of environment is necessary to develop protocols and standards accordingly. This work provides the results of measurements carried out in two industrial facilities, which are a university workshop and a pit oven building from a steel company. Metrics of the results are computed and discussed as well, where a significantly larger losses can be seen for the pit oven measurements compared to other industrial scenarios.
通信系统是工业4.0革命的关键要素,其中远程访问机器是与不同工业过程的监视和控制相关的自动化任务的基本部分。人们对使用无线媒介进行这种通信越来越感兴趣,因为它们具有成本更低、灵活性更大或在移动元件中操作的能力等优点。然而,现有工作表明,在6 GHz以下频段可实现的性能不足以满足所有需求,这促使对这些用例的毫米波频谱进行分析。工业环境为电磁波传播提供了一个恶劣的条件,其中大量的反射表面可能会给正确交换信息带来困难。因此,有必要对这种环境中的传播进行彻底的分析和表征,从而制定相应的协议和标准。这项工作提供了在两个工业设施中进行的测量结果,这两个工业设施是一个大学车间和一个钢铁公司的窖炉建筑。对结果的度量进行了计算和讨论,其中与其他工业场景相比,坑炉测量的损失要大得多。
{"title":"60 GHz mmWave Signal Propagation Characterization in Workshop and Steel Industry","authors":"Joseba Osa, N. Björsell, P. Ängskog, I. Val, M. Mendicute","doi":"10.1109/WFCS57264.2023.10144240","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144240","url":null,"abstract":"Communication systems are a key element for the industry 4.0 revolution, where the remote access to the machinery is a fundamental part for the automation of tasks related to monitoring and control of the different industrial processes. There is an increasing interest in performing such communications using a wireless medium, as they offer several advantages as a lower cost, greater flexibility or the ability to operate in moving elements. However, existing works have showed that the achievable performance in the sub-6 GHz frequency bands is insufficient to cope with all the requirements, which motivated the analysis of the millimeter wave spectrum for these use cases. Industrial environments present a harsh condition for electromagnetic wave propagation, where the abundance of reflective surfaces can present difficulties to properly exchange information. Thus, a thorough analysis and characterization of the propagation through this kind of environment is necessary to develop protocols and standards accordingly. This work provides the results of measurements carried out in two industrial facilities, which are a university workshop and a pit oven building from a steel company. Metrics of the results are computed and discussed as well, where a significantly larger losses can be seen for the pit oven measurements compared to other industrial scenarios.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114493528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attacker Localization with Machine Learning in RS-485 Industrial Control Networks RS-485工业控制网络中基于机器学习的攻击者定位
Pub Date : 2023-04-26 DOI: 10.1109/WFCS57264.2023.10144114
H. Ochiai, Md. Delwar Hossain, Y. Kadobayashi, H. Esaki
Cyber-attacks on industrial control systems (ICSs) may cause huge damage to our society and our lives. RS-485 is a backbone network for many ICSs deployed worldwide as a standard. Attack detection in the RS-485 network has been studied in the past. However, the operator still needs to identify and eliminate the attacker in the network after detected, which may require a huge downtime of the system. We propose an attacker localization framework for RS-485 networks. This framework uses (1) a current transformer for monitoring the analog signals of the communication line and (2) machine learning for detecting and localizing the attacker. We have carried out a performance evaluation on a 200-meter scale testbed and found that regression-based localization model performed the best with an averaging aggregator. It could estimate the location of the attacker with about 100% accuracy if we could obtain 6 or 10 attacker points in the training dataset. It could also estimate the location with 93%-96% accuracy with only 4 attacker training points, which would be still practically useful for finding the attacker in RS-485 network.
针对工业控制系统(ics)的网络攻击可能会对我们的社会和生活造成巨大的破坏。RS-485是全球部署的许多ics的骨干网络标准。RS-485网络中的攻击检测已经在过去进行了研究。但是,在检测到攻击者后,运营商仍然需要识别和消除网络中的攻击者,这可能需要大量的系统停机时间。我们提出了一个针对RS-485网络的攻击者定位框架。该框架使用(1)电流互感器来监控通信线路的模拟信号,(2)机器学习来检测和定位攻击者。我们在一个200米尺度的测试平台上进行了性能评估,发现基于回归的定位模型在平均聚合器下表现最好。如果我们能在训练数据集中获得6或10个攻击者点,它可以估计攻击者的位置,准确率约为100%。它还可以仅用4个攻击者训练点就以93%-96%的准确率估计位置,这对于在RS-485网络中寻找攻击者仍然是实用的。
{"title":"Attacker Localization with Machine Learning in RS-485 Industrial Control Networks","authors":"H. Ochiai, Md. Delwar Hossain, Y. Kadobayashi, H. Esaki","doi":"10.1109/WFCS57264.2023.10144114","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144114","url":null,"abstract":"Cyber-attacks on industrial control systems (ICSs) may cause huge damage to our society and our lives. RS-485 is a backbone network for many ICSs deployed worldwide as a standard. Attack detection in the RS-485 network has been studied in the past. However, the operator still needs to identify and eliminate the attacker in the network after detected, which may require a huge downtime of the system. We propose an attacker localization framework for RS-485 networks. This framework uses (1) a current transformer for monitoring the analog signals of the communication line and (2) machine learning for detecting and localizing the attacker. We have carried out a performance evaluation on a 200-meter scale testbed and found that regression-based localization model performed the best with an averaging aggregator. It could estimate the location of the attacker with about 100% accuracy if we could obtain 6 or 10 attacker points in the training dataset. It could also estimate the location with 93%-96% accuracy with only 4 attacker training points, which would be still practically useful for finding the attacker in RS-485 network.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128317710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deterministic Local Cloud for Industrial Applications 工业应用的确定性本地云
Pub Date : 2023-04-26 DOI: 10.1109/WFCS57264.2023.10144237
M. Maliosz, I. Moldován, M. Máté, Csaba Simon, J. Harmatos
Time Sensitive Networking (TSN) is a key enabler technology for Industry 4.0. TSN provides the basic building block for network convergence: instead of having multiple, parallel communication networks for each traffic type in the factory, it provides a common ground that can fulfill the Quality-of-Service requirements of all existing networks with a single, shared infrastructure. The next step on this path is the convergence of the computing infrastructure, where on-premises cloud technology will be used to aggregate the different process controllers into a cloud computing environment. In this paper, we highlight some of the challenges in the cloudification of TSN traffic endpoints, and present an architecture design for TSN and cloud integration. We have set up a testbed and carried out measurements to show how the requirements of an industrial network can be met with cloudified TSN functions.
时间敏感网络(TSN)是工业4.0的关键使能技术。TSN为网络融合提供了基本的构建块:它不是为工厂中的每种流量类型提供多个并行通信网络,而是提供了一个公共基础,可以通过一个单一的共享基础设施满足所有现有网络的服务质量要求。这条道路上的下一步是计算基础设施的融合,其中将使用本地云技术将不同的过程控制器聚合到云计算环境中。在本文中,我们强调了TSN流量端点云化的一些挑战,并提出了TSN与云集成的架构设计。我们已经建立了一个试验台并进行了测量,以显示如何通过云化的TSN功能满足工业网络的要求。
{"title":"Deterministic Local Cloud for Industrial Applications","authors":"M. Maliosz, I. Moldován, M. Máté, Csaba Simon, J. Harmatos","doi":"10.1109/WFCS57264.2023.10144237","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144237","url":null,"abstract":"Time Sensitive Networking (TSN) is a key enabler technology for Industry 4.0. TSN provides the basic building block for network convergence: instead of having multiple, parallel communication networks for each traffic type in the factory, it provides a common ground that can fulfill the Quality-of-Service requirements of all existing networks with a single, shared infrastructure. The next step on this path is the convergence of the computing infrastructure, where on-premises cloud technology will be used to aggregate the different process controllers into a cloud computing environment. In this paper, we highlight some of the challenges in the cloudification of TSN traffic endpoints, and present an architecture design for TSN and cloud integration. We have set up a testbed and carried out measurements to show how the requirements of an industrial network can be met with cloudified TSN functions.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"285 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124550676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Electricity Theft Detection for Smart Homes with Knowledge-Based Synthetic Attack Data 基于知识综合攻击数据的智能家居窃电检测
Pub Date : 2023-04-26 DOI: 10.1109/WFCS57264.2023.10144120
O. Abraham, H. Ochiai, Md. Delwar Hossain, Yuzo Taenaka, Y. Kadobayashi
Electricity thefts are conventionally manually detected by inspections, accusations, and the failure of meters. However, the recent evolution of machine learning may allow the automatic detection of electricity theft only from the patterns of meter readings. Electric consumption heavily relies on many factors, e.g., the lifestyle of the day and the weather, and thus the accuracy of detection is questioned. We propose an electricity theft detection framework for smart homes with knowledge-based synthetic attack data. This allows training of the attack classifier only from the legitimate power consumption data, i.e, without attack actions and associated labels. We identified five attack patterns as the knowledge which consisted of smart attacks and legacy attacks. We have conducted comprehensive evaluations with nine machine learning models using the Almanac of Minutely Power dataset version 2 (AMPds2) dataset fine-grained time-series data of a smart home. We found that Gradient Boosting-based algorithms achieved the best, and Random Forest performed alternatively with almost 100% accuracy for detecting and classifying legacy attacks. Some smart attacks were not detected, but those algorithms achieved good performance in detection and classification.
电力盗窃通常是通过检查、指控和仪表故障来手动检测的。然而,最近机器学习的发展可能只允许从电表读数模式自动检测电力盗窃。电力消耗严重依赖于许多因素,例如,一天的生活方式和天气,因此检测的准确性受到质疑。我们提出了一种基于知识的综合攻击数据的智能家居窃电检测框架。这允许仅从合法的功耗数据训练攻击分类器,也就是说,不需要攻击动作和相关标签。我们确定了五种攻击模式作为知识,包括智能攻击和遗留攻击。我们利用一个智能家居的细粒度时间序列数据集AMPds2 (Almanac of minetulypower dataset version 2)对9个机器学习模型进行了综合评估。我们发现基于梯度增强的算法达到了最好的效果,而随机森林在检测和分类遗留攻击方面的准确率几乎为100%。一些智能攻击没有被检测到,但这些算法在检测和分类方面取得了很好的效果。
{"title":"Electricity Theft Detection for Smart Homes with Knowledge-Based Synthetic Attack Data","authors":"O. Abraham, H. Ochiai, Md. Delwar Hossain, Yuzo Taenaka, Y. Kadobayashi","doi":"10.1109/WFCS57264.2023.10144120","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144120","url":null,"abstract":"Electricity thefts are conventionally manually detected by inspections, accusations, and the failure of meters. However, the recent evolution of machine learning may allow the automatic detection of electricity theft only from the patterns of meter readings. Electric consumption heavily relies on many factors, e.g., the lifestyle of the day and the weather, and thus the accuracy of detection is questioned. We propose an electricity theft detection framework for smart homes with knowledge-based synthetic attack data. This allows training of the attack classifier only from the legitimate power consumption data, i.e, without attack actions and associated labels. We identified five attack patterns as the knowledge which consisted of smart attacks and legacy attacks. We have conducted comprehensive evaluations with nine machine learning models using the Almanac of Minutely Power dataset version 2 (AMPds2) dataset fine-grained time-series data of a smart home. We found that Gradient Boosting-based algorithms achieved the best, and Random Forest performed alternatively with almost 100% accuracy for detecting and classifying legacy attacks. Some smart attacks were not detected, but those algorithms achieved good performance in detection and classification.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"27 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120909927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1