首页 > 最新文献

IET Cyber-Physical Systems: Theory and Applications最新文献

英文 中文
Optimising Energy Efficiency in Agricultural Consumer Electronics Using Principal Component Analysis and Deep Q-Learning 利用主成分分析和深度q -学习优化农业消费电子产品的能源效率
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-05 DOI: 10.1049/cps2.70029
Subir Gupta, Upasana Adhikari, Pinky Pramanik, Subrata Chowdhury, Shreyas J., Anurag Sinha, Saifullah Khalid, Malathi S. Y.

The ability to reduce emissions and improve sustainability in agricultural consumer electronics has been significantly hindered due to the use of energy-intensive technology within the agricultural sector. This study proposes a new enhancement of deep Q-learning (DQN) with principal component analysis (PCA) focused on energy efficiency. PCA helps manage massive operational data by performing dimensionality reduction, whereas DQN, a reinforcement learning paradigm, optimises decision-making during real-world interactions. The main contribution of this study is in the combined use of PCA and DQN to form customisable, precise, contest-responsive energy frameworks powered by real-time analytics on agricultural data—energy management on such a scale has not been approached in the context of sustainable agriculture before. The experiments confirm the optimal model, further achieving a cumulative reward of 72.56, an average emission of 1.83, a Q-value of 24.76 and a total zenith value of 75.40% in ensuring numerous noncriteria-defined efficient energy-dependent operations. This paradigm not only fills the void in the automation of passive intelligent agricultural systems but also serves as a point of reference for other eco-critical domains to strive towards greener technology.

由于在农业部门使用能源密集型技术,减少农业消费电子产品排放和提高可持续性的能力受到了严重阻碍。本文提出了一种基于能量效率的主成分分析方法来增强深度q学习(DQN)。PCA通过执行降维来帮助管理大量操作数据,而DQN是一种强化学习范式,在现实世界的交互过程中优化决策。本研究的主要贡献在于将PCA和DQN结合使用,形成可定制的、精确的、响应竞赛的能源框架,该框架由对农业数据的实时分析提供动力,这种规模的能源管理在可持续农业的背景下从未被接触过。实验验证了最优模型,进一步实现了累计奖励为72.56,平均排放为1.83,q值为24.76,总天顶值为75.40%,确保了大量非标准定义的高效能源依赖操作。这种模式不仅填补了被动智能农业系统自动化的空白,而且还为其他生态关键领域努力实现更环保的技术提供了参考。
{"title":"Optimising Energy Efficiency in Agricultural Consumer Electronics Using Principal Component Analysis and Deep Q-Learning","authors":"Subir Gupta,&nbsp;Upasana Adhikari,&nbsp;Pinky Pramanik,&nbsp;Subrata Chowdhury,&nbsp;Shreyas J.,&nbsp;Anurag Sinha,&nbsp;Saifullah Khalid,&nbsp;Malathi S. Y.","doi":"10.1049/cps2.70029","DOIUrl":"10.1049/cps2.70029","url":null,"abstract":"<p>The ability to reduce emissions and improve sustainability in agricultural consumer electronics has been significantly hindered due to the use of energy-intensive technology within the agricultural sector. This study proposes a new enhancement of deep Q-learning (DQN) with principal component analysis (PCA) focused on energy efficiency. PCA helps manage massive operational data by performing dimensionality reduction, whereas DQN, a reinforcement learning paradigm, optimises decision-making during real-world interactions. The main contribution of this study is in the combined use of PCA and DQN to form customisable, precise, contest-responsive energy frameworks powered by real-time analytics on agricultural data—energy management on such a scale has not been approached in the context of sustainable agriculture before. The experiments confirm the optimal model, further achieving a cumulative reward of 72.56, an average emission of 1.83, a <i>Q</i>-value of 24.76 and a total zenith value of 75.40% in ensuring numerous noncriteria-defined efficient energy-dependent operations. This paradigm not only fills the void in the automation of passive intelligent agricultural systems but also serves as a point of reference for other eco-critical domains to strive towards greener technology.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70029","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144997884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-Resilient Distributed Energy Resource Control Algorithms for Smart Distribution Grids 智能配电网的网络弹性分布式能源控制算法
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-05 DOI: 10.1049/cps2.70032
Mohammad Panahazari, Guangming Yao, Jianhua Zhang, Jing Wang

This paper focuses on the development of cyber-resilient gradient-based optimisation algorithms and theoretical proof for grid-interactive distributed energy resource (DER) control to enable two grid services of virtual power plants (VPPs) dispatch and grid voltage regulation, considering the communication and security impacts. Firstly, the combined DER dispatch and voltage regulation as a real-time gradient-based optimisation problem is recapped. Thereafter, we consider a probabilistic traffic model to characterise packet delays and loss in a communication network, and study how the delays enter the process of information exchange among the grid measurement units, local DER controllers and the grid control centre that execute this control algorithm in a coordinated manner. Then, a strategy combining delay thresholds and message update rules is proposed to immunity the asynchrony resulting from the communications traffic and it avoids possible numerical instabilities and sensitivities of the power tracking and voltage regulation capabilities, resulting as cyber-resilient DER control algorithms. Additionally, their convergence is theoretically proved. Effectiveness of proposed cyber-resilient algorithms has been validated on the IEEE 37-bus system in terms of convergence, VPP tracking and voltage regulation performance for smart distribution systems with high penetration of DERs.

本文重点研究了基于网络弹性梯度的电网交互分布式能源(DER)控制优化算法的发展和理论证明,以实现虚拟电厂(vpp)调度和电网电压调节两种电网服务,同时考虑到通信和安全影响。首先,将分布式电网调度和电压调节作为一个实时的基于梯度的优化问题进行了概述。此后,我们考虑了一个概率流量模型来表征通信网络中的数据包延迟和丢失,并研究了延迟如何进入网格测量单元、本地DER控制器和网格控制中心之间的信息交换过程,这些网格测量单元以协调的方式执行该控制算法。然后,提出了一种将延迟阈值和消息更新规则相结合的策略来免疫通信业务量带来的异步性,并避免了功率跟踪和电压调节能力可能存在的数值不稳定性和敏感性,从而形成了网络弹性DER控制算法。并从理论上证明了它们的收敛性。本文提出的网络弹性算法在IEEE 37总线系统上的收敛性、VPP跟踪和电压调节性能方面的有效性得到了验证。
{"title":"Cyber-Resilient Distributed Energy Resource Control Algorithms for Smart Distribution Grids","authors":"Mohammad Panahazari,&nbsp;Guangming Yao,&nbsp;Jianhua Zhang,&nbsp;Jing Wang","doi":"10.1049/cps2.70032","DOIUrl":"10.1049/cps2.70032","url":null,"abstract":"<p>This paper focuses on the development of cyber-resilient gradient-based optimisation algorithms and theoretical proof for grid-interactive distributed energy resource (DER) control to enable two grid services of virtual power plants (VPPs) dispatch and grid voltage regulation, considering the communication and security impacts. Firstly, the combined DER dispatch and voltage regulation as a real-time gradient-based optimisation problem is recapped. Thereafter, we consider a probabilistic traffic model to characterise packet delays and loss in a communication network, and study how the delays enter the process of information exchange among the grid measurement units, local DER controllers and the grid control centre that execute this control algorithm in a coordinated manner. Then, a strategy combining delay thresholds and message update rules is proposed to immunity the asynchrony resulting from the communications traffic and it avoids possible numerical instabilities and sensitivities of the power tracking and voltage regulation capabilities, resulting as cyber-resilient DER control algorithms. Additionally, their convergence is theoretically proved. Effectiveness of proposed cyber-resilient algorithms has been validated on the IEEE 37-bus system in terms of convergence, VPP tracking and voltage regulation performance for smart distribution systems with high penetration of DERs.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70032","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144997883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
APHformerNET: A Gear Fault Diagnosis Model Based on Adaptive Prototype Hashing Optimisation Algorithm 基于自适应原型哈希优化算法的齿轮故障诊断模型
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-28 DOI: 10.1049/cps2.70028
Peng Zhou, Chang Liu, Jiacan Xu, Zinan Wang, Shubing Liu

Fault-diagnosis methods based on deep learning technology have been widely applied in gear fault diagnosis. Gearboxes often operate under complex and harsh conditions, which can lead to faults. Therefore, monitoring the condition of gearboxes and diagnosing faults are crucial for ensuring the reliability and safety of the system. In response, this paper proposes a gear fault diagnosis model based on the adaptive prototype hashing (APH) optimisation algorithm for diagnosing faults in rotating machinery. This method combines the advantages of adaptive prototype hashing with transformers to improve the accuracy of fault diagnosis. The model utilises an adaptive prototype selection mechanism to dynamically select the most representative samples as prototypes and employs the transformer model to extract feature representations of the input data. In classification tasks using two datasets, the model achieved an accuracy of 98.11% under normal conditions. In experiments with added white noise and a smaller sample size, the accuracies reached 96.81% and 86.41%, respectively. Additionally, we conducted ablation experiments with advanced transformer models, where the APHformer model incorporating the APH layer achieved fault diagnosis accuracies exceeding 97%, significantly outperforming other combinations. Furthermore, T-SNE visualisation results indicate that the method performs well in feature representation. This study provides important insights into the field of gear fault diagnosis based on deep learning and has potential practical application values.

基于深度学习技术的故障诊断方法在齿轮故障诊断中得到了广泛应用。齿轮箱经常在复杂和恶劣的条件下运行,这可能导致故障。因此,对齿轮箱进行状态监测和故障诊断对于保证系统的可靠性和安全性至关重要。为此,本文提出了一种基于自适应原型哈希优化算法的齿轮故障诊断模型,用于旋转机械故障诊断。该方法结合了自适应原型哈希和变压器的优点,提高了故障诊断的准确性。该模型利用自适应原型选择机制动态选择最具代表性的样本作为原型,并利用变压器模型提取输入数据的特征表示。在使用两个数据集的分类任务中,该模型在正常情况下的准确率达到了98.11%。在添加白噪声和较小样本量的实验中,准确率分别达到96.81%和86.41%。此外,我们对先进的变压器模型进行了烧蚀实验,其中包含APH层的APHformer模型的故障诊断准确率超过97%,显著优于其他组合。此外,T-SNE可视化结果表明,该方法在特征表示方面表现良好。本研究为基于深度学习的齿轮故障诊断领域提供了重要的见解,具有潜在的实际应用价值。
{"title":"APHformerNET: A Gear Fault Diagnosis Model Based on Adaptive Prototype Hashing Optimisation Algorithm","authors":"Peng Zhou,&nbsp;Chang Liu,&nbsp;Jiacan Xu,&nbsp;Zinan Wang,&nbsp;Shubing Liu","doi":"10.1049/cps2.70028","DOIUrl":"10.1049/cps2.70028","url":null,"abstract":"<p>Fault-diagnosis methods based on deep learning technology have been widely applied in gear fault diagnosis. Gearboxes often operate under complex and harsh conditions, which can lead to faults. Therefore, monitoring the condition of gearboxes and diagnosing faults are crucial for ensuring the reliability and safety of the system. In response, this paper proposes a gear fault diagnosis model based on the adaptive prototype hashing (APH) optimisation algorithm for diagnosing faults in rotating machinery. This method combines the advantages of adaptive prototype hashing with transformers to improve the accuracy of fault diagnosis. The model utilises an adaptive prototype selection mechanism to dynamically select the most representative samples as prototypes and employs the transformer model to extract feature representations of the input data. In classification tasks using two datasets, the model achieved an accuracy of 98.11% under normal conditions. In experiments with added white noise and a smaller sample size, the accuracies reached 96.81% and 86.41%, respectively. Additionally, we conducted ablation experiments with advanced transformer models, where the APHformer model incorporating the APH layer achieved fault diagnosis accuracies exceeding 97%, significantly outperforming other combinations. Furthermore, T-SNE visualisation results indicate that the method performs well in feature representation. This study provides important insights into the field of gear fault diagnosis based on deep learning and has potential practical application values.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70028","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144716483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating Cybersecurity Risks in Grids With a High Penetration of Distributed Renewables 分布式可再生能源高渗透降低电网网络安全风险
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-14 DOI: 10.1049/cps2.70026
Matthew Green, Shahram Sarkani, Thomas Mazzuchi

The increasing penetration of distributed renewables creates new threats to the optimal planning, management, and operation of the electric grid. In particular, new standards that mandate real-time visibility and communications to grid operations, coupled with supply-constrained inverter manufacturers, have exposed the electric grid to increased cyber risk and challenges to resiliency. Despite these developments, the electric industry must fully understand the emerging threats and develop a comprehensive and balanced approach to mitigation of the cyberattack risk by grid operators while maintaining the overall grid resiliency that connected and communicating renewables can provide. This study explores the impact of a coordinated cybersecurity attack on distributed renewables in the electric grid and proposes a novel approach to reduce the disruption of services to customers. This approach is anchored on a shift from centralised multi-party control to decentralised node-based control. It provides a starting point to address the overall framework for connecting, controlling, and securing distributed renewables, which can improve cybersecurity protection levels while maintaining the reliability of connected energy assets.

分布式可再生能源的日益普及给电网的优化规划、管理和运行带来了新的威胁。特别是,要求电网运行实时可见性和通信的新标准,加上供应受限的逆变器制造商,使电网面临越来越大的网络风险和弹性挑战。尽管有这些发展,电力行业必须充分了解新出现的威胁,并制定一种全面、平衡的方法来减轻电网运营商的网络攻击风险,同时保持连接和通信可再生能源所能提供的整体电网弹性。本研究探讨了协同网络安全攻击对电网中分布式可再生能源的影响,并提出了一种减少对客户服务中断的新方法。这种方法基于从集中式多方控制到分散的基于节点的控制的转变。它为解决连接、控制和保护分布式可再生能源的总体框架提供了一个起点,这可以提高网络安全保护水平,同时保持连接能源资产的可靠性。
{"title":"Mitigating Cybersecurity Risks in Grids With a High Penetration of Distributed Renewables","authors":"Matthew Green,&nbsp;Shahram Sarkani,&nbsp;Thomas Mazzuchi","doi":"10.1049/cps2.70026","DOIUrl":"10.1049/cps2.70026","url":null,"abstract":"<p>The increasing penetration of distributed renewables creates new threats to the optimal planning, management, and operation of the electric grid. In particular, new standards that mandate real-time visibility and communications to grid operations, coupled with supply-constrained inverter manufacturers, have exposed the electric grid to increased cyber risk and challenges to resiliency. Despite these developments, the electric industry must fully understand the emerging threats and develop a comprehensive and balanced approach to mitigation of the cyberattack risk by grid operators while maintaining the overall grid resiliency that connected and communicating renewables can provide. This study explores the impact of a coordinated cybersecurity attack on distributed renewables in the electric grid and proposes a novel approach to reduce the disruption of services to customers. This approach is anchored on a shift from centralised multi-party control to decentralised node-based control. It provides a starting point to address the overall framework for connecting, controlling, and securing distributed renewables, which can improve cybersecurity protection levels while maintaining the reliability of connected energy assets.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70026","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144624218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transient Synchronous Stability Control for a Wind Solar Gas Energy Storage Integrated Energy Management System Considering Carbon Constraints and Dynamic Characteristics 考虑碳约束和动态特性的风能-太阳能-气储能综合能源管理系统暂态同步稳定控制
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-02 DOI: 10.1049/cps2.70027
Jingli Liu, Peng Ren, Xin Yang, Mengyu Li, Xiaobo Cao, Long Fu

Traditional integrated energy management systems may lack comprehensive scheduling and management strategies for wind, solar and natural gas energy storage. This may lead to imbalanced utilisation of energy and the inability to fully utilise the advantages of various energy sources, thereby affecting the economy and operational efficiency of the system. A transient synchronous stability control method for wind, solar and natural gas energy storage integrated energy management systems considering carbon constraints and dynamic characteristics is proposed. Firstly, with the optimisation objective of system economy, a combined dynamic stability analysis method for photovoltaic panels, wind turbines and gas turbines is proposed based on the carbon constraints and dynamic characteristics distribution of wind, solar, gas and energy storage integrated energy management systems. A comprehensive energy management rule model for wind, solar and natural gas storage is established. This comprehensive energy management rule model can help the system achieve comprehensive scheduling and management of wind, solar and natural gas energy storage, in order to maximise the economic and operational efficiency of the system. Then, the model was analysed based on the characteristics of total fuel consumption and unit fuel price. The operational cost is used to describe the lifecycle control project of the material price management system and a control project is constructed with the goal of integrating the annual total cost of the energy system. Finally, the grid search algorithm is used to find the optimal combination of optimisation variables. This model uses transient synchronous control variables for optimisation and solution, such as system radiation conditions, wind conditions, stepped electricity pricing system loads and equipment parameters. Realise transient synchronous and stable control of the integrated energy management system of wind, light, gas and energy storage. The simulation results show that the WS-G-EMS transient synchronisation control using this method has good stability and excellent performance with good stability and small convergence error.

传统的综合能源管理系统可能缺乏对风能、太阳能和天然气储能的综合调度和管理策略。这可能导致能源利用不平衡,无法充分利用各种能源的优势,从而影响系统的经济性和运行效率。提出了一种考虑碳约束和动态特性的风能、太阳能和天然气储能综合能源管理系统暂态同步稳定控制方法。首先,以系统经济优化为目标,基于风能、太阳能、天然气和储能综合能源管理系统的碳约束和动态特性分布,提出了光伏板、风力发电机组和燃气轮机的联合动态稳定性分析方法。建立了风能、太阳能和天然气储能综合能源管理规则模型。该能源综合管理规则模型可以帮助系统实现对风能、太阳能和天然气储能的综合调度和管理,使系统的经济效益和运行效率最大化。然后,根据总燃油消耗量和单位燃油价格的特点,对模型进行了分析。采用运行成本来描述材料价格管理系统的生命周期控制项目,并以整合能源系统的年度总成本为目标构建控制项目。最后,利用网格搜索算法寻找优化变量的最优组合。该模型采用暂态同步控制变量进行优化求解,如系统辐射条件、风力条件、分级电价系统负荷和设备参数等。实现风、光、气、储能综合能源管理系统的暂态同步稳定控制。仿真结果表明,采用该方法实现的WS-G-EMS瞬态同步控制具有稳定性好、收敛误差小等优点。
{"title":"Transient Synchronous Stability Control for a Wind Solar Gas Energy Storage Integrated Energy Management System Considering Carbon Constraints and Dynamic Characteristics","authors":"Jingli Liu,&nbsp;Peng Ren,&nbsp;Xin Yang,&nbsp;Mengyu Li,&nbsp;Xiaobo Cao,&nbsp;Long Fu","doi":"10.1049/cps2.70027","DOIUrl":"10.1049/cps2.70027","url":null,"abstract":"<p>Traditional integrated energy management systems may lack comprehensive scheduling and management strategies for wind, solar and natural gas energy storage. This may lead to imbalanced utilisation of energy and the inability to fully utilise the advantages of various energy sources, thereby affecting the economy and operational efficiency of the system. A transient synchronous stability control method for wind, solar and natural gas energy storage integrated energy management systems considering carbon constraints and dynamic characteristics is proposed. Firstly, with the optimisation objective of system economy, a combined dynamic stability analysis method for photovoltaic panels, wind turbines and gas turbines is proposed based on the carbon constraints and dynamic characteristics distribution of wind, solar, gas and energy storage integrated energy management systems. A comprehensive energy management rule model for wind, solar and natural gas storage is established. This comprehensive energy management rule model can help the system achieve comprehensive scheduling and management of wind, solar and natural gas energy storage, in order to maximise the economic and operational efficiency of the system. Then, the model was analysed based on the characteristics of total fuel consumption and unit fuel price. The operational cost is used to describe the lifecycle control project of the material price management system and a control project is constructed with the goal of integrating the annual total cost of the energy system. Finally, the grid search algorithm is used to find the optimal combination of optimisation variables. This model uses transient synchronous control variables for optimisation and solution, such as system radiation conditions, wind conditions, stepped electricity pricing system loads and equipment parameters. Realise transient synchronous and stable control of the integrated energy management system of wind, light, gas and energy storage. The simulation results show that the WS-G-EMS transient synchronisation control using this method has good stability and excellent performance with good stability and small convergence error.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70027","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144524820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-Driven Anomaly Detection and Mitigation for FACTS-Based Wide-Area Voltage Control System 基于facts的广域电压控制系统数据驱动异常检测与缓解
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-18 DOI: 10.1049/cps2.70020
Vivek Kumar Singh, Manimaran Govindarasu, Reynaldo Nuqui

Wide-area voltage control system (WAVCS) ensures comprehensive voltage security and optimal management of power resources by incorporating flexible alternating current transmission system (FACTS) devices. However, due to its reliance on a wide-area communication network and coordination with FACTS-based local controllers, WAVCS is susceptible to cyberattacks. To address this issue, we propose a data-driven attack-resilient system (DARS) that integrates a machine learning-based anomaly detection system (ADS) and rules-based attack mitigation system (RAMS) to detect data integrity attacks and initiate necessary corrective actions to restore the grid operation after disturbances. The proposed ADS utilises the variational mode decomposition (VMD) technique to extract sub-signal modes from the measurement signals of WAVCS and computes statistics features to detect data integrity attacks using machine learning algorithms. Our proposed methodology is evaluated by emulating the fuzzy logic-based WAVCS, as developed by the Bonneville Power Administration (BPA), for Kundur's four machine two-area system. The WAVCS applies V $V$ magQ $Q$ algorithm that utilises synchrophasor measurements (voltage magnitude and reactive power) to compute an optimal set-point for FACTS devices. Experimental results show that our proposed algorithm (VMD-DT) with statistics features outperforms existing machine learning algorithms while exhibiting a smaller processing time. Also, the proposed RAMS is effective in maintaining transient voltage stability within acceptable voltage limits by triggering different modes of operations upon detection of anomalies in grid network.

广域电压控制系统(WAVCS)通过结合灵活的交流输电系统(FACTS)设备,确保全面的电压安全和电力资源的优化管理。然而,由于它依赖于广域通信网络和与基于fact的本地控制器的协调,WAVCS很容易受到网络攻击。为了解决这一问题,我们提出了一种数据驱动的攻击弹性系统(DARS),该系统集成了基于机器学习的异常检测系统(ADS)和基于规则的攻击缓解系统(RAMS),以检测数据完整性攻击并启动必要的纠正措施,以恢复干扰后的电网运行。本文提出的ADS利用变分模态分解(VMD)技术从WAVCS测量信号中提取子信号模式,并利用机器学习算法计算统计特征来检测数据完整性攻击。我们提出的方法是通过模拟基于模糊逻辑的WAVCS来评估的,这是由Bonneville电力管理局(BPA)为昆都尔的四机两区系统开发的。WAVCS采用V$ V$ mag Q$ Q$算法,该算法利用同步量测量(电压幅度和无功功率)来计算FACTS设备的最佳设定点。实验结果表明,我们提出的具有统计特征的算法(VMD-DT)在处理时间更短的同时,优于现有的机器学习算法。此外,所提出的RAMS通过在检测到电网异常时触发不同的操作模式,有效地将暂态电压稳定在可接受的电压范围内。
{"title":"Data-Driven Anomaly Detection and Mitigation for FACTS-Based Wide-Area Voltage Control System","authors":"Vivek Kumar Singh,&nbsp;Manimaran Govindarasu,&nbsp;Reynaldo Nuqui","doi":"10.1049/cps2.70020","DOIUrl":"10.1049/cps2.70020","url":null,"abstract":"<p>Wide-area voltage control system (WAVCS) ensures comprehensive voltage security and optimal management of power resources by incorporating flexible alternating current transmission system (FACTS) devices. However, due to its reliance on a wide-area communication network and coordination with FACTS-based local controllers, WAVCS is susceptible to cyberattacks. To address this issue, we propose a data-driven attack-resilient system (DARS) that integrates a machine learning-based anomaly detection system (ADS) and rules-based attack mitigation system (RAMS) to detect data integrity attacks and initiate necessary corrective actions to restore the grid operation after disturbances. The proposed ADS utilises the variational mode decomposition (VMD) technique to extract sub-signal modes from the measurement signals of WAVCS and computes statistics features to detect data integrity attacks using machine learning algorithms. Our proposed methodology is evaluated by emulating the fuzzy logic-based WAVCS, as developed by the Bonneville Power Administration (BPA), for Kundur's four machine two-area system. The WAVCS applies <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>V</mi>\u0000 </mrow>\u0000 <annotation> $V$</annotation>\u0000 </semantics></math> mag<span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>Q</mi>\u0000 </mrow>\u0000 <annotation> $Q$</annotation>\u0000 </semantics></math> algorithm that utilises synchrophasor measurements (voltage magnitude and reactive power) to compute an optimal set-point for FACTS devices. Experimental results show that our proposed algorithm (VMD-DT) with statistics features outperforms existing machine learning algorithms while exhibiting a smaller processing time. Also, the proposed RAMS is effective in maintaining transient voltage stability within acceptable voltage limits by triggering different modes of operations upon detection of anomalies in grid network.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70020","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144315253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling False Data Injection and Denial of Service Attacks in Cyber-Physical Microgrids 网络物理微电网中的虚假数据注入和拒绝服务攻击建模
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-16 DOI: 10.1049/cps2.70025
Abbas Ahmadi, Mahdieh S. Sadabadi, Qobad Shafiee

To ensure normal and efficient operation, microgrids (MGs) must fully integrate information and communication technologies into their control systems. However, this integration introduces vulnerabilities to cyberattacks that can compromise sensitive data and disrupt operations. In MGs, two distinct types of data communication flows pose cybersecurity risks. The first involves local data transfers, which occur directly between devices based on their MAC addresses. The second involves network-wide data transmission using the Internet protocol (IP). When assessing the potential impact of cyberattacks on control systems, it is crucial to consider the specific nature of the protocols in use. This research analyses the impact of cyberattacks on data transmission in MGs and develops appropriate models for well-known attack types. It introduces updated models for false data injection (FDI) and denial of service (DoS) attacks to evaluate their impact on numerical stream data in MGs. Experimental and simulation-based validations are conducted to develop accurate cyberattack models and support the design of resilient control systems. The vulnerability of MGs' secondary control to these cyberattacks is assessed through MATLAB simulations. The results indicate that the impact of each attack depends on factors such as the packet sampling time, the injected data values (for FDI attacks) and the induced delays (for DoS attacks).

为了确保微电网的正常高效运行,微电网必须将信息和通信技术充分融入其控制系统。然而,这种集成带来了网络攻击的漏洞,可能会损害敏感数据并中断运营。在mgg中,两种不同类型的数据通信流构成网络安全风险。第一种涉及本地数据传输,它直接发生在基于设备MAC地址的设备之间。第二种涉及使用因特网协议(IP)的全网范围的数据传输。在评估网络攻击对控制系统的潜在影响时,考虑所使用协议的具体性质至关重要。本研究分析了网络攻击对mgg中数据传输的影响,并针对已知的攻击类型开发了适当的模型。它引入了虚假数据注入(FDI)和拒绝服务(DoS)攻击的更新模型,以评估它们对mg中数值流数据的影响。实验和基于仿真的验证进行开发准确的网络攻击模型和支持弹性控制系统的设计。通过MATLAB仿真,评估了MGs二次控制对这些网络攻击的脆弱性。结果表明,每次攻击的影响取决于数据包采样时间、注入的数据值(针对FDI攻击)和引起的延迟(针对DoS攻击)等因素。
{"title":"Modelling False Data Injection and Denial of Service Attacks in Cyber-Physical Microgrids","authors":"Abbas Ahmadi,&nbsp;Mahdieh S. Sadabadi,&nbsp;Qobad Shafiee","doi":"10.1049/cps2.70025","DOIUrl":"10.1049/cps2.70025","url":null,"abstract":"<p>To ensure normal and efficient operation, microgrids (MGs) must fully integrate information and communication technologies into their control systems. However, this integration introduces vulnerabilities to cyberattacks that can compromise sensitive data and disrupt operations. In MGs, two distinct types of data communication flows pose cybersecurity risks. The first involves local data transfers, which occur directly between devices based on their MAC addresses. The second involves network-wide data transmission using the Internet protocol (IP). When assessing the potential impact of cyberattacks on control systems, it is crucial to consider the specific nature of the protocols in use. This research analyses the impact of cyberattacks on data transmission in MGs and develops appropriate models for well-known attack types. It introduces updated models for false data injection (FDI) and denial of service (DoS) attacks to evaluate their impact on numerical stream data in MGs. Experimental and simulation-based validations are conducted to develop accurate cyberattack models and support the design of resilient control systems. The vulnerability of MGs' secondary control to these cyberattacks is assessed through MATLAB simulations. The results indicate that the impact of each attack depends on factors such as the packet sampling time, the injected data values (for FDI attacks) and the induced delays (for DoS attacks).</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70025","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144299692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest Editorial: Security and Privacy of Cyber-Physical System 嘉宾评论:网络物理系统的安全与隐私
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-16 DOI: 10.1049/cps2.70012
Xiaojie Zhu, Jiankun Hu, Waqas Haider

Cyber-physical systems (CPS) serve as the backbone of critical infrastructure, seamlessly integrating computation, networking and physical processes. However, the growing interconnectivity of these systems also increases their exposure to sophisticated cyber threats. Ensuring the security and privacy of CPS is crucial to maintaining operational stability, preventing service disruptions and mitigating cascading failures.

This Special Issue presents cutting-edge research addressing diverse aspects of CPS security, ranging from attack methodologies to vulnerability assessments and resilience strategies. The selected papers provide insights into real-time attack implementations, advanced analytics using graph theory, multi-stage cyber threat scenarios and socio-technical security modelling.

In this Special Issue, we have received 7 papers, all of which underwent peer review. Of the six originally submitted papers, four have been accepted and two have been ‘rejected with referral’, that is, they did not meet the criteria for publication to the IET Cyber-Physical Systems: Theory & Applications, and on. Thus, the overall submissions were of high quality, which marks the success of this Special Issue.

The four eventually accepted papers can be categorised into four key themes: (1) cyber-physical attack modelling and system vulnerability, (2) graph-based cyber-physical system security analysis, (3) multi-stage cyber threats and impact assessment and (4) socio-technical security modelling for cyber-physical systems.

Yadav et al. investigate the impact of sliding mode-based switching attacks on power system components. By leveraging real-time simulation techniques, the study highlights how cyber-attacks on circuit breakers, excitation systems and governors can lead to cascading failures. The results offer valuable insights into the vulnerabilities of power grids and the need for proactive mitigation measures.

Jacobs et al. introduce a novel graph clustering approach for analysing cyber-physical interactions in smart grid environments. The study demonstrates how clustering techniques can help characterise disturbances, identify critical system components and enhance situational awareness. These findings pave the way for improved cybersecurity strategies by enabling better detection and response mechanisms.

Al Homoud et al. present an in-depth case study on a multi-stage cyber threat targeting power systems. The research details how cyber intrusions can escalate, leading to severe physical consequences in the grid. By leveraging the MITRE ATT&CK framework, the authors propose defence strategies that enhance the resilience of cyber-physical energy management systems.

Ani et al. explore socio-technical security modelling and simulation (STSec-M&S) in cyber-physical systems (CPS) to enhance critical infrastructure (CI) cybersecurity, emphasising its potential for integrating technical and social aspects to

信息物理系统(CPS)作为关键基础设施的骨干,无缝集成计算、网络和物理过程。然而,这些系统日益增长的互联性也增加了它们面临复杂网络威胁的风险。确保CPS的安全性和隐私性对于维护运营稳定性、防止服务中断和减轻级联故障至关重要。本期特刊介绍了解决CPS安全各个方面的前沿研究,从攻击方法到漏洞评估和弹性策略。所选论文提供了对实时攻击实施,使用图论的高级分析,多阶段网络威胁场景和社会技术安全建模的见解。本期特刊共收到7篇论文,均经过同行评议。在最初提交的六篇论文中,四篇被接受,两篇被“推荐拒绝”,也就是说,它们不符合发表在IET网络物理系统:理论和;应用程序等。因此,所有的投稿都是高质量的,这标志着这期特刊的成功。四篇最终被接受的论文可分为四个关键主题:(1)网络物理攻击建模和系统脆弱性;(2)基于图形的网络物理系统安全分析;(3)多阶段网络威胁和影响评估;(4)网络物理系统的社会技术安全建模。Yadav等人研究了基于滑模的开关攻击对电力系统组件的影响。通过利用实时仿真技术,该研究强调了对断路器、励磁系统和调速器的网络攻击如何导致级联故障。研究结果对电网的脆弱性和采取主动缓解措施的必要性提供了有价值的见解。Jacobs等人介绍了一种新的图聚类方法,用于分析智能电网环境中的网络物理交互。该研究展示了聚类技术如何帮助描述干扰、识别关键系统组件和增强态势感知。这些发现通过实现更好的检测和响应机制,为改进网络安全策略铺平了道路。Al Homoud等人对针对电力系统的多阶段网络威胁进行了深入的案例研究。该研究详细说明了网络入侵是如何升级的,并在电网中导致严重的物理后果。通过利用MITRE att&ck框架,作者提出了增强网络物理能源管理系统弹性的防御策略。Ani等人探索了网络物理系统(CPS)中的社会技术安全建模和仿真(STSec-M&;S),以增强关键基础设施(CI)网络安全,强调其整合技术和社会方面的潜力,以提高系统理解和风险管理,同时通过整体模型、现实数据和跨部门协作解决复杂性、高成本和数据限制等障碍。本期特刊的研究强调了CPS环境中日益复杂的网络威胁。实时攻击模拟、基于图形的安全分析、多阶段威胁建模和社会技术安全建模的集成为CPS安全提供了一个全面的视角。未来的研究应侧重于人工智能驱动的威胁检测、量子安全通信协议和自适应防御机制,以应对不断变化的网络威胁。作者声明无利益冲突。
{"title":"Guest Editorial: Security and Privacy of Cyber-Physical System","authors":"Xiaojie Zhu,&nbsp;Jiankun Hu,&nbsp;Waqas Haider","doi":"10.1049/cps2.70012","DOIUrl":"10.1049/cps2.70012","url":null,"abstract":"<p>Cyber-physical systems (CPS) serve as the backbone of critical infrastructure, seamlessly integrating computation, networking and physical processes. However, the growing interconnectivity of these systems also increases their exposure to sophisticated cyber threats. Ensuring the security and privacy of CPS is crucial to maintaining operational stability, preventing service disruptions and mitigating cascading failures.</p><p>This Special Issue presents cutting-edge research addressing diverse aspects of CPS security, ranging from attack methodologies to vulnerability assessments and resilience strategies. The selected papers provide insights into real-time attack implementations, advanced analytics using graph theory, multi-stage cyber threat scenarios and socio-technical security modelling.</p><p>In this Special Issue, we have received 7 papers, all of which underwent peer review. Of the six originally submitted papers, four have been accepted and two have been ‘rejected with referral’, that is, they did not meet the criteria for publication to the IET Cyber-Physical Systems: Theory &amp; Applications, and on. Thus, the overall submissions were of high quality, which marks the success of this Special Issue.</p><p>The four eventually accepted papers can be categorised into four key themes: (1) cyber-physical attack modelling and system vulnerability, (2) graph-based cyber-physical system security analysis, (3) multi-stage cyber threats and impact assessment and (4) socio-technical security modelling for cyber-physical systems.</p><p>Yadav et al. investigate the impact of sliding mode-based switching attacks on power system components. By leveraging real-time simulation techniques, the study highlights how cyber-attacks on circuit breakers, excitation systems and governors can lead to cascading failures. The results offer valuable insights into the vulnerabilities of power grids and the need for proactive mitigation measures.</p><p>Jacobs et al. introduce a novel graph clustering approach for analysing cyber-physical interactions in smart grid environments. The study demonstrates how clustering techniques can help characterise disturbances, identify critical system components and enhance situational awareness. These findings pave the way for improved cybersecurity strategies by enabling better detection and response mechanisms.</p><p>Al Homoud et al. present an in-depth case study on a multi-stage cyber threat targeting power systems. The research details how cyber intrusions can escalate, leading to severe physical consequences in the grid. By leveraging the MITRE ATT&amp;CK framework, the authors propose defence strategies that enhance the resilience of cyber-physical energy management systems.</p><p>Ani et al. explore socio-technical security modelling and simulation (STSec-M&amp;S) in cyber-physical systems (CPS) to enhance critical infrastructure (CI) cybersecurity, emphasising its potential for integrating technical and social aspects to","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70012","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144292921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intrusion Detection System for Wind Turbines Based on Thermal Models 基于热模型的风力发电机入侵检测系统
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-11 DOI: 10.1049/cps2.70024
Ngoc Que Anh Tran, Liang He

Wind energy plays an essential position in the renewable energy sector and is frequently deployed remotely, which makes them susceptible to intrusions that can compromise their operational system. This paper introduces a novel method T–IDS leveraging the interconnected thermal behaviours of wind turbine modules to identify the abnormal imprints that signify security breaches. Our approach consists of three key components: a graph model that outlines the dependencies among the thermal variables of the turbines, a random forest-based prediction strategy for these variables within the thermal graph and an anomaly detection method that assesses the predicted thermal values with actual observations. We performed extensive experiments using three real-world wind turbine supervisory control and data acquisition (SCADA) log datasets: one dataset collected over six months and two additional datasets covering 12-month operational durations from distinct wind turbine installations for rigorous cross-validation. The results demonstrate that T–IDS achieves an overall anomaly detection accuracy of 97.3% when detecting unusual thermal activities such as physical model damage leading to overheating or tampering temperature readings.

风能在可再生能源领域占有重要地位,并且经常远程部署,这使得它们容易受到入侵,从而危及其运行系统。本文介绍了一种新的方法T-IDS,利用风力涡轮机模块的相互关联的热行为来识别表明安全漏洞的异常印记。我们的方法由三个关键部分组成:概述涡轮机热变量之间依赖关系的图形模型,热图中这些变量的基于随机森林的预测策略,以及通过实际观测评估预测热值的异常检测方法。我们使用三个真实世界的风力涡轮机监控和数据采集(SCADA)日志数据集进行了广泛的实验:一个数据集收集了六个多月,另外两个数据集涵盖了不同风力涡轮机装置12个月的运行持续时间,以进行严格的交叉验证。结果表明,在检测异常热活动(如物理模型损坏导致过热或篡改温度读数)时,T-IDS的总体异常检测准确率为97.3%。
{"title":"An Intrusion Detection System for Wind Turbines Based on Thermal Models","authors":"Ngoc Que Anh Tran,&nbsp;Liang He","doi":"10.1049/cps2.70024","DOIUrl":"10.1049/cps2.70024","url":null,"abstract":"<p>Wind energy plays an essential position in the renewable energy sector and is frequently deployed remotely, which makes them susceptible to intrusions that can compromise their operational system. This paper introduces a novel method <span>T–IDS</span> leveraging the interconnected thermal behaviours of wind turbine modules to identify the abnormal imprints that signify security breaches. Our approach consists of three key components: a graph model that outlines the dependencies among the thermal variables of the turbines, a random forest-based prediction strategy for these variables within the thermal graph and an anomaly detection method that assesses the predicted thermal values with actual observations. We performed extensive experiments using three real-world wind turbine supervisory control and data acquisition (SCADA) log datasets: one dataset collected over six months and two additional datasets covering 12-month operational durations from distinct wind turbine installations for rigorous cross-validation. The results demonstrate that <span>T–IDS</span> achieves an overall anomaly detection accuracy of 97.3% when detecting unusual thermal activities such as physical model damage leading to overheating or tampering temperature readings.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70024","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144264659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling a Reliable Multimedia Transmission Approach for Medical Wireless Sensor Networks 一种可靠的医疗无线传感器网络多媒体传输方法建模
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-11 DOI: 10.1049/cps2.70022
R. Nidhya, Manish Kumar, D. Pavithra, Harpreet Singh, Chetna Sharma, Anurag Sinha, Celestine Iwendi, Syed Abid Hussain

Advancement in wireless and communication technologies has remarkably boosted healthcare services such as Medical WSN. Protecting the patient's health-related data against malicious activities is also essential. It is mandatory to ensure its dependability and reliability. The reliability of the proposed model in Secure Multimedia Transmission for medical wireless sensor network (IRSMT) system considers the need for authentication and confidentiality in security. Additionally, it enhances the transmission reliability during multimedia data transmission compared to the prevailing methods. To provide reliable multimedia (MM) data transmission, an improved energy-efficient protocol is considered where the protocol differentiates MM and non-MM data to enhance routing methodology for MM transmission. The proposed IRSMT enhances adaptability by balancing media quality with prompt delivery and loss tolerance. It is achieved through the anonymous routing method, which maintains the node secrecy using the SHA 256 method. It reduces the probability of data retransmission and provides less processing delay to acquire routing reliability. The simulation results demonstrate the advantages of IRSMT in comparison with the prevailing protocols in performance metrics such as throughput, packet delivery ratio, jitter etc.

无线和通信技术的进步极大地促进了医疗WSN等医疗保健服务的发展。保护患者的健康相关数据免受恶意活动的侵害也至关重要。确保其可靠性和可靠性是强制性的。该模型在医疗无线传感器网络(IRSMT)安全多媒体传输系统中的可靠性考虑了安全认证和保密的需要。与现有的多媒体数据传输方法相比,提高了传输的可靠性。为了提供可靠的多媒体(MM)数据传输,考虑了一种改进的节能协议,其中协议区分MM和非MM数据,以增强MM传输的路由方法。提出的IRSMT通过平衡媒体质量、快速传输和容错能力来增强适应性。它是通过匿名路由方法实现的,匿名路由方法使用SHA 256方法来维护节点的保密性。它降低了数据重传的概率,并提供了较小的处理延迟,以获得路由的可靠性。仿真结果表明,IRSMT协议在吞吐量、包传送率、抖动等性能指标上优于现有协议。
{"title":"Modelling a Reliable Multimedia Transmission Approach for Medical Wireless Sensor Networks","authors":"R. Nidhya,&nbsp;Manish Kumar,&nbsp;D. Pavithra,&nbsp;Harpreet Singh,&nbsp;Chetna Sharma,&nbsp;Anurag Sinha,&nbsp;Celestine Iwendi,&nbsp;Syed Abid Hussain","doi":"10.1049/cps2.70022","DOIUrl":"10.1049/cps2.70022","url":null,"abstract":"<p>Advancement in wireless and communication technologies has remarkably boosted healthcare services such as Medical WSN. Protecting the patient's health-related data against malicious activities is also essential. It is mandatory to ensure its dependability and reliability. The reliability of the proposed model in Secure Multimedia Transmission for medical wireless sensor network (IRSMT) system considers the need for authentication and confidentiality in security. Additionally, it enhances the transmission reliability during multimedia data transmission compared to the prevailing methods. To provide reliable multimedia (MM) data transmission, an improved energy-efficient protocol is considered where the protocol differentiates MM and non-MM data to enhance routing methodology for MM transmission. The proposed IRSMT enhances adaptability by balancing media quality with prompt delivery and loss tolerance. It is achieved through the anonymous routing method, which maintains the node secrecy using the SHA 256 method. It reduces the probability of data retransmission and provides less processing delay to acquire routing reliability. The simulation results demonstrate the advantages of IRSMT in comparison with the prevailing protocols in performance metrics such as throughput, packet delivery ratio, jitter etc.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70022","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144264658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Cyber-Physical Systems: Theory and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1