József Szőlősi, Péter Magyar, József Antal, Béla J. Szekeres, Gábor Farkas, Mátyás Andó
The conditions for a feasible Cyber-Physical System (CPS) in a welding environment are explored for the manufacturing technology components while also focusing on machine learning tools. Increasing manufacturing efficiency means making digitalisation feasible for all technologies, including welding, given today's challenges. Early versions of manufacturing management, such as Computer Integrated Manufacturing, are already leading the way, and one of the latest milestones in these developments is CPS. It can be shown that the digital migration of specific sub-domains (e.g. visual inspection of the weld seam during quality assurance) is significantly more challenging and unimaginable without artificial intelligence applications. However, it is also true that the full integration needed to achieve autonomous manufacturing has yet to be fully achieved, although there is a strong demand in the industry for these CPS to work. In some areas, the digital switchover has already been prepared. However, the interconnection of these subsystems requires modern information systems or, in the case of existing ones, their upgrading to the appropriate level. This research area is set to be addressed comprehensively by initiating several projects. In the initial phase, the aim is to develop an architecture that integrates the various Information Technology applications. In this work, the digital manufacturing environment under CPS is studied, the relevant components are explored, the conditions for the transition from traditional to CPS-based manufacturing are examined and examples of planned further specific studies on the components are listed.
{"title":"Cyber-physical-based welding systems: Components and implementation strategies","authors":"József Szőlősi, Péter Magyar, József Antal, Béla J. Szekeres, Gábor Farkas, Mátyás Andó","doi":"10.1049/cps2.12092","DOIUrl":"10.1049/cps2.12092","url":null,"abstract":"<p>The conditions for a feasible Cyber-Physical System (CPS) in a welding environment are explored for the manufacturing technology components while also focusing on machine learning tools. Increasing manufacturing efficiency means making digitalisation feasible for all technologies, including welding, given today's challenges. Early versions of manufacturing management, such as Computer Integrated Manufacturing, are already leading the way, and one of the latest milestones in these developments is CPS. It can be shown that the digital migration of specific sub-domains (e.g. visual inspection of the weld seam during quality assurance) is significantly more challenging and unimaginable without artificial intelligence applications. However, it is also true that the full integration needed to achieve autonomous manufacturing has yet to be fully achieved, although there is a strong demand in the industry for these CPS to work. In some areas, the digital switchover has already been prepared. However, the interconnection of these subsystems requires modern information systems or, in the case of existing ones, their upgrading to the appropriate level. This research area is set to be addressed comprehensively by initiating several projects. In the initial phase, the aim is to develop an architecture that integrates the various Information Technology applications. In this work, the digital manufacturing environment under CPS is studied, the relevant components are explored, the conditions for the transition from traditional to CPS-based manufacturing are examined and examples of planned further specific studies on the components are listed.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"293-312"},"PeriodicalIF":1.7,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12092","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141049823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saket Sarin, Sunil K. Singh, Sudhakar Kumar, Shivam Goyal, Brij B. Gupta, Varsha Arya, Kwok Tai Chui
With the current COVID-19 pandemic, sophisticated epidemiological surveillance systems are more important than ever because conventional approaches have not been able to handle the scope and complexity of this global emergency. In response to this challenge, the authors present the state-of-the-art SEIR-Driven Semantic Integration Framework (SDSIF), which leverages the Internet of Things (IoT) to handle a variety of data sources. The primary innovation of SDSIF is the development of an extensive COVID-19 ontology, which makes unmatched data interoperability and semantic inference possible. The framework facilitates not only real-time data integration but also advanced analytics, anomaly detection, and predictive modelling through the use of Recurrent Neural Networks (RNNs). By being scalable and flexible enough to fit into different healthcare environments and geographical areas, SDSIF is revolutionising epidemiological surveillance for COVID-19 outbreak management. Metrics such as Mean Absolute Error (MAE) and Mean sqḋ Error (MSE) are used in a rigorous evaluation. The evaluation also includes an exceptional R-squared score, which attests to the effectiveness and ingenuity of SDSIF. Notably, a modest RMSE value of 8.70 highlights its accuracy, while a low MSE of 3.03 highlights its high predictive precision. The framework's remarkable R-squared score of 0.99 emphasises its resilience in explaining variations in disease data even more.
{"title":"SEIR-driven semantic integration framework: Internet of Things-enhanced epidemiological surveillance in COVID-19 outbreaks using recurrent neural networks","authors":"Saket Sarin, Sunil K. Singh, Sudhakar Kumar, Shivam Goyal, Brij B. Gupta, Varsha Arya, Kwok Tai Chui","doi":"10.1049/cps2.12091","DOIUrl":"10.1049/cps2.12091","url":null,"abstract":"<p>With the current COVID-19 pandemic, sophisticated epidemiological surveillance systems are more important than ever because conventional approaches have not been able to handle the scope and complexity of this global emergency. In response to this challenge, the authors present the state-of-the-art SEIR-Driven Semantic Integration Framework (SDSIF), which leverages the Internet of Things (IoT) to handle a variety of data sources. The primary innovation of SDSIF is the development of an extensive COVID-19 ontology, which makes unmatched data interoperability and semantic inference possible. The framework facilitates not only real-time data integration but also advanced analytics, anomaly detection, and predictive modelling through the use of Recurrent Neural Networks (RNNs). By being scalable and flexible enough to fit into different healthcare environments and geographical areas, SDSIF is revolutionising epidemiological surveillance for COVID-19 outbreak management. Metrics such as Mean Absolute Error (MAE) and Mean sqḋ Error (MSE) are used in a rigorous evaluation. The evaluation also includes an exceptional R-squared score, which attests to the effectiveness and ingenuity of SDSIF. Notably, a modest RMSE value of 8.70 highlights its accuracy, while a low MSE of 3.03 highlights its high predictive precision. The framework's remarkable R-squared score of 0.99 emphasises its resilience in explaining variations in disease data even more.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"135-149"},"PeriodicalIF":1.5,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12091","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140694681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alzheimer’s disease (AD) is a neurodegenerative disorder that mostly affects old aged people. Its symptoms are initially mild, but they get worse over time. Although this health disease has no cure, its early diagnosis can help to reduce its impacts. A methodology SMOTE-RF is proposed for AD prediction. Alzheimer's is predicted using machine learning algorithms. Performances of three algorithms decision tree, extreme gradient boosting (XGB), and random forest (RF) are evaluated in prediction. Open Access Series of Imaging Studies longitudinal dataset available on Kaggle is used for experiments. The dataset is balanced using synthetic minority oversampling technique. Experiments are done on both imbalanced and balanced datasets. Decision tree obtained 73.38% accuracy, XGB obtained 83.88% accuracy and RF obtained a maximum of 87.84% accuracy on the imbalanced dataset. Decision tree obtained 83.15% accuracy, XGB obtained 91.05% accuracy and RF obtained maximum 95.03% accuracy on the balanced dataset. A maximum accuracy of 95.03% is achieved with SMOTE-RF.
{"title":"A machine learning model for Alzheimer's disease prediction","authors":"Pooja Rani, Rohit Lamba, Ravi Kumar Sachdeva, Karan Kumar, Celestine Iwendi","doi":"10.1049/cps2.12090","DOIUrl":"10.1049/cps2.12090","url":null,"abstract":"<p>Alzheimer’s disease (AD) is a neurodegenerative disorder that mostly affects old aged people. Its symptoms are initially mild, but they get worse over time. Although this health disease has no cure, its early diagnosis can help to reduce its impacts. A methodology SMOTE-RF is proposed for AD prediction. Alzheimer's is predicted using machine learning algorithms. Performances of three algorithms decision tree, extreme gradient boosting (XGB), and random forest (RF) are evaluated in prediction. Open Access Series of Imaging Studies longitudinal dataset available on Kaggle is used for experiments. The dataset is balanced using synthetic minority oversampling technique. Experiments are done on both imbalanced and balanced datasets. Decision tree obtained 73.38% accuracy, XGB obtained 83.88% accuracy and RF obtained a maximum of 87.84% accuracy on the imbalanced dataset. Decision tree obtained 83.15% accuracy, XGB obtained 91.05% accuracy and RF obtained maximum 95.03% accuracy on the balanced dataset. A maximum accuracy of 95.03% is achieved with SMOTE-RF.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"125-134"},"PeriodicalIF":1.5,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12090","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140227957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Internet of Things (IoT) is revolutionizing the healthcare industry by enhancing personalized patient care. However, the transmission of sensitive health data in IoT systems presents significant security and privacy challenges, further exacerbated by the difficulty of exploiting traditional protection means due to poor battery equipment and limited storage and computational capabilities of IoT devices. The authors analyze techniques applied in the medical context to encrypt sensible data and deal with the unique challenges of resource-constrained devices. A technique that is facing increasing interest is the Physical Unclonable Function (PUF), where biometrics are implemented on integrated circuits' electric features. PUFs, however, demand special hardware, so in this work, instead of considering the physical device as a source of randomness, an ElectroCardioGram (ECG) can be taken into consideration to make a ‘virtual’ PUF. Such an mechanism leverages individual ECG signals to generate a cryptographic key for encrypting and decrypting data. Due to the poor stability of the ECG signal and the typical noise existing in the measurement process for such a signal, filtering and feature extraction techniques must be adopted. The proposed model considers the adoption of pre-processing techniques in conjunction with a fuzzy extractor to add stability to the signal. Experiments were performed on a dataset containing ECG records gathered over 6 months, yielding good results in the short term and valuable outcomes in the long term, paving the way for adaptive PUF techniques in this context.
{"title":"Securing the Internet of Medical Things with ECG-based PUF encryption","authors":"Biagio Boi, Christian Esposito","doi":"10.1049/cps2.12089","DOIUrl":"10.1049/cps2.12089","url":null,"abstract":"<p>The Internet of Things (IoT) is revolutionizing the healthcare industry by enhancing personalized patient care. However, the transmission of sensitive health data in IoT systems presents significant security and privacy challenges, further exacerbated by the difficulty of exploiting traditional protection means due to poor battery equipment and limited storage and computational capabilities of IoT devices. The authors analyze techniques applied in the medical context to encrypt sensible data and deal with the unique challenges of resource-constrained devices. A technique that is facing increasing interest is the Physical Unclonable Function (PUF), where biometrics are implemented on integrated circuits' electric features. PUFs, however, demand special hardware, so in this work, instead of considering the physical device as a source of randomness, an ElectroCardioGram (ECG) can be taken into consideration to make a ‘virtual’ PUF. Such an mechanism leverages individual ECG signals to generate a cryptographic key for encrypting and decrypting data. Due to the poor stability of the ECG signal and the typical noise existing in the measurement process for such a signal, filtering and feature extraction techniques must be adopted. The proposed model considers the adoption of pre-processing techniques in conjunction with a fuzzy extractor to add stability to the signal. Experiments were performed on a dataset containing ECG records gathered over 6 months, yielding good results in the short term and valuable outcomes in the long term, paving the way for adaptive PUF techniques in this context.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"115-124"},"PeriodicalIF":1.5,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12089","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140257509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Along with the development of industrial and distributed systems, security concerns have also emerged in industrial communication protocols. PTP, Precision Time Protocol, is one of the most precise time synchronisation protocols for industrial devices. It ensures real-time activity of the industrial control systems with precision equal to microseconds. In order to address the actual or potential security issues of PTP, this article firstly describes attack models applicable to PTP and then focuses on applying Coloured Petri Net to formally analyse the attack detection methods and also model PTP. The alignment of simulation results with the model and the considered assumptions show the suitability and accuracy of the proposed model.
随着工业和分布式系统的发展,工业通信协议也出现了安全问题。PTP(精确时间协议)是工业设备最精确的时间同步协议之一。它确保工业控制系统的实时活动精确到微秒级。为了解决 PTP 实际或潜在的安全问题,本文首先介绍了适用于 PTP 的攻击模型,然后重点应用彩色 Petri 网正式分析攻击检测方法,并对 PTP 进行建模。仿真结果与模型和所考虑的假设的一致性表明了所提出模型的适用性和准确性。
{"title":"A Petri net model for Time-Delay Attack detection in Precision Time Protocol-based networks","authors":"Mohsen Moradi, Amir Hossein Jahangir","doi":"10.1049/cps2.12088","DOIUrl":"10.1049/cps2.12088","url":null,"abstract":"<p>Along with the development of industrial and distributed systems, security concerns have also emerged in industrial communication protocols. PTP, Precision Time Protocol, is one of the most precise time synchronisation protocols for industrial devices. It ensures real-time activity of the industrial control systems with precision equal to microseconds. In order to address the actual or potential security issues of PTP, this article firstly describes attack models applicable to PTP and then focuses on applying Coloured Petri Net to formally analyse the attack detection methods and also model PTP. The alignment of simulation results with the model and the considered assumptions show the suitability and accuracy of the proposed model.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"407-423"},"PeriodicalIF":1.7,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12088","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140426605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nicholas Jacobs, Shamina Hossain-McKenzie, Shining Sun, Emily Payne, Adam Summers, Leen Al-Homoud, Astrid Layton, Kate Davis, Chris Goes
Cyber-physical systems have behaviour that crosses domain boundaries during events such as planned operational changes and malicious disturbances. Traditionally, the cyber and physical systems are monitored separately and use very different toolsets and analysis paradigms. The security and privacy of these cyber-physical systems requires improved understanding of the combined cyber-physical system behaviour and methods for holistic analysis. Therefore, the authors propose leveraging clustering techniques on cyber-physical data from smart grid systems to analyse differences and similarities in behaviour during cyber-, physical-, and cyber-physical disturbances. Since clustering methods are commonly used in data science to examine statistical similarities in order to sort large datasets, these algorithms can assist in identifying useful relationships in cyber-physical systems. Through this analysis, deeper insights can be shared with decision-makers on what cyber and physical components are strongly or weakly linked, what cyber-physical pathways are most traversed, and the criticality of certain cyber-physical nodes or edges. This paper presents several types of clustering methods for cyber-physical graphs of smart grid systems and their application in assessing different types of disturbances for informing cyber-physical situational awareness. The collection of these clustering techniques provide a foundational basis for cyber-physical graph interdependency analysis.
{"title":"Leveraging graph clustering techniques for cyber-physical system analysis to enhance disturbance characterisation","authors":"Nicholas Jacobs, Shamina Hossain-McKenzie, Shining Sun, Emily Payne, Adam Summers, Leen Al-Homoud, Astrid Layton, Kate Davis, Chris Goes","doi":"10.1049/cps2.12087","DOIUrl":"10.1049/cps2.12087","url":null,"abstract":"<p>Cyber-physical systems have behaviour that crosses domain boundaries during events such as planned operational changes and malicious disturbances. Traditionally, the cyber and physical systems are monitored separately and use very different toolsets and analysis paradigms. The security and privacy of these cyber-physical systems requires improved understanding of the combined cyber-physical system behaviour and methods for holistic analysis. Therefore, the authors propose leveraging clustering techniques on cyber-physical data from smart grid systems to analyse differences and similarities in behaviour during cyber-, physical-, and cyber-physical disturbances. Since clustering methods are commonly used in data science to examine statistical similarities in order to sort large datasets, these algorithms can assist in identifying useful relationships in cyber-physical systems. Through this analysis, deeper insights can be shared with decision-makers on what cyber and physical components are strongly or weakly linked, what cyber-physical pathways are most traversed, and the criticality of certain cyber-physical nodes or edges. This paper presents several types of clustering methods for cyber-physical graphs of smart grid systems and their application in assessing different types of disturbances for informing cyber-physical situational awareness. The collection of these clustering techniques provide a foundational basis for cyber-physical graph interdependency analysis.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"392-406"},"PeriodicalIF":1.7,"publicationDate":"2024-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12087","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139960393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Energy storage is playing an increasingly important role in the modern world as sustainability is becoming a critical issue. Within this domain, rechargeable battery is gaining significant popularity as it has been adopted to serve as the power supplier in a broad range of application scenarios, such as cyber-physical system (CPS), due to multiple advantages. On the other hand, battery inspection and management solutions have been constructed based on the CPS architecture in order to guarantee the quality, reliability and safety of rechargeable batteries. In specific, lifetime prediction is extensively studied in recent research as it can help assess the quality and health status to facilitate the manufacturing and maintenance. Due to the aforementioned importance, the authors aim to conduct a comprehensive survey on the data-driven techniques for battery lifetime prediction, including their current status, challenges and promises. In contrast to existing literature, the battery lifetime prediction methods are studied under CPS context in this survey. Hence, the authors focus on the algorithms for lifetime prediction as well as the engineering frameworks that enable the data acquisition and deployment of prediction models in CPS systems. Through this survey, the authors intend to investigate both academic and practical values in the domain of battery lifetime prediction to benefit both researchers and practitioners.
{"title":"Status, challenges, and promises of data-driven battery lifetime prediction under cyber-physical system context","authors":"Yang Liu, Sihui Chen, Peiyi Li, Jiayu Wan, Xin Li","doi":"10.1049/cps2.12086","DOIUrl":"10.1049/cps2.12086","url":null,"abstract":"<p>Energy storage is playing an increasingly important role in the modern world as sustainability is becoming a critical issue. Within this domain, rechargeable battery is gaining significant popularity as it has been adopted to serve as the power supplier in a broad range of application scenarios, such as cyber-physical system (CPS), due to multiple advantages. On the other hand, battery inspection and management solutions have been constructed based on the CPS architecture in order to guarantee the quality, reliability and safety of rechargeable batteries. In specific, lifetime prediction is extensively studied in recent research as it can help assess the quality and health status to facilitate the manufacturing and maintenance. Due to the aforementioned importance, the authors aim to conduct a comprehensive survey on the data-driven techniques for battery lifetime prediction, including their current status, challenges and promises. In contrast to existing literature, the battery lifetime prediction methods are studied under CPS context in this survey. Hence, the authors focus on the algorithms for lifetime prediction as well as the engineering frameworks that enable the data acquisition and deployment of prediction models in CPS systems. Through this survey, the authors intend to investigate both academic and practical values in the domain of battery lifetime prediction to benefit both researchers and practitioners.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 3","pages":"207-217"},"PeriodicalIF":1.7,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12086","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140471755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Agus Syamsul Arifin, Deris Stiawan, Bhakti Yudho Suprapto, Susanto Susanto, Tasmi Salim, Mohd Yazid Idris, Rahmat Budiarto
Supervisory control and data acquisition systems are critical in Industry 4.0 for controlling and monitoring industrial processes. However, these systems are vulnerable to various attacks, and therefore, intelligent and robust intrusion detection systems as security tools are necessary for ensuring security. Machine learning-based intrusion detection systems require datasets with balanced class distribution, but in practice, imbalanced class distribution is unavoidable. A dataset created by running a supervisory control and data acquisition IEC 60870-5-104 (IEC 104) protocol on a testbed network is presented. The dataset includes normal and attacks traffic data such as port scan, brute force, and Denial of service attacks. Various types of Denial of service attacks are generated to create a robust and specific dataset for training the intrusion detection system model. Three popular techniques for handling class imbalance, that is, random over-sampling, random under-sampling, and synthetic minority oversampling, are implemented to select the best dataset for the experiment. Gradient boosting, decision tree, and random forest algorithms are used as classifiers for the intrusion detection system models. Experimental results indicate that the intrusion detection system model using decision tree and random forest classifiers using random under-sampling achieved the highest accuracy of 99.05%. The intrusion detection system model's performance is verified using various metrics such as recall, precision, F1-Score, receiver operating characteristics curves, and area under the curve. Additionally, 10-fold cross-validation shows no indication of overfitting in the created intrusion detection system model.
{"title":"Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870-5-104","authors":"M. Agus Syamsul Arifin, Deris Stiawan, Bhakti Yudho Suprapto, Susanto Susanto, Tasmi Salim, Mohd Yazid Idris, Rahmat Budiarto","doi":"10.1049/cps2.12085","DOIUrl":"10.1049/cps2.12085","url":null,"abstract":"<p>Supervisory control and data acquisition systems are critical in Industry 4.0 for controlling and monitoring industrial processes. However, these systems are vulnerable to various attacks, and therefore, intelligent and robust intrusion detection systems as security tools are necessary for ensuring security. Machine learning-based intrusion detection systems require datasets with balanced class distribution, but in practice, imbalanced class distribution is unavoidable. A dataset created by running a supervisory control and data acquisition IEC 60870-5-104 (IEC 104) protocol on a testbed network is presented. The dataset includes normal and attacks traffic data such as port scan, brute force, and Denial of service attacks. Various types of Denial of service attacks are generated to create a robust and specific dataset for training the intrusion detection system model. Three popular techniques for handling class imbalance, that is, random over-sampling, random under-sampling, and synthetic minority oversampling, are implemented to select the best dataset for the experiment. Gradient boosting, decision tree, and random forest algorithms are used as classifiers for the intrusion detection system models. Experimental results indicate that the intrusion detection system model using decision tree and random forest classifiers using random under-sampling achieved the highest accuracy of 99.05%. The intrusion detection system model's performance is verified using various metrics such as recall, precision, F1-Score, receiver operating characteristics curves, and area under the curve. Additionally, 10-fold cross-validation shows no indication of overfitting in the created intrusion detection system model.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 3","pages":"282-292"},"PeriodicalIF":1.7,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12085","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139386040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Testing the visual field is a valuable diagnostic tool for identifying eye conditions such as cataract, glaucoma, and retinal disease. Its quick and straightforward testing process has become an essential component in our efforts to prevent blindness. Still, the device must be accessible to the general masses. This research has developed a machine learning model that can work with Edge devices like smartphones. As a result, it is opening the opportunity to integrate the disease-detecting model into multiple Edge devices to automate their operation. The authors intend to use convolutional neural network (CNN) and deep learning to deduce which optimisers have the best results when detecting cataracts from live photos of eyes. This is done by comparing different models and optimisers. Using these methods, a reliable model can be obtained that detects cataracts. The proposed TensorFlow Lite model constructed by combining CNN layers and Adam in this study is called Optimised Light Weight Sequential Deep Learning Model (SDLM). SDLM is trained using a smaller number of CNN layers and parameters, which gives SDLM its compatibility, fast execution time, and low memory requirements. The proposed Android app, I-Scan, uses SDLM in the form of TensorFlow Lite for demonstration of the model in Edge devices.
视野测试是识别白内障、青光眼和视网膜疾病等眼部疾病的重要诊断工具。其快速、直接的测试过程已成为我们防盲工作的重要组成部分。不过,该设备必须能够为普通大众所使用。这项研究开发了一种机器学习模型,可与智能手机等边缘设备配合使用。因此,它为将疾病检测模型集成到多个 Edge 设备中实现自动化操作提供了机会。作者打算利用卷积神经网络(CNN)和深度学习来推断出哪种优化器在从眼睛的实时照片中检测白内障时效果最好。这是通过比较不同的模型和优化器来实现的。利用这些方法,可以获得检测白内障的可靠模型。在本研究中,通过结合 CNN 层和亚当构建的 TensorFlow Lite 模型被称为优化轻量级序列深度学习模型(SDLM)。SDLM 使用较少的 CNN 层数和参数进行训练,因此具有兼容性强、执行时间快、内存需求低等特点。拟议的安卓应用程序 I-Scan 使用 TensorFlow Lite 形式的 SDLM,以便在 Edge 设备中演示该模型。
{"title":"Mobile detection of cataracts with an optimised lightweight deep Edge Intelligent technique","authors":"Dipta Neogi, Mahirul Alam Chowdhury, Mst. Moriom Akter, Md. Ishan Arefin Hossain","doi":"10.1049/cps2.12083","DOIUrl":"10.1049/cps2.12083","url":null,"abstract":"<p>Testing the visual field is a valuable diagnostic tool for identifying eye conditions such as cataract, glaucoma, and retinal disease. Its quick and straightforward testing process has become an essential component in our efforts to prevent blindness. Still, the device must be accessible to the general masses. This research has developed a machine learning model that can work with Edge devices like smartphones. As a result, it is opening the opportunity to integrate the disease-detecting model into multiple Edge devices to automate their operation. The authors intend to use convolutional neural network (CNN) and deep learning to deduce which optimisers have the best results when detecting cataracts from live photos of eyes. This is done by comparing different models and optimisers. Using these methods, a reliable model can be obtained that detects cataracts. The proposed TensorFlow Lite model constructed by combining CNN layers and Adam in this study is called Optimised Light Weight Sequential Deep Learning Model (SDLM). SDLM is trained using a smaller number of CNN layers and parameters, which gives SDLM its compatibility, fast execution time, and low memory requirements. The proposed Android app, I-Scan, uses SDLM in the form of TensorFlow Lite for demonstration of the model in Edge devices.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 3","pages":"269-281"},"PeriodicalIF":1.7,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12083","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139394799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, cyber security-related studies in the power grid have drawn wide attention, with much focus on its detection, mainly for data injection type of attacks. The vulnerability of power components as a result of attack and their impact on generator dynamics have been largely ignored so far. With the aim of addressing some of these issues, the authors propose a novel approach using real-time sliding surface-based switching attack (SA) construction. This approach targets the circuit breaker, excitation system, and governor system of the generator. The vulnerability of these power components to cyber-physical attacks and assessment of their potential impact on the stability of generator are discussed. The study is presented to show the progression of cascading generator dynamics on account of single or multiple time instants of SA launched on these power components. The results are discussed according to criteria in terms of deviations in rotor speed of the generator and identify some of possible combinations of power components that are most critical to grid stability. The proposed study is implemented on standard IEEE 3-machine, 9-bus network in real-time digital simulator via transmission control protocol/internet protocol (TCP/IP) communication network established as cyber-physical system. The sliding surface-based SA algorithm developed in MATLAB is launched from another computer.
{"title":"Real-time implementation for vulnerability of power components under switching attack based on sliding mode","authors":"Seema Yadav, Nand Kishor, Shubhi Purwar, Saikat Chakrabarti, Petra Raussi, Avinash Kumar","doi":"10.1049/cps2.12084","DOIUrl":"https://doi.org/10.1049/cps2.12084","url":null,"abstract":"<p>In recent years, cyber security-related studies in the power grid have drawn wide attention, with much focus on its detection, mainly for data injection type of attacks. The vulnerability of power components as a result of attack and their impact on generator dynamics have been largely ignored so far. With the aim of addressing some of these issues, the authors propose a novel approach using real-time sliding surface-based switching attack (SA) construction. This approach targets the circuit breaker, excitation system, and governor system of the generator. The vulnerability of these power components to cyber-physical attacks and assessment of their potential impact on the stability of generator are discussed. The study is presented to show the progression of cascading generator dynamics on account of single or multiple time instants of SA launched on these power components. The results are discussed according to criteria in terms of deviations in rotor speed of the generator and identify some of possible combinations of power components that are most critical to grid stability. The proposed study is implemented on standard IEEE 3-machine, 9-bus network in real-time digital simulator via transmission control protocol/internet protocol (TCP/IP) communication network established as cyber-physical system. The sliding surface-based SA algorithm developed in MATLAB is launched from another computer.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"375-391"},"PeriodicalIF":1.7,"publicationDate":"2023-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12084","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}