首页 > 最新文献

IET Cyber-Physical Systems: Theory and Applications最新文献

英文 中文
Dependability-aware routing and scheduling for Time-Sensitive Networking 时间敏感网络的可靠性感知路由和调度
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-03-15 DOI: 10.1049/cps2.12030
Niklas Reusch, Silviu S. Craciunas, Paul Pop

Time-Sensitive Networking (TSN) extends IEEE 802.1 Ethernet for safety-critical and real-time applications in several areas, for example, automotive, aerospace or industrial automation. However, many of these systems also have stringent security requirements, and security attacks may impair safety. Given a TSN-based distributed architecture, a set of applications with tasks and messages as well as a set of security and redundancy requirements, the authors are interested to synthesise a system configuration such that the real-time, safety and security requirements are upheld. The Timed Efficient Stream Loss-Tolerant Authentication (TESLA) low-resource multicast authentication protocol is used to guarantee the security requirements and redundant disjunct message routes to tolerate link failures. The authors consider that tasks are dispatched using a static cyclic schedule table and that the messages use the time-sensitive traffic class in TSN, which relies on schedule tables (called Gate Control Lists, GCLs) in the network switches. A configuration consists of the schedule tables for tasks as well as the disjoint routes and GCLs for messages. A Constraint Programing-based formulation, which can be used to find an optimal solution with respect to the cost function, is proposed. Additionally, a Simulated Annealing-based metaheuristic, which can find good solution for large test cases, is proposed. The authors evaluate both approaches on several test cases.

时间敏感网络(TSN)扩展了IEEE 802.1以太网,适用于汽车、航空航天或工业自动化等多个领域的安全关键和实时应用。但是,其中许多系统也有严格的安全要求,安全攻击可能会损害安全性。给定一个基于tsn的分布式体系结构,一组具有任务和消息的应用程序,以及一组安全性和冗余需求,作者有兴趣合成一个系统配置,使实时,安全性和安全性需求得到维护。采用TESLA (Timed Efficient Stream Loss-Tolerant Authentication)低资源组播认证协议来保证安全要求,并采用冗余的分离消息路由来容忍链路故障。作者认为任务调度使用静态循环调度表,消息使用TSN中的时间敏感流量类,该流量类依赖于网络交换机中的调度表(称为门控制列表,gcl)。配置由任务的进度表以及消息的不相交路由和gcl组成。提出了一种基于约束规划的求解成本函数的最优解的方法。此外,本文还提出了一种基于模拟退火的元启发式算法,该算法能较好地解决大型测试用例的问题。作者在几个测试用例上评估了这两种方法。
{"title":"Dependability-aware routing and scheduling for Time-Sensitive Networking","authors":"Niklas Reusch,&nbsp;Silviu S. Craciunas,&nbsp;Paul Pop","doi":"10.1049/cps2.12030","DOIUrl":"10.1049/cps2.12030","url":null,"abstract":"<p>Time-Sensitive Networking (TSN) extends IEEE 802.1 Ethernet for safety-critical and real-time applications in several areas, for example, automotive, aerospace or industrial automation. However, many of these systems also have stringent security requirements, and security attacks may impair safety. Given a TSN-based distributed architecture, a set of applications with tasks and messages as well as a set of security and redundancy requirements, the authors are interested to synthesise a system configuration such that the real-time, safety and security requirements are upheld. The Timed Efficient Stream Loss-Tolerant Authentication (TESLA) low-resource multicast authentication protocol is used to guarantee the security requirements and redundant disjunct message routes to tolerate link failures. The authors consider that tasks are dispatched using a static cyclic schedule table and that the messages use the time-sensitive traffic class in TSN, which relies on schedule tables (called Gate Control Lists, GCLs) in the network switches. A configuration consists of the schedule tables for tasks as well as the disjoint routes and GCLs for messages. A Constraint Programing-based formulation, which can be used to find an optimal solution with respect to the cost function, is proposed. Additionally, a Simulated Annealing-based metaheuristic, which can find good solution for large test cases, is proposed. The authors evaluate both approaches on several test cases.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 3","pages":"124-146"},"PeriodicalIF":1.5,"publicationDate":"2022-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12030","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121921895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Guest editorial: Machine learning for secure cyber-physical industrial control systems 嘉宾评论:用于安全网络物理工业控制系统的机器学习
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-02-23 DOI: 10.1049/cps2.12029
Shichao Liu, Ligang Wu, Jose Ignacio Leon, Bo Chen
<p>Information and communication technologies have increasingly been used to support the exchange of measurements and control signals in industrial control systems, making them important applications of cyber-physical industrial control systems (CPICSs) such as electrical power systems and intelligent transportation systems. While the communication infrastructure significantly facilitates the transmission of vast amounts of data over wide geographical areas, it makes CPICSs vulnerable to cyber-attacks; protecting CPICSs of critical infrastructures from cyber-attacks is crucial and challenging. In order to secure CPICSs, a variety of open challenges need to be tackled, including cyber-physical system modelling approaches, advanced intrusion detection systems, and resilient estimation and control methods. Machine learning (ML) and its emerging algorithms offer the potential of dealing with large-scale data analysis, data processing and decision-making in the security of CPICSs.</p><p>This special issue publishes state-of-the-art ML-based solutions for the open challenges in securing CPICSs of critical infrastructures.</p><p>When modelling cyber-attacks in CPICSs, most of existing works consider using external disturbances, which follow certain assumptions. While it is not sufficient to model cyber-attacks simply as disturbances, the paper ‘Game theoretic vulnerability management for secondary frequency control of islanded microgrids against false data injection (FDI) attacks’ by S. Liu et al. considers the dynamic interaction between the smart attacker (the spoofer) and the defender the microgrid control centre (MGCC). The authors propose a stochastic game between the MGCC and the attacker for enhancing the vulnerability of the MGCC to FDI attack (wireless spoof attack).</p><p>As communication networks are implemented for information exchange between the master and slave sides of bilateral teleoperation systems, they are also exposed to cyber-attack threats. The paper ‘Mode-dependent switching control of bilateral teleoperation against random denial-of-service attacks’ by L. Hu et al. analyses the performance of bilateral teleoperation systems in the presence of random denial-of-service (DoS) attacks and constant transmission delays and proposes a mode-dependent switching controller to mitigate the influence of DoS attacks.</p><p>While machine-learning algorithms are helpful in identifying cyber-attacks such as network intrusion, common network intrusion datasets are negatively affected by class imbalance; the normal traffic behaviour constitutes most of the dataset, whereas intrusion traffic behaviour forms a significantly smaller portion. The paper ‘Network intrusion detection using ML approaches: Addressing data imbalance’ by R. Ahsan et al. conducts a comparative evaluation on the impact of data imbalance of various ML algorithms and presents a hybrid voting classifier to improve the results.</p><p>To improve the anomaly detection performance w
信息和通信技术越来越多地用于支持工业控制系统中测量和控制信号的交换,使其成为电力系统和智能交通系统等网络物理工业控制系统(cpics)的重要应用。虽然通信基础设施极大地促进了在广泛地理区域内传输大量数据,但它使ccics容易受到网络攻击;保护关键基础设施的cpcs免受网络攻击是至关重要且具有挑战性的。为了确保cpics的安全,需要解决各种开放的挑战,包括网络物理系统建模方法,先进的入侵检测系统以及弹性估计和控制方法。机器学习(ML)及其新兴算法为cpics的安全性提供了处理大规模数据分析、数据处理和决策的潜力。本期特刊发布了最先进的基于ml的解决方案,以应对关键基础设施ccics安全方面的公开挑战。在对cpics中的网络攻击进行建模时,大多数现有工作都考虑使用外部干扰,这些干扰遵循一定的假设。虽然将网络攻击简单地建模为干扰是不够的,但S. Liu等人的论文“孤岛微电网二次频率控制对抗虚假数据注入(FDI)攻击的博弈论漏洞管理”考虑了智能攻击者(欺骗者)和防御者微电网控制中心(MGCC)之间的动态交互。为了提高MGCC对FDI攻击(无线欺骗攻击)的脆弱性,作者提出了MGCC与攻击者之间的随机博弈。由于通信网络是用于双边远程操作系统主从端信息交换的,因此也容易受到网络攻击的威胁。L. Hu等人的论文《针对随机拒绝服务攻击的双边远程操作模式依赖切换控制》分析了随机拒绝服务(DoS)攻击和持续传输延迟情况下双边远程操作系统的性能,并提出了一种模式依赖切换控制器来减轻DoS攻击的影响。虽然机器学习算法有助于识别网络入侵等网络攻击,但常见的网络入侵数据集受到类不平衡的负面影响;正常的流量行为构成了数据集的大部分,而入侵流量行为构成了数据集的一小部分。R. Ahsan等人的论文“使用ML方法的网络入侵检测:解决数据不平衡”对各种ML算法的数据不平衡影响进行了比较评估,并提出了一种混合投票分类器来改进结果。为了提高使用不平衡数据集时的异常检测性能,R. Ahsan等人的论文“基于cgan的过采样异常检测的比较分析”提出了一种基于cgan的异常检测解决方案,同时考虑了数据级和算法级结构。本期特刊精选的论文涵盖了各种基于机器学习的cpics安全解决方案,如网络物理能源系统和远程机器人系统。此外,本文还针对网络层入侵检测系统中数据不平衡问题提出了新的解决方案。未来,机器学习和强化学习算法可能会在解决涉及cpics安全性的大规模数据分析、数据处理和决策方面的挑战方面引起人们的极大兴趣。
{"title":"Guest editorial: Machine learning for secure cyber-physical industrial control systems","authors":"Shichao Liu,&nbsp;Ligang Wu,&nbsp;Jose Ignacio Leon,&nbsp;Bo Chen","doi":"10.1049/cps2.12029","DOIUrl":"10.1049/cps2.12029","url":null,"abstract":"&lt;p&gt;Information and communication technologies have increasingly been used to support the exchange of measurements and control signals in industrial control systems, making them important applications of cyber-physical industrial control systems (CPICSs) such as electrical power systems and intelligent transportation systems. While the communication infrastructure significantly facilitates the transmission of vast amounts of data over wide geographical areas, it makes CPICSs vulnerable to cyber-attacks; protecting CPICSs of critical infrastructures from cyber-attacks is crucial and challenging. In order to secure CPICSs, a variety of open challenges need to be tackled, including cyber-physical system modelling approaches, advanced intrusion detection systems, and resilient estimation and control methods. Machine learning (ML) and its emerging algorithms offer the potential of dealing with large-scale data analysis, data processing and decision-making in the security of CPICSs.&lt;/p&gt;&lt;p&gt;This special issue publishes state-of-the-art ML-based solutions for the open challenges in securing CPICSs of critical infrastructures.&lt;/p&gt;&lt;p&gt;When modelling cyber-attacks in CPICSs, most of existing works consider using external disturbances, which follow certain assumptions. While it is not sufficient to model cyber-attacks simply as disturbances, the paper ‘Game theoretic vulnerability management for secondary frequency control of islanded microgrids against false data injection (FDI) attacks’ by S. Liu et al. considers the dynamic interaction between the smart attacker (the spoofer) and the defender the microgrid control centre (MGCC). The authors propose a stochastic game between the MGCC and the attacker for enhancing the vulnerability of the MGCC to FDI attack (wireless spoof attack).&lt;/p&gt;&lt;p&gt;As communication networks are implemented for information exchange between the master and slave sides of bilateral teleoperation systems, they are also exposed to cyber-attack threats. The paper ‘Mode-dependent switching control of bilateral teleoperation against random denial-of-service attacks’ by L. Hu et al. analyses the performance of bilateral teleoperation systems in the presence of random denial-of-service (DoS) attacks and constant transmission delays and proposes a mode-dependent switching controller to mitigate the influence of DoS attacks.&lt;/p&gt;&lt;p&gt;While machine-learning algorithms are helpful in identifying cyber-attacks such as network intrusion, common network intrusion datasets are negatively affected by class imbalance; the normal traffic behaviour constitutes most of the dataset, whereas intrusion traffic behaviour forms a significantly smaller portion. The paper ‘Network intrusion detection using ML approaches: Addressing data imbalance’ by R. Ahsan et al. conducts a comparative evaluation on the impact of data imbalance of various ML algorithms and presents a hybrid voting classifier to improve the results.&lt;/p&gt;&lt;p&gt;To improve the anomaly detection performance w","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 1","pages":"1-3"},"PeriodicalIF":1.5,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12029","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125416194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimentation framework for wireless communication systems under jamming scenarios 干扰情况下无线通信系统的实验框架
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-28 DOI: 10.1049/cps2.12027
Marko Jacovic, Michael J. Liston, Vasil Pano, Geoffrey Mainland, Kapil R. Dandekar

Cyber-physical systems (CPS) integrate control, sensing, and processing into interconnected physical components to support applications within transportation, energy, healthcare, environment, and various other areas. Secure and reliable wireless communication between devices is necessary to enable the widespread adoption of these emerging technologies. Cyber-physical systems devices must be protected against active threats, such as Radio Frequency (RF) Jammers, which intentionally disrupt communication links. Jamming detection and mitigation techniques must be evaluated extensively to validate algorithms prior to full implementation. Challenges related to obtaining zoning permits, Federal Aviation Administration (FAA) pilot certification for Unmanned Aerial Vehicles (UAVs), and Federal Communications Commission (FCC) licencing lead to evaluation limited to simulation-based or simplistic, non-representative hardware experimentation. A site-specific ray-tracing emulation framework is presented to provide a realistic evaluation of communication devices under RF jamming attacks in complex scenarios involving mobility, vehicular, and UAV systems. System architecture and capabilities are provided for the devices under test, real-world jamming adversaries, channel modelling, and channel emulation. Case studies are provided to demonstrate the use of the framework for different applications and jamming threats. The experimental results illustrate the benefit of the ray-tracing emulation system for conducting complex wireless communication studies under the presence of RF jamming.

网络物理系统(CPS)将控制、传感和处理集成到相互连接的物理组件中,以支持交通、能源、医疗保健、环境和各种其他领域的应用。设备之间安全可靠的无线通信是广泛采用这些新兴技术的必要条件。必须保护网络物理系统设备免受主动威胁,例如故意破坏通信链路的射频干扰器。在全面实施之前,必须对干扰检测和缓解技术进行广泛的评估,以验证算法。与获得分区许可、美国联邦航空管理局(FAA)无人机飞行员认证以及美国联邦通信委员会(FCC)许可相关的挑战导致评估仅限于基于模拟的或简单的、不具代表性的硬件实验。提出了一种特定地点的光线追踪仿真框架,用于在涉及移动性、车辆和无人机系统的复杂场景中对射频干扰攻击下的通信设备进行现实评估。系统架构和功能提供了测试设备,现实世界的干扰对手,信道建模和信道仿真。提供了案例研究来演示该框架在不同应用和干扰威胁中的使用。实验结果说明了射线追踪仿真系统在射频干扰条件下进行复杂无线通信研究的优越性。
{"title":"Experimentation framework for wireless communication systems under jamming scenarios","authors":"Marko Jacovic,&nbsp;Michael J. Liston,&nbsp;Vasil Pano,&nbsp;Geoffrey Mainland,&nbsp;Kapil R. Dandekar","doi":"10.1049/cps2.12027","DOIUrl":"https://doi.org/10.1049/cps2.12027","url":null,"abstract":"<p>Cyber-physical systems (CPS) integrate control, sensing, and processing into interconnected physical components to support applications within transportation, energy, healthcare, environment, and various other areas. Secure and reliable wireless communication between devices is necessary to enable the widespread adoption of these emerging technologies. Cyber-physical systems devices must be protected against active threats, such as Radio Frequency (RF) Jammers, which intentionally disrupt communication links. Jamming detection and mitigation techniques must be evaluated extensively to validate algorithms prior to full implementation. Challenges related to obtaining zoning permits, Federal Aviation Administration (FAA) pilot certification for Unmanned Aerial Vehicles (UAVs), and Federal Communications Commission (FCC) licencing lead to evaluation limited to simulation-based or simplistic, non-representative hardware experimentation. A site-specific ray-tracing emulation framework is presented to provide a realistic evaluation of communication devices under RF jamming attacks in complex scenarios involving mobility, vehicular, and UAV systems. System architecture and capabilities are provided for the devices under test, real-world jamming adversaries, channel modelling, and channel emulation. Case studies are provided to demonstrate the use of the framework for different applications and jamming threats. The experimental results illustrate the benefit of the ray-tracing emulation system for conducting complex wireless communication studies under the presence of RF jamming.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 2","pages":"93-111"},"PeriodicalIF":1.5,"publicationDate":"2022-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12027","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91883051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal control input for discrete-time networked control systems with data dropout 具有数据丢失的离散网络控制系统的最优控制输入
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-15 DOI: 10.1049/cps2.12028
Tadanao Zanma, Naohiro Yamamoto, Kenta Koiwa, Kang-Zhi Liu

These days, networked control systems (NCSs) in which data is transmitted via communication have been actively studied for many potential applications. In an NCS, data dropout degrades control performance depending on network conditions. For an NCS with data dropout, the authors propose a model-predictive-control-based input optimisation, representing data dropout as both a Bernoulli model and a finite-order Markov chain. Using the proposed NCS data dropout model, the authors derive an optimal input that provides the estimated error between the expected state of the plant and a given reference. The proposed control problem is formulated as its equivalent quadratic programming, as executed at each online sampling. The authors also demonstrate simulations and experiments to show the effectiveness of the proposed method.

如今,通过通信传输数据的网络控制系统(NCSs)已被积极研究用于许多潜在的应用。在NCS中,根据网络条件的不同,数据丢失会降低控制性能。对于具有数据丢失的NCS,作者提出了一种基于模型预测控制的输入优化,将数据丢失表示为伯努利模型和有限阶马尔可夫链。利用提出的NCS数据丢失模型,作者得出了一个最优输入,该输入提供了工厂预期状态与给定参考之间的估计误差。所提出的控制问题被表述为在每次在线采样时执行的等效二次规划。通过仿真和实验验证了该方法的有效性。
{"title":"Optimal control input for discrete-time networked control systems with data dropout","authors":"Tadanao Zanma,&nbsp;Naohiro Yamamoto,&nbsp;Kenta Koiwa,&nbsp;Kang-Zhi Liu","doi":"10.1049/cps2.12028","DOIUrl":"10.1049/cps2.12028","url":null,"abstract":"<p>These days, networked control systems (NCSs) in which data is transmitted via communication have been actively studied for many potential applications. In an NCS, data dropout degrades control performance depending on network conditions. For an NCS with data dropout, the authors propose a model-predictive-control-based input optimisation, representing data dropout as both a Bernoulli model and a finite-order Markov chain. Using the proposed NCS data dropout model, the authors derive an optimal input that provides the estimated error between the expected state of the plant and a given reference. The proposed control problem is formulated as its equivalent quadratic programming, as executed at each online sampling. The authors also demonstrate simulations and experiments to show the effectiveness of the proposed method.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 3","pages":"113-123"},"PeriodicalIF":1.5,"publicationDate":"2022-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12028","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130664018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Codesign of communication scheduling and controller of networked control systems 网络控制系统通信调度与控制器协同设计
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-12-24 DOI: 10.1049/cps2.12026
Tadanao Zanma, Toru Kuribayashi, Kenta Koiwa, Kang-Zhi Liu

Networked control systems have received increasing attention from many researchers because of their vast potential. The insertion of communication networks in a controlled system brings network-induced defects, which are mainly caused by limited network resources. This paper proposes a codesign of periodic communication scheduling and a controller using sparsity for efficient use of the network while improving initial control performance. The effectiveness of the proposed method is verified through two numerical simulations.

网络控制系统因其巨大的潜力而受到越来越多研究者的关注。在受控系统中引入通信网络会产生网络缺陷,而网络缺陷主要是由有限的网络资源造成的。为了在提高初始控制性能的同时有效地利用网络,本文提出了一种周期通信调度的协同设计和一种利用稀疏性的控制器。通过两个数值仿真验证了该方法的有效性。
{"title":"Codesign of communication scheduling and controller of networked control systems","authors":"Tadanao Zanma,&nbsp;Toru Kuribayashi,&nbsp;Kenta Koiwa,&nbsp;Kang-Zhi Liu","doi":"10.1049/cps2.12026","DOIUrl":"https://doi.org/10.1049/cps2.12026","url":null,"abstract":"<p>Networked control systems have received increasing attention from many researchers because of their vast potential. The insertion of communication networks in a controlled system brings network-induced defects, which are mainly caused by limited network resources. This paper proposes a codesign of periodic communication scheduling and a controller using sparsity for efficient use of the network while improving initial control performance. The effectiveness of the proposed method is verified through two numerical simulations.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 2","pages":"81-92"},"PeriodicalIF":1.5,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12026","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91867574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimation of network traffic status and switching control of networked control systems with data dropout 具有数据丢失的网络控制系统的网络流量状态估计与切换控制
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-11-02 DOI: 10.1049/cps2.12024
Tadanao Zanma, Daiki Hashimoto, Kenta Koiwa, Kang-Zhi Liu

The recent development of the communication technology accelerates studies of real-time networked control systems using networks. The data dropout is essentially unavoidable, especially in wireless networks and it results from transmission errors and network traffic congestion. Multiple time-varying network traffic status given by discrete-time homogeneous Markov chains is assumed. The authors estimate the network traffic status characterised by the probability matrix of the Markov chain online from the data dropout history. According to the estimation of network traffic status, an appropriate controller is selected to improve the control performance. The effectiveness of the proposed method is verified through simulations and experiments.

近年来通信技术的发展加速了利用网络实现实时网络化控制系统的研究。数据丢失是不可避免的,特别是在无线网络中,它是由传输错误和网络流量拥塞造成的。假设由离散齐次马尔可夫链给出的多时变网络流量状态。根据数据丢失历史,用马尔可夫链的概率矩阵在线估计网络流量状态。根据对网络流量状态的估计,选择合适的控制器来提高控制性能。通过仿真和实验验证了该方法的有效性。
{"title":"Estimation of network traffic status and switching control of networked control systems with data dropout","authors":"Tadanao Zanma,&nbsp;Daiki Hashimoto,&nbsp;Kenta Koiwa,&nbsp;Kang-Zhi Liu","doi":"10.1049/cps2.12024","DOIUrl":"https://doi.org/10.1049/cps2.12024","url":null,"abstract":"<p>The recent development of the communication technology accelerates studies of real-time networked control systems using networks. The data dropout is essentially unavoidable, especially in wireless networks and it results from transmission errors and network traffic congestion. Multiple time-varying network traffic status given by discrete-time homogeneous Markov chains is assumed. The authors estimate the network traffic status characterised by the probability matrix of the Markov chain online from the data dropout history. According to the estimation of network traffic status, an appropriate controller is selected to improve the control performance. The effectiveness of the proposed method is verified through simulations and experiments.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 2","pages":"69-80"},"PeriodicalIF":1.5,"publicationDate":"2021-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12024","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90139399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A fault location method of distribution network based on XGBoost and SVM algorithm 基于XGBoost和SVM算法的配电网故障定位方法
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-10-29 DOI: 10.1049/cps2.12022
Keyan Liu, Tianyuan Kang, Xueshun Ye, Muke Bai, Yaqian Fan

Nowadays, the reliable supply of electric power is vital in all aspects of social life. With the development and participation of distributed generations, not only does an accurate fault location lets repair of a fault line as quickly as possible, but also it is of great significance to ensure the safe and stable economic operation of the power system. This study proposes a method to determine the fault location in distribution networks, which is a combination of Extreme Gradient Boosting and Support Vector Machine. The effectiveness of the proposed method is validated on an IEEE34-bus distribution network under single-phase-to-ground faults, using voltage measurements available at each node in the distribution network. The comparison in accuracy, precision, recall, F1-score and time-cost of the method in this study with K-Nearest Neighbour and Multi-Layer Perceptron demonstrates the feasibility of applying the proposed method in distribution system fault diagnosis.

如今,可靠的电力供应对社会生活的各个方面都至关重要。随着分布式电源的发展和参与,准确的故障定位不仅可以使故障线路尽快修复,而且对保证电力系统的安全稳定经济运行具有重要意义。本文提出了一种将极限梯度增强和支持向量机相结合的配电网故障定位方法。在ieee34总线配电网单相接地故障情况下,利用配电网各节点电压测量值验证了该方法的有效性。通过与k近邻和多层感知器在准确率、精密度、召回率、f1分数和时间成本等方面的比较,证明了该方法在配电系统故障诊断中的可行性。
{"title":"A fault location method of distribution network based on XGBoost and SVM algorithm","authors":"Keyan Liu,&nbsp;Tianyuan Kang,&nbsp;Xueshun Ye,&nbsp;Muke Bai,&nbsp;Yaqian Fan","doi":"10.1049/cps2.12022","DOIUrl":"https://doi.org/10.1049/cps2.12022","url":null,"abstract":"<p>Nowadays, the reliable supply of electric power is vital in all aspects of social life. With the development and participation of distributed generations, not only does an accurate fault location lets repair of a fault line as quickly as possible, but also it is of great significance to ensure the safe and stable economic operation of the power system. This study proposes a method to determine the fault location in distribution networks, which is a combination of Extreme Gradient Boosting and Support Vector Machine. The effectiveness of the proposed method is validated on an IEEE34-bus distribution network under single-phase-to-ground faults, using voltage measurements available at each node in the distribution network. The comparison in accuracy, precision, recall, F1-score and time-cost of the method in this study with K-Nearest Neighbour and Multi-Layer Perceptron demonstrates the feasibility of applying the proposed method in distribution system fault diagnosis.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"6 4","pages":"254-264"},"PeriodicalIF":1.5,"publicationDate":"2021-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12022","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91942846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A comparative analysis of CGAN-based oversampling for anomaly detection 基于cgan的过采样异常检测的比较分析
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-10-26 DOI: 10.1049/cps2.12019
Rahbar Ahsan, Wei Shi, Xiangyu Ma, William Lee Croft

In this work, the problem of anomaly detection in imbalanced datasets, framed in the context of network intrusion detection is studied. A novel anomaly detection solution that takes both data-level and algorithm-level approaches into account to cope with the class-imbalance problem is proposed. This solution integrates the auto-learning ability of Reinforcement Learning with the oversampling ability of a Conditional Generative Adversarial Network (CGAN). To further investigate the potential of a CGAN, in imbalanced classification tasks, the effect of CGAN-based oversampling on the following classifiers is examined: Naïve Bayes, Multilayer Perceptron, Random Forest and Logistic Regression. Through the experimental results, the authors demonstrate improved performance from the proposed approach, and from CGAN-based oversampling in general, over other oversampling techniques such as Synthetic Minority Oversampling Technique and Adaptive Synthetic.

本文在网络入侵检测的背景下,研究了不平衡数据集的异常检测问题。提出了一种同时考虑数据级和算法级方法的异常检测方法。该解决方案将强化学习的自动学习能力与条件生成对抗网络(CGAN)的过采样能力相结合。为了进一步研究CGAN的潜力,在不平衡分类任务中,研究了基于CGAN的过采样对以下分类器的影响:Naïve贝叶斯、多层感知器、随机森林和逻辑回归。通过实验结果,作者证明了该方法的性能优于其他过采样技术,如合成少数派过采样技术和自适应合成过采样技术。
{"title":"A comparative analysis of CGAN-based oversampling for anomaly detection","authors":"Rahbar Ahsan,&nbsp;Wei Shi,&nbsp;Xiangyu Ma,&nbsp;William Lee Croft","doi":"10.1049/cps2.12019","DOIUrl":"10.1049/cps2.12019","url":null,"abstract":"<p>In this work, the problem of anomaly detection in imbalanced datasets, framed in the context of network intrusion detection is studied. A novel anomaly detection solution that takes both data-level and algorithm-level approaches into account to cope with the class-imbalance problem is proposed. This solution integrates the auto-learning ability of Reinforcement Learning with the oversampling ability of a Conditional Generative Adversarial Network (CGAN). To further investigate the potential of a CGAN, in imbalanced classification tasks, the effect of CGAN-based oversampling on the following classifiers is examined: Naïve Bayes, Multilayer Perceptron, Random Forest and Logistic Regression. Through the experimental results, the authors demonstrate improved performance from the proposed approach, and from CGAN-based oversampling in general, over other oversampling techniques such as Synthetic Minority Oversampling Technique and Adaptive Synthetic.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 1","pages":"40-50"},"PeriodicalIF":1.5,"publicationDate":"2021-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12019","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133066878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A secure and efficient range query method for two-layer wireless sensor networks 一种安全高效的双层无线传感器网络距离查询方法
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-09-10 DOI: 10.1049/cps2.12023
Yun Deng, Yanping Kang

Traditional range query methods of work still have shortcomings in node energy consumption and privacy security, so a two-layer secure and efficient range query method for wireless sensor networks is proposed. In the data storage stage, the sensing node obtains the data ciphertext and timestamp by the Advanced Encryption Standard encryption algorithm, receives the new encryption constraint chain by the reverse 0–1 encoding method and Hash-based Message Authentication Code encryption algorithm, and sends the chain to the storage node. In the query response phase, the storage node responds to the request of the base station and sends the data that meet the query requirements. After receiving the data, the base station verifies the consistency with the new encryption constraint chain and timestamp. During the experiment, the energy consumption is analysed from three aspects: the number of data collected in the period, the data length of the sensing node and the partition factor of the encryption constraint chain. The results show that this method has low energy consumption and can maintain the consistency of data.

针对传统的工作距离查询方法在节点能耗和隐私安全方面存在的不足,提出了一种安全高效的两层无线传感器网络距离查询方法。在数据存储阶段,感知节点通过Advanced Encryption Standard加密算法获取数据密文和时间戳,通过反向0-1编码方法和基于哈希的消息认证码加密算法接收新的加密约束链,并将该链发送到存储节点。在查询响应阶段,存储节点响应基站的请求,发送符合查询要求的数据。基站接收到数据后,验证与新的加密约束链和时间戳的一致性。在实验过程中,从周期内采集的数据数量、感知节点的数据长度和加密约束链的分割系数三个方面分析了能耗。结果表明,该方法能耗低,能保持数据的一致性。
{"title":"A secure and efficient range query method for two-layer wireless sensor networks","authors":"Yun Deng,&nbsp;Yanping Kang","doi":"10.1049/cps2.12023","DOIUrl":"https://doi.org/10.1049/cps2.12023","url":null,"abstract":"<p>Traditional range query methods of work still have shortcomings in node energy consumption and privacy security, so a two-layer secure and efficient range query method for wireless sensor networks is proposed. In the data storage stage, the sensing node obtains the data ciphertext and timestamp by the Advanced Encryption Standard encryption algorithm, receives the new encryption constraint chain by the reverse 0–1 encoding method and Hash-based Message Authentication Code encryption algorithm, and sends the chain to the storage node. In the query response phase, the storage node responds to the request of the base station and sends the data that meet the query requirements. After receiving the data, the base station verifies the consistency with the new encryption constraint chain and timestamp. During the experiment, the energy consumption is analysed from three aspects: the number of data collected in the period, the data length of the sensing node and the partition factor of the encryption constraint chain. The results show that this method has low energy consumption and can maintain the consistency of data.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 2","pages":"51-68"},"PeriodicalIF":1.5,"publicationDate":"2021-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12023","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91823721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal specification and verification of fault location, isolation and service restoration of local topology model based on distributed processing for active distribution network 基于分布式处理的有源配电网局部拓扑模型故障定位、隔离和业务恢复的形式化规范与验证
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-08-19 DOI: 10.1049/cps2.12005
Jiaming Weng, Dong Liu, Yingxu Liu

Active distribution network (ADN) technology, as an important trend of the future smart distribution grid, is able to effectively absorb distributed energy resource (DER), to reasonably optimise grid-load operation characteristics, and to safely support the reliability of power supply. Through enhancing energy utilisation efficiency and friendly interaction with user access, ADN technology is also able to comprehensively improve the power supply reliability of the distribution network. However, distributed feeder automation (FA), as an important part of ADN technology, will also meet new problems and challenges with the access of DER in the distribution network. The formal method can analyse the correctness and effectiveness of a distributed fault processing algorithm from mathematical logic, which provides an important theoretical basis for distributed fault processing. The focus herein is on the formal description and verification of topology modelling in fault location, isolation, and service restoration (FLISR) based on distributed processing. By abstracting and simplifying the complex power system features, the adaptability of the formal method is solved. The logical correctness of the topology model in FLISR based on distributed processing is verified. Finally, the distributed local topology model and algorithm is verified through a formal method using an actual ADN example.

主动配电网(ADN)技术能够有效吸收分布式能源,合理优化电网负荷运行特性,安全保障供电可靠性,是未来智能配电网发展的重要趋势。通过提高能源利用效率和与用户接入的友好交互,ADN技术还能够全面提高配电网的供电可靠性。然而,分布式馈线自动化作为ADN技术的重要组成部分,随着DER在配电网中的接入,也将面临新的问题和挑战。形式化方法可以从数学逻辑上分析分布式故障处理算法的正确性和有效性,为分布式故障处理提供了重要的理论依据。本文重点研究了基于分布式处理的故障定位、隔离和服务恢复(FLISR)中拓扑建模的形式化描述和验证。通过对复杂电力系统特征的抽象和简化,解决了形式化方法的适应性问题。验证了基于分布式处理的FLISR拓扑模型的逻辑正确性。最后,通过一个实际ADN实例,通过形式化方法对分布式局部拓扑模型和算法进行了验证。
{"title":"Formal specification and verification of fault location, isolation and service restoration of local topology model based on distributed processing for active distribution network","authors":"Jiaming Weng,&nbsp;Dong Liu,&nbsp;Yingxu Liu","doi":"10.1049/cps2.12005","DOIUrl":"https://doi.org/10.1049/cps2.12005","url":null,"abstract":"<p>Active distribution network (ADN) technology, as an important trend of the future smart distribution grid, is able to effectively absorb distributed energy resource (DER), to reasonably optimise grid-load operation characteristics, and to safely support the reliability of power supply. Through enhancing energy utilisation efficiency and friendly interaction with user access, ADN technology is also able to comprehensively improve the power supply reliability of the distribution network. However, distributed feeder automation (FA), as an important part of ADN technology, will also meet new problems and challenges with the access of DER in the distribution network. The formal method can analyse the correctness and effectiveness of a distributed fault processing algorithm from mathematical logic, which provides an important theoretical basis for distributed fault processing. The focus herein is on the formal description and verification of topology modelling in fault location, isolation, and service restoration (FLISR) based on distributed processing. By abstracting and simplifying the complex power system features, the adaptability of the formal method is solved. The logical correctness of the topology model in FLISR based on distributed processing is verified. Finally, the distributed local topology model and algorithm is verified through a formal method using an actual ADN example.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"6 3","pages":"116-124"},"PeriodicalIF":1.5,"publicationDate":"2021-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12005","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91849015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Cyber-Physical Systems: Theory and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1