The introduction of building information management (BIM) to enable the management and delivery of megaprojects has illuminated the importance of system integration (SI) to coordinate and bring together complex interdependent technical and organizational systems. SI can inform and address the emerging interdependencies with BIM processes and technologies in megaprojects. Thus, in this article, we extend the theorizing of SI and BIM for the management of megaprojects in the infrastructure sector. This process involves 1) conceptualizing the complementarity and compatibility of SI and BIM in the management of megaprojects, and 2) offering an integrative framework and model of SI and BIM. Finally, we discuss and highlight this twofold contribution and offer insights into future research.
引入建筑信息管理(BIM)以实现超大型项目的管理和交付,揭示了系统集成(SI)在协调和汇集复杂的相互依存的技术和组织系统方面的重要性。系统集成可以为超大型项目中的 BIM 流程和技术提供信息,并解决新出现的相互依存问题。因此,在本文中,我们将扩展 SI 和 BIM 的理论,用于基础设施领域的超大型项目管理。这一过程包括:1)将 SI 和 BIM 在巨型项目管理中的互补性和兼容性概念化;2)提供 SI 和 BIM 的整合框架和模型。最后,我们讨论并强调了这两方面的贡献,并对未来研究提出了见解。
{"title":"Complementarity and Compatibility of Systems Integration and Building Information Management","authors":"Mikela Chatzimichailidou;Tim Whitcher;Nikola Suzic","doi":"10.1109/JSYST.2024.3387064","DOIUrl":"10.1109/JSYST.2024.3387064","url":null,"abstract":"The introduction of building information management (BIM) to enable the management and delivery of megaprojects has illuminated the importance of system integration (SI) to coordinate and bring together complex interdependent technical and organizational systems. SI can inform and address the emerging interdependencies with BIM processes and technologies in megaprojects. Thus, in this article, we extend the theorizing of SI and BIM for the management of megaprojects in the infrastructure sector. This process involves 1) conceptualizing the complementarity and compatibility of SI and BIM in the management of megaprojects, and 2) offering an integrative framework and model of SI and BIM. Finally, we discuss and highlight this twofold contribution and offer insights into future research.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1198-1207"},"PeriodicalIF":4.0,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140806732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-17DOI: 10.1109/JSYST.2024.3384372
Daotong Zhang;Peng Shi;Ramesh K. Agarwal;Levente Kovács
This article presents a novel model predictive control (MPC) framework with an integrated disturbance observer for cyber-physical systems (CPSs) under denial-of-service (DoS) attacks. Uniquely incorporating a memory module, our MPC approach is tailored to maintain stability and security in CPS during DoS attacks, which typically disrupt communication and degrade performance. Our method stands out by addressing time-varying system uncertainties through the disturbance observer, enhancing robustness under these attack conditions. The effectiveness of our approach is validated through numerical simulations, hardware-in-the-loop experiments, and comparative analyses using an omnidirectional robot, highlighting its practical applicability and advancement over existing methods.
本文介绍了一种新颖的模型预测控制(MPC)框架,该框架集成了干扰观测器,可用于拒绝服务(DoS)攻击下的网络物理系统(CPS)。我们的 MPC 方法独特地集成了内存模块,专门用于在 DoS 攻击期间保持 CPS 的稳定性和安全性,DoS 攻击通常会破坏通信并降低性能。我们的方法通过干扰观测器解决了时变系统不确定性问题,增强了在这些攻击条件下的鲁棒性。我们通过数值模拟、硬件在环实验以及使用全向机器人进行比较分析,验证了我们方法的有效性,突出了其实际适用性以及与现有方法相比的先进性。
{"title":"Reference Tracking MPC for Cyber-Physical Systems Under Denial-of-Service Attacks: An Omnidirectional Robot Application","authors":"Daotong Zhang;Peng Shi;Ramesh K. Agarwal;Levente Kovács","doi":"10.1109/JSYST.2024.3384372","DOIUrl":"10.1109/JSYST.2024.3384372","url":null,"abstract":"This article presents a novel model predictive control (MPC) framework with an integrated disturbance observer for cyber-physical systems (CPSs) under denial-of-service (DoS) attacks. Uniquely incorporating a memory module, our MPC approach is tailored to maintain stability and security in CPS during DoS attacks, which typically disrupt communication and degrade performance. Our method stands out by addressing time-varying system uncertainties through the disturbance observer, enhancing robustness under these attack conditions. The effectiveness of our approach is validated through numerical simulations, hardware-in-the-loop experiments, and comparative analyses using an omnidirectional robot, highlighting its practical applicability and advancement over existing methods.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1248-1256"},"PeriodicalIF":4.0,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140804840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-16DOI: 10.1109/JSYST.2024.3381304
Hao Zhang;Jie Yao;Zhuping Wang;Sheng Gao;Huaicheng Yan
This article studies the optimal distributed denial-of-service attack strategy for cyber–physical systems with multiple attackers and multiple defenders. An advanced attack strategy is proposed to cause the great damage to system in a multiattacker–defender form. First, a novel model of signal-to-interference-to-noise ratio for the multiattacker and multidefender is built. Taking the energy constraints into consideration, the objective of defenders is to minimize the system performance, while the attackers tend to deteriorate it by emitting interference energy. Thus, the optimal channel selection and optimal energy allocation strategies are proposed to answer which channel both of them should choose and how much power both of them should allocate to each channel in a finite time horizon. Second, a two-player zero-sum matrix game is formulated to solve the optimal problem by linear programming and obtain the Nash equilibrium. When the channel parameters are time-varying, a dynamic optimal channel selection problem is considered and a multistage game algorithm is proposed to find the Nash equilibrium. In addition, the designed optimal strategies of both players are demonstrated and analyzed. Finally, a numerical simulation is provided to illustrate the effectiveness of the proposed approach.
{"title":"Optimal DDoS Attack Strategy for Cyber–Physical Systems: A Multiattacker–Defender Game","authors":"Hao Zhang;Jie Yao;Zhuping Wang;Sheng Gao;Huaicheng Yan","doi":"10.1109/JSYST.2024.3381304","DOIUrl":"10.1109/JSYST.2024.3381304","url":null,"abstract":"This article studies the optimal distributed denial-of-service attack strategy for cyber–physical systems with multiple attackers and multiple defenders. An advanced attack strategy is proposed to cause the great damage to system in a multiattacker–defender form. First, a novel model of signal-to-interference-to-noise ratio for the multiattacker and multidefender is built. Taking the energy constraints into consideration, the objective of defenders is to minimize the system performance, while the attackers tend to deteriorate it by emitting interference energy. Thus, the optimal channel selection and optimal energy allocation strategies are proposed to answer which channel both of them should choose and how much power both of them should allocate to each channel in a finite time horizon. Second, a two-player zero-sum matrix game is formulated to solve the optimal problem by linear programming and obtain the Nash equilibrium. When the channel parameters are time-varying, a dynamic optimal channel selection problem is considered and a multistage game algorithm is proposed to find the Nash equilibrium. In addition, the designed optimal strategies of both players are demonstrated and analyzed. Finally, a numerical simulation is provided to illustrate the effectiveness of the proposed approach.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"929-940"},"PeriodicalIF":4.0,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140615033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-15DOI: 10.1109/JSYST.2024.3378699
Long Ma;Yuan Zhang
Internet of Things (IoT) devices frequently encounter various challenges, including limited power, spectrum, and memory resources, as well as harsh environments conditions. Therefore, the development of an efficient transmission scheme is crucial for ensuring reliable and secure communication in IoT networks. In this article, an adaptive semi-grant-free (SGF) transmission scheme is proposed for reliable uplink nonorthogonal multiple access systems with enhanced security, in which a ratio-based user scheduling criterion and a hybrid successive interference cancellation technique are employed to suppress the activity of untrusted nodes while ensuring reliable transmission. To evaluate the superiority of the adaptive scheme, a conventional static transmission scheme and a worst-case eavesdropping scenario are used as benchmarks. Simulation results show that the adaptive scheme outperforms the conventional schemes in terms of outage and intercept probability. In addition, the closed-form results of grant-based user's and grant-free user's outage probability and untrusted node's intercept probability are derived. Compared to existing literature, this work provides a comprehensive view of security-reliability tradeoff analysis of SGF transmissions.
{"title":"Security-Reliability Analysis for Adaptive Semi-Grant-Free Transmissions","authors":"Long Ma;Yuan Zhang","doi":"10.1109/JSYST.2024.3378699","DOIUrl":"10.1109/JSYST.2024.3378699","url":null,"abstract":"Internet of Things (IoT) devices frequently encounter various challenges, including limited power, spectrum, and memory resources, as well as harsh environments conditions. Therefore, the development of an efficient transmission scheme is crucial for ensuring reliable and secure communication in IoT networks. In this article, an adaptive semi-grant-free (SGF) transmission scheme is proposed for reliable uplink nonorthogonal multiple access systems with enhanced security, in which a ratio-based user scheduling criterion and a hybrid successive interference cancellation technique are employed to suppress the activity of untrusted nodes while ensuring reliable transmission. To evaluate the superiority of the adaptive scheme, a conventional static transmission scheme and a worst-case eavesdropping scenario are used as benchmarks. Simulation results show that the adaptive scheme outperforms the conventional schemes in terms of outage and intercept probability. In addition, the closed-form results of grant-based user's and grant-free user's outage probability and untrusted node's intercept probability are derived. Compared to existing literature, this work provides a comprehensive view of security-reliability tradeoff analysis of SGF transmissions.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1080-1091"},"PeriodicalIF":4.0,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140582673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article investigates completely distributed secure consensus control (SCC) of high-order linear and Lipschitz nonlinear multiagent systems (MASs) in the presence of interaction link attacks, respectively, where the design criteria are independent of the interaction topology and the parameters of interaction link attacks. An estimator-based adaptive SCC protocol is proposed to realize SCC, where coupling weights of the virtual distributed reference state estimator (VDRSE) are adaptively adjusted to eliminate the impacts of interaction link attacks. Then, the leader–follower and leaderless structures are unified into a general directed graph framework by decomposing the Laplacian matrix in terms of the root node and nonroot node, and sufficient conditions for VDRSEs achieving reference state consensus and high-order linear MASs achieving SCC are given, respectively. Moreover, main results of high-order linear MASs are extended to Lipschitz nonlinear MASs. Finally, two numerical examples are presented in order to validate the theoretical results.
本文分别研究了存在交互链路攻击的高阶线性多代理系统(MAS)和利普希茨非线性多代理系统(MAS)的完全分布式安全共识控制(SCC),其中设计标准与交互拓扑和交互链路攻击参数无关。为实现 SCC,提出了一种基于估计器的自适应 SCC 协议,即自适应调整虚拟分布式参考状态估计器(VDRSE)的耦合权重,以消除交互链路攻击的影响。然后,通过分解根节点和非根节点的拉普拉卡矩阵,将领导者-跟随者结构和无领导者结构统一到一般有向图框架中,并分别给出了 VDRSE 实现参考状态共识和高阶线性 MAS 实现 SCC 的充分条件。此外,还将高阶线性 MAS 的主要结果扩展到 Lipschitz 非线性 MAS。最后,介绍了两个数值示例,以验证理论结果。
{"title":"Completely Distributed Secure Consensus for Multiagent Systems With a General Directed Graph Under Interaction Link Attacks","authors":"Miao Zhao;Jianxiang Xi;Le Wang;Kehan Xia;Yuanshi Zheng","doi":"10.1109/JSYST.2024.3381914","DOIUrl":"10.1109/JSYST.2024.3381914","url":null,"abstract":"This article investigates completely distributed secure consensus control (SCC) of high-order linear and Lipschitz nonlinear multiagent systems (MASs) in the presence of interaction link attacks, respectively, where the design criteria are independent of the interaction topology and the parameters of interaction link attacks. An estimator-based adaptive SCC protocol is proposed to realize SCC, where coupling weights of the virtual distributed reference state estimator (VDRSE) are adaptively adjusted to eliminate the impacts of interaction link attacks. Then, the leader–follower and leaderless structures are unified into a general directed graph framework by decomposing the Laplacian matrix in terms of the root node and nonroot node, and sufficient conditions for VDRSEs achieving reference state consensus and high-order linear MASs achieving SCC are given, respectively. Moreover, main results of high-order linear MASs are extended to Lipschitz nonlinear MASs. Finally, two numerical examples are presented in order to validate the theoretical results.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1380-1391"},"PeriodicalIF":4.0,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140582896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Low Earth orbit (LEO) satellites have recently received considerable attention because they can provide stronger signal power and better bandwidth availability than medium Earth orbit or geosynchronous orbit satellites. However, due to the limited processing capability of a receiver, it is difficult to utilize all the measurements of the available satellites in view when the number of satellites is large. With this motivation, selecting a subset of satellites that are in a good geometry relative to the receiver for precise positioning among a large number of available LEO constellations represents a challenging yet significant problem. Geometric dilution of precision (GDOP) is a metric that provides useful information about the relative geometry between satellites and a receiver. In this study, we put forth a novel GDOP-based satellite selection algorithm that uses efficient matrix decomposition and update rule. Simulation results show that the proposed algorithm achieves a GDOP performance close to the optimal exhaustive search-based schemes while greatly reducing the computational complexity. In particular, the computational complexity is verified in terms of flop counts as well as numerical evaluations.
{"title":"GDOP-Based Low-Complexity LEO Satellite Subset Selection for Positioning","authors":"Kyeongjun Ko;M. Humayun Kabir;Jungtai Kim;Wonjae Shin","doi":"10.1109/JSYST.2024.3383092","DOIUrl":"10.1109/JSYST.2024.3383092","url":null,"abstract":"Low Earth orbit (LEO) satellites have recently received considerable attention because they can provide stronger signal power and better bandwidth availability than medium Earth orbit or geosynchronous orbit satellites. However, due to the limited processing capability of a receiver, it is difficult to utilize all the measurements of the available satellites in view when the number of satellites is large. With this motivation, selecting a subset of satellites that are in a good geometry relative to the receiver for precise positioning among a large number of available LEO constellations represents a challenging yet significant problem. Geometric dilution of precision (GDOP) is a metric that provides useful information about the relative geometry between satellites and a receiver. In this study, we put forth a novel GDOP-based satellite selection algorithm that uses efficient matrix decomposition and update rule. Simulation results show that the proposed algorithm achieves a GDOP performance close to the optimal exhaustive search-based schemes while greatly reducing the computational complexity. In particular, the computational complexity is verified in terms of flop counts as well as numerical evaluations.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"989-996"},"PeriodicalIF":4.0,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140582892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-10DOI: 10.1109/JSYST.2024.3379856
Shah Fahad;Arman Goudarzi;Rui Bo;Muhammad Waseem;Rashid Al-Ammari;Atif Iqbal
Over the past decade, PQ regulation schemes for a single-controllable active distribution network (ADN) using coordination among a network of virtual synchronous generators (VSGs) have been proposed. However, considering the variable nature of intermittent renewable energy sources (IRESs), coupling a cluster of IRESs with the point of common coupling (PCC) of ADN could inflict transient issues for the power management of the whole ADN. To counter these challenges, the proposed study has three main objectives: 1) To propose a modified mathematical model that represents the apparent resistance-reactance at the PCC of ADN in relation to the PQ coordination among the network of VSGs; 2) to utilize the proposed model for deriving a $mu$