首页 > 最新文献

2018 IEEE 16th International Conference on Industrial Informatics (INDIN)最新文献

英文 中文
A JSON/HTTP communication protocol to support the development of distributed cyber-physical systems 一个JSON/HTTP通信协议,支持分布式网络物理系统的开发
Pub Date : 2018-07-01 DOI: 10.1109/INDIN.2018.8472084
F. Pereira, L. Gomes
Cyber physical systems are often built using networks of components containing physical and computational resources, enabling the design of distributed applications that collect data from remote sensors and manipulate remote actuators, located on local networks or on far away locations. The communication protocol presented in this paper was designed to support the communication between components of distributed applications. In addition, it includes remote debug and monitoring capabilities, to support the detection and resolution of errors and design mistakes on nodes running on remote locations. Employing the JSON/HTTP standards, the proposed protocol is Web browser friendly, suitable for the creation of Web based applications and user interfaces, but it may be employed on most programming environments that offer libraries to support those standards. As it is based on HTTP, it can easily traverse most firewall configurations and used through proxies. Development of the proposed protocol started on the IOPTTools framework, but the current version was implemented as part of the IOPT-Flow framework, aiming the development of distributed CPS applications based on graphical formalism combining Petri nets and dataflows. Both tool frameworks are available at http://gres.uninova.pt.
网络物理系统通常使用包含物理和计算资源的组件网络构建,从而能够设计分布式应用程序,从远程传感器收集数据并操纵位于本地网络或遥远位置的远程执行器。本文提出的通信协议旨在支持分布式应用程序组件之间的通信。此外,它还包括远程调试和监视功能,以支持在远程位置运行的节点上检测和解决错误和设计错误。采用JSON/HTTP标准,提议的协议是Web浏览器友好的,适合创建基于Web的应用程序和用户界面,但它可以用于提供库来支持这些标准的大多数编程环境。由于它基于HTTP,因此可以轻松地遍历大多数防火墙配置并通过代理使用。拟议协议的开发始于IOPTTools框架,但当前版本是作为IOPT-Flow框架的一部分实现的,旨在开发基于图形形式化结合Petri网和数据流的分布式CPS应用程序。这两个工具框架都可以在http://gres.uninova.pt上获得。
{"title":"A JSON/HTTP communication protocol to support the development of distributed cyber-physical systems","authors":"F. Pereira, L. Gomes","doi":"10.1109/INDIN.2018.8472084","DOIUrl":"https://doi.org/10.1109/INDIN.2018.8472084","url":null,"abstract":"Cyber physical systems are often built using networks of components containing physical and computational resources, enabling the design of distributed applications that collect data from remote sensors and manipulate remote actuators, located on local networks or on far away locations. The communication protocol presented in this paper was designed to support the communication between components of distributed applications. In addition, it includes remote debug and monitoring capabilities, to support the detection and resolution of errors and design mistakes on nodes running on remote locations. Employing the JSON/HTTP standards, the proposed protocol is Web browser friendly, suitable for the creation of Web based applications and user interfaces, but it may be employed on most programming environments that offer libraries to support those standards. As it is based on HTTP, it can easily traverse most firewall configurations and used through proxies. Development of the proposed protocol started on the IOPTTools framework, but the current version was implemented as part of the IOPT-Flow framework, aiming the development of distributed CPS applications based on graphical formalism combining Petri nets and dataflows. Both tool frameworks are available at http://gres.uninova.pt.","PeriodicalId":6467,"journal":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","volume":"8 1","pages":"23-30"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81705105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Assessing the Consequence of Cyber and Physical Malicious Attacks in Complex, Cyber-Physical Systems During Early System Design 在早期系统设计中评估复杂网络物理系统中网络和物理恶意攻击的后果
Pub Date : 2018-07-01 DOI: 10.1109/INDIN.2018.8471937
B. O’Halloran, N. Papakonstantinou, Douglas L. Van Bossuyt
This research contributes to the lifecycle assessment of complex cyber-physical systems (CCPSs) to better understand and mitigate risks of malicious attacks through design. This assessment capability is proposed during the early phase of engineering design where significant decision-making flexibility exists. This is done by assessing potential malicious attacks carried out by humans interacting with the system across all phases of the system’s lifecycle. We propose a novel quantification of an attacker-centric risk, then optimize the large set of attacks using a genetic algorithm. This research is motivated by the increased vulnerability of CCPSs due to their increasingly complex interconnected and digitally connected nature. A specific area of interest for CCPSs has been the increasing degree of connectedness. For example, several recent federal reports indicate that significant risk exists in the design of commercial aircraft where the entertainment system is connected to the avionics through a central network. The result is an increased ability to attack a specific subsystem or component to produce system failure. These findings, as well as others, have led to a significant concern with malicious attacks to target critical components of the CCPS. While assessments can be performed on a CCPS during the later phases of engineering design, techniques are currently not available during the early phase. We propose an assessment technique which is useful to practitioners during conceptual design. In this research, we assess a nuclear power plant as an example CCPS. The resulting methodology provides useful insight to the risks of malicious attacks throughout the system’s lifecycle.
本研究有助于复杂网络物理系统(ccps)的生命周期评估,以便通过设计更好地理解和减轻恶意攻击的风险。这种评估能力是在工程设计的早期阶段提出的,在这个阶段存在很大的决策灵活性。这是通过评估在系统生命周期的所有阶段与系统交互的人员执行的潜在恶意攻击来完成的。我们提出了一种新的以攻击者为中心的风险量化方法,然后使用遗传算法优化大型攻击集。由于ccps日益复杂的互联和数字连接性质,它们的脆弱性日益增加,这促使了本研究的开展。ccps感兴趣的一个特定领域是不断增加的连通性。例如,最近的几份联邦报告表明,在娱乐系统通过中央网络连接到航空电子设备的商用飞机的设计中存在重大风险。其结果是攻击特定子系统或组件以产生系统故障的能力增加。这些发现,以及其他发现,引起了对针对CCPS关键组件的恶意攻击的极大关注。虽然在工程设计的后期阶段可以对CCPS进行评估,但目前在早期阶段还没有可用的技术。我们提出了一种评估技术,在概念设计中对实践者有用。本研究以某核电厂为例,对CCPS进行评估。由此产生的方法对整个系统生命周期中的恶意攻击风险提供了有用的见解。
{"title":"Assessing the Consequence of Cyber and Physical Malicious Attacks in Complex, Cyber-Physical Systems During Early System Design","authors":"B. O’Halloran, N. Papakonstantinou, Douglas L. Van Bossuyt","doi":"10.1109/INDIN.2018.8471937","DOIUrl":"https://doi.org/10.1109/INDIN.2018.8471937","url":null,"abstract":"This research contributes to the lifecycle assessment of complex cyber-physical systems (CCPSs) to better understand and mitigate risks of malicious attacks through design. This assessment capability is proposed during the early phase of engineering design where significant decision-making flexibility exists. This is done by assessing potential malicious attacks carried out by humans interacting with the system across all phases of the system’s lifecycle. We propose a novel quantification of an attacker-centric risk, then optimize the large set of attacks using a genetic algorithm. This research is motivated by the increased vulnerability of CCPSs due to their increasingly complex interconnected and digitally connected nature. A specific area of interest for CCPSs has been the increasing degree of connectedness. For example, several recent federal reports indicate that significant risk exists in the design of commercial aircraft where the entertainment system is connected to the avionics through a central network. The result is an increased ability to attack a specific subsystem or component to produce system failure. These findings, as well as others, have led to a significant concern with malicious attacks to target critical components of the CCPS. While assessments can be performed on a CCPS during the later phases of engineering design, techniques are currently not available during the early phase. We propose an assessment technique which is useful to practitioners during conceptual design. In this research, we assess a nuclear power plant as an example CCPS. The resulting methodology provides useful insight to the risks of malicious attacks throughout the system’s lifecycle.","PeriodicalId":6467,"journal":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","volume":"238 1","pages":"733-740"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77018611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Counterexample visualization and explanation for function block diagrams 反例可视化和功能块图的解释
Pub Date : 2018-07-01 DOI: 10.1109/INDIN.2018.8472025
A. Pakonen, I. Buzhinsky, V. Vyatkin
Model checking is a proven, effective method for verifying instrumentation and control system application logics. If a model of the system being verified does not satisfy a specification, the failure scenario is presented to the user as a counterexample trace. Analysis of the counterexample can be time-consuming if the trace is long, the model is large, or the specification is complex. Spurious counterexamples (“false negatives”) often exacerbate the problem. In this paper, we present a method that assists in identifying the root of the failure in both the model and the specification, by animating the model of the function block diagram as well as the LTL property. We also introduce a practical tool for visualizing LTL properties by animation and highlighting of important values based on causality. Using 43 actual design issues identified in practical nuclear industry projects, we then evaluate usefulness of the property visualization and explanation features.
模型检验是验证仪表和控制系统应用逻辑的一种行之有效的方法。如果被验证的系统模型不满足规范,则故障场景将作为反例跟踪呈现给用户。如果跟踪很长,模型很大,或者规范很复杂,那么反例的分析可能会很耗时。虚假的反例(“假否定”)常常使问题恶化。在本文中,我们提出了一种方法,通过将功能框图模型和LTL属性动画化,帮助识别模型和规范中的故障根源。我们还介绍了一个实用的工具,用于通过动画来可视化LTL属性,并根据因果关系突出显示重要的值。利用在实际核工业项目中确定的43个实际设计问题,我们然后评估属性可视化和解释特征的有用性。
{"title":"Counterexample visualization and explanation for function block diagrams","authors":"A. Pakonen, I. Buzhinsky, V. Vyatkin","doi":"10.1109/INDIN.2018.8472025","DOIUrl":"https://doi.org/10.1109/INDIN.2018.8472025","url":null,"abstract":"Model checking is a proven, effective method for verifying instrumentation and control system application logics. If a model of the system being verified does not satisfy a specification, the failure scenario is presented to the user as a counterexample trace. Analysis of the counterexample can be time-consuming if the trace is long, the model is large, or the specification is complex. Spurious counterexamples (“false negatives”) often exacerbate the problem. In this paper, we present a method that assists in identifying the root of the failure in both the model and the specification, by animating the model of the function block diagram as well as the LTL property. We also introduce a practical tool for visualizing LTL properties by animation and highlighting of important values based on causality. Using 43 actual design issues identified in practical nuclear industry projects, we then evaluate usefulness of the property visualization and explanation features.","PeriodicalId":6467,"journal":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","volume":"38 1","pages":"747-753"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77239361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Anonymization method based on sparse coding for power usage data 基于稀疏编码的电力使用数据匿名化方法
Pub Date : 2018-07-01 DOI: 10.1109/INDIN.2018.8471982
Keiya Haradat, Yuta Ohnot, Yuichi Nakamurat, Hiroaki Nishit
In recent years, there have been rapid increases in the number of network-connected devices such as computers, smartphones, and Internet of Things devices. Thus, large amounts of data have been accumulated such as locational data, website search histories, and power usage data. These data are used in various types of services. However, these data cannot be used easily for secondary purposes in some countries because of privacy problems. Therefore, privacy protection is necessary to apply these data in secondary uses where data anonymization is the usual solution. Many conventional methods are used for anonymizing power usage data, but the conventional method has three problems. First, it cannot anonymize time-series data. Second, the information loss is so large in the conventional method that the anonymized data are no longer suitable for secondary uses. Third, the conventional method cannot preserve the type of electrical appliance used. In this study, we propose a method for anonymizing power demand data, where sparse coding is used to solve the three problems that affect the conventional method. The proposed method can anonymize time series-data and it allows data to be analyzed at a chosen time. The proposed method was used to anonymize power usage data from the Urban Design Center Misono (UDCMi) and the experimental error rate decreased compared with the conventional method. The dictionary produced using the proposed method represents the electrical appliance data.
近年来,计算机、智能手机、物联网设备等联网设备的数量迅速增加。因此,积累了大量的数据,如位置数据、网站搜索历史、电力使用数据等。这些数据用于各种类型的服务。然而,由于隐私问题,这些数据在一些国家不能轻易用于次要目的。因此,为了将这些数据应用于次要用途,隐私保护是必要的,在次要用途中,数据匿名化是通常的解决方案。许多传统的方法用于匿名化电力使用数据,但传统的方法有三个问题。首先,它不能匿名化时间序列数据。其次,传统方法的信息丢失较大,使得匿名数据不再适合二次使用。第三,传统的方法不能保留所使用的电器的类型。在本研究中,我们提出了一种匿名化电力需求数据的方法,其中使用稀疏编码来解决影响传统方法的三个问题。该方法可以对时间序列数据进行匿名化处理,并允许在选定的时间对数据进行分析。将所提出的方法用于匿名化来自Misono城市设计中心(UDCMi)的电力使用数据,与传统方法相比,实验错误率降低。使用所提出的方法生成的字典表示电器数据。
{"title":"Anonymization method based on sparse coding for power usage data","authors":"Keiya Haradat, Yuta Ohnot, Yuichi Nakamurat, Hiroaki Nishit","doi":"10.1109/INDIN.2018.8471982","DOIUrl":"https://doi.org/10.1109/INDIN.2018.8471982","url":null,"abstract":"In recent years, there have been rapid increases in the number of network-connected devices such as computers, smartphones, and Internet of Things devices. Thus, large amounts of data have been accumulated such as locational data, website search histories, and power usage data. These data are used in various types of services. However, these data cannot be used easily for secondary purposes in some countries because of privacy problems. Therefore, privacy protection is necessary to apply these data in secondary uses where data anonymization is the usual solution. Many conventional methods are used for anonymizing power usage data, but the conventional method has three problems. First, it cannot anonymize time-series data. Second, the information loss is so large in the conventional method that the anonymized data are no longer suitable for secondary uses. Third, the conventional method cannot preserve the type of electrical appliance used. In this study, we propose a method for anonymizing power demand data, where sparse coding is used to solve the three problems that affect the conventional method. The proposed method can anonymize time series-data and it allows data to be analyzed at a chosen time. The proposed method was used to anonymize power usage data from the Urban Design Center Misono (UDCMi) and the experimental error rate decreased compared with the conventional method. The dictionary produced using the proposed method represents the electrical appliance data.","PeriodicalId":6467,"journal":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","volume":"9 1","pages":"571-576"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80835906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Title page] (标题页)
Pub Date : 2018-07-01 DOI: 10.1109/indin.2018.8471944
{"title":"[Title page]","authors":"","doi":"10.1109/indin.2018.8471944","DOIUrl":"https://doi.org/10.1109/indin.2018.8471944","url":null,"abstract":"","PeriodicalId":6467,"journal":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","volume":"91 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80874311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel observer method for Markov jump systems with simultaneous sensor and actuator faults* 具有传感器和执行器同步故障的马尔可夫跳变系统的一种新的观测器方法*
Pub Date : 2018-07-01 DOI: 10.1109/INDIN.2018.8471993
Hongyan Yang, Baoran An, Shen Yin
This work focuses on the fault estimation (FE) problem for Markov Jump Systems (MJS) with sensor and actuator faults, and a novel reduced-order observer-based FE method is proposed. Firstly, an augmented plant in standard form is considered and a new theorem is derived to decouple the augmented fault vectors $d(t)$ from $bar{x}_{1^{(1)(t)}}$ which is the state vector after the first time coordinate transformation. Then, the novel reduced-order observer is investigated and the Theorem 2 is derived to ensure the asymptotically reconstruction of $x(t)$. Compared with other existing observer-based method for MJS with faults, the advantage is that the FE and state estimation can be obtained directly without any supplementary design. Finally, simulations are provided to demonstrate the effectiveness of the proposed observer approach.
针对具有传感器和执行器故障的马尔可夫跳变系统的故障估计问题,提出了一种基于降阶观测器的马尔可夫跳变系统故障估计方法。首先,考虑一个标准形式的增广植物,并推导出一个新的定理,将增广故障向量d(t)$与第一次坐标变换后的状态向量$bar{x}_{1^{(1)(t)}}$解耦。然后,研究了新的降阶观测器,并导出了保证x(t)$渐近重构的定理2。与现有的基于观测器的故障MJS分析方法相比,该方法的优点是无需辅助设计即可直接得到有限元和状态估计。最后,通过仿真验证了所提观测器方法的有效性。
{"title":"A novel observer method for Markov jump systems with simultaneous sensor and actuator faults*","authors":"Hongyan Yang, Baoran An, Shen Yin","doi":"10.1109/INDIN.2018.8471993","DOIUrl":"https://doi.org/10.1109/INDIN.2018.8471993","url":null,"abstract":"This work focuses on the fault estimation (FE) problem for Markov Jump Systems (MJS) with sensor and actuator faults, and a novel reduced-order observer-based FE method is proposed. Firstly, an augmented plant in standard form is considered and a new theorem is derived to decouple the augmented fault vectors $d(t)$ from $bar{x}_{1^{(1)(t)}}$ which is the state vector after the first time coordinate transformation. Then, the novel reduced-order observer is investigated and the Theorem 2 is derived to ensure the asymptotically reconstruction of $x(t)$. Compared with other existing observer-based method for MJS with faults, the advantage is that the FE and state estimation can be obtained directly without any supplementary design. Finally, simulations are provided to demonstrate the effectiveness of the proposed observer approach.","PeriodicalId":6467,"journal":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","volume":"45 1","pages":"611-616"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91010688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling Workflows for Industrial Robots Considering Human-Robot-Collaboration 考虑人机协作的工业机器人工作流建模
Pub Date : 2018-07-01 DOI: 10.1109/INDIN.2018.8471999
D. Schonberger, René Lindorfer, R. Froschauer
The increasing number of variants results in decreasing lot sizes in the assembly and manufacturing domain. Considering traditional approaches of automation using industrial robots, it is very time-consuming to permanently adapt industrial robots for specific product variants in assembly lines. One possible approach of resolving this issue is the use of human-robot-collaboration for specific assembly steps. However, this also means that, in addition to the robot program, a work instruction must be created for the human worker. With current methods no workflow can be modeled which is universally applicable for a human or a robot. Therefore, this paper presents a new approach, called Human Robot Time and Motion (HRTM). The method provides generic basic elements which can be performed by a human worker or a robot. Additionally, collaborative elements allow to model synchronous tasks and a communication between human/human, human/robot or robot/robot. The HRTM approach is initially demonstrated by modeling a simple workflow which can be performed by a human worker or a robot. Finally, we model a collaborative workflow using LegoⓇ DuploⓇ bricks and perform it at a workplace with a collaborative robot.
越来越多的变体导致在组装和制造领域的批量减小。考虑到使用工业机器人的传统自动化方法,在装配线上永久地调整工业机器人以适应特定的产品变体是非常耗时的。解决这个问题的一个可能的方法是在特定的装配步骤中使用人机协作。然而,这也意味着,除了机器人程序之外,还必须为人类工人创建一个工作指令。在现有的方法下,没有一个工作流模型可以普遍适用于人类或机器人。因此,本文提出了一种新的方法,称为人-机器人时间和运动(HRTM)。该方法提供了可由人类工作者或机器人执行的通用基本元素。此外,协作元素允许对同步任务和人/人、人/机器人或机器人/机器人之间的通信进行建模。HRTM方法最初是通过建模一个简单的工作流来演示的,该工作流可以由人类工作人员或机器人执行。最后,我们使用LegoⓇDuploⓇ块建模协作工作流,并在工作场所使用协作机器人执行它。
{"title":"Modeling Workflows for Industrial Robots Considering Human-Robot-Collaboration","authors":"D. Schonberger, René Lindorfer, R. Froschauer","doi":"10.1109/INDIN.2018.8471999","DOIUrl":"https://doi.org/10.1109/INDIN.2018.8471999","url":null,"abstract":"The increasing number of variants results in decreasing lot sizes in the assembly and manufacturing domain. Considering traditional approaches of automation using industrial robots, it is very time-consuming to permanently adapt industrial robots for specific product variants in assembly lines. One possible approach of resolving this issue is the use of human-robot-collaboration for specific assembly steps. However, this also means that, in addition to the robot program, a work instruction must be created for the human worker. With current methods no workflow can be modeled which is universally applicable for a human or a robot. Therefore, this paper presents a new approach, called Human Robot Time and Motion (HRTM). The method provides generic basic elements which can be performed by a human worker or a robot. Additionally, collaborative elements allow to model synchronous tasks and a communication between human/human, human/robot or robot/robot. The HRTM approach is initially demonstrated by modeling a simple workflow which can be performed by a human worker or a robot. Finally, we model a collaborative workflow using LegoⓇ DuploⓇ bricks and perform it at a workplace with a collaborative robot.","PeriodicalId":6467,"journal":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","volume":"65 1","pages":"400-405"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91533765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Modelling Industrial Cyber-Physical Systems using IEC 61499 and OPC UA 使用IEC 61499和OPC UA建模工业信息物理系统
Pub Date : 2018-07-01 DOI: 10.1109/INDIN.2018.8472099
W. Dai, Yineng Song, Zhijie Zhang, Peng Wang, Cheng Pang, V. Vyatkin
Industrial Cyber-Physical Systems (iCPS) are considered as the enabling technology for achieve Industry 4.0. One main characteristic of the iCPS is the information transparency to allow interoperability among various devices and systems. The OPC UA provides a common information model for connecting Industry 4.0 components. On the other hand, the IEC 61499 is commonly used as an executable modeling language for iCPS. The IEC 61499 function block network provides an abstract view of the system configuration. By combining IEC 61499 and OPC UA, a visual executable model for iCPS is completed. In this paper, the mapping between two standards are provided and a case study of the proposed mapping is given.
工业信息物理系统(iCPS)被视为实现工业4.0的使能技术。iCPS的一个主要特点是信息透明,允许各种设备和系统之间的互操作性。OPC UA为连接工业4.0组件提供了一个通用的信息模型。另一方面,IEC 61499通常用作icp的可执行建模语言。IEC 61499功能块网络提供了系统配置的抽象视图。结合IEC 61499和OPC UA,完成了一个可视化的iCPS可执行模型。本文给出了两个标准之间的映射,并给出了一个建议映射的案例研究。
{"title":"Modelling Industrial Cyber-Physical Systems using IEC 61499 and OPC UA","authors":"W. Dai, Yineng Song, Zhijie Zhang, Peng Wang, Cheng Pang, V. Vyatkin","doi":"10.1109/INDIN.2018.8472099","DOIUrl":"https://doi.org/10.1109/INDIN.2018.8472099","url":null,"abstract":"Industrial Cyber-Physical Systems (iCPS) are considered as the enabling technology for achieve Industry 4.0. One main characteristic of the iCPS is the information transparency to allow interoperability among various devices and systems. The OPC UA provides a common information model for connecting Industry 4.0 components. On the other hand, the IEC 61499 is commonly used as an executable modeling language for iCPS. The IEC 61499 function block network provides an abstract view of the system configuration. By combining IEC 61499 and OPC UA, a visual executable model for iCPS is completed. In this paper, the mapping between two standards are provided and a case study of the proposed mapping is given.","PeriodicalId":6467,"journal":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","volume":"56 1","pages":"772-777"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86758587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
[Title page] (标题页)
Pub Date : 2018-07-01 DOI: 10.1109/indin.2018.8471989
{"title":"[Title page]","authors":"","doi":"10.1109/indin.2018.8471989","DOIUrl":"https://doi.org/10.1109/indin.2018.8471989","url":null,"abstract":"","PeriodicalId":6467,"journal":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","volume":"75 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90257259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generation of Adversarial Examples to Prevent Misclassification of Deep Neural Network based Condition Monitoring Systems for Cyber-Physical Production Systems 基于深度神经网络的信息物理生产系统状态监测系统的对抗示例生成以防止误分类
Pub Date : 2018-07-01 DOI: 10.1109/INDIN.2018.8472060
Felix Specht, J. Otto, O. Niggemann, B. Hammer
Deep neural network based condition monitoring systems are used to detect system failures of cyber-physical production systems. However, a vulnerability of deep neural networks are adversarial examples. They are manipulated inputs, e.g. process data, with the ability to mislead a deep neural network into misclassification. Adversarial example attacks can manipulate the physical production process of a cyber-physical production system without being recognized by the condition monitoring system. Manipulation of the physical process poses a serious threat for production systems and employees. This paper introduces CyberProtect, a novel approach to prevent misclassification caused by adversarial example attacks. CyberProtect generates adversarial examples and uses them to retrain deep neural networks. This results in a hardened deep neural network with a significant reduced misclassification rate. The proposed countermeasure increases the classification rate from 20% to 82%, as proved by empirical results.
基于深度神经网络的状态监测系统用于网络物理生产系统的故障检测。然而,深度神经网络的脆弱性是对抗性的例子。它们是被操纵的输入,例如过程数据,具有误导深度神经网络进行错误分类的能力。对抗性示例攻击可以在不被状态监测系统识别的情况下操纵网络物理生产系统的物理生产过程。对物理过程的操纵对生产系统和员工构成严重威胁。本文介绍了一种防止由对抗性示例攻击引起的误分类的新方法——CyberProtect。CyberProtect生成对抗性示例,并用它们来重新训练深度神经网络。这导致了一个强化的深度神经网络,显著降低了误分类率。实证结果表明,该对策将分类率从20%提高到82%。
{"title":"Generation of Adversarial Examples to Prevent Misclassification of Deep Neural Network based Condition Monitoring Systems for Cyber-Physical Production Systems","authors":"Felix Specht, J. Otto, O. Niggemann, B. Hammer","doi":"10.1109/INDIN.2018.8472060","DOIUrl":"https://doi.org/10.1109/INDIN.2018.8472060","url":null,"abstract":"Deep neural network based condition monitoring systems are used to detect system failures of cyber-physical production systems. However, a vulnerability of deep neural networks are adversarial examples. They are manipulated inputs, e.g. process data, with the ability to mislead a deep neural network into misclassification. Adversarial example attacks can manipulate the physical production process of a cyber-physical production system without being recognized by the condition monitoring system. Manipulation of the physical process poses a serious threat for production systems and employees. This paper introduces CyberProtect, a novel approach to prevent misclassification caused by adversarial example attacks. CyberProtect generates adversarial examples and uses them to retrain deep neural networks. This results in a hardened deep neural network with a significant reduced misclassification rate. The proposed countermeasure increases the classification rate from 20% to 82%, as proved by empirical results.","PeriodicalId":6467,"journal":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","volume":"16 1","pages":"760-765"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84796866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2018 IEEE 16th International Conference on Industrial Informatics (INDIN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1