Pub Date : 2018-07-01DOI: 10.1109/INDIN.2018.8472084
F. Pereira, L. Gomes
Cyber physical systems are often built using networks of components containing physical and computational resources, enabling the design of distributed applications that collect data from remote sensors and manipulate remote actuators, located on local networks or on far away locations. The communication protocol presented in this paper was designed to support the communication between components of distributed applications. In addition, it includes remote debug and monitoring capabilities, to support the detection and resolution of errors and design mistakes on nodes running on remote locations. Employing the JSON/HTTP standards, the proposed protocol is Web browser friendly, suitable for the creation of Web based applications and user interfaces, but it may be employed on most programming environments that offer libraries to support those standards. As it is based on HTTP, it can easily traverse most firewall configurations and used through proxies. Development of the proposed protocol started on the IOPTTools framework, but the current version was implemented as part of the IOPT-Flow framework, aiming the development of distributed CPS applications based on graphical formalism combining Petri nets and dataflows. Both tool frameworks are available at http://gres.uninova.pt.
{"title":"A JSON/HTTP communication protocol to support the development of distributed cyber-physical systems","authors":"F. Pereira, L. Gomes","doi":"10.1109/INDIN.2018.8472084","DOIUrl":"https://doi.org/10.1109/INDIN.2018.8472084","url":null,"abstract":"Cyber physical systems are often built using networks of components containing physical and computational resources, enabling the design of distributed applications that collect data from remote sensors and manipulate remote actuators, located on local networks or on far away locations. The communication protocol presented in this paper was designed to support the communication between components of distributed applications. In addition, it includes remote debug and monitoring capabilities, to support the detection and resolution of errors and design mistakes on nodes running on remote locations. Employing the JSON/HTTP standards, the proposed protocol is Web browser friendly, suitable for the creation of Web based applications and user interfaces, but it may be employed on most programming environments that offer libraries to support those standards. As it is based on HTTP, it can easily traverse most firewall configurations and used through proxies. Development of the proposed protocol started on the IOPTTools framework, but the current version was implemented as part of the IOPT-Flow framework, aiming the development of distributed CPS applications based on graphical formalism combining Petri nets and dataflows. Both tool frameworks are available at http://gres.uninova.pt.","PeriodicalId":6467,"journal":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","volume":"8 1","pages":"23-30"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81705105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/INDIN.2018.8471937
B. O’Halloran, N. Papakonstantinou, Douglas L. Van Bossuyt
This research contributes to the lifecycle assessment of complex cyber-physical systems (CCPSs) to better understand and mitigate risks of malicious attacks through design. This assessment capability is proposed during the early phase of engineering design where significant decision-making flexibility exists. This is done by assessing potential malicious attacks carried out by humans interacting with the system across all phases of the system’s lifecycle. We propose a novel quantification of an attacker-centric risk, then optimize the large set of attacks using a genetic algorithm. This research is motivated by the increased vulnerability of CCPSs due to their increasingly complex interconnected and digitally connected nature. A specific area of interest for CCPSs has been the increasing degree of connectedness. For example, several recent federal reports indicate that significant risk exists in the design of commercial aircraft where the entertainment system is connected to the avionics through a central network. The result is an increased ability to attack a specific subsystem or component to produce system failure. These findings, as well as others, have led to a significant concern with malicious attacks to target critical components of the CCPS. While assessments can be performed on a CCPS during the later phases of engineering design, techniques are currently not available during the early phase. We propose an assessment technique which is useful to practitioners during conceptual design. In this research, we assess a nuclear power plant as an example CCPS. The resulting methodology provides useful insight to the risks of malicious attacks throughout the system’s lifecycle.
{"title":"Assessing the Consequence of Cyber and Physical Malicious Attacks in Complex, Cyber-Physical Systems During Early System Design","authors":"B. O’Halloran, N. Papakonstantinou, Douglas L. Van Bossuyt","doi":"10.1109/INDIN.2018.8471937","DOIUrl":"https://doi.org/10.1109/INDIN.2018.8471937","url":null,"abstract":"This research contributes to the lifecycle assessment of complex cyber-physical systems (CCPSs) to better understand and mitigate risks of malicious attacks through design. This assessment capability is proposed during the early phase of engineering design where significant decision-making flexibility exists. This is done by assessing potential malicious attacks carried out by humans interacting with the system across all phases of the system’s lifecycle. We propose a novel quantification of an attacker-centric risk, then optimize the large set of attacks using a genetic algorithm. This research is motivated by the increased vulnerability of CCPSs due to their increasingly complex interconnected and digitally connected nature. A specific area of interest for CCPSs has been the increasing degree of connectedness. For example, several recent federal reports indicate that significant risk exists in the design of commercial aircraft where the entertainment system is connected to the avionics through a central network. The result is an increased ability to attack a specific subsystem or component to produce system failure. These findings, as well as others, have led to a significant concern with malicious attacks to target critical components of the CCPS. While assessments can be performed on a CCPS during the later phases of engineering design, techniques are currently not available during the early phase. We propose an assessment technique which is useful to practitioners during conceptual design. In this research, we assess a nuclear power plant as an example CCPS. The resulting methodology provides useful insight to the risks of malicious attacks throughout the system’s lifecycle.","PeriodicalId":6467,"journal":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","volume":"238 1","pages":"733-740"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77018611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/INDIN.2018.8472025
A. Pakonen, I. Buzhinsky, V. Vyatkin
Model checking is a proven, effective method for verifying instrumentation and control system application logics. If a model of the system being verified does not satisfy a specification, the failure scenario is presented to the user as a counterexample trace. Analysis of the counterexample can be time-consuming if the trace is long, the model is large, or the specification is complex. Spurious counterexamples (“false negatives”) often exacerbate the problem. In this paper, we present a method that assists in identifying the root of the failure in both the model and the specification, by animating the model of the function block diagram as well as the LTL property. We also introduce a practical tool for visualizing LTL properties by animation and highlighting of important values based on causality. Using 43 actual design issues identified in practical nuclear industry projects, we then evaluate usefulness of the property visualization and explanation features.
{"title":"Counterexample visualization and explanation for function block diagrams","authors":"A. Pakonen, I. Buzhinsky, V. Vyatkin","doi":"10.1109/INDIN.2018.8472025","DOIUrl":"https://doi.org/10.1109/INDIN.2018.8472025","url":null,"abstract":"Model checking is a proven, effective method for verifying instrumentation and control system application logics. If a model of the system being verified does not satisfy a specification, the failure scenario is presented to the user as a counterexample trace. Analysis of the counterexample can be time-consuming if the trace is long, the model is large, or the specification is complex. Spurious counterexamples (“false negatives”) often exacerbate the problem. In this paper, we present a method that assists in identifying the root of the failure in both the model and the specification, by animating the model of the function block diagram as well as the LTL property. We also introduce a practical tool for visualizing LTL properties by animation and highlighting of important values based on causality. Using 43 actual design issues identified in practical nuclear industry projects, we then evaluate usefulness of the property visualization and explanation features.","PeriodicalId":6467,"journal":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","volume":"38 1","pages":"747-753"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77239361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/INDIN.2018.8471982
Keiya Haradat, Yuta Ohnot, Yuichi Nakamurat, Hiroaki Nishit
In recent years, there have been rapid increases in the number of network-connected devices such as computers, smartphones, and Internet of Things devices. Thus, large amounts of data have been accumulated such as locational data, website search histories, and power usage data. These data are used in various types of services. However, these data cannot be used easily for secondary purposes in some countries because of privacy problems. Therefore, privacy protection is necessary to apply these data in secondary uses where data anonymization is the usual solution. Many conventional methods are used for anonymizing power usage data, but the conventional method has three problems. First, it cannot anonymize time-series data. Second, the information loss is so large in the conventional method that the anonymized data are no longer suitable for secondary uses. Third, the conventional method cannot preserve the type of electrical appliance used. In this study, we propose a method for anonymizing power demand data, where sparse coding is used to solve the three problems that affect the conventional method. The proposed method can anonymize time series-data and it allows data to be analyzed at a chosen time. The proposed method was used to anonymize power usage data from the Urban Design Center Misono (UDCMi) and the experimental error rate decreased compared with the conventional method. The dictionary produced using the proposed method represents the electrical appliance data.
{"title":"Anonymization method based on sparse coding for power usage data","authors":"Keiya Haradat, Yuta Ohnot, Yuichi Nakamurat, Hiroaki Nishit","doi":"10.1109/INDIN.2018.8471982","DOIUrl":"https://doi.org/10.1109/INDIN.2018.8471982","url":null,"abstract":"In recent years, there have been rapid increases in the number of network-connected devices such as computers, smartphones, and Internet of Things devices. Thus, large amounts of data have been accumulated such as locational data, website search histories, and power usage data. These data are used in various types of services. However, these data cannot be used easily for secondary purposes in some countries because of privacy problems. Therefore, privacy protection is necessary to apply these data in secondary uses where data anonymization is the usual solution. Many conventional methods are used for anonymizing power usage data, but the conventional method has three problems. First, it cannot anonymize time-series data. Second, the information loss is so large in the conventional method that the anonymized data are no longer suitable for secondary uses. Third, the conventional method cannot preserve the type of electrical appliance used. In this study, we propose a method for anonymizing power demand data, where sparse coding is used to solve the three problems that affect the conventional method. The proposed method can anonymize time series-data and it allows data to be analyzed at a chosen time. The proposed method was used to anonymize power usage data from the Urban Design Center Misono (UDCMi) and the experimental error rate decreased compared with the conventional method. The dictionary produced using the proposed method represents the electrical appliance data.","PeriodicalId":6467,"journal":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","volume":"9 1","pages":"571-576"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80835906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/INDIN.2018.8471993
Hongyan Yang, Baoran An, Shen Yin
This work focuses on the fault estimation (FE) problem for Markov Jump Systems (MJS) with sensor and actuator faults, and a novel reduced-order observer-based FE method is proposed. Firstly, an augmented plant in standard form is considered and a new theorem is derived to decouple the augmented fault vectors $d(t)$ from $bar{x}_{1^{(1)(t)}}$ which is the state vector after the first time coordinate transformation. Then, the novel reduced-order observer is investigated and the Theorem 2 is derived to ensure the asymptotically reconstruction of $x(t)$. Compared with other existing observer-based method for MJS with faults, the advantage is that the FE and state estimation can be obtained directly without any supplementary design. Finally, simulations are provided to demonstrate the effectiveness of the proposed observer approach.
{"title":"A novel observer method for Markov jump systems with simultaneous sensor and actuator faults*","authors":"Hongyan Yang, Baoran An, Shen Yin","doi":"10.1109/INDIN.2018.8471993","DOIUrl":"https://doi.org/10.1109/INDIN.2018.8471993","url":null,"abstract":"This work focuses on the fault estimation (FE) problem for Markov Jump Systems (MJS) with sensor and actuator faults, and a novel reduced-order observer-based FE method is proposed. Firstly, an augmented plant in standard form is considered and a new theorem is derived to decouple the augmented fault vectors $d(t)$ from $bar{x}_{1^{(1)(t)}}$ which is the state vector after the first time coordinate transformation. Then, the novel reduced-order observer is investigated and the Theorem 2 is derived to ensure the asymptotically reconstruction of $x(t)$. Compared with other existing observer-based method for MJS with faults, the advantage is that the FE and state estimation can be obtained directly without any supplementary design. Finally, simulations are provided to demonstrate the effectiveness of the proposed observer approach.","PeriodicalId":6467,"journal":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","volume":"45 1","pages":"611-616"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91010688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/INDIN.2018.8471999
D. Schonberger, René Lindorfer, R. Froschauer
The increasing number of variants results in decreasing lot sizes in the assembly and manufacturing domain. Considering traditional approaches of automation using industrial robots, it is very time-consuming to permanently adapt industrial robots for specific product variants in assembly lines. One possible approach of resolving this issue is the use of human-robot-collaboration for specific assembly steps. However, this also means that, in addition to the robot program, a work instruction must be created for the human worker. With current methods no workflow can be modeled which is universally applicable for a human or a robot. Therefore, this paper presents a new approach, called Human Robot Time and Motion (HRTM). The method provides generic basic elements which can be performed by a human worker or a robot. Additionally, collaborative elements allow to model synchronous tasks and a communication between human/human, human/robot or robot/robot. The HRTM approach is initially demonstrated by modeling a simple workflow which can be performed by a human worker or a robot. Finally, we model a collaborative workflow using LegoⓇ DuploⓇ bricks and perform it at a workplace with a collaborative robot.
{"title":"Modeling Workflows for Industrial Robots Considering Human-Robot-Collaboration","authors":"D. Schonberger, René Lindorfer, R. Froschauer","doi":"10.1109/INDIN.2018.8471999","DOIUrl":"https://doi.org/10.1109/INDIN.2018.8471999","url":null,"abstract":"The increasing number of variants results in decreasing lot sizes in the assembly and manufacturing domain. Considering traditional approaches of automation using industrial robots, it is very time-consuming to permanently adapt industrial robots for specific product variants in assembly lines. One possible approach of resolving this issue is the use of human-robot-collaboration for specific assembly steps. However, this also means that, in addition to the robot program, a work instruction must be created for the human worker. With current methods no workflow can be modeled which is universally applicable for a human or a robot. Therefore, this paper presents a new approach, called Human Robot Time and Motion (HRTM). The method provides generic basic elements which can be performed by a human worker or a robot. Additionally, collaborative elements allow to model synchronous tasks and a communication between human/human, human/robot or robot/robot. The HRTM approach is initially demonstrated by modeling a simple workflow which can be performed by a human worker or a robot. Finally, we model a collaborative workflow using LegoⓇ DuploⓇ bricks and perform it at a workplace with a collaborative robot.","PeriodicalId":6467,"journal":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","volume":"65 1","pages":"400-405"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91533765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/INDIN.2018.8472099
W. Dai, Yineng Song, Zhijie Zhang, Peng Wang, Cheng Pang, V. Vyatkin
Industrial Cyber-Physical Systems (iCPS) are considered as the enabling technology for achieve Industry 4.0. One main characteristic of the iCPS is the information transparency to allow interoperability among various devices and systems. The OPC UA provides a common information model for connecting Industry 4.0 components. On the other hand, the IEC 61499 is commonly used as an executable modeling language for iCPS. The IEC 61499 function block network provides an abstract view of the system configuration. By combining IEC 61499 and OPC UA, a visual executable model for iCPS is completed. In this paper, the mapping between two standards are provided and a case study of the proposed mapping is given.
{"title":"Modelling Industrial Cyber-Physical Systems using IEC 61499 and OPC UA","authors":"W. Dai, Yineng Song, Zhijie Zhang, Peng Wang, Cheng Pang, V. Vyatkin","doi":"10.1109/INDIN.2018.8472099","DOIUrl":"https://doi.org/10.1109/INDIN.2018.8472099","url":null,"abstract":"Industrial Cyber-Physical Systems (iCPS) are considered as the enabling technology for achieve Industry 4.0. One main characteristic of the iCPS is the information transparency to allow interoperability among various devices and systems. The OPC UA provides a common information model for connecting Industry 4.0 components. On the other hand, the IEC 61499 is commonly used as an executable modeling language for iCPS. The IEC 61499 function block network provides an abstract view of the system configuration. By combining IEC 61499 and OPC UA, a visual executable model for iCPS is completed. In this paper, the mapping between two standards are provided and a case study of the proposed mapping is given.","PeriodicalId":6467,"journal":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","volume":"56 1","pages":"772-777"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86758587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/INDIN.2018.8472060
Felix Specht, J. Otto, O. Niggemann, B. Hammer
Deep neural network based condition monitoring systems are used to detect system failures of cyber-physical production systems. However, a vulnerability of deep neural networks are adversarial examples. They are manipulated inputs, e.g. process data, with the ability to mislead a deep neural network into misclassification. Adversarial example attacks can manipulate the physical production process of a cyber-physical production system without being recognized by the condition monitoring system. Manipulation of the physical process poses a serious threat for production systems and employees. This paper introduces CyberProtect, a novel approach to prevent misclassification caused by adversarial example attacks. CyberProtect generates adversarial examples and uses them to retrain deep neural networks. This results in a hardened deep neural network with a significant reduced misclassification rate. The proposed countermeasure increases the classification rate from 20% to 82%, as proved by empirical results.
{"title":"Generation of Adversarial Examples to Prevent Misclassification of Deep Neural Network based Condition Monitoring Systems for Cyber-Physical Production Systems","authors":"Felix Specht, J. Otto, O. Niggemann, B. Hammer","doi":"10.1109/INDIN.2018.8472060","DOIUrl":"https://doi.org/10.1109/INDIN.2018.8472060","url":null,"abstract":"Deep neural network based condition monitoring systems are used to detect system failures of cyber-physical production systems. However, a vulnerability of deep neural networks are adversarial examples. They are manipulated inputs, e.g. process data, with the ability to mislead a deep neural network into misclassification. Adversarial example attacks can manipulate the physical production process of a cyber-physical production system without being recognized by the condition monitoring system. Manipulation of the physical process poses a serious threat for production systems and employees. This paper introduces CyberProtect, a novel approach to prevent misclassification caused by adversarial example attacks. CyberProtect generates adversarial examples and uses them to retrain deep neural networks. This results in a hardened deep neural network with a significant reduced misclassification rate. The proposed countermeasure increases the classification rate from 20% to 82%, as proved by empirical results.","PeriodicalId":6467,"journal":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","volume":"16 1","pages":"760-765"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84796866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}