Wireless networked controlsystems (WNCSs) have the potential to revolutionize industrial automation in smart factories. Optimizing closed-loop performance while maintaining stability is a fundamental challenge in WNC...
详细信息
Wireless networked controlsystems (WNCSs) have the potential to revolutionize industrial automation in smart factories. Optimizing closed-loop performance while maintaining stability is a fundamental challenge in WNCS due to limited bandwidth and nondeterministic link quality of wireless networks. In order to bridge the gap between network design and control system performance, we propose an optimal dynamic transmission scheduling strategy that optimizes the performance of multiloop controlsystems by allocating network resources based on predictions of both link quality and controlperformance at run time. We formulate the optimal dynamic scheduling problem as a nonlinear integer programming problem, which is relaxed to a linear programming problem. We further extend the optimization problem to balance controlperformance and communication cost. The proposed optimal dynamic scheduling strategy renders the closed-loop system mean-square stable under mild assumptions. Its efficacy is demonstrated by simulating a four-loop control system over an IEEE 802.15.4 wireless network simulator--TOSSIM. The run-time network reconfiguration protocol tailored for optimal scheduling is designed and implemented on a real wireless network consisting of IEEE 802.15.4 devices. Hybrid simulations integrating a real wireless network and simulated physical plant control are performed. Simulation and experimental results show that the optimal dynamic scheduling can enhance control system performance and adapt to both constant and variable wireless interference and physical disturbance to the plant.
In today's digital era, the internet holds a fundamental position in daily life, particularly in Sri Lanka. This study addresses two primary objectives: first, to quantify the technical performance of internet ser...
详细信息
Intrusion Detection systems (IDS) allow for detecting malicious activities in organizational networks and hosts. As the Industrial internet of Things (Industrial IoT) has gained momentum and attackers become process-a...
详细信息
ISBN:
(纸本)9798400704215
Intrusion Detection systems (IDS) allow for detecting malicious activities in organizational networks and hosts. As the Industrial internet of Things (Industrial IoT) has gained momentum and attackers become process-aware, it elevates the focus on anomaly-based network Intrusion Detection systems (NIDS) in IoT. While previous research has primarily concentrated on fortifying SCADA systems with NIDS, keeping track of the latest advancements in resource-efficient messaging (e.g., MQTT, CoAP, and OPC-UA) is paramount. In our work, we straightforwardly derive IoT processes for NIDS using distributed tracing and process mining. We introduce a pioneering framework called MISSION which effectively captures, consolidates, and models MQTT flows, leading to a heightened process awareness in NIDS. Through our prototypical implementation, we demonstrate exceptional performance and high-quality models. Moreover, our experiments provide empirical evidence for rediscovering pre-defined processes and successfully detecting two distinct MQTT attacks in a simulated IoT network.
As the Industrial internet of Things (IIoT) rapidly evolves, cybersecurity issues have become increasingly prominent. Traditional centralized intrusion detection methods face significant challenges, including privacy,...
详细信息
The cloud-network-end integrated system is the inevitable result of integrating cloud-based internet of Things (IoT) systems and new-generation network communication architectures. It can achieve wide-area coverage to...
详细信息
ISBN:
(纸本)9798350396041;9798350396034
The cloud-network-end integrated system is the inevitable result of integrating cloud-based internet of Things (IoT) systems and new-generation network communication architectures. It can achieve wide-area coverage to enable efficient control and secure communication between various manned/unmanned end systems. For example, as a typical application in such systems, cloud-based Unmanned aerial vehicles (UAVs) surpass the payload limitations of traditional unmanned end systems by leveraging the computing and storage capabilities of cloud servers. This enables a significant enhancement in the diversity and complexity of various types of manned/unmanned end systems, leading to promising development prospects. In particular, the establishment and development of the space-air-ground integrated network (SAGIN) has greatly expanded and improved the communication range and quality between end systems. With a control paradigm centered on cloud servers, it can effectively meet the control requirements of various end systems in all areas and at all times. And further achieve secure data sharing among multiple end systems, as well as secure collaboration between multiple end systems. This paper proposes two lightweight authentication and key establishment (AKE) protocols for two typical scenarios of cloud-network-end integration systems to ensure secure communication between end systems based on SM2. We briefly analyze the correctness of our schemes and conduct a basic performance analysis. The results show that our schemes are reliable, effective, and very suitable for use in cloud-network integrated systems.
internet access is the primary motivating factor behind the revolutionary modern digital era. Almost everything is connected to the internet because of the internet of Things (IoT) concept. However, because typical IP...
详细信息
Principal network traffic in network-based controlsystems (NBCS) is driven by plant Sensor-controller-Actuator nodes operating in closed-loop. The performance provided by an NBCS's quality-of-control (QoC), and E...
详细信息
Indoor air pollution is a persistent and significant issue with detrimental effects on human health, including respiratory problems, allergies, carcinogenic risks, and impacts on the nervous and cardiovascular systems...
详细信息
The congestion control (CC) algorithm is expected to achieve consistent high performance under different network environments. Traditionally, classic CCs are designed with the methodology of inferring path conditions ...
详细信息
ISBN:
(纸本)9798400711961
The congestion control (CC) algorithm is expected to achieve consistent high performance under different network environments. Traditionally, classic CCs are designed with the methodology of inferring path conditions to guide the rate adjustment. However, this methodology suffers from wrong path condition inferences in certain cases, which mislead the rate adjustment and lead to performance degradation. To avoid wrong path condition inferences, we develop the projection-based introspective method and design the introspective congestion control (ICC) algorithm in this paper. Specifically, the rate adjustment rules are designed to possess a specialized profile such that the projection of the profile can be distinguished under unchanged path conditions. In this way, the projection, which can be distinguished from the time series of delay signals in the frequency domain, facilitates ICC to extract more information for path condition inferences. Consequently, with the introspection on the projection, ICC can avoid being misled by wrong path condition inferences and thus achieve consistent high performance under different conditions. The advantages of ICC are confirmed through extensive experiments conducted on various locally emulated scenarios, global testbeds over the internet, and the Alipay platform.
The World Health Organization estimates that road accident fatalities reached about 1.19 million in 2021 and keep increasing yearly, with about 90% due to human errors. Artificial intelligence can elevate the environm...
详细信息
ISBN:
(纸本)9798350349696;9798350349689
The World Health Organization estimates that road accident fatalities reached about 1.19 million in 2021 and keep increasing yearly, with about 90% due to human errors. Artificial intelligence can elevate the environmental awareness of drivers and reduce human errors. With the ever-evolving field of deep learning, this study aims to compare the accuracy and effectiveness along with the computational capabilities of the seventeen most popular convolutional neural network architectures from AlexNet, published in 2012, to MaxVit in 2022, for an image binary classification problem. This study aims to be a foundation for future research on computer vision applications in the internet of Vehicles domain in various ways, such as the effectiveness of transfer learning and the behaviour of CNN models on low-quality images. A total of sixty-seven models were trained with and without pre-trained weights, and the performance and computational metrics of each hundred and thirty-four models were measured. Among the chosen models, it was observed that the DenseNet model emerged as the most effective and efficient model, with a training time of 11.8 minutes, predictive accuracy of 100%, memory footprint of 26.53 MB and GPU utilisation of 4.1 GB.
暂无评论