One of the most universally accepted practices in computer security is the use of security policy enforcement. Under a policy enforcement regime, users and programs can only perform actions for which they are authoriz...
详细信息
ISBN:
(纸本)9781450335201
One of the most universally accepted practices in computer security is the use of security policy enforcement. Under a policy enforcement regime, users and programs can only perform actions for which they are authorized by the security policy. Unfortunately, modern control systems fail to make effective use of policy enforcement. In many cases, privilege in control systems is binary a single password is sufficient to gain most or all privileges within the system. In this paper, we consider the benefits and challenges of enforcing security policies for code running on programmable logic controllers (PLCs). We first summarize two of our previous approaches, which place no trust in the PLC to behave correctly. While these approaches show promise, especially for current PLC architectures, they are lacking in comparison to approaches based on a trustworthy PLC design. Thus, we argue that future PLCs should implement a Trusted Computing Base (TCB). Such a TCB is a small set of trusted hardware and software that is sufficient for enforcing policies directly on the PLC. We also propose a method of doing policy enforcement on PLCs supporting a small TCB, and argue that it is the simpler and more effective means of doing policy enforcement for PLCs. We conclude that future PLCs should support a small TCB.
With the increasing computing power and network capacity, distributed automation systems are facing new challenges of handling massive amounts of distributed nodes within tight real-time constraints. The industrial cy...
详细信息
ISBN:
(纸本)9781479917624
With the increasing computing power and network capacity, distributed automation systems are facing new challenges of handling massive amounts of distributed nodes within tight real-time constraints. The industrial cyber-physical systems is considered as the key to solve these complexities. In distributed industrial automation systems, there exists several execution semantics. In this paper, all existing execution semantics are summarized as a set of rules which are described by reconfigurable elements. During the simulation and verification of industrial cyber-physical systems, those rules are helpful to provide a generic runtime environment which can perform various execution semantics. This reconfigurable execution environment is demonstrated using a case study of a room lighting system.
The article is devoted to adaptation criterion series for use in process control algorithms. Criterion series is proposed for detecting abrupt changes in trend information and diagnostics of device. The use of this cr...
详细信息
ISBN:
(纸本)9781467374453
The article is devoted to adaptation criterion series for use in process control algorithms. Criterion series is proposed for detecting abrupt changes in trend information and diagnostics of device. The use of this criterion is,justified on the programmable logic controllers of small and medium power. The air temperature control system which has a variety sources of information is regarded as the object. The object has non-linear properties, which complicates the analysis. The standard algorithms filtration was implemented in the programmablelogic controller. The data were recorded and processed with MatLAB. The estimation of noise that affects the sensors thermal object was carried out. The criterion settings should be selected taking into account the dynamics of the object and the sensor. Quality filtration and static errors affect the accuracy of the method. Speed of the modern programmable logic controllers allows using a small length of the series or multiple series.
Embedded memories modules are one of the core components in System-on-a-Chip (SoC) device. For memory built-in self-test (MBIST) failures, bitmapping tool is normally used to locate the defect location.. This paper de...
详细信息
ISBN:
(纸本)9781479999286
Embedded memories modules are one of the core components in System-on-a-Chip (SoC) device. For memory built-in self-test (MBIST) failures, bitmapping tool is normally used to locate the defect location.. This paper demonstrates the effectiveness in the use of dynamic photon emission microscopy (PEM) analysis as an alternative method to debug MBIST failures. We also show how an additional failure characterization step prior to fault localization, can enhance success rate and turnaround time.
The performance of two different Quadratic Programming (QP) solvers for embedded Model Predictive Control (MPC), FiOrdOs and qpOASES, is evaluated for a relevant case study from the petroleum industry. Embedded MPC fo...
详细信息
ISBN:
(纸本)9781479977871
The performance of two different Quadratic Programming (QP) solvers for embedded Model Predictive Control (MPC), FiOrdOs and qpOASES, is evaluated for a relevant case study from the petroleum industry. Embedded MPC for the considered system is implemented on a PLC (programmablelogic Controller) using both solvers. The focus is on the computation time and memory requirements of the solvers as the dimensions of the control problem increase. The results show that qpOASES has a superior performance for small systems with respect to computation time. However, qpOASES has a near cubic growth in computation time with respect to the number of system variables, while FiOrdOs only has a near linear growth. FiOrdOs may thus be faster for larger systems. FiOrdOs has a smaller memory footprint than qpOASES for small systems;however, the program size grows faster than with qpOASES, and for the largest system configuration, the program sizes were almost identical. For even larger systems, qpOASES may have smaller program memory requirements than FiOrdOs, though qpOASES requires more data memory for all problem sizes.
Heat treatment is considered to be one of the most common methods in food drying. However, the problem with this conventional method is that the texture of the food sample is often altered from its original state, jus...
详细信息
ISBN:
(纸本)9789881925329
Heat treatment is considered to be one of the most common methods in food drying. However, the problem with this conventional method is that the texture of the food sample is often altered from its original state, just like in brown rice. Superheated steam treatment system (SSTS) is introduced as an effective method to remove the moisture of the sample. In order to perform process control, a programmablelogic controller (PLC), which served as the main controller, is employed to automate the process. To code the PLC program, combination of ladder logic diagrams (LLD), structured texts (ST) and function block diagrams (FBD) were employed using Omron CP1L. The developed controller is also adaptable to different SSTS setting parameters like pressure, temperature (through the temperature controller) and the speed of the transport or conveyorized-driven bed system (through inverter or variable frequency drive).
This paper tackles the problem of formulating and proving the completeness of focused-like proof systems in an automated fashion. Focusing is a discipline on proofs which structures them into phases in order to reduce...
详细信息
Accurate, compact thermal sensors are desirable in many applications, including on-chip temperature monitoring for processors with dynamic throttling and reliability management. Modern thermal sensors are limited in e...
详细信息
The modern control of the electrical power system faces various challenges caused by the introduction of renewable energy sources and rapidly changing loads. Key problem in reaching successful and sustainable control ...
详细信息
In recent years, the quality of power supplied to the consumer devices by an ac system has become an issue of great concern due to the rapidly increasing inductive loads, electronic equipments, power electronic device...
详细信息
暂无评论