In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose condition...
详细信息
In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose conditions under which one can execute zero dynamics and controllable attacks in the CPS. The above conditions are derived based on the Markov parameters of the CPS and elements of the system observability matrix. Consequently, in addition to outlining the number of required actuators to be attacked, these conditions provide one with the minimum system knowledge needed to perform zero dynamics and controllable cyber-attacks. As a countermeasure against the above stealthy cyber-attacks, we develop a dynamic coding scheme that increases the minimum number of the CPS required actuators to carry out zero dynamics and controllable cyber-attacks to its maximum possible value. It is shown that if at least one secure input channel exists, the proposed dynamic coding scheme can prevent adversaries from executing the zero dynamics and controllable attacks even if they have complete knowledge of the coding system. Finally, two illustrative numerical case studies are provided to demonstrate the effectiveness and capabilities of our derived conditions and proposed methodologies.
Over-the-air computation(AirComp)enables federated learning(FL)to rapidly aggregate local models at the central server using waveform superposition property of wireless *** this paper,a robust transmission scheme for ...
详细信息
Over-the-air computation(AirComp)enables federated learning(FL)to rapidly aggregate local models at the central server using waveform superposition property of wireless *** this paper,a robust transmission scheme for an AirCompbased FL system with imperfect channel state information(CSI)is *** model CSI uncertainty,an expectation-based error model is *** main objective is to maximize the number of selected devices that meet mean-squared error(MSE)requirements for model broadcast and model *** problem is formulated as a combinatorial optimization problem and is solved in two ***,the priority order of devices is determined by a sparsity-inducing ***,a feasibility detection scheme is used to select the maximum number of devices to guarantee that the MSE requirements are *** alternating optimization(AO)scheme is used to transform the resulting nonconvex problem into two convex *** results illustrate the effectiveness and robustness of the proposed scheme.
Large number of antennas and higher bandwidth usage in massive multiple-input-multipleoutput(MIMO)systems create immense burden on receiver in terms of higher power *** power consumption at the receiver radio frequenc...
详细信息
Large number of antennas and higher bandwidth usage in massive multiple-input-multipleoutput(MIMO)systems create immense burden on receiver in terms of higher power *** power consumption at the receiver radio frequency(RF)circuits can be significantly reduced by the application of analog-to-digital converter(ADC)of low *** this paper we investigate bandwidth efficiency(BE)of massive MIMO with perfect channel state information(CSI)by applying low resolution ADCs with Rician *** start our analysis by deriving the additive quantization noise model,which helps to understand the effects of ADC resolution on BE by keeping the power constraint at the receiver in *** also investigate deeply the effects of using higher bit rates and the number of BS antennas on bandwidth efficiency(BE)of the *** emphasize that good bandwidth efficiency can be achieved by even using low resolution ADC by using regularized zero-forcing(RZF)combining *** also provide a generic analysis of energy efficiency(EE)with different options of bits by calculating the energy efficiencies(EE)using the achievable *** emphasize that satisfactory BE can be achieved by even using low-resolution ADC/DAC in massive MIMO.
Advancements in neuromorphic computing have given an impetus to the development of systems with adaptive behavior,dynamic responses,and energy efficiency *** charge-based or emerging memory technologies such as memris...
详细信息
Advancements in neuromorphic computing have given an impetus to the development of systems with adaptive behavior,dynamic responses,and energy efficiency *** charge-based or emerging memory technologies such as memristors have been developed to emulate synaptic plasticity,replicating the key functionality of neurons—integrating diverse presynaptic inputs to fire electrical impulses—has remained *** this study,we developed reconfigurable metal-oxide-semiconductor capacitors(MOSCaps)based on hafnium diselenide(HfSe2).The proposed devices exhibit(1)optoelectronic synaptic features and perform separate stimulus-associated learning,indicating considerable adaptive neuron emulation,(2)dual light-enabled charge-trapping and memcapacitive behavior within the same MOSCap device,whose threshold voltage and capacitance vary based on the light intensity across the visible spectrum,(3)memcapacitor volatility tuning based on the biasing conditions,enabling the transition from volatile light sensing to non-volatile optical data *** reconfigurability and multifunctionality of MOSCap were used to integrate the device into a leaky integrate-and-fire neuron model within a spiking neural network to dynamically adjust firing patterns based on light stimuli and detect exoplanets through variations in light intensity.
Integrated sensing and communication (ISAC) is a promising technique to increase spectral efficiency and support various emerging applications by sharing the spectrum and hardware between these functionalities. Howeve...
详细信息
Integrated sensing and communication (ISAC) is a promising technique to increase spectral efficiency and support various emerging applications by sharing the spectrum and hardware between these functionalities. However, the traditional ISAC schemes are highly dependent on the accurate mathematical model and suffer from the challenges of high complexity and poor performance in practical scenarios. Recently, artificial intelligence (AI) has emerged as a viable technique to address these issues due to its powerful learning capabilities, satisfactory generalization capability, fast inference speed, and high adaptability for dynamic environments, facilitating a system design shift from model-driven to data-driven. Intelligent ISAC, which integrates AI into ISAC, has been a hot topic that has attracted many researchers to investigate. In this paper, we provide a comprehensive overview of intelligent ISAC, including its motivation, typical applications, recent trends, and challenges. In particular, we first introduce the basic principle of ISAC, followed by its key techniques. Then, an overview of AI and a comparison between model-based and AI-based methods for ISAC are provided. Furthermore, the typical applications of AI in ISAC and the recent trends for AI-enabled ISAC are reviewed. Finally, the future research issues and challenges of intelligent ISAC are discussed.
Millimeter-wave(mmWave)Non-Orthogonal Multiple Access(NOMA)with random beamforming is a promising technology to guarantee massive connectivity and low latency transmissions of future generations of mobile *** this pap...
详细信息
Millimeter-wave(mmWave)Non-Orthogonal Multiple Access(NOMA)with random beamforming is a promising technology to guarantee massive connectivity and low latency transmissions of future generations of mobile *** this paper,we introduce a cost-effective and energy-efficient mmWave-NOMA system that exploits sparse antenna arrays in the *** analysis shows that utilizing low-weight and small-sized sparse antennas in the Base Station(BS)leads to better outage probability *** also introduce an optimum low complexity Equilibrium Optimization(EO)-based algorithm to further improve the outage *** simulation and analysis results show that the systems equipped with sparse antenna arrays making use of optimum beamforming vectors outperform the conventional systems with uniform linear arrays in terms of outage probability and sum rates.
The magnetic flux in a permanent magnet transverse flux generator(PMTFG) is three-dimensional(3D), therefore, its efficacy is evaluated using 3D magnetic field analysis. Although the 3D finite-element method(FEM) is h...
详细信息
The magnetic flux in a permanent magnet transverse flux generator(PMTFG) is three-dimensional(3D), therefore, its efficacy is evaluated using 3D magnetic field analysis. Although the 3D finite-element method(FEM) is highly accurate and reliable for machine simulation, it requires a long computation time, which is crucial when it is to be used in an iterative optimization process. Therefore, an alternative to 3DFEM is required as a rapid and accurate analytical technique. This paper presents an analytical model for PMTFG analysis using winding function method. To obtain the air gap MMF distribution, the excitation magneto-motive force(MMF) and the turn function are determined based on certain assumptions. The magnetizing inductance, flux density, and back-electro-magnetomotive force of the winding are then determined. To assess the accuracy of the proposed method, the analytically calculated parameters of the generator are compared to those obtained by a 3D-FEM. The presented method requires significantly shorter computation time than the 3D-FEM with comparable accuracy.
Bidirectional interlinking converter(BIC)is the core equipment in a hybrid AC/DC microgrid connected between AC and DC ***,the variety of control modes and flexible bidirectional power flow complicate the influence of...
详细信息
Bidirectional interlinking converter(BIC)is the core equipment in a hybrid AC/DC microgrid connected between AC and DC ***,the variety of control modes and flexible bidirectional power flow complicate the influence of AC faults on BIC itself and on DC sub-grid,which potentially threaten both converter safety and system *** study first investigates AC fault influence on the BIC and DC bus voltage under different BIC control modes and different pre-fault operation states,by developing a mathematical model and equivalent sequence ***,based on the analysis results,a general accommodative current limiting strategy is proposed for BIC without limitations to specific mode or operation *** amplitude is predicted and constrained according to the critical requirements to protect the BIC and relieving the AC fault influence on the DC bus *** with conventional methods,potential current limit failure and distortions under asymmetric faults can also be ***,experiments verify feasibility of the proposed method.
The increasing penetration of renewable energy resources with highly fluctuating outputs has placed increasing concern on the accuracy and timeliness of electric power system state estimation(SE).Meanwhile,we note tha...
详细信息
The increasing penetration of renewable energy resources with highly fluctuating outputs has placed increasing concern on the accuracy and timeliness of electric power system state estimation(SE).Meanwhile,we note that only a fraction of system states fluctuate at the millisecond level and require to be *** such,refreshing only those states with significant variation would enhance the computational efficiency of SE and make fast-continuous update of states ***,this is difficult to achieve with conventional SE methods,which generally refresh states of the entire system every 4–5 *** this context,we propose a local hybrid linear SE framework using stream processing,in which synchronized measurements received from phasor measurement units(PMUs),and trigger/timingmode measurements received from remote terminal units(RTUs)are used to update the associated local ***,the measurement update process efficiency and timeliness are enhanced by proposing a trigger measurement-based fast dynamic partitioning algorithm for determining the areas of the system with states requiring *** particular,non-iterative hybrid linear formulations with both RTUs and PMUs are employed to solve the local SE *** timeliness,accuracy,and computational efficiency of the proposed method are demonstrated by extensive simulations based on IEEE 118-,300-,and 2383-bus systems.
With the continuous development of transportation electrification,the cybersecurity of energy infrastructure has become increasingly ***,EVs resemble a significant tool to carryout cyberattacks since EVs are not only ...
详细信息
With the continuous development of transportation electrification,the cybersecurity of energy infrastructure has become increasingly ***,EVs resemble a significant tool to carryout cyberattacks since EVs are not only seen as dynamic loads but also as mobile energy sources that establish two-way communications with several players in the *** taxonomy aims to provide a comprehensive overview of cyberattacks against EVs from four distinct *** first is the research domains of EVs application,which investigates the different fields of research related to the development and application of EVs and how they are susceptible to cyber *** second is the CIAbased attacks,which examines the threats to the confidentiality,integrity,and availability of EVs'sensitive information and critical *** third taxonomy discusses the countermeasures and defensive mechanisms to secure the EVs against cyberattacks,including preventive measures,detection algorithms,response strategy,and recovery *** fourth taxonomy is the verification and validation methodologies,which explores the software tools and hardware testbeds used to test and evaluate the security of EVs against cyber ***,this taxonomy presents an understanding of the current state of cyberattacks against EVs and serves as a valuable resource for researchers and practitioners in the fields of cybersecurity and electric mobility.
暂无评论