Federated learning (FL) has gained prominence in electroencephalogram (EEG)-based emotion recognition because of its ability to enable secure collaborative training without centralized data. However, traditional FL fa...
详细信息
作者:
Nieße, AstridHagenmeyer, VeitFk. II – Department für Informatik
Carl von Ossietzky Universität Oldenburg Abteilung Digitalisierte Energiesysteme Oldenburg26111 Germany
Institute for Automation and Applied Informatics Eggenstein-Leopoldshafen76344 Germany
IoT systems are an integral part of every modern industrial enterprise Industry 4.0. IoT is the term for modern remote devices controlled via the Internet. Internet of Things is the name of technologies that allow che...
详细信息
IoT systems are an integral part of every modern industrial enterprise Industry 4.0. IoT is the term for modern remote devices controlled via the Internet. Internet of Things is the name of technologies that allow cheap wireless connection and communication of various sensors and devices to automate, accelerate and streamline processes. In the interconnected world of Industry 4.0, there are many potential resources existing for infiltration. Cybercriminals could take control of manufacturing industries, manipulate machines, or could do an industrial espionage. This type of attack is called Denial of Service. In the second case, the attack preserves the attacker’s anonymity through an IP address by using a potentially innocent third party (a reflector) that is indirectly involved in the attack. Through this attack, the attacker forwards the flow of attacking data to the target victim. The attacker sends the packets with a fake spoof source IP address set to the victim’s IP address to the reflector, thus indirectly overloading the target with the packets, or it will intrude into a network device through a faulty WPS implementation. The simulation model of the production line and the IoT security system Fibaro were used to investigate these attacks. The article demonstrates the possibility of attacks on network devices and the misuse of IoT devices in order to compromise production machines which use DRDoS and Brute-force attacks.
This paper introduces a novel distributed optimization framework for large-scale AC Optimal Power Flow (OPF) problems, offering both theoretical convergence guarantees and rapid convergence in practice. By integrating...
详细信息
Recent research in the field of computer vision strongly focuses on deep learning architectures to tackle image processing problems. Deep neural networks are often considered in complex image processing scenarios sinc...
详细信息
This paper provides an approach to create the digital thread associated to the value stream along a dairy process value chain. Identifying the different stakeholders within the dairy process, each of them is concretel...
This paper provides an approach to create the digital thread associated to the value stream along a dairy process value chain. Identifying the different stakeholders within the dairy process, each of them is concretely positioned as provider of assets to be digitalized and networked using the Asset Administration Shell technology and this within an Eco-system formally specified by the 3D-Reference Architecture Model for Industry 4.0 (RAMI 4.0). The different sub-models of the Asset Administration Shells along the digital thread are then an essential part of the so called Digital Passport, which will be associated to different dairy products (milk powders, butter, whey, cheese, etc.). The Digital Passport is the core tool allowing all stakeholders for performing traceability of products and processes. It provides digitalized data and information, to be exposed and/or consumed as services, developed and shared in real-time by all the actors of the dairy supply chain, responding to strict dairy process business requirements.
Devices in IEC 61850 substations use the generic object-oriented substation events (GOOSE) protocol to exchange protection-related events. Because of its lack of authentication and encryption, GOOSE is vulnerable to m...
详细信息
ISBN:
(数字)9781728161273
ISBN:
(纸本)9781728163598
Devices in IEC 61850 substations use the generic object-oriented substation events (GOOSE) protocol to exchange protection-related events. Because of its lack of authentication and encryption, GOOSE is vulnerable to man-in-the-middle attacks. An adversary with access to the substation network can inject carefully crafted messages to impact the grid's availability. One of the most common such attacks, GOOSE-based poisoning, modifies the StNum and SqNum fields in the protocol data unit to take over GOOSE publications. We present ED4GAP, a network- level system for efficient detection of the poisoning attacks. We define a finite state machine model for network communication concerning the attacks. Guided by the model, ED4GAP analyzes network traffic out-of-band and detects attacks in real-time. We implement a prototype of the system and evaluate its detection accuracy. We provide a systematic approach to assessing bottlenecks, improving performance, and demonstrating that ED4GAP has low overhead and meets GOOSE's timing constraints.
Quantifying the stability of an equilibrium is central in the theory of dynamical systems as well as in engineering and control. A comprehensive picture must include the response to both small and large perturbations,...
详细信息
Quantifying the stability of an equilibrium is central in the theory of dynamical systems as well as in engineering and control. A comprehensive picture must include the response to both small and large perturbations, leading to the concepts of local (linear) and global stability. Here, we show how systems displaying Hopf bifurcations show contrarian results for these two aspects of stability: Global stability is large close to the point where the system loses its stability altogether. We demonstrate this effect for an elementary model system, an anharmonic oscillator, and a realistic model of power system dynamics with delayed control. Detailed investigations of the bifurcation explain the seeming paradox in terms of the location of the attractors relative to the equilibrium.
This paper deals with the design and implementation of adaptive nonlinear predictive control (NMPC). The resulting control system is deployed on a softPLC embedded target in real-time via the REXYGEN control system. T...
This paper deals with the design and implementation of adaptive nonlinear predictive control (NMPC). The resulting control system is deployed on a softPLC embedded target in real-time via the REXYGEN control system. The paper describes functional prototype using softPLC hosting the NMPC algorithm applied for a nonlinear system consisting of three coupled tanks. The NMPC algorithm is solved via the receding horizon control method (RHC), formulated as a nonlinear programming problem (NLP) and numerically computed using the SOLNP solver. The adaptivity is provided by online identification via moving horizon estimation (MHE), keeping the model updated to avoid a model-plant mismatch. The methodology described in this paper can be easily transferred to a wider group of industrial nonlinear processes. Such created control unit can run in a standalone mode or can be connected to some exiting control system providing a necessary computational power and thus upgrading the quality of control significantly.
暂无评论