Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 230
Filtrar
1.
Sci Rep ; 14(1): 22072, 2024 Sep 27.
Artigo em Inglês | MEDLINE | ID: mdl-39333625

RESUMO

Power electronic converters are widely implemented in many types of power applications such as microgrids. Power converters can make a physical connection between the power resources and the power application. To control a power converter, required data such as the voltage and the current of that should be measured to be used in a control application. Therefore, a communication-based structure including sensors and communication links can be used to measure the desired data and transmit that to the controllers. So, a power converter-based system can be considered as a type of cyber-physical system, and it can be vulnerable to cyber-attacks. Then, it can strongly be recommended to use a strategy for a power converter-based system to monitor the system and identify the existence of cyber-attack in the system. In this study, artificial intelligence (AI) is deployed to calculate the value of the false data (i.e., constant false data, and time-varying false data) and detect false data injection cyber-attacks on power converters. Besides, to have a precise technical evaluation of the proposed methodology, that is evaluated under other issues, i.e., noise, and communication link delay. In the case of noise, the proposed strategy is examined under noises with different signal-to-noise ratios . Further, for the case of the communication delay, the system is examined under both symmetrical (i.e., same communication delay on all inputs) and unsymmetrical communication delays (i.e., different communication delay/delays on the inputs). In this work, artificial neural networks are implemented as the AI-based application, and two types of the networks, i.e., feedforward (as a basic type) and long short-term memory (LSTM)-based network as a more complex network are tested. Finally, three important AI-based techniques (regression, classification, and clustering) are examined. Based on the obtained results, this work can properly identify and calculate the false data in the system.

2.
Sensors (Basel) ; 24(15)2024 Aug 05.
Artigo em Inglês | MEDLINE | ID: mdl-39124119

RESUMO

Recently, research has been conducted on mixed reality (MR), which provides immersive visualization and interaction experiences, and on mapping human motions directly onto a robot in a mixed reality (MR) space to achieve a high level of immersion. However, even though the robot is mapped onto the MR space, their surrounding environment is often not mapped sufficiently; this makes it difficult to comfortably perform tasks that require precise manipulation of the objects that are difficult to see from the human perspective. Therefore, we propose a system that allows users to operate a robot in real space by mapping the task environment around the robot on the MR space and performing operations within the MR space.

3.
Sensors (Basel) ; 24(16)2024 Aug 11.
Artigo em Inglês | MEDLINE | ID: mdl-39204892

RESUMO

Today, Smart Assistants (SAs) are supported by significantly improved Natural Language Processing (NLP) and Natural Language Understanding (NLU) engines as well as AI-enabled decision support, enabling efficient information communication, easy appliance/device control, and seamless access to entertainment services, among others. In fact, an increasing number of modern households are being equipped with SAs, which promise to enhance user experience in the context of smart environments through verbal interaction. Currently, the market in SAs is dominated by products manufactured by technology giants that provide well designed off-the-shelf solutions. However, their simple setup and ease of use come with trade-offs, as these SAs abide by proprietary and/or closed-source architectures and offer limited functionality. Their enforced vendor lock-in does not provide (power) users with the ability to build custom conversational applications through their SAs. On the other hand, employing an open-source approach for building and deploying an SA (which comes with a significant overhead) necessitates expertise in multiple domains and fluency in the multimodal technologies used to build the envisioned applications. In this context, this paper proposes a methodology for developing and deploying conversational applications on the edge on top of an open-source software and hardware infrastructure via a multilayer architecture that simplifies low-level complexity and reduces learning overhead. The proposed approach facilitates the rapid development of applications by third-party developers, thereby enabling the establishment of a marketplace of customized applications aimed at the smart assisted living domain, among others. The supporting framework supports application developers, device owners, and ecosystem administrators in building, testing, uploading, and deploying applications, remotely controlling devices, and monitoring device performance. A demonstration of this methodology is presented and discussed focusing on health and assisted living applications for the elderly.

4.
Sensors (Basel) ; 24(16)2024 Aug 15.
Artigo em Inglês | MEDLINE | ID: mdl-39204976

RESUMO

This paper presents a comprehensive and evidence-based cyber-risk assessment approach specifically designed for Medical Cyber Physical Systems (MCPS)- and Internet-of-Medical Devices (IoMT)-based collaborative digital healthcare systems, which leverage Federated Identity Management (FIM) solutions to manage user identities within this complex environment. While these systems offer advantages like easy data collection and improved collaboration, they also introduce new security challenges due to the interconnected nature of devices and data, as well as vulnerabilities within the FIM and the lack of robust security in IoMT devices. To proactively safeguard the digital healthcare system from cyber attacks with potentially life-threatening consequences, a comprehensive and evidence-based cyber-risk assessment is crucial for mitigating these risks. To this end, this paper proposes a novel cyber-risk assessment approach that leverages a three-dimensional attack landscape analysis, encompassing existing IT infrastructure, medical devices, and Federated Identity Management protocols. By considering their interconnected vulnerabilities, the approach recommends tailored security controls to prioritize and mitigate critical risks, ultimately enhancing system resilience. The proposed approach combines established industry standards like Cyber Resilience Review (CRR) asset management and NIST SP 800-30 for a comprehensive assessment. We have validated our approach using threat modeling with attack trees and detailed attack sequence diagrams on a diverse range of IoMT and MCPS devices from various vendors. The resulting evidence-based cyber-risk assessments and corresponding security control recommendations will significantly support healthcare professionals and providers in improving both patient and medical device safety management within the FIM-enabled healthcare ecosystem.


Assuntos
Segurança Computacional , Atenção à Saúde , Medição de Risco , Humanos , Internet
5.
Sensors (Basel) ; 24(12)2024 Jun 17.
Artigo em Inglês | MEDLINE | ID: mdl-38931707

RESUMO

Cyber-physical systems (CPS) are vital in automating complex tasks across various sectors, yet they face significant vulnerabilities due to the rising threats of cybersecurity attacks. The recent surge in cyber-attacks on critical infrastructure (CI) and industrial control systems (ICSs), with a 150% increase in 2022 affecting over 150 industrial operations, underscores the urgent need for advanced cybersecurity strategies and education. To meet this requirement, we develop a specialised cyber-physical testbed (CPT) tailored for transportation CI, featuring a simplified yet effective automated level-crossing system. This hybrid CPT serves as a cost-effective, high-fidelity, and safe platform to facilitate cybersecurity education and research. High-fidelity networking and low-cost development are achieved by emulating the essential ICS components using single-board computers (SBC) and open-source solutions. The physical implementation of an automated level-crossing visualised the tangible consequences on real-world systems while emphasising their potential impact. The meticulous selection of sensors enhances the CPT, allowing for the demonstration of analogue transduction attacks on this physical implementation. Incorporating wireless access points into the CPT facilitates multi-user engagement and an infrared remote control streamlines the reinitialization effort and time after an attack. The SBCs overwhelm as traffic surges to 12 Mbps, demonstrating the consequences of denial-of-service attacks. Overall, the design offers a cost-effective, open-source, and modular solution that is simple to maintain, provides ample challenges for users, and supports future expansion.

6.
Micromachines (Basel) ; 15(5)2024 Apr 26.
Artigo em Inglês | MEDLINE | ID: mdl-38793150

RESUMO

Managing Multi-Processor Systems-on-Chip (MPSoCs) is becoming increasingly complex as demands for advanced capabilities rise. This complexity is due to the involvement of more processing elements and resources, leading to a higher degree of heterogeneity throughout the system. Over time, management schemes have evolved from simple to autonomous systems with continuous control and monitoring of various parameters such as power distribution, thermal events, fault tolerance, and system security. Autonomous management integrates self-awareness into the system, making it aware of its environment, behavior, and objectives. Self-Aware Cyber-Physical Systems-on-Chip (SA-CPSoCs) have emerged as a concept to achieve highly autonomous management. Communication infrastructure is also vital to SoCs, and Software-Defined Networks-on-Chip (SDNoCs) can serve as a base structure for self-aware systems-on-chip. This paper presents a survey of the evolution of MPSoC management over the last two decades, categorizing research works according to their objectives and improvements. It also discusses the characteristics and properties of SA-CPSoCs and explains why SDNoCs are crucial for these systems.

8.
Sensors (Basel) ; 24(9)2024 May 03.
Artigo em Inglês | MEDLINE | ID: mdl-38733028

RESUMO

Interoperability is a central problem in digitization and System of Systems (SoS) engineering, which concerns the capacity of systems to exchange information and cooperate. The task to dynamically establish interoperability between heterogeneous cyber-physical systems (CPSs) at run-time is a challenging problem. Different aspects of the interoperability problem have been studied in fields such as SoS, neural translation, and agent-based systems, but there are no unifying solutions beyond domain-specific standardization efforts. The problem is complicated by the uncertain and variable relations between physical processes and human-centric symbols, which result from, e.g., latent physical degrees of freedom, maintenance, re-configurations, and software updates. Therefore, we surveyed the literature for concepts and methods needed to automatically establish SoSs with purposeful CPS communication, focusing on machine learning and connecting approaches that are not integrated in the present literature. Here, we summarize recent developments relevant to the dynamic interoperability problem, such as representation learning for ontology alignment and inference on heterogeneous linked data; neural networks for transcoding of text and code; concept learning-based reasoning; and emergent communication. We find that there has been a recent interest in deep learning approaches to establishing communication under different assumptions about the environment, language, and nature of the communicating entities. Furthermore, we present examples of architectures and discuss open problems associated with artificial intelligence (AI)-enabled solutions in relation to SoS interoperability requirements. Although these developments open new avenues for research, there are still no examples that bridge the concepts necessary to establish dynamic interoperability in complex SoSs, and realistic testbeds are needed.

9.
Appl Ergon ; 119: 104316, 2024 Sep.
Artigo em Inglês | MEDLINE | ID: mdl-38810325

RESUMO

Thresholds that guide diagnoses of probable and acceptable seasickness levels on board ships are scarcely reported in literature. Motion sickness incidence and motion sickness dose value thresholds exist, but are defined for specific environments, such as naval, or offered merely as optional criteria for ship performance metrics. The presented work communicates a novel means of developing seasickness diagnostic criteria during ship operation, based on observations from shipboard measurement systems and seafarers using an innovative platform. The innovative platform provides personalised seasickness criteria that are accessible during ship operation to estimate the probable level of seasickness on board. Results are compared to that from a traditional method of data acquisition and analyses, post operation, revealing a similar trend in diagnostic threshold magnitudes (13-85 m/s1.5) that can be applicable to voyages with different durations (0.5-6 hr) considering desired levels of seasickness (10-50 %). The seasickness criteria are envisioned to be pertinent for the prediction of probable seasickness levels based on sea state forecasts and ship motion estimation.


Assuntos
Enjoo devido ao Movimento , Navios , Humanos , Enjoo devido ao Movimento/diagnóstico , Enjoo devido ao Movimento/etiologia , Masculino , Adulto , Medicina Naval
10.
ISA Trans ; 149: 44-53, 2024 Jun.
Artigo em Inglês | MEDLINE | ID: mdl-38692974

RESUMO

The finite-horizon optimal secure tracking control (FHOSTC) problem for cyber-physical systems under actuator denial-of-service (DoS) attacks is addressed in this paper. A model-free method based on the Q-function is designed to achieve FHOSTC without the system model information. First, an augmented time-varying Riccati equation (TVRE) is derived by integrating the system with the reference system into a unified augmented system. Then, a lower bound on malicious DoS attacks probability that guarantees the solutions of the TVRE is provided. Third, a Q-function that changes over time (time-varying Q-function, TVQF) is devised. A TVQF-based method is then proposed to solve the TVRE without the need for the knowledge of the augmented system dynamics. The developed method works backward-in-time and uses the least-squares method. To validate the performance and features of the developed method, simulation studies are conducted in the end.

11.
Sensors (Basel) ; 24(7)2024 Apr 05.
Artigo em Inglês | MEDLINE | ID: mdl-38610535

RESUMO

The fifth Industrial revolution (I5.0) prioritizes resilience and sustainability, integrating cognitive cyber-physical systems and advanced technologies to enhance machining processes. Numerous research studies have been conducted to optimize machining operations by identifying and reducing sources of uncertainty and estimating the optimal cutting parameters. Virtual modeling and Tool Condition Monitoring (TCM) methodologies have been developed to assess the cutting states during machining processes. With a precise estimation of cutting states, the safety margin necessary to deal with uncertainties can be reduced, resulting in improved process productivity. This paper reviews the recent advances in high-performance machining systems, with a focus on cyber-physical models developed for the cutting operation of difficult-to-cut materials using cemented carbide tools. An overview of the literature and background on the advances in offline and online process optimization approaches are presented. Process optimization objectives such as tool life utilization, dynamic stability, enhanced productivity, improved machined part quality, reduced energy consumption, and carbon emissions are independently investigated for these offline and online optimization methods. Addressing the critical objectives and constraints prevalent in industrial applications, this paper explores the challenges and opportunities inherent to developing a robust cyber-physical optimization system.

12.
PeerJ Comput Sci ; 10: e1975, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38660195

RESUMO

The evolution of engineering applications is highly relevant in the context of protecting industrial systems. As industries are increasingly interconnected, the need for robust cybersecurity measures becomes paramount. Engineering informatics not only provides tools for knowledge representation and extraction but also affords a comprehensive spectrum of developing sophisticated cybersecurity solutions. However, safeguarding industrial systems poses a unique challenge due to the inherent heterogeneity of data within these environments. Together with this problem, it's crucial to acknowledge that datasets that simulate real cyberattacks within these diverse environments exhibit a high imbalance, often skewed towards certain types of traffics. This study proposes a system for addressing class imbalance in cybersecurity. To do this, three oversampling (SMOTE, Borderline1-SMOTE, and ADASYN) and five undersampling (random undersampling, cluster centroids, NearMiss, repeated edited nearest neighbor, and Tomek Links) methods are tested. Particularly, these balancing algorithms are used to generate one-vs-rest binary models and to develop a two-stage classification system. By doing so, this study aims to enhance the efficacy of cybersecurity measures ensuring a more comprehensive understanding and defense against the diverse range of threats encountered in industrial environments. Experimental results demonstrates the effectiveness of proposed system for cyberattack detection and classification among nine widely known cyberattacks.

13.
Technol Health Care ; 32(4): 2599-2618, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38578908

RESUMO

BACKGROUND: Sports have been a fundamental component of any culture and legacy for centuries. Athletes are widely regarded as a source of national pride, and their physical well-being is deemed to be of paramount significance. The attainment of optimal performance and injury prevention in athletes is contingent upon physical fitness. Technology integration has implemented Cyber-Physical Systems (CPS) to augment the athletic training milieu. OBJECTIVE: The present study introduces an approach for assessing athlete physical fitness in training environments: the Internet of Things (IoT) and CPS-based Physical Fitness Evaluation Method (IoT-CPS-PFEM). METHODS: The IoT-CPS-PFEM employs a range of IoT-connected sensors and devices to observe and assess the physical fitness of athletes. The proposed methodology gathers information on diverse fitness parameters, including heart rate, body temperature, and oxygen saturation. It employs machine learning algorithms to scrutinize and furnish feedback on the athlete's physical fitness status. RESULTS: The simulation findings illustrate the efficacy of the proposed IoT-CPS-PFEM in identifying the physical fitness levels of athletes, with an average precision of 93%. The method under consideration aims to tackle the existing obstacles of conventional physical fitness assessment techniques, including imprecisions, time lags, and manual data-gathering requirements. The approach of IoT-CPS-PFEM provides the benefits of real-time monitoring, precision, and automation, thereby enhancing an athlete's physical fitness and overall performance to a considerable extent. CONCLUSION: The research findings suggest that the implementation of IoT-CPS-PFEM can significantly impact the physical fitness of athletes and enhance the performance of the Indian sports industry in global competitions.


Assuntos
Atletas , Aptidão Física , Humanos , Aptidão Física/fisiologia , Internet das Coisas , Frequência Cardíaca/fisiologia , Aprendizado de Máquina , Temperatura Corporal/fisiologia
14.
Heliyon ; 10(4): e26638, 2024 Feb 29.
Artigo em Inglês | MEDLINE | ID: mdl-38434084

RESUMO

Recently, the European Commission announced Industry 5.0 as a strategic initiative toward a value-driven industrial transformation. This new paradigm coexists with previous Industry 4.0 revolution that has guided the efforts towards technology driven industrial digitalisation in the past ten years. As part of this Industry 4.0 strategies, numerous KPI-driven evaluation methods were proposed to cover the multiple pillars of smart industry assessment. However, they do not incorporate human workers and actors in a systematic way as drivers for digitalisation processes, as the new Industry 5.0 paradigm argues. This paper addresses this gap by proposing an evaluation methodology that incorporates multiple human actors in the digitalisation process. The final objective of this methodology is to evaluate the direct and indirect benefits of the technology-driven transformation process to achieve the goals of human workers and other human stakeholders. To this end, our methodology provides the basis for proposing assessment tools and instruments for technological and infrastructure integration, process optimisation, new functionalities and human factors benefits, and four core indicators that have been applied to a real case comparing the digitalisation processes of three different companies.

15.
Sci Rep ; 14(1): 7361, 2024 Mar 28.
Artigo em Inglês | MEDLINE | ID: mdl-38548780

RESUMO

Malicious attacks are often inevitable in cyber-physical systems (CPS). Accuracy in Cyber physical system for position tracking of servos is the major concern now a days. In high precision industrial automation, it is very hard to achieve accuracy in tracking especially under malicious cyber-attacks, control saturations, parametric perturbations and external disturbances. In this paper, we have designed a novel predefined time (PDT) convergence sliding mode adaptive controller (PTCSMAC) for such kind of cyber physical control system. Main key feature of our control is to cope these challenges that are posed by CPS systems such as parameter perturbation, control saturation, and cyber-attacks and the whole system then upgrade to a third-order system to facilitate adaptive control law. Then, we present an adaptive controller based on the novel PDT convergent sliding mode surface (SMS) combined with a modified weight updated Extreme Learning Machine (ELM) which is used to approximate the uncertain part of the system. Another significant advantage of our proposed control approach is that it does not require detailed model information, guaranteeing robust performance even when the system model is uncertain. Additionally, our proposed PTCSMAC controller is nonsingular regardless of initial conditions, and is capable of eradicating the possibility of singularity problems, which are frequently a concern in numerous CPS control systems. Finally, we have verified our designed PTCSMAC control law through rigorous simulations on CPS seeker servo positioning system and compared the robustness and performance of different existing techniques.

16.
Sensors (Basel) ; 24(3)2024 Jan 28.
Artigo em Inglês | MEDLINE | ID: mdl-38339566

RESUMO

In recent years, the problem of cyber-physical systems' remote state estimations under eavesdropping attacks have been a source of concern. Aiming at the existence of eavesdroppers in multi-system CPSs, the optimal attack energy allocation problem based on a SINR (signal-to-noise ratio) remote state estimation is studied. Assume that there are N sensors, and these sensors use a shared wireless communication channel to send their state measurements to the remote estimator. Due to the limited power, eavesdroppers can only attack M channels out of N channels at most. Our goal is to use the Markov decision processes (MDP) method to maximize the eavesdropper's state estimation error, so as to determine the eavesdropper's optimal attack allocation. We propose a backward induction algorithm which uses MDP to obtain the optimal attack energy allocation strategy. Compared with the traditional induction algorithm, this algorithm has lower computational cost. Finally, the numerical simulation results verify the correctness of the theoretical analysis.

17.
Evol Comput ; : 1-24, 2024 Feb 19.
Artigo em Inglês | MEDLINE | ID: mdl-38377686

RESUMO

Describing the properties of complex systems that evolve over time is a crucial requirement for monitoring and understanding them. Signal Temporal Logic (STL) is a framework that proved to be effective for this aim because it is expressive and allows state properties as human-readable formulae. Crafting STL formulae that fit a particular system is, however, a difficult task. For this reason, a few approaches have been proposed recently for the automatic learning of STL formulae starting from observations of the system. In this paper, we propose BUSTLE (Bi-level Universal STL Evolver), an approach based on evolutionary computation for learning STL formulae from data. BUSTLE advances the state-of-the-art because it (i) applies to a broader class of problems, in terms of what is known about the state of the system during its observation, and (ii) generates both the structure and the values of the parameters of the formulae employing a bi-level search mechanism (global for the structure, local for the parameters). We consider two cases where (a) observations of the system in both anomalous and regular state are available, or (b) only observations of regular state are available. We experimentally evaluate BUSTLE on problem instances corresponding to the two cases and compare it against previous approaches. We show that the evolved STL formulae are effective and human-readable: the versatility of BUSTLE does not come at the cost of lower effectiveness.

18.
Sensors (Basel) ; 24(3)2024 Jan 31.
Artigo em Inglês | MEDLINE | ID: mdl-38339656

RESUMO

This article presents a novel hardware-assisted distributed ledger-based solution for simultaneous device and data security in smart healthcare. This article presents a novel architecture that integrates PUF, blockchain, and Tangle for Security-by-Design (SbD) of healthcare cyber-physical systems (H-CPSs). Healthcare systems around the world have undergone massive technological transformation and have seen growing adoption with the advancement of Internet-of-Medical Things (IoMT). The technological transformation of healthcare systems to telemedicine, e-health, connected health, and remote health is being made possible with the sophisticated integration of IoMT with machine learning, big data, artificial intelligence (AI), and other technologies. As healthcare systems are becoming more accessible and advanced, security and privacy have become pivotal for the smooth integration and functioning of various systems in H-CPSs. In this work, we present a novel approach that integrates PUF with IOTA Tangle and blockchain and works by storing the PUF keys of a patient's Body Area Network (BAN) inside blockchain to access, store, and share globally. Each patient has a network of smart wearables and a gateway to obtain the physiological sensor data securely. To facilitate communication among various stakeholders in healthcare systems, IOTA Tangle's Masked Authentication Messaging (MAM) communication protocol has been used, which securely enables patients to communicate, share, and store data on Tangle. The MAM channel works in the restricted mode in the proposed architecture, which can be accessed using the patient's gateway PUF key. Furthermore, the successful verification of PUF enables patients to securely send and share physiological sensor data from various wearable and implantable medical devices embedded with PUF. Finally, healthcare system entities like physicians, hospital admin networks, and remote monitoring systems can securely establish communication with patients using MAM and retrieve the patient's BAN PUF keys from the blockchain securely. Our experimental analysis shows that the proposed approach successfully integrates three security primitives, PUF, blockchain, and Tangle, providing decentralized access control and security in H-CPS with minimal energy requirements, data storage, and response time.


Assuntos
Inteligência Artificial , Blockchain , Humanos , Segurança Computacional , Computadores , Atenção à Saúde/métodos
19.
ISA Trans ; 144: 11-17, 2024 Jan.
Artigo em Inglês | MEDLINE | ID: mdl-37891071

RESUMO

This paper investigates the attack estimation and state reconstruction problem for linear cyber-physical systems with state delay and simultaneous sensor and actuator attacks. Reduced-order observer is designed for the augmented system to simultaneously estimate the actuator attack, sensor attack and the state of system. By adopting the double integral term into the Lyapunov-Krasovskii functional and decomposing the cross term, the delay-dependent results are obtained. The method proposed in this paper can accurately estimate the state, actuator and sensor attacks simultaneously without additional design. Compared with the previous method, the time delay information is fully utilized and the conservation is greatly reduced. Finally, the correctness of the results is verified by simulation.

20.
ISA Trans ; 144: 51-60, 2024 Jan.
Artigo em Inglês | MEDLINE | ID: mdl-38007369

RESUMO

Intent on the smart vehicles of a platoon to follow their correct routes, they must exchange their state information with each other based on a communication graph. Meanwhile, malicious factors like Denial-of-Service (DoS) attacks, one of the major types of cyber-attacks, can affect vehicles and divert them from their correct routes. Also, spreading the erroneous data induced by a DoS attack from the attacked agent gradually destabilizes the platoon. Therefore, preserving all vehicles' safety is a vital issue for the platoon. In this paper, in the first step, detection and measurement of the DoS attack modeled by a time-varying delay are conducted by exploiting two incremental counters through a DoS detection and measurement algorithm. Also, supplementary to this, a novel vehicular resilient control strategy based on switching systems is proposed to retrieve the attacked agent to the leader-follower consensus. In the end, the capability of the proposed algorithms will be indicated by presenting an illustrative case study.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA