Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 3 de 3
Filtrar
Mais filtros

Base de dados
Tipo de documento
Intervalo de ano de publicação
1.
Sensors (Basel) ; 24(12)2024 Jun 14.
Artigo em Inglês | MEDLINE | ID: mdl-38931643

RESUMO

The article deals with the issue of detecting cyberattacks on control algorithms running in a real Programmable Logic Controller (PLC) and controlling a real laboratory control plant. The vulnerability of the widely used Proportional-Integral-Derivative (PID) controller is investigated. Four effective, easy-to-implement, and relatively robust methods for detecting attacks on the control signal, output variable, and parameters of the PID controller are researched. The first method verifies whether the value of the control signal sent to the control plant in the previous step is the actual value generated by the controller. The second method relies on detecting sudden, unusual changes in output variables, taking into account the inertial nature of dynamic plants. In the third method, a copy of the controller parameters is used to detect an attack on the controller's parameters implemented in the PLC. The fourth method uses the golden run in attack detection.

2.
Sensors (Basel) ; 23(15)2023 Jul 28.
Artigo em Inglês | MEDLINE | ID: mdl-37571561

RESUMO

This work is concerned with the vulnerability of a network industrial control system to cyber-attacks, which is a critical issue nowadays. This is because an attack on a controlled process can damage or destroy it. These attacks use long short-term memory (LSTM) neural networks, which model dynamical processes. This means that the attacker may not know the physical nature of the process; an LSTM network is sufficient to mislead the process operator. Our experimental studies were conducted in an industrial control network containing a magnetic levitation process. The model training, evaluation, and structure selection are described. The chosen LSTM network very well mimicked the considered process. Finally, based on the obtained results, we formulated possible protection methods against the considered types of cyber-attack.

3.
Sensors (Basel) ; 22(2)2022 Jan 16.
Artigo em Inglês | MEDLINE | ID: mdl-35062639

RESUMO

The digital twins technology delivers a new degree of freedom into system implementation and maintenance practice. Using this approach, a technological system can be efficiently modeled and simulated. Furthermore, such a twin offline system can be efficiently used to investigate real system issues and improvement opportunities, e.g., improvement of the existing control system or development of a new one. This work describes the development of a control system using the digital twins methodology for a gas system delivering a specific mixture of gases to the time-of-flight (ToF) multipurpose detector (MPD) used during high-energy physics experiments in the Joint Institute for Nuclear Research (Dubna, Russia). The gas system digital twin was built using a test stand and further extended into target full-scale installation planned to be built in the near future. Therefore, conducted simulations are used to validate the existing system and to allow validation of the planned new system. Moreover, the gas system digital twin enables testing of new control opportunities, improving the operation of the target gas system.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA