46 research outputs found

    Security risk modeling in smart grid critical infrastructures in the era of big data and artificial intelligence

    Get PDF
    Smart grids (SG) emerged as a response to the need to modernize the electricity grid. The current security tools are almost perfect when it comes to identifying and preventing known attacks in the smart grid. Still, unfortunately, they do not quite meet the requirements of advanced cybersecurity. Adequate protection against cyber threats requires a whole set of processes and tools. Therefore, a more flexible mechanism is needed to examine data sets holistically and detect otherwise unknown threats. This is possible with big modern data analyses based on deep learning, machine learning, and artificial intelligence. Machine learning, which can rely on adaptive baseline behavior models, effectively detects new, unknown attacks. Combined known and unknown data sets based on predictive analytics and machine intelligence will decisively change the security landscape. This paper identifies the trends, problems, and challenges of cybersecurity in smart grid critical infrastructures in big data and artificial intelligence. We present an overview of the SG with its architectures and functionalities and confirm how technology has configured the modern electricity grid. A qualitative risk assessment method is presented. The most significant contributions to the reliability, safety, and efficiency of the electrical network are described. We expose levels while proposing suitable security countermeasures. Finally, the smart grid’s cybersecurity risk assessment methods for supervisory control and data acquisition are presented

    A Systematic Mapping Study of Cloud Resources Management and Scalability in Brokering, Scheduling, Capacity Planning and Elasticity

    Get PDF
    Cloud computing allows for resource management through various means. Some of these include brokering, scheduling, elasticity and capacity planning and these processes helps in facilitating service utilization. Determining a particular research area especially in terms of resources management and scalability in the cloud is usually a cumbersome process for a researcher, hence the need for reviews and paper surveys in identifying potential research gaps. The objective of this work was to carry out a systematic mapping study of resources management and scalability in the cloud. A systematic mapping study offers a summarized overview of studies that have been carried out in a particular area of interest. It then presents the results of such overviews graphically using a map. Although, the systematic mapping process requires less effort, the results are more coarse-grained. In this study, analysis of publications were done based on their topics, research type and contribution facets. These publications were on research works which focused on resource management, scheduling, capacity planning, scalability and elasticity. This study classified publications into research facets viz., evaluation, validation, solution, philosophical, option and experience and contribution facets based on metrics, tools, processes, models and methods used. Obtained results showed that 31.3% of the considered publications focused on evaluation based research, 19.85% on validation and 32% on processes. About 2.4% focused on metric for capacity planning, 5.6% focused on tools relating to resource management, while 5.6 and 8% of the publications were on model for capacity planning and scheduling method, respectively. Research works focusing on validating capacity planning and elasticity were the least at 2.29 and 0.76%, respectively. This study clearly identified gaps in the field of resources management and scalability in the cloud which should stimulate interest for further studies by both researchers and industry practitioners

    Augmented Air Traffic Control System—Artificial Intelligence as Digital Assistance System to Predict Air Traffic Conflicts

    Get PDF
    Today’s air traffic management (ATM) system evolves around the air traffic controllers and pilots. This human-centered design made air traffic remarkably safe in the past. However, with the increase in flights and the variety of aircraft using European airspace, it is reaching its limits. It poses significant problems such as congestion, deterioration of flight safety, greater costs, more delays, and higher emissions. Transforming the ATM into the “next generation” requires complex human-integrated systems that provide better abstraction of airspace and create situational awareness, as described in the literature for this problem. This paper makes the following contributions: (a) It outlines the complexity of the problem. (b) It introduces a digital assistance system to detect conflicts in air traffic by systematically analyzing aircraft surveillance data to provide air traffic controllers with better situational awareness. For this purpose, long short-term memory (LSTMs) networks, which are a popular version of recurrent neural networks (RNNs) are used to determine whether their temporal dynamic behavior is capable of reliably monitoring air traffic and classifying error patterns. (c) Large-scale, realistic air traffic models with several thousand flights containing air traffic conflicts are used to create a parameterized airspace abstraction to train several variations of LSTM networks. The applied networks are based on a 20–10–1 architecture while using leaky ReLU and sigmoid activation function. For the learning process, the binary cross-entropy loss function and the adaptive moment estimation (ADAM) optimizer are applied with different learning rates and batch sizes over ten epochs. (d) Numerical results and achievements by using LSTM networks to predict various weather events, cyberattacks, emergency situations and human factors are presented

    Assessment of the cutting performance of a robot mower using custom built software.

    Get PDF
    Before the introduction of positioning technologies in agriculture practices such as global navigation satellite systems (GNSS), data collection and management were time-consuming and labor-intensive tasks. Today, due to the introduction of advanced technologies, precise information on the performance of agricultural machines, and smaller autonomous vehicles such as robot mowers, can be collected in a relatively short time. The aim of this work was to track the performance of a robot mower in various turfgrass areas of an equal number of square meters but with four dierent shapes by using real-time kinematic (RTK)-GNSS devices, and to easily extract data by a custom built software capable of calculating the distance travelled by the robot mower, the forward speed, the cutting area, and the number of intersections of the trajectories. These data were then analyzed in order to provide useful functioning information for manufacturers, entrepreneurs, and practitioners. The path planning of the robot mower was random and the turfgrass area for each of the four shapes was 135 m2 without obstacles. The distance travelled by the robot mower, the mean forward speed, and the intersections of the trajectories were aected by the interaction between the time of cutting and the shape of the turfgrass. For all the dierent shapes, the whole turfgrass area was completely cut after two hours of mowing. The cutting eciency decreased by increasing the time, as a consequence of the increase in overlaps. After 75 minutes of cutting, the eciency was about 35% in all the turfgrass areas shapes, thus indicating a high level of overlapping

    Robotic mowing of tall fescue at 90 mm cutting height: random trajectories vs. systematic trajectories

    Get PDF
    Tall fescue (Schedonorus arundinaceus (Schreb.) Dumort.) is often managed with a cutting height ranging from 70 to 100 mm in ornamental lawns. Some autonomous mowers have been specifically designed to maintain mowing height in the same range. Generally, autonomous mowers operate by following random trajectories, and substantial overlapping is needed to obtain full coverage of the working area. In the case of tall grass, this may cause lodging of grass plants, which in turn may reduce turf quality. The introduction of a navigation system based on systematic trajectories has the potential to improve the performances of autonomous mowers with respect to machine efficiency and turf quality. With the aim of determining the effects of reduced mowing frequency and systematic navigation systems on turf quality and mower performances in terms of working time, energy consumption and overlapping, the performances of two autonomous mowers working with random and systematic trajectories were tested on a mature tall fescue lawn at 90 mm cutting height. The working efficiency was approximately 80% for the systematic trajectories and approximately 35% for the random trajectories; this was mainly due to the lower overlapping associated with systematic trajectories. Turf quality was slightly higher for the mower working systematically (a score of 8 using a 1–9 score with 1 = poor, 6 = acceptable and 9 = best) compared to the one working randomly (quality of 7 and 6 on a 1–9 scale with 1 = poor and 9 = best). No appreciable lodging was observed in either case. For tall, managed lawns, systematic trajectories may improve autonomous mowers’ overall performances

    Trampling Analysis of Autonomous Mowers: Implications on Garden Designs

    Get PDF
    Several trials have been carried out by various authors concerning autonomous mowers, which are battery-powered machines. The effects of these machines on turfgrass quality and energy consumption have been thoroughly investigated. However, there are still some aspects that have not been studied. Among these, random trajectory overlapping is one of the most important. To investigate these aspects, two RTK-GPS devices along with the custom-built software used for previous trials has been upgraded in order to precisely calculate how many times the mower drives over the same spot using random trajectories. This parameter, the number of passages in the same position, was hypothesized to explain the autonomous mower's overlapping and trampling action. The trial has been carried out testing a commercial autonomous mower on three areas with different levels of complexity to assess its performances. The following variables were examined: the percentage of mowed area, the distance travelled, the number of intersections, the number of passages, and the autonomous mower's work efficiency. The average percentage of area mown (average value for the three areas) was 54.64% after one hour and 80.15% after two hours of work. Percentage of area mown was 15% higher for the area with no obstacles after two hours of work. The number of passages was slightly different among the three garden designs. The garden with no obstacles obtained the highest number of passages with an average of 37 passages. The highest working efficiency was obtained in the garden with an intermediate number of obstacles with a value of 0.40 after two hours of work. The estimated energy consumption resulted 0.31 Wh m(-2) after one hour and 0.42 Wh m(-2) after two hours of working. These results highlight how the correct settings of cutting time may be crucial to consistently save energy during the long period and may be useful for a complete automation of the maintenance of green areas

    Annual Report, 2013-2014

    Get PDF
    Beginning in 2004/2005- issued in online format onl

    CryptoBap: A Binary Analysis Platform for Cryptographic Protocols

    Full text link
    We introduce CryptoBap, a platform to verify weak secrecy and authentication for the (ARMv8 and RISC-V) machine code of cryptographic protocols. We achieve this by first transpiling the binary of protocols into an intermediate representation and then performing a crypto-aware symbolic execution to automatically extract a model of the protocol that represents all its execution paths. Our symbolic execution resolves indirect jumps and supports bounded loops using the loop-summarization technique, which we fully automate. The extracted model is then translated into models amenable to automated verification via ProVerif and CryptoVerif using a third-party toolchain. We prove the soundness of the proposed approach and used CryptoBap to verify multiple case studies ranging from toy examples to real-world protocols, TinySSH, an implementation of SSH, and WireGuard, a modern VPN protocol

    Key Generation for Internet of Things: A Contemporary Survey

    Get PDF
    Key generation is a promising technique to bootstrap secure communications for the Internet of Things (IoT) devices that have no prior knowledge between each other. In the past few years, a variety of key generation protocols and systems have been proposed. In this survey, we review and categorise recent key generation systems based on a novel taxonomy. Then, we provide both quantitative and qualitative comparisons of existing approaches. We also discuss the security vulnerabilities of key generation schemes and possible countermeasures. Finally, we discuss the current challenges and point out several potential research directions
    corecore