3,894 research outputs found

    Security framework for industrial collaborative robotic cyber-physical systems

    Get PDF
    The paper introduces a security framework for the application of human-robot collaboration in a futuristic industrial cyber-physical system (CPS) context of industry 4.0. The basic elements and functional requirements of a secure collaborative robotic cyber-physical system are explained and then the cyber-attack modes are discussed in the context of collaborative CPS whereas a defense mechanism strategy is proposed for such a complex system. The cyber-attacks are categorized according to the extent on controllability and the possible effects on the performance and efficiency of such CPS. The paper also describes the severity and categorization of such cyber-attacks and the causal effect on the human worker safety during human-robot collaboration. Attacks in three dimensions of availability, authentication and confidentiality are proposed as the basis of a consolidated mitigation plan. We propose a security framework based on a two-pronged strategy where the impact of this methodology is demonstrated on a teleoperation benchmark (NeCS-Car). The mitigation strategy includes enhanced data security at important interconnected adaptor nodes and development of an intelligent module that employs a concept similar to system health monitoring and reconfiguration

    Resilient networking in wireless sensor networks

    Get PDF
    This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focus at the network layer in particular, and an analysis of the behavior of four particular routing protocols is provided to determine their inherent resiliency to insider attacks. The protocols considered are: Dynamic Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing (RWR)

    Mobile Firewall System For Distributed Denial Of Service Defense In Internet Of Things Networks

    Get PDF
    Internet of Things (IoT) has seen unprecedented growth in the consumer space over the past ten years. The majority of IoT device manufacturers do not, however, build their products with cybersecurity in mind. The goal of the mobile firewall system is to move mitigation of network-diffused attacks closer to their source. Attack detection and mitigation is enforced using a machine that physically traverses the area. This machine uses a suite of security tools to protect the network. Our system provides advantages over current network attack mitigation techniques. Mobile firewalls can be deployed when there is no access to the network gateway or when no gateway exists, such as in IoT mesh networks. The focus of this thesis is to refine an explicit implementation for the mobile firewall system and evaluate its effectiveness. Evaluation of the mobile firewall system is analyzed using three simulated distributed denial of service case studies. Mobility is shown to be a great benefit when defending against physically distant attackers – the system takes no more than 131 seconds to fully nullify a worst-case attack

    Magnetic and Newtonian noises in Advanced Virgo: evaluation and mitigation strategies

    Get PDF
    In the present study, I table the first detailed estimation of the magnetic noise contribution to the Advanced Virgo sensitivity to gravitational waves. I tackle the topic by performing experimental assessments and numerical finite element simulations, all accompanied by careful data analysis. Results suggest that the magnetic noise impact for Advanced Virgo is not dramatic, but it will eventually be a considerable issue once the detector will approach its final design. In anticipation of that, I propose a mitigation strategy based on passive magnetic field shielding. In the second part, I deal with seismic newtonian noise, focusing on two crucial aspects involving the noise cancellation pipeline. These are the choice of the subtraction filter and the optimization of the seismic sensor array placement. The former issue required the definition of a machine learning algorithm based on deep neural networks, and its fine tuning. Results give some indication of good performances compared to the standard Wiener filter approach. The problem of the sensors deployment is instead addressed with the finite element analysis of the actual Virgo infrastructure and underground soil layers surrounding the test masses

    Symmetry in Structural Health Monitoring

    Get PDF
    In this Special Issue on symmetry, we mainly discuss the application of symmetry in various structural health monitoring. For example, considering the health monitoring of a known structure, by obtaining the static or dynamic response of the structure, using different signal processing methods, including some advanced filtering methods, to remove the influence of environmental noise, and extract structural feature parameters to determine the safety of the structure. These damage diagnosis methods can also be effectively applied to various types of infrastructure and mechanical equipment. For this reason, the vibration control of various structures and the knowledge of random structure dynamics should be considered, which will promote the rapid development of the structural health monitoring. Among them, signal extraction and evaluation methods are also worthy of study. The improvement of signal acquisition instruments and acquisition methods improves the accuracy of data. A good evaluation method will help to correctly understand the performance with different types of infrastructure and mechanical equipment

    A Virtual Acoustic Black Hole on a Cantilever Beam

    Full text link
    An acoustic black hole (ABH) consists of a tapered structure whose thickness follows a power-law profile. When attached to a host structure, an ABH localizes and traps the vibrational energy, which can then be dissipated through, e.g., a damping layer. However, effective vibration mitigation is known to occur only above a cut-on frequency which is inversely proportional to the length of the tapered structure. In this context, the main thrust of this paper is to replace a mechanical ABH by a digital controller so as to create a so-called virtual acoustic black hole (VABH), thus, freeing the ABH from possible mechanical constraints (e.g., compactness, manufacturing and fatigue issues). The proposed VABH is first detailed theoretically. The salient features and performance of the VABH are then demonstrated both numerically and experimentally using a cantilever beam as a host structure. Eventually, it is shown that the VABH significantly enlarges the applicability of the concept of an ABH

    Failure Analysis in Next-Generation Critical Cellular Communication Infrastructures

    Full text link
    The advent of communication technologies marks a transformative phase in critical infrastructure construction, where the meticulous analysis of failures becomes paramount in achieving the fundamental objectives of continuity, security, and availability. This survey enriches the discourse on failures, failure analysis, and countermeasures in the context of the next-generation critical communication infrastructures. Through an exhaustive examination of existing literature, we discern and categorize prominent research orientations with focuses on, namely resource depletion, security vulnerabilities, and system availability concerns. We also analyze constructive countermeasures tailored to address identified failure scenarios and their prevention. Furthermore, the survey emphasizes the imperative for standardization in addressing failures related to Artificial Intelligence (AI) within the ambit of the sixth-generation (6G) networks, accounting for the forward-looking perspective for the envisioned intelligence of 6G network architecture. By identifying new challenges and delineating future research directions, this survey can help guide stakeholders toward unexplored territories, fostering innovation and resilience in critical communication infrastructure development and failure prevention
    • …
    corecore