378 research outputs found

    Getting smarter about smart cities: Improving data privacy and data security

    Get PDF
    Abstract included in text

    Prescribing Exploitation

    Get PDF

    CPS Attacks Mitigation Approaches on Power Electronic Systems with Security Challenges for Smart Grid Applications: A Review

    Get PDF
    This paper presents an inclusive review of the cyber-physical (CP) attacks, vulnerabilities, mitigation approaches on the power electronics and the security challenges for the smart grid applications. With the rapid evolution of the physical systems in the power electronics applications for interfacing renewable energy sources that incorporate with cyber frameworks, the cyber threats have a critical impact on the smart grid performance. Due to the existence of electronic devices in the smart grid applications, which are interconnected through communication networks, these networks may be subjected to severe cyber-attacks by hackers. If this occurs, the digital controllers can be physically isolated from the control loop. Therefore, the cyber-physical systems (CPSs) in the power electronic systems employed in the smart grid need special treatment and security. In this paper, an overview of the power electronics systems security on the networked smart grid from the CP perception, as well as then emphases on prominent CP attack patterns with substantial influence on the power electronics components operation along with analogous defense solutions. Furthermore, appraisal of the CPS threats attacks mitigation approaches, and encounters along the smart grid applications are discussed. Finally, the paper concludes with upcoming trends and challenges in CP security in the smart grid applications

    Law in the present future : approaching the legal imaginary of smart cities with science (and) fiction

    Full text link
    This doctoral research concerns smart cities, describing digital solutions and social issues related to their innovative technologies, adopted models, and major projects around the world. The many perspectives mentioned in it were identified by online tools used for the textual analysis of two databases that were built from relevant publications on the main subject by authors coming from media and academia. Expected legal elements emerged from the applied process, such as privacy, security, transparency, participation, accountability, and governance. A general review was produced on the information available about the public policies of Big Data in the two municipal cases of Rio de Janeiro and MontrĂ©al, and their regulation in the Brazilian and Canadian contexts. The combined approaches from science and literature were explored to reflect on the normative concerns represented by the global challenges and local risks brought by urban surveillance, climate change, and other neoliberal conditions. Cyberpunk Science Fiction reveals itself useful for engaging with the shared problems that need to be faced in the present time, all involving democracy. The results achieved reveal that this work was, in fact, about the complex network of practices and senses between (post)modern law and the imaginary of the future.Cette recherche doctorale centrĂ©e sur les villes intelligentes met en Ă©vidence les solutions numĂ©riques et les questionnements sociĂ©taux qui ont trait aux technologies innovantes, ainsi qu’aux principaux modĂšles et projets dĂ©veloppĂ©s autour d’elles Ă  travers le monde. Des perspectives multiples en lien avec ces dĂ©veloppements ont Ă©tĂ© identifiĂ©es Ă  l’aide d’outils en ligne qui ont permis l’analyse textuelle de deux bases de donnĂ©es comprenant des publications scientifiques et des Ă©crits mĂ©diatiques. De ce processus analytique ont Ă©mergĂ© des Ă©lĂ©ments juridiques relatifs aux questions de vie privĂ©e, de sĂ©curitĂ©, de transparence, de participation, d’imputabilitĂ© et de gouvernance. De plus, Ă  partir de ces informations a Ă©tĂ© rĂ©alisĂ©e une revue des politiques publiques relatives aux mĂ©gadonnĂ©es dans les villes de Rio de Janeiro et de MontrĂ©al, ainsi que des rĂ©glementations nationales du Canada et du BrĂ©sil en lien avec ce sujet. Finalement, Ă  travers l’exploration d’écrits scientifiques et fictionnels de la littĂ©rature, les principaux enjeux normatifs soulevĂ©s localement et mondialement par la surveillance urbaine, les changements climatiques et les politiques nĂ©olibĂ©rales ont pu ĂȘtre mis Ă  jour. Le courant cyberpunk de la science-fiction s’est avĂ©rĂ© particuliĂšrement utile pour rĂ©vĂ©ler les principaux problĂšmes politiques, en lien avec la prĂ©servation de la dĂ©mocratie, auxquelles sont confrontĂ©es nos sociĂ©tĂ©s prĂ©sentement. Les rĂ©sultats de la recherche dĂ©montrent finalement la prĂ©sence d’un rĂ©seau de pratiques et de significations entre le droit (post)moderne et les reprĂ©sentations imaginaires du futur

    The Cloud-to-Thing Continuum

    Get PDF
    The Internet of Things offers massive societal and economic opportunities while at the same time significant challenges, not least the delivery and management of the technical infrastructure underpinning it, the deluge of data generated from it, ensuring privacy and security, and capturing value from it. This Open Access Pivot explores these challenges, presenting the state of the art and future directions for research but also frameworks for making sense of this complex area. This book provides a variety of perspectives on how technology innovations such as fog, edge and dew computing, 5G networks, and distributed intelligence are making us rethink conventional cloud computing to support the Internet of Things. Much of this book focuses on technical aspects of the Internet of Things, however, clear methodologies for mapping the business value of the Internet of Things are still missing. We provide a value mapping framework for the Internet of Things to address this gap. While there is much hype about the Internet of Things, we have yet to reach the tipping point. As such, this book provides a timely entrée for higher education educators, researchers and students, industry and policy makers on the technologies that promise to reshape how society interacts and operates

    Security of smart manufacturing systems

    Get PDF
    A revolution in manufacturing systems is underway: substantial recent investment has been directed towards the development of smart manufacturing systems that are able to respond in real time to changes in customer demands, as well as the conditions in the supply chain and in the factory itself. Smart manufacturing is a key component of the broader thrust towards Industry 4.0, and relies on the creation of a bridge between digital and physical environments through Internet of Things (IoT) technologies, coupled with enhancements to those digital environments through greater use of cloud systems, data analytics and machine learning. Whilst these individual technologies have been in development for some time, their integration with industrial systems leads to new challenges as well as potential benefits. In this paper, we explore the challenges faced by those wishing to secure smart manufacturing systems. Lessons from history suggest that where an attempt has been made to retrofit security on systems for which the primary driver was the development of functionality, there are inevitable and costly breaches. Indeed, today's manufacturing systems have started to experience this over the past few years; however, the integration of complex smart manufacturing technologies massively increases the scope for attack from adversaries aiming at industrial espionage and sabotage. The potential outcome of these attacks ranges from economic damage and lost production, through injury and loss of life, to catastrophic nation-wide effects. In this paper, we discuss the security of existing industrial and manufacturing systems, existing vulnerabilities, potential future cyber-attacks, the weaknesses of existing measures, the levels of awareness and preparedness for future security challenges, and why security must play a key role underpinning the development of future smart manufacturing systems

    Human-data interaction

    Get PDF
    We have moved from a world where computing is siloed and specialised, to a world where computing is ubiquitous and everyday. In many, if not most, parts of the world, networked computing is now mundane as both foreground (e.g., smartphones, tablets) and background (e.g., road tra c management, financial systems) technologies. This has permitted, and continues to permit, new gloss on existing interactions (e.g., online banking) as well as distinctively new interactions (e.g., massively scalable distributed real-time mobile gaming). An e ect of this increasing pervasiveness of networked computation in our environments and our lives is that data are also now ubiquitous: in many places, much of society is rapidly becoming “data driven”

    Cross Domain IW Threats to SOF Maritime Missions: Implications for U.S. SOF

    Get PDF
    As cyber vulnerabilities proliferate with the expansion of connected devices, wherein security is often forsaken for ease of use, Special Operations Forces (SOF) cannot escape the obvious, massive risk that they are assuming by incorporating emerging technologies into their toolkits. This is especially true in the maritime sector where SOF operates nearshore in littoral zones. As SOF—in support to the U.S. Navy— increasingly operate in these contested maritime environments, they will gradually encounter more hostile actors looking to exploit digital vulnerabilities. As such, this monograph comes at a perfect time as the world becomes more interconnected but also more vulnerable

    Emerging Risk Management in Industry 4.0: An Approach to Improve Organizational and Human Performance in the Complex Systems

    Get PDF
    Industry 4.0 in the contemporary operating context carries important sources of complexity. This context generates both traditional risks and emerging risks that must be managed. The management of these risks includes both industrial risks and occupational risks, since they are heavily interlinked. The human factor can be considered the main link between both types of risks. Thus, understanding risks originating from human errors and organizational weaknesses as causes of accidents and other disruptions in complex systems requires elaborating sophisticated modeling approaches. Therefore, the objective of this paper is to propose an organizational and human performance approach to improve the emerging risk management linked to the complex systems, like as Human-Machine Interactions (HMI) and Human-Robot Interaction (HRI). To fulfill this objective, we first introduce the concept of emerging risk linked to human factor. Then, we introduce the concept of emerging risk management in the Industry 4.0 context. Under this complex context, we expose the concept considering the current models of risk management. Finally, we discuss how enhancing human and organizational performance can be achieved through risk management in complex systems linked to Industry 4.0. Therefore, we conclude that while Industry 4.0 brings numerous advantages, it must contend with emerging risks and challenges associated with organizational and human factors. These emerging risks include industrial risks as well as occupational risks. Moreover, the human factor aspect of Industry 4.0 is directly linked to industrial emerging and occupational emerging via context of operations. To cope with these new challenges, it is necessary to develop new approaches. One of such approaches is Complex System Governance. This approach is discussed along with the need for adequate organizational and human performance models dealing with, for example, experience from other domains such as nuclear, space, aviation, and petrochemical.This work was funded by the Spanish Ministry of Economy and Competitiveness, with the title “Analysis and Assessment of technological requirements for the design of a New and Emerging Risks standardized management SYStem (A2NERSYS)” with reference DPI2016-79824-R
    • 

    corecore