6,926 research outputs found

    A Cyber-Physical System for integrated remote control andprotection of smart grid critical infrastructures

    Get PDF
    This work proposes a Cyber-Physical System (CPS) for protecting Smart Electric Grid Critical Infrastructures (CI) using video surveillance while remotely monitoring them. Due to the critical nature of Smart Grid, it is necessary to guarantee an adequate level of safety, security and reliability. Thus, this CPS is back-boned by a Time-Sensitive Network solution (TSN) providing concurrent support for smart-video surveillance and Smart Grid control over a single communication infrastructure. To this end, TSN delivers high-bandwidth communication for video surveil-lance and deterministic Quality of Service (QoS), latency and bandwidth guarantees, required by the time-critical Smart Grid control. On the one hand, the CPS utilizes High-availability Seamless Redundancy (HSR) in the control subsystem via Remote Terminal Units (RTU) guaranteeing seamless failover against failures in Smart Grid. On the other hand, the smart video surveillance subsystem applies machine learning to monitor secured perimeters and detect people around the Smart Grid CI. Moreover, it is also able to directly interoperate with RTUs via MODBUS protocol to send alarms in case of e.g. intrusion. The work evaluates the accuracy and performance of the detection using common metrics in surveillance field. An integrated monitoring dashboard has also been developed in which all CPS information is available in real timeThis work was partially supported by the EU Project FitOptiVis [3] through the ECSEL Joint Undertaking under GA n. 783162, a Spanish National grant funded by MINECO through APCIN PCI2018-093184, and partially by the Research Network RED2018-102511-

    A Taxonomy for Management and Optimization of Multiple Resources in Edge Computing

    Full text link
    Edge computing is promoted to meet increasing performance needs of data-driven services using computational and storage resources close to the end devices, at the edge of the current network. To achieve higher performance in this new paradigm one has to consider how to combine the efficiency of resource usage at all three layers of architecture: end devices, edge devices, and the cloud. While cloud capacity is elastically extendable, end devices and edge devices are to various degrees resource-constrained. Hence, an efficient resource management is essential to make edge computing a reality. In this work, we first present terminology and architectures to characterize current works within the field of edge computing. Then, we review a wide range of recent articles and categorize relevant aspects in terms of 4 perspectives: resource type, resource management objective, resource location, and resource use. This taxonomy and the ensuing analysis is used to identify some gaps in the existing research. Among several research gaps, we found that research is less prevalent on data, storage, and energy as a resource, and less extensive towards the estimation, discovery and sharing objectives. As for resource types, the most well-studied resources are computation and communication resources. Our analysis shows that resource management at the edge requires a deeper understanding of how methods applied at different levels and geared towards different resource types interact. Specifically, the impact of mobility and collaboration schemes requiring incentives are expected to be different in edge architectures compared to the classic cloud solutions. Finally, we find that fewer works are dedicated to the study of non-functional properties or to quantifying the footprint of resource management techniques, including edge-specific means of migrating data and services.Comment: Accepted in the Special Issue Mobile Edge Computing of the Wireless Communications and Mobile Computing journa

    Supporting Cyber-Physical Systems with Wireless Sensor Networks: An Outlook of Software and Services

    Get PDF
    Sensing, communication, computation and control technologies are the essential building blocks of a cyber-physical system (CPS). Wireless sensor networks (WSNs) are a way to support CPS as they provide fine-grained spatial-temporal sensing, communication and computation at a low premium of cost and power. In this article, we explore the fundamental concepts guiding the design and implementation of WSNs. We report the latest developments in WSN software and services for meeting existing requirements and newer demands; particularly in the areas of: operating system, simulator and emulator, programming abstraction, virtualization, IP-based communication and security, time and location, and network monitoring and management. We also reflect on the ongoing efforts in providing dependable assurances for WSN-driven CPS. Finally, we report on its applicability with a case-study on smart buildings

    Securing Natural Gas: Entity-Attentive Security Research

    Get PDF
    Natural gas is a troublesome and ‘wayward’ material (Bridge, 2004; 396). Amongst other qualities, it is invisible, intangible, naturally odorless, highly inflammable, and constantly resistant to the forces that contain it. This thesis provides an account of how these qualities both introduce a series of insecurities to everyday social environments, and also make it a challenging material to govern. Specifically, I examine the way that security is performed around gas circulations in the UK’s transmission and distribution pipelines, and I describe how a range of specialized security practices have been developed according to the particular challenges that gas’s materiality presents. In developing this account, I make two claims. First, I argue that performances of security cannot be adequately understood without attending to the specific qualities of the circulating elements around which it is practiced. Here I build upon Dillon’s (1996) observation that security has tended to be treated as a noun that is independent of the elements that it is practiced in relation to. As a consequence, it has typically been framed as a broadly transferrable set of practices that can be more-or-less unproblematically applied to very different elements. I suggest that this abstraction has resulted in the further reduction of security into two broad practices: acts of circulatory filtration (in which risky elements are separated from flows of safe bodies, materials and things), and acts of circulatory maintenance (whereby security is performed by ensuring the continuity of particular circulations). It is my contention in this thesis that security scholars need to pay better attention to the ways in which the specific material qualities of circulating elements are generative of particular forms of securing practice. Indeed, by examining the way that security is performed around gas, I describe a series of practices that far exceed those described in accounts that present security as a matter of circulatory filtration or maintenance. My second claim is that the spaces and scales at which security is analyzed need to be expanded. I demonstrate how the critical security studies and energy security literatures have both tended to focus on security’s practice within particular nodes, at the exclusion of the performances of security (and forms of insecurity) that develop across the journeys of circulating elements; as they move between nodes. Indeed, I suggest that circulation has often been reduced in these accounts to thin, straight, and featureless lines that are largely inconsequential for performances of security. I seek to trouble this reduction, following gas as it travels through the UK gas transport infrastructures, tracing the various forms of (in)security that develop across these journeys. As a consequence of these two claims, security takes quite a different form in this account to its various depictions in the existing security literatures. I describe it as consisting of a series of ontological projects that are enacted across the lengths and breadths of gas’s circulations, and through which the material reality of natural gas is constantly (re)organised in attempts to facilitate, ‘compensate for’, and ‘cancel out’ particular kinds of perceived potential phenomena (Foucault, 2007; 36). Significantly, these performances are shown to be structured, or ‘programmed’ (Latour, 1991), through the coming together of multiple interests that pertain to a variety of heterogeneous actors and manifold referent objects. Different interests are shown to come together across gas’s journeys, and to undergo ongoing processes of negotiation that result in a variety of security performances, through which different imperatives are pursued. As such, I suggest that gas becomes ‘modulated’ (Deleuze, 1992) – it is constantly transformed from moment to moment, across the full duration of its circulatory journeys

    Reconfiguring the city in the global South: rationalities, techniques and subjectivities in the local governance of energy

    Get PDF
    Debates around climate change and resource security are reshaping the way cities conceive and develop their infrastructures. Electricity systems play a key role in this transformation, as cities across the world set out to implement local energy strategies via decentralised and low carbon energy systems. Such transformation is of particular relevance for cities in the global South, where rapid economic growth and an increase in energy consumption coexist with acute social needs and unmet infrastructure provision. Through a comparative study of two cities (Thane, in the Mumbai Metropolitan Region, India, and São Paulo, in Brazil) this thesis evaluates the way in which public and private stakeholders are implementing a new form of local energy generation through the use of domestic solar hot water (SHW) systems as a mechanism for reducing electricity consumption. By focusing on the governing mechanisms involved in scaling-up solar technologies and the ways by which these are mobilised to serve contrasting interests in the city, the thesis examines the emerging local governance of energy in the global South. The thesis uses Foucault’s analytics of governmentality as a conceptual tool aimed at unpacking the different ways by which energy in the city, in its material and socio-political formations, is thought of, mobilised, and transformed. Through a combination of interviews, site visits, and ethnographic techniques, it examines how this transformation in urban infrastructures is changing the manner in which energy is governed, the spatial and socio-political implications of this transformation, and the way in which the material dimensions of SHW systems influence the transformation process. The thesis discusses the governmental rationales involved in the making of a local governance of energy, the key governmental techniques involved in operationalizing a solar energy regime, and the multiple ways in which energy subjects are imagined within this process

    Electricity Infrastructure in Asian Region and Energy Security Problems

    Get PDF

    Cognitive Radio for Smart Grid with Security Considerations

    Get PDF
    In this paper, we investigate how Cognitive Radio as a means of communication can be utilized to serve a smart grid deployment end to end, from a home area network to power generation. We show how Cognitive Radio can be mapped to integrate the possible different communication networks within a smart grid large scale deployment. In addition, various applications in smart grid are defined and discussed showing how Cognitive Radio can be used to fulfill their communication requirements. Moreover, information security issues pertained to the use of Cognitive Radio in a smart grid environment at different levels and layers are discussed and mitigation techniques are suggested. Finally, the well-known Role-Based Access Control (RBAC) is integrated with the Cognitive Radio part of a smart grid communication network to protect against unauthorized access to customer’s data and to the network at large

    Beirut. The metropolis of darkness and the politics of urban electricity grid

    Get PDF
    International audienceDespite massive investments in infrastructure reconstruction, Beirut has never fully recovered 24/7 provision of electricity after the civil war (1975-90). Since 2006, the consequences of Israeli bombings and of infrastructure decaying in a context of political bickering preventing new investments plans have worsened the situation. On average, electricity is currently supplied only half of the day. Building on Timothy Mitchell's project to follow the tracks of energy in order to unravel the precarious agencies of power that allow its flows to circulate, I try to map the disruptions and reconfigurations of energy circuits and to show that it both reflect existing configurations of power in the city and create new ones. (Mitchell 2011) At a first glance, uneven access to electricity might well be understood as the way to reproduce social and political domination between central Beirut and its suburbs and between the wealthiest and the middle and lower class, for which the cost of making without public network is very heavy. But seen from Mitchell's perspective, the economic arrangements and the technological devices needed to run the system and for the electricity being generated and processed contain in themselves their fragilities that allow such domination to be constantly challenged by the clients-users-citizens or newcomers like informal vendors of alternative electricity devices (the famous generators). Thus, one might well read the rising protests against the current state of blackness in Beirut as new agencies of power that seek to undermine and derail the symbolical hierarchies of power (here I will analyse cartoons and the Minister of Energy bashing on the social networks), despite the constant struggle by the political class to reenact them through sectarian cleavages. Hooking and meter-pirating, as well as non-payment, display the power of the network's end-users. The development of private illegal-but-tolerated generators involves the building of new local configuration of power

    Guest Editorial Special Issue on: Big Data Analytics in Intelligent Systems

    Get PDF
    The amount of information that is being created, every day, is quickly growing. As such, it is now more common than ever to deal with extremely large datasets. As systems develop and become more intelligent and adaptive, analysing their behaviour is a challenge. The heterogeneity, volume and speed of data generation are increasing rapidly. This is further exacerbated by the use of wireless networks, sensors, smartphones and the Internet. Such systems are capable of generating a phenomenal amount of information and the need to analyse their behaviour, to detect security anomalies or predict future demands for example, is becoming harder. Furthermore, securing such systems is a challenge. As threats evolve, so should security measures develop and adopt increasingly intelligent security techniques. Adaptive systems must be employed and existing methods built upon to provide well-structured defence in depth. Despite the clear need to develop effective protection methods, the task is a difficult one, as there are significant weaknesses in the existing security currently in place. Consequently, this special issue of the Journal of Computer Sciences and Applications discusses big data analytics in intelligent systems. The specific topics of discussion include the Internet of Things, Web Services, Cloud Computing, Security and Interconnected Systems

    Design and optimization of optical grids and clouds

    Get PDF
    • 

    corecore