51,496 research outputs found

    Federated Embedded Systems – a review of the literature in related fields

    Get PDF
    This report is concerned with the vision of smart interconnected objects, a vision that has attracted much attention lately. In this paper, embedded, interconnected, open, and heterogeneous control systems are in focus, formally referred to as Federated Embedded Systems. To place FES into a context, a review of some related research directions is presented. This review includes such concepts as systems of systems, cyber-physical systems, ubiquitous computing, internet of things, and multi-agent systems. Interestingly, the reviewed fields seem to overlap with each other in an increasing number of ways

    Cyber-physical framework for emulating distributed control systems in smart grids

    Get PDF
    This paper proposes a cyber-physical framework for investigating distributed control systems operating in the context of smart-grid applications. At the moment, the literature focuses almost exclusively on the theoretical aspects of distributed intelligence in the smart-grid, meanwhile, approaches for testing and validating such systems are either missing or are very limited in their scope. Three aspects need to be taken into account while considering these applications: (1) the physical system, (2) the distributed computation platform, and (3) the communication system. In most of the previous works either the communication system is neglected or oversimplified, either the distributed computation aspect is disregarded, either both elements are missing. In order to cover all these aspects, we propose a framework which is built around a fleet of low-cost single board computers coupled with a real-time simulator. Additionally, using traffic control and network emulation, the flow of data between different controllers is shaped so that it replicates various quality of service (QoS) conditions. The versatility of the proposed framework is shown on a study case in which 27 controllers self-coordinate in order to solve the distributed optimal power flow (OPF) algorithm in a dc network

    Quality in the balance? Competing in the age of black swans and grey rhinos

    Get PDF
    Paper accepted for 26th APQO INTERNATIONAL CONFERENCE 2021The 21st century has produced both opportunity and crisis. The era of ‘industry 4.0’ has brought global connectivity, cyber-physical systems, Artificial Intelligence and other innovations to production and service delivery systems. We operate now in a context of globalised markets, supply networks, logistics and data where increasingly sophisticated customers demand ever more competitive quality, delivery and price. Consumer wants and needs can be determined at an almost individualised level. Over the same period, events and megatrends including: shifts in corporate and geopolitical power balance; financial system volatility; supply chain fraud and adulteration; cyber-crime, terrorism and piracy; natural disasters; and the devastation brought to many businesses by the COVID pandemic have sharply highlighted the vulnerabilities, threats and risks to those same supply networks. Additionally, narrowing margins, shrinking market share, and cash-strapped governments have created renewed cost pressures. It is not surprising, then, that quality professionals and academics are busily seeking to understand the role that quality management should play in this brave new world where the rules of engagement seem to change every year. In this talk I aim to provide one viewpoint on the answer to this question through firstly deconstructing quality management to its core elements, and then exploring how those elements relate to the current context. I will discuss the relevance and roles of various quality tools and methodologies within this turbulent environment.fals

    Always in control? Sovereign states in cyberspace

    Get PDF
    For well over twenty years, we have witnessed an intriguing debate about the nature of cyberspace. Used for everything from communication to commerce, it has transformed the way individuals and societies live. But how has it impacted the sovereignty of states? An initial wave of scholars argued that it had dramatically diminished centralised control by states, helped by a tidal wave of globalisation and freedom. These libertarian claims were considerable. More recently, a new wave of writing has argued that states have begun to recover control in cyberspace, focusing on either the police work of authoritarian regimes or the revelations of Edward Snowden. Both claims were wide of the mark. By contrast, this article argues that we have often misunderstood the materiality of cyberspace and its consequences for control. It not only challenges the libertarian narrative of freedom, it suggests that the anarchic imaginary of the Internet as a ‘Wild West’ was deliberately promoted by states in order to distract from the reality. The Internet, like previous forms of electronic connectivity, consists mostly of a physical infrastructure located in specific geographies and jurisdictions. Rather than circumscribing sovereignty, it has offered centralised authority new ways of conducting statecraft. Indeed, the Internet, high-speed computing, and voice recognition were all the result of security research by a single information hegemon and therefore it has always been in control

    "Virtual disenfranchisement": cyber election meddling in the grey zones of international law

    Get PDF
    This Article examines remotely conducted election meddling by cyber means in the context of international law and asks whether such cyber operations qualify as "internationally wrongful acts." An internationally wrongful act requires both a breach of a legal obligation owed by one State to another under international law and attribution of the act to the former. The Article considers three possible breaches related to such meddling-violation of the requirement to respect sovereignty, intervention into the internal affairs of another State, and, when the cyber operations are not attributable to the State from which they were launched, breach of the due diligence obligation that requires States to ensure cyber operations with serious adverse consequences are not mounted from their territory. The Article then examines the various modalities for attributing a cyber operation to a State under international law. Whether cyber meddling in another State's election is unlawful, as well as the severity thereof, determines the range of responses available to the victim State. The Article concludes that the law applicable to remotely conducted meddling in another State's election is unsettled, thereby comprising a normative grey zone ripe for exploitation by States and non-State actors

    Peeling Back the Onion of Cyber Espionage after Tallinn 2.0

    Get PDF
    Tallinn 2.0 represents an important advancement in the understanding of international law’s application to cyber operations below the threshold of force. Its provisions on cyber espionage will be instrumental to states in grappling with complex legal problems in the area of digital spying. The law of cyber espionage as outlined by Tallinn 2.0, however, is substantially based on rules that have evolved outside of the digital context, and there exist serious ambiguities and limitations in its framework. This Article will explore gaps in the legal structure and consider future options available to states in light of this underlying mismatch
    • …
    corecore