412 research outputs found

    Active Fault-Tolerance in Wireless Networked Control Systems

    Get PDF
    In a Wireless Networked Control System (WNCS), several nodes or components of the system may communicate over the common network that connects them together. Thus, there may be communication taking place between the sensors and the controller nodes, among the controllers themselves, among the sensors themselves, among the actuator themselves, and between the controller and the actuator nodes. The purpose of this communication is to improve the performance of the control system. The performance may be a measurable quantity defined in terms of a performance criterion, as in the case of optimal control or estimation, or it may be a qualitative measure described as a desired behaviour. Each node of the WNCS may act as a decision maker, making control as well as communication decisions. The presence of a network brings in constraints in the design of the control system, as information between the various decision makers must be exchanged according to the rules and dynamics of the network. Our goal is to quantify some of these constraints, and design the control system together with the communication system so as both do their best given the constraints. This work in no way attempts to suggest the best way to design a communication network that suits the needs of a particular control system, but some of the results obtained here may be used in conjunction with other results in forming an understanding as to how to proceed in the design of such systems in the future. The work proposes a novel real-time communication protocol based on the Time Division Multiple Access (TDMA) strategy, which has built-in tolerance against the network-induced effects like lost packets, assuring a highly deterministic and reliable behaviour of the overall networked control system, thus allowing the use of classical control design methods with WNCS. Determinism in the transmission times, for sending and for receiving, is assured by a communication schedule that is dynamically updated based on the conditions of the network and the propagation environment. An advanced experimentation platform has been developed, called WiNC, which demonstrates the efficiency of the protocol with two well-known laboratory benchmarks that have very different dynamics, namely the three-tank system and the inverted pendulum system. Wireless nodes belonging to both systems are coordinated and synchronized by a master node, namely the controller node. The WiNC platform uses only open source software and general-purpose (commercial, off-the shelf) hardware, thus making it with a minimal investment (low cost) a flexible and easily extendable research platform for WNCS. And considering the general trend towards the adoption of Linux as a real-time operating system for embedded system in automation, the developed concepts and algorithms can be ported with minimum effort to the industrial embedded devices which already run Linux

    Holistic Control for Cyber-Physical Systems

    Get PDF
    The Industrial Internet of Things (IIoT) are transforming industries through emerging technologies such as wireless networks, edge computing, and machine learning. However, IIoT technologies are not ready for control systems for industrial automation that demands control performance of physical processes, resiliency to both cyber and physical disturbances, and energy efficiency. To meet the challenges of IIoT-driven control, we propose holistic control as a cyber-physical system (CPS) approach to next-generation industrial automation systems. In contrast to traditional industrial automation systems where computing, communication, and control are managed in isolation, holistic control orchestrates the management of cyber platforms (networks and computing platforms) and physical plant control at run-time in an integrated architecture. Specifically, this dissertation research comprises the following primary components. Holistic wireless control: The core of holistic wireless control is a holistic controller comprising a plant controller and a network controller cooperating with each other. At run-time the holistic controller generates (1) control commands to the physical plant and (2) network reconfiguration commands to wireless networks based on both physical and network states. This part of dissertation research focused on the design and evaluation of holistic controllers exploiting a range of network reconfiguration strategies: (1) adapting transmission redundancy, (2) adapting sampling rates, (3) self-triggered control, and (4) dynamic transmission scheduling. Furthermore, we develop novel network reconfiguration protocols (NRP) as actuators to control network configurations in holistic control. Holistic edge control: This part of dissertation research explores edge computing as a multitier computing platform for holistic control. The proposed switching multi-tier control (SMC) dynamically switches controllers located on different computation platforms, thereby exploiting the trade-off between computation and communication in a multi-tier computing platform. We also design the stability switch between local and edge controllers under information loss from another perspective, based on co-design of edge and local controllers that are designed via a joint Lyapunov function. Real-time wireless cyber-physical simulators: To evaluate holistic control, we extend the Wireless Cyber-Physical Simulator (WCPS) to integrate simulated physical plants (in Simulink) with real wireless networks (WCPS-RT) and edge computing platforms (WCPS-EC). The real-time WCPS provides a holistic environment for CPS simulations that incorporate wireless dynamics that are challenging to simulate accurately, explore the impacts and trade-off of computation and communication of multi-tier platforms, and leverage simulation support for controllers and plants

    A control theoretic approach for security of cyber-physical systems

    Get PDF
    In this dissertation, several novel defense methodologies for cyber-physical systems have been proposed. First, a special type of cyber-physical system, the RFID system, is considered for which a lightweight mutual authentication and ownership management protocol is proposed in order to protect the data confidentiality and integrity. Then considering the fact that the protection of the data confidentiality and integrity is insufficient to guarantee the security in cyber-physical systems, we turn to the development of a general framework for developing security schemes for cyber-physical systems wherein the cyber system states affect the physical system and vice versa. After that, we apply this general framework by selecting the traffic flow as the cyber system state and a novel attack detection scheme that is capable of capturing the abnormality in the traffic flow in those communication links due to a class of attacks has been proposed. On the other hand, an attack detection scheme that is capable of detecting both sensor and actuator attacks is proposed for the physical system in the presence of network induced delays and packet losses. Next, an attack detection scheme is proposed when the network parameters are unknown by using an optimal Q-learning approach. Finally, this attack detection and accommodation scheme has been further extended to the case where the network is modeled as a nonlinear system with unknown system dynamics --Abstract, page iv

    Emerging Communications for Wireless Sensor Networks

    Get PDF
    Wireless sensor networks are deployed in a rapidly increasing number of arenas, with uses ranging from healthcare monitoring to industrial and environmental safety, as well as new ubiquitous computing devices that are becoming ever more pervasive in our interconnected society. This book presents a range of exciting developments in software communication technologies including some novel applications, such as in high altitude systems, ground heat exchangers and body sensor networks. Authors from leading institutions on four continents present their latest findings in the spirit of exchanging information and stimulating discussion in the WSN community worldwide

    Real-Time Sensor Networks and Systems for the Industrial IoT

    Get PDF
    The Industrial Internet of Things (Industrial IoT—IIoT) has emerged as the core construct behind the various cyber-physical systems constituting a principal dimension of the fourth Industrial Revolution. While initially born as the concept behind specific industrial applications of generic IoT technologies, for the optimization of operational efficiency in automation and control, it quickly enabled the achievement of the total convergence of Operational (OT) and Information Technologies (IT). The IIoT has now surpassed the traditional borders of automation and control functions in the process and manufacturing industry, shifting towards a wider domain of functions and industries, embraced under the dominant global initiatives and architectural frameworks of Industry 4.0 (or Industrie 4.0) in Germany, Industrial Internet in the US, Society 5.0 in Japan, and Made-in-China 2025 in China. As real-time embedded systems are quickly achieving ubiquity in everyday life and in industrial environments, and many processes already depend on real-time cyber-physical systems and embedded sensors, the integration of IoT with cognitive computing and real-time data exchange is essential for real-time analytics and realization of digital twins in smart environments and services under the various frameworks’ provisions. In this context, real-time sensor networks and systems for the Industrial IoT encompass multiple technologies and raise significant design, optimization, integration and exploitation challenges. The ten articles in this Special Issue describe advances in real-time sensor networks and systems that are significant enablers of the Industrial IoT paradigm. In the relevant landscape, the domain of wireless networking technologies is centrally positioned, as expected

    The Internet of Everything

    Get PDF
    In the era before IoT, the world wide web, internet, web 2.0 and social media made people’s lives comfortable by providing web services and enabling access personal data irrespective of their location. Further, to save time and improve efficiency, there is a need for machine to machine communication, automation, smart computing and ubiquitous access to personal devices. This need gave birth to the phenomenon of Internet of Things (IoT) and further to the concept of Internet of Everything (IoE)

    Networking and application interface technology for wireless sensor network surveillance and monitoring

    Get PDF
    Distributed unattended ground sensor (UGS) networks are commonly deployed to support wide area battlefield surveillance and monitoring missions. The information they generate has proven to be valuable in providing a necessary tactical information advantage for command and control, intelligence and reconnaissance field planning. Until recently, however, there has been greater emphasis within the defence research community for UGS networks to fulfil their mission objectives successfully, with minimal user interaction. For a distributed UGS scenario, this implies a network centric capability, where deployed UGS networks can self-manage their behaviour in response to dynamic environmental changes. In this thesis, we consider both the application interface and networking technologies required to achieve a network centric capability, within a distributed UGS surveillance setting. Three main areas of work are addressed towards achieving this. The first area of work focuses on a capability to support autonomous UGS network management for distributed surveillance operations. The network management aspect is framed in terms of how distributed sensors can collaborate to achieve their common mission objectives and at the same time, conserve their limited network resources. A situation awareness methodology is used, in order to enable sensors which have similar understanding towards a common objective to be utilised, for collaboration and to allow sensor resources to be managed as a direct relationship according to, the dynamics of a monitored threat. The second area of work focuses on the use of geographic routing to support distributed surveillance operations. Here we envisage the joint operation of unmanned air vehicles and UGS networks, working together to verify airborne threat observations. Aerial observations made in this way are typically restricted to a specific identified geographic area. Information queries sent to inquire about these observations can also be routed and restricted to using this geographic information. In this section, we present our bio-inspired geographic routing strategy, with an integrated topology control function to facilitate this. The third area of work focuses on channel aware packet forwarding. Distributed UGS networks typically operate in wireless environments, which can be unreliable for packet forwarding purposes. In this section, we develop a capability for UGS nodes to decide which packet forwarding links are reliable, in order to reduce packet transmission failures and improve overall distributed networking performance

    Testability of a swarm robot using a system of systems approach and discrete event simulation

    Get PDF
    A simulation framework using discrete event system specification (DEVS) and data encoded with Extensible Markup Language (XML) is presented to support agent-in-the-loop (AIL) simulations for large, complex, and distributed systems. A System of Systems (SoS) approach organizes the complex systems hierarchically. AIL simulations provide a necessary step in maintaining model continuity methods to achieve a greater degree of accuracy in systems analysis. The proposed SoS approach enables the simulation and analysis of these independent and cooperative systems by concentrating on the data transferred among systems to achieve interoperability instead of requiring the software modeling of global state spaces. The information exchanged is wrapped in XML to facilitate system integration and interoperability. A Groundscout is deployed as a real agent working cooperatively with virtual agents to form a robotic swarm in an example threat detection scenario. This scenario demonstrates the AIL framework\u27s ability to successfully test a swarm robot for individual performance and swarm behavior. Results of the testing process show an increase of robot team size increases the rate of successfully investigating a threat while critical violations of the algorithm remained low despite packet loss

    Digital provenance - models, systems, and applications

    Get PDF
    Data provenance refers to the history of creation and manipulation of a data object and is being widely used in various application domains including scientific experiments, grid computing, file and storage system, streaming data etc. However, existing provenance systems operate at a single layer of abstraction (workflow/process/OS) at which they record and store provenance whereas the provenance captured from different layers provide the highest benefit when integrated through a unified provenance framework. To build such a framework, a comprehensive provenance model able to represent the provenance of data objects with various semantics and granularity is the first step. In this thesis, we propose a such a comprehensive provenance model and present an abstract schema of the model. ^ We further explore the secure provenance solutions for distributed systems, namely streaming data, wireless sensor networks (WSNs) and virtualized environments. We design a customizable file provenance system with an application to the provenance infrastructure for virtualized environments. The system supports automatic collection and management of file provenance metadata, characterized by our provenance model. Based on the proposed provenance framework, we devise a mechanism for detecting data exfiltration attack in a file system. We then move to the direction of secure provenance communication in streaming environment and propose two secure provenance schemes focusing on WSNs. The basic provenance scheme is extended in order to detect packet dropping adversaries on the data flow path over a period of time. We also consider the issue of attack recovery and present an extensive incident response and prevention system specifically designed for WSNs
    • …
    corecore