4,211 research outputs found

    Supporting Cyber-Physical Systems with Wireless Sensor Networks: An Outlook of Software and Services

    Get PDF
    Sensing, communication, computation and control technologies are the essential building blocks of a cyber-physical system (CPS). Wireless sensor networks (WSNs) are a way to support CPS as they provide fine-grained spatial-temporal sensing, communication and computation at a low premium of cost and power. In this article, we explore the fundamental concepts guiding the design and implementation of WSNs. We report the latest developments in WSN software and services for meeting existing requirements and newer demands; particularly in the areas of: operating system, simulator and emulator, programming abstraction, virtualization, IP-based communication and security, time and location, and network monitoring and management. We also reflect on the ongoing efforts in providing dependable assurances for WSN-driven CPS. Finally, we report on its applicability with a case-study on smart buildings

    Development of a Cyber Range with description language for network topology definition

    Get PDF
    Cyber Ranges are an essential tool for cybersecurity trainings and experiments because they enable to setup virtual, isolated and reproducible environments that can be safely used to execute different types of tests and scenarios. The preparation of scenarios is the most time-consuming phase, which includes the configuration of the virtual machines and the definition of the network topology, so it is important for a Cyber Range to include tools that simplify this operation. This work focuses on how to implement and setup a Cyber Range that includes the necessary features and tools to simplify the setup phase, in particular for large topologies. The literature review provides an analysis of the selected open-source and research solutions currently available for Cyber Ranges and their configuration for use in different scenarios. This work presents the development of a Cyber Range based on the open-source framework OpenStack and the entire design process of a new Description Language, starting from the analysis of the requirements for the defined use-cases, defining and designing the required features, the implementation of all the required components, and the testing of the correctness and effectiveness of the whole system. A comparison of the implemented solution against the selected solutions in the literature study is provided, summarising the unique features offered by this approach. The validation of the Description Language implementation with the defined use cases demonstrated that it can reduce the complexity and length of the required template, which can help to make the setup of scenarios faster

    Toward a sustainable cybersecurity ecosystem

    Get PDF
    © 2020 by the authors. Licensee MDPI, Basel, Switzerland. Cybersecurity issues constitute a key concern of today’s technology-based economies. Cybersecurity has become a core need for providing a sustainable and safe society to online users in cyberspace. Considering the rapid increase of technological implementations, it has turned into a global necessity in the attempt to adapt security countermeasures, whether direct or indirect, and prevent systems from cyberthreats. Identifying, characterizing, and classifying such threats and their sources is required for a sustainable cyber-ecosystem. This paper focuses on the cybersecurity of smart grids and the emerging trends such as using blockchain in the Internet of Things (IoT). The cybersecurity of emerging technologies such as smart cities is also discussed. In addition, associated solutions based on artificial intelligence and machine learning frameworks to prevent cyber-risks are also discussed. Our review will serve as a reference for policy-makers from the industry, government, and the cybersecurity research community

    Internet of Things Software Modules Marketplace

    Get PDF
    The project developed is a centralised repository of software packages to be used in cyber-physical systems. It is composed by a central database, an http api, an ftp client to serve files and a web application to manage the repository. The system also communicates via OPCUA protocol with the embed-system for real time monitoring.The advent of the Cyber-Physical Systems (CPS), a physical system representation through a vir-tual model, usually used to control a system or a process comes from the growing democratizationof the computational power. Nowadays, virtually anything can be equipped with some kind ofembedded processor to automate tasks, generate or consume some kind of data. In addition, thecontinuous development and improvement of the communication networks has helped leveragethe concept of the Internet of Things (IoT) in which things are now, themselves, connected to theInternet, exchanging data with each other and with people.In the industrial sector, CPS, also called Cyber-Physical Production Systems (CPPS) and theIoT are the main technological advances that lead to the industry fourth revolution, common des-ignated as Industry 4.0 in which the factory floor is no longer a centralized model where all thecomputation is done centrally but is now a decentralized model where industrial equipment haveembedded devices to control, automate tasks and react in a dynamic and intelligent manner to thesensed physical environment.Thereby, one of the keywords around the CPPSs is software. Software is no longer centralizedand is now distributed through several devices that comprises the system. This new approachcomes with significant changes and one of them is the reuse and distribution of the software. Itis not viable to manual deploy and install software in hundreds or thousands of devices and nothaving a way of reusing the existing software. If, on the one hand, the desire is to develop a moreintelligent process control system, on the other, flexibility, adaptability and simplicity are alsoconvenient capabilities or else intelligent manufacturing process control systems are built upon alot of resources debt. Hence, the solution is to build standards, tools and frameworks that allowthe reuse of software and its rapid deployment in the distributed devices.One option, in the Industry 4.0 field, to cope with the software reuse issue in this kind of sys-tems is the encapsulation of software in functional blocks, the Function Blocks (FBs) and their usein the function block programming paradigm, described in IEC 61499 standard. The functionalityis abstracted away in the FBs and can be reused by just deploying the them to the devices. Thisway, it is easier to manage a network by dragging and dropping these blocks, building complexapplications centrally and deploy everything to the distributed embedded devices. However, theimplementation of this standard to address the aforementioned problem brings, itself, other neces-sities such as managing the FBs, monitoring them and their previous download by the embeddeddevices.This dissertation main goal is the development of a marketplace to manage and monitor of FBs in a IEC 61499 network envisioning the filling of the previous mentioned gaps in this kindof networks. The marketplace, integrated in a IEC 61499 global solution will not only enable thedistribution of FBs among the embedded devices in a IEC 61499 compliant CPPS but also manageFBs versions, functioning as a central repository of software components, having also monitoringand statistical features, allowing the detection of flaws or malfunctions and collect statistical datai iiabout FBs usage

    Development of an automated bicycle parking spot for a smart parking system

    Get PDF
    Mestrado de dupla diplomação com a UTFPR - Universidade TecnolĂłgica Federal do ParanĂĄSmart parking systems are promising solutions for a set of traffic-related problems in major cities across the world. The goal of those systems is to guide users through paths in which they spend less time, resources, and release fewer greenhouse gases to find a parking spot. To this end, deployers develop Cyber-physical Systems that generally comprise embedded electronics materials, Internet of Things technologies, and Artificial Intelligence concepts. This work combines ESP8266 microcontrollers and Raspberry Pi microprocessors through MQTT communication protocol to implement its architecture, a few possible different options for the actuator are also presented, and a project for the power supply by lowcurrent photovoltaic panels is documented. Therefore, the goal is to work over some options and ideas for the physical implementation of the low-level electronics physical stage of a smart parking Cyber-physical System. The results include validated actuator options, a small photovoltaic generation sizing, and the deployment of a microcontroller routine capable of properly operate as a physical asset controller enabling scalability.Sistemas de estacionamento inteligentes sĂŁo soluçÔes promissoras para uma gama de problemas relacionados a trĂĄfego de automĂłveis em grandes cidades do mundo. O objetivo destes sistemas Ă© guiar seus usuĂĄrios por caminhos pelos quais os mesmos gastam menos tempo, recursos e liberam menos gases contribuintes para o efeito estufa a fim de encontrar um local de estacionamento. Para este fim, desenvolvedores implementam Sistemas Ciber-fĂ­sicos que geralmente incluem materiais de eletrĂŽnica embebida, tecnologias de Internet das Coisas e conceitos de InteligĂȘncia Artificial. Este trabalho combina os microcontroladores ESP8266 e microprocessadores Raspberry Pi pelo protocolo de comunicação MQTT a fim de implementar sua arquitetura definida, tambĂ©m apresenta algumas possĂ­veis opçÔes para a implementação de um atuador e o projeto para suprir o consumo de eletricidade por painĂ©is fotovoltaicos de baixa corrente. Portanto, o objetivo Ă© trabalhar em possĂ­veis opçÔes e ideias para a implementação fĂ­sica da etapa de eletrĂŽnica de baixo nĂ­vel de um Sistema Ciber-fĂ­sico para estacionamentos inteligentes. Os resultados incluem opçÔes validadas de atuadores, um dimensionamento de geração fotovoltaica de baixa potĂȘncia e o desenvolvimento de uma rotina para o que o microcontrolador aja como um controlador local e permita escalabilidade

    Configuration Management of Distributed Systems over Unreliable and Hostile Networks

    Get PDF
    Economic incentives of large criminal profits and the threat of legal consequences have pushed criminals to continuously improve their malware, especially command and control channels. This thesis applied concepts from successful malware command and control to explore the survivability and resilience of benign configuration management systems. This work expands on existing stage models of malware life cycle to contribute a new model for identifying malware concepts applicable to benign configuration management. The Hidden Master architecture is a contribution to master-agent network communication. In the Hidden Master architecture, communication between master and agent is asynchronous and can operate trough intermediate nodes. This protects the master secret key, which gives full control of all computers participating in configuration management. Multiple improvements to idempotent configuration were proposed, including the definition of the minimal base resource dependency model, simplified resource revalidation and the use of imperative general purpose language for defining idempotent configuration. Following the constructive research approach, the improvements to configuration management were designed into two prototypes. This allowed validation in laboratory testing, in two case studies and in expert interviews. In laboratory testing, the Hidden Master prototype was more resilient than leading configuration management tools in high load and low memory conditions, and against packet loss and corruption. Only the research prototype was adaptable to a network without stable topology due to the asynchronous nature of the Hidden Master architecture. The main case study used the research prototype in a complex environment to deploy a multi-room, authenticated audiovisual system for a client of an organization deploying the configuration. The case studies indicated that imperative general purpose language can be used for idempotent configuration in real life, for defining new configurations in unexpected situations using the base resources, and abstracting those using standard language features; and that such a system seems easy to learn. Potential business benefits were identified and evaluated using individual semistructured expert interviews. Respondents agreed that the models and the Hidden Master architecture could reduce costs and risks, improve developer productivity and allow faster time-to-market. Protection of master secret keys and the reduced need for incident response were seen as key drivers for improved security. Low-cost geographic scaling and leveraging file serving capabilities of commodity servers were seen to improve scaling and resiliency. Respondents identified jurisdictional legal limitations to encryption and requirements for cloud operator auditing as factors potentially limiting the full use of some concepts

    SPADE 3: Supporting the New Generation of Multi-Agent Systems

    Full text link
    [EN] Although intelligent agent-based systems have existed for several years, the progression in terms of real applications or their integration in the industry have not yet reached the expected levels. During the last two decades, many agent platforms have appeared with the aim of simplifying the development of multi-agent systems. Some of these platforms have been designed for general purposes, while others have been oriented towards specific domains. However, the lack of standards and the complexity associated with supporting such systems, among other difficulties, have hampered their generalised use. This article looks in depth at the current situation of existing agent platforms, trying to analyse their current shortcomings and their expected needs in the near future. The goal of the paper is to identify possible lines of work and some of the most crucial aspects to be considered in order to popularize the application of agent technology as a dynamic and flexible solution to current problems. Moreover, the paper presents SPADE 3, a new version of the SPADE middleware, which has been totally redesigned in order to conform to the identified challenges. Finally, a case study is proposed to illustrate how SPADE 3 is able to fulfill these challenges.This work was supported in part by the Spanish Government, under Project RTI2018-095390-B-C31-AR.Palanca CĂĄmara, J.; Terrasa Barrena, AM.; Julian Inglada, VJ.; Carrascosa Casamayor, C. (2020). SPADE 3: Supporting the New Generation of Multi-Agent Systems. IEEE Access. 8:182537-182549. https://doi.org/10.1109/ACCESS.2020.3027357S182537182549

    Hacker Combat: A Competitive Sport from Programmatic Dueling & Cyberwarfare

    Full text link
    The history of humanhood has included competitive activities of many different forms. Sports have offered many benefits beyond that of entertainment. At the time of this article, there exists not a competitive ecosystem for cyber security beyond that of conventional capture the flag competitions, and the like. This paper introduces a competitive framework with a foundation on computer science, and hacking. This proposed competitive landscape encompasses the ideas underlying information security, software engineering, and cyber warfare. We also demonstrate the opportunity to rank, score, & categorize actionable skill levels into tiers of capability. Physiological metrics are analyzed from participants during gameplay. These analyses provide support regarding the intricacies required for competitive play, and analysis of play. We use these intricacies to build a case for an organized competitive ecosystem. Using previous player behavior from gameplay, we also demonstrate the generation of an artificial agent purposed with gameplay at a competitive level
    • 

    corecore