148,951 research outputs found

    Energy Network Communications and Expandable Control Mechanisms

    Get PDF
    A modular, expandable network requiring little or no calibration is something that is well sought after and would offer great benefits when used for distributed energy generation. Intelligent and adaptive control of such a network offers stability of supply from intermittent sources which, to date, has been hard to achieve. Key to the effective use of such control systems is communications, specifically the exchange of commands and status information between the control systems and the attached devices. Power-line communications has been used in various applications for years and would offer a good mechanism for interconnecting devices on a power grid without the expense of laying new cabling. By using clusters of devices managed by an IEMS (Intelligent Energy Management System) in a branching network fashion (not unlike the grid itself) it would be possible to manage large numbers of devices and high speed with relatively low bandwidth usage increasing the usable range of transmission. Implications of this include improving network efficiency through managed power distribution and increased security of supply

    Sensor Network Security: More Interesting Than You Think

    Get PDF
    With the advent of low-power wireless sensor networks, a wealth of new applications at the interface of the real and digital worlds is emerging. A distributed computing platform that can measure properties of the real world, formulate intelligent inferences, and instrument responses, requires strong foundations in distributed computing, artificial intelligence, databases, control theory, and security. Before these intelligent systems can be deployed in critical infrastructures such as emergency rooms and powerplants, the security properties of sensors must be fully understood. Existing wisdom has been to apply the traditional security models and techniques to sensor networks. However, sensor networks are not traditional computing devices, and as a result, existing security models and methods are ill suited. In this position paper, we take the first steps towards producing a comprehensive security model that is tailored for sensor networks. Incorporating work from Internet security, ubiquitous computing, and distributed systems, we outline security properties that must be considered when designing a secure sensor network. We propose challenges for sensor networks – security obstacles that, when overcome, will move us closer to decreasing the divide between computers and the physical world

    Over-the-Air Computation for Distributed Systems: Something Old and Something New

    Full text link
    Facing the upcoming era of Internet-of-Things and connected intelligence, efficient information processing, computation and communication design becomes a key challenge in large-scale intelligent systems. Recently, Over-the-Air (OtA) computation has been proposed for data aggregation and distributed function computation over a large set of network nodes. Theoretical foundations for this concept exist for a long time, but it was mainly investigated within the context of wireless sensor networks. There are still many open questions when applying OtA computation in different types of distributed systems where modern wireless communication technology is applied. In this article, we provide a comprehensive overview of the OtA computation principle and its applications in distributed learning, control, and inference systems, for both server-coordinated and fully decentralized architectures. Particularly, we highlight the importance of the statistical heterogeneity of data and wireless channels, the temporal evolution of model updates, and the choice of performance metrics, for the communication design in OtA federated learning (FL) systems. Several key challenges in privacy, security and robustness aspects of OtA FL are also identified for further investigation.Comment: 7 pages, 3 figures, submitted for possible publicatio

    Deep Learning Approach for Intrusion Detection System (IDS) in the Internet of Things (IoT) Network using Gated Recurrent Neural Networks (GRU)

    Get PDF
    The Internet of Things (IoT) is a complex paradigm where billions of devices are connected to a network. These connected devices form an intelligent system of systems that share the data without human-to-computer or human-to-human interaction. These systems extract meaningful data that can transform human lives, businesses, and the world in significant ways. However, the reality of IoT is prone to countless cyber-attacks in the extremely hostile environment like the internet. The recent hack of 2014 Jeep Cherokee, iStan pacemaker, and a German steel plant are a few notable security breaches. To secure an IoT system, the traditional high-end security solutions are not suitable, as IoT devices are of low storage capacity and less processing power. Moreover, the IoT devices are connected for longer time periods without human intervention. This raises a need to develop smart security solutions which are light-weight, distributed and have a high longevity of service. Rather than per-device security for numerous IoT devices, it is more feasible to implement security solutions for network data. The artificial intelligence theories like Machine Learning and Deep Learning have already proven their significance when dealing with heterogeneous data of various sizes. To substantiate this, in this research, we have applied concepts of Deep Learning and Transmission Control Protocol/Internet Protocol (TCP/IP) to build a light-weight distributed security solution with high durability for IoT network security. First, we have examined the ways of improving IoT architecture and proposed a light-weight and multi-layered design for an IoT network. Second, we have analyzed the existingapplications of Machine Learning and Deep Learning to the IoT and Cyber-Security. Third, we have evaluated deep learning\u27s Gated Recurrent Neural Networks (LSTM and GRU) on the DARPA/KDD Cup \u2799 intrusion detection data set for each layer in the designed architecture. Finally, from the evaluated metrics, we have proposed the best neural network design suitable for the IoT Intrusion Detection System. With an accuracy of 98.91% and False Alarm Rate of 0.76 %, this unique research outperformed the performance results of existing methods over the KDD Cup \u2799 dataset. For this first time in the IoT research, the concepts of Gated Recurrent Neural Networks are applied for the IoT security

    Microgrid Control and Protection: Stability and Security

    Get PDF
    When the microgrid disconnects from the main grid in response to, say, upstream disturbance or voltage fluctuation and goes to islanding mode, both voltage and frequency at all locations in the microgrid have to be regulated to nominal values in a short amount of time before the operation of protective relays. Motivated by this, we studied the application of intelligent pinning of distributed cooperative secondary control of distributed generators in islanded microgrid operation in a power system. In the first part, the problem of single and multi-pinning of distributed cooperative secondary control of DGs in a microgrid is formulated. It is shown that the intelligent selection of a pinning set based on the number of its connections and distance of leader DG/DGs from the rest of the network, i.e., degree of connectivity, strengthens microgrid voltage and frequency regulation performance both in transient and steady state. The proposed control strategy and algorithm are validated by simulation in MATLAB/SIMULINK using different microgrid topologies. It is shown that it is much easier to stabilize the microgrid voltage and frequency in islanding mode operation by specifically placing the pinning node on the DGs with high degrees of connectivity than by randomly placing pinning nodes into the network. In all of these research study cases, DGs are only required to communicate with their neighboring units which facilitates the distributed control strategy. Historically, the models for primary control are developed for power grids with centralized power generation, in which the transmission lines are assumed to be primarily inductive. However, for distributed power generation, this assumption does not hold since the network has significant resistive impedance as well. Hence, it is of utmost importance to generalize the droop equations, i.e., primary control, to arrive at a proper model for microgrid systems. Motivated by this, we proposed the secondary adaptive voltage and frequency control of distributed generators for low and medium voltage microgrid in autonomous mode to overcome the drawback of existing classical droop based control techniques. Our proposed secondary control strategy is adaptive with line parameters and can be applied to all types of microgrids to address the simultaneous impacts of active and reactive power on the microgrids voltage and frequency. Also, since the parameters in the network model are unknown or uncertain, the second part of our research studies adaptive distributed estimation/compensation. It is shown that this is an effective method to robustly regulate the microgrid variables to their desired values. The security of power systems against malicious cyberphysical data attacks is the third topic of this dissertation. The adversary always attempts to manipulate the information structure of the power system and inject malicious data to deviate state variables while evading the existing detection techniques based on residual test. The solutions proposed in the literature are capable of immunizing the power system against false data injection but they might be too costly and physically not practical in the expansive distribution network. To this end, we define an algebraic condition for trustworthy power system to evade malicious data injection. The proposed protection scheme secures the power system by deterministically reconfiguring the information structure and corresponding residual test. More importantly, it does not require any physical effort in either microgrid or network level. The identification scheme of finding meters being attacked is proposed as well. Eventually, a well-known IEEE 30-bus system is adopted to demonstrate the effectiveness of the proposed schemes

    A High-confidence Cyber-Physical Alarm System: Design and Implementation

    Full text link
    Most traditional alarm systems cannot address security threats in a satisfactory manner. To alleviate this problem, we developed a high-confidence cyber-physical alarm system (CPAS), a new kind of alarm systems. This system establishes the connection of the Internet (i.e. TCP/IP) through GPRS/CDMA/3G. It achieves mutual communication control among terminal equipments, human machine interfaces and users by using the existing mobile communication network. The CPAS will enable the transformation in alarm mode from traditional one-way alarm to two-way alarm. The system has been successfully applied in practice. The results show that the CPAS could avoid false alarms and satisfy residents' security needs.Comment: IEEE/ACM Internet of Things Symposium (IOTS), in conjunction with GreenCom 2010, IEEE, Hangzhou, China, December 18-20, 201
    • …
    corecore