461,950 research outputs found
Detection techniques in operational technology infrastructure
In previous decades, cyber-attacks have not been considered a threat to critical infrastructure. However, as the Information Technology (IT) and Operational Technology (OT) domains converge, the vulnerability of OT infrastructure is being exploited. Nation-states, cyber criminals and hacktivists are moving to benefit from economic and political gains. The OT network, i.e. Industrial Control System (ICS) is referred to within OT infrastructure as Supervisory Control and Data Acquisition (SCADA). SCADA systems were introduced primarily to optimise the data transfer within OT network infrastructure. The introduction of SCADA can be traced back to the 1960âs, a time where cyber-attacks were not considered. Hence SCADA networks and associated systems are highly vulnerable to cyber-attacks which can ultimately result in catastrophic events. Historically, when deployed, intrusion detection systems in converged IT/OT networks are deployed and monitor the IT side of the network. While academic research into OT specific intrusion detection is not a new direction, application to real systems are few and lack the contextual information required to make intrusion detection systems actionable. This paper provides an overview of cyber security in OT SCADA networks. Through evaluating the historical development of OT systems and protocols, a range of current issues caused by the IT/OT convergence is presented. A number of publicly disclosed SCADA vulnerabilities are outlined, in addition to approaches for detecting attacks in OT networks. The paper concludes with a discussion of what the future of interconnected OT systems should entail, and the potential risks of continuing with an insecure design philosophy
Design and Performance Analysis of a Non-Standard EPICS Fast Controller
The large scientific projects present new technological challenges, such as
the distributed control over a communication network. In particular, the
middleware EPICS is the most extended communication standard in particle
accelerators. The integration of modern control architectures in these EPICS
networks is becoming common, as for example for the PXI/PXIe and xTCA hardware
alternatives. In this work, a different integration procedure for PXIe real
time controllers from National Instruments is proposed, using LabVIEW as the
design tool. This methodology is considered and its performance is analyzed by
means of a set of laboratory experiments. This control architecture is proposed
for achieving the implementation requirements of the fast controllers, which
need an important amount of computational power and signal processing
capability, with a tight real-time demand. The present work studies the
advantages and drawbacks of this methodology and presents its comprehensive
evaluation by means of a laboratory test bench, designed for the application of
systematic tests. These tests compare the proposed fast controller performance
with a similar system implemented using an standard EPICS IOC provided by the
CODAC system.Comment: This is the extended version of the Conference Record presented in
the IEEE Real-Time Conference 2014, Nara, Japan. This paper has been
submitted to the IEEE Transactions on Nuclear Scienc
Recommended from our members
SOAR (Support Office for Aerogeophysical Research) Annual Report 1994/1995
The Support Office for Aerogeophysical Research (SOAR) was a facility of the National Science Foundation's Office of Polar Programs whose mission is to make airborne geophysical observations available to the broad research community of geology, glaciology and other sciences. The central office of the SOAR facility is located in Austin, Texas within the University of Texas Institute for Geophysics. Other institutions with significant responsibilities are the Lamont Doherty Earth Observatory of Columbia University and the Geophysics Branch of the U.S . Geological Survey. This report summarizes the goals and accomplishments of the SOAR facility during 1994/1995 and plans for the next year.National Science Foundation's Office of Polar ProgramsInstitute for Geophysic
Implementation of a Hardware/Software Platform for Real-Timedata-Intensive Applications in Hazardous Environments
Real-Time Technology and Applications Symposium. Brookline, MA, USA, 10-12 Oct. 1996In real-time data-intensive applications, the simultaneous achievement of the required performance and determinism is a difficult issue to address, mainly due to the time needed to perform I/O operations, which is more significant than the CPU processing time. Additional features need to be considered if these applications are intended to perform in hostile environments. In this paper, we address the implementation of a hardware/software platform designed to acquire, transfer, process and store massive amounts of information at sustained rates of several MBytes/sec, capable of supporting real-time applications with stringent throughput requirements under hazardous environmental conditions. A real-world system devoted to the inspection of nuclear power plants is presented as an illustrative examplePublicad
Beyond Gazing, Pointing, and Reaching: A Survey of Developmental Robotics
Developmental robotics is an emerging field located
at the intersection of developmental psychology
and robotics, that has lately attracted
quite some attention. This paper gives a survey of
a variety of research projects dealing with or inspired
by developmental issues, and outlines possible
future directions
Multi-Sensor Context-Awareness in Mobile Devices and Smart Artefacts
The use of context in mobile devices is receiving increasing attention in mobile and ubiquitous computing research. In this article we consider how to augment mobile devices with awareness of their environment and situation as context. Most work to date has been based on integration of generic context sensors, in particular for location and visual context. We propose a different approach based on integration of multiple diverse sensors for awareness of situational context that can not be inferred from location, and targeted at mobile device platforms that typically do not permit processing of visual context. We have investigated multi-sensor context-awareness in a series of projects, and report experience from development of a number of device prototypes. These include development of an awareness module for augmentation of a mobile phone, of the Mediacup exemplifying context-enabled everyday artifacts, and of the Smart-Its platform for aware mobile devices. The prototypes have been explored in various applications to validate the multi-sensor approach to awareness, and to develop new perspectives of how embedded context-awareness can be applied in mobile and ubiquitous computing
Computer- and robot-assisted Medical Intervention
Medical robotics includes assistive devices used by the physician in order to
make his/her diagnostic or therapeutic practices easier and more efficient.
This chapter focuses on such systems. It introduces the general field of
Computer-Assisted Medical Interventions, its aims, its different components and
describes the place of robots in that context. The evolutions in terms of
general design and control paradigms in the development of medical robots are
presented and issues specific to that application domain are discussed. A view
of existing systems, on-going developments and future trends is given. A
case-study is detailed. Other types of robotic help in the medical environment
(such as for assisting a handicapped person, for rehabilitation of a patient or
for replacement of some damaged/suppressed limbs or organs) are out of the
scope of this chapter.Comment: Handbook of Automation, Shimon Nof (Ed.) (2009) 000-00
- âŠ