4 research outputs found

    Model Checking of RegCTL

    Get PDF
    The paper is devoted to the problem of extending the temporal logic CTL so that it is more expressive and complicated properties can be expressed in a more readable form. The specification language RegCTL, an extension of CTL, is proposed. In RegCTL every CTL temporal operator is augmented with a regular expression, thus restricting moments when the validity is required. We propose a local distributed model checking algorithm for RegCTL

    Local Distributed Model Checking of Reg CTL

    Get PDF
    AbstractThe paper is devoted to the problem of extending the temporal logic CTL so that it is more expressive and complicated properties can be expressed more succinctly. The specification language Reg CTL, an extension of CTL, is proposed. In Reg CTL every CTL temporal operator is augmented with a regular expression restricting thus moments when the validity is required. The resulting logic is more expressive than previous extensions of CTL with regular expressions. Reg CTL can be model-checked on-the-fly and the model checking algorithm is well distributable

    Design and Implementation of Distributed Identity and Access Management Framework for Internet of Things (IoT) Enabled Distribution Automation

    Get PDF
    The smart grid and Internet of Things (IoT) technologies play vital roles in improving the quality of services offered in traditional electrical grid. They open a room for the introduction of new services like distribution automation (DA) that has a significant advantage to both utility companies and final consumers. DA integrates sensors, actuators, intelligent electrical devices (IED) and information and communication technologies to monitor and control electrical grid. However, the integration of these technologies poses security threats to the electrical grid like Denial of Service (DoS) attacks, false data injection attacks, and masquerading attacks like system node impersonation that can transmit wrong readings, resulting in false alarm reports and hence leading to incorrect node actuation. To overcome these challenges, researchers have proposed a centralized public key infrastructure (PKI) with bridged certificate authority (CA) which is prone to DoS attacks. Moreover, the proposed blockchain based distributed identity and access management (DIAM) in IoT domain at the global scale is adding communicational and computational overheads. Also. It is imposing new security threats to the DA system by integrating it with online services like IoTEX and IoTA. For those reasons, this study proposes a DIAM security scheme to secure IoT-enabled distribution automation. The scheme divides areas into clusters and each cluster has a device registry and a registry controller. The registry controller is a command line tool to access and manage a device registry. The results show that the scheme can prevent impersonated and non-legitimate system nodes and users from accessing the system by imposing role-based access control (RBAC) at the cluster level. Keywords: Distributed Identity and Access Management; Electrical Secondary Distribution Network; Internet of Things; IoT Enabled Distribution Automation; Smart Grid Securit

    Open Tank Level Control System and Controller Comparison Study

    Get PDF
    The control system to be improved is an open tank level control system designed by previous Final Year Project student. The previous control system utilized a local PI controller and did not have any safety features. This improvement project involves connecting the plant to a distributed control system, and safe guarding and interlocking features such as tank overflowing prevention and pump interlock. In designing the control system, both experimental and simulation methods were used. After the project is completed, the plant is intended to be used by students to allow them to have a better understanding of process control and implementation of a distributed control system. The author was successful in developing a remotely automated open tank level control system, carrying out SIMULINK simulations and carrying out controller comparison studies. Thus achieving all objectives set by the author. Additional interlocks and protective devices were implemented and installed to protect the equipment from damage and minimize danger to the operator. The DCS pages allow for the user to monitor, control the process and provide the user with guidelines on how to tune PID controller and to obtain the process model. After performing MATLAB simulations of the control system and comparing the performance of the PI controller and Fuzzy PI controller, the author can conclude that there are significant improvements in the process response of a open tank water level control system when a Fuzzy PI controller is used
    corecore