1,154 research outputs found
Resilient Multidimensional Sensor Fusion Using Measurement History
This work considers the problem of performing resilient sensor fusion using past sensor measurements. In particular, we consider a system with n sensors measuring the same physical variable where some sensors might be attacked or faulty. We consider a setup in which each sensor provides the controller with a set of possible values for the true value. Here, more precise sensors provide smaller sets. Since a lot of modern sensors provide multidimensional measurements (e.g., position in three dimensions), the sets considered in this work are multidimensional polyhedra.
Given the assumption that some sensors can be attacked or faulty, the paper provides a sensor fusion algorithm that obtains a fusion polyhedron which is guaranteed to contain the true value and is minimal in size. A bound on the volume of the fusion polyhedron is also proved based on the number of faulty or attacked sensors. In addition, we incorporate system dynamics in order to utilize past measurements and further reduce the size of the fusion polyhedron. We describe several ways of mapping previous measurements to current time and compare them, under di erent assumptions, using the volume of the fusion polyhedron. Finally, we illustrate the implementation of the best of these methods and show its e ectiveness using a case study with sensor values from a real robot
Security of Cyber-Physical Systems in the Presence of Transient Sensor Faults
This paper is concerned with the security of modern Cyber-Physical Systems in the presence of transient sensor faults. We consider a system with multiple sensors measuring the same physical variable, where each sensor provides an interval with all possible values of the true state. We note that some sensors might output faulty readings and others may be controlled by a malicious attacker. Different from previous works, in this paper we aim to distinguish between faults and attacks and develop an attack detection algorithm for the latter only. To do this, we note that there are two kinds of faults ā transient and permanent; the former are benign and short-lived whereas the latter may have dangerous consequences on system performance.We argue that sensors have an underlying transient fault model that quantifies the amount of time in which transient faults can occur. In addition, we provide a framework for developing such a model if it is not provided by manufacturers.
Attacks can manifest as either transient or permanent faults depending on the attackerās goal. We provide different techniques for handling each kind. For the former, we analyze the worst-case performance of sensor fusion over time given each sensorās transient fault model and develop a filtered fusion interval that is guaranteed to contain the true value and is bounded in size. To deal with attacks that do not comply with sensorsā transient fault models, we propose a sound attack detection algorithm based on pairwise inconsistencies between sensor measurements. Finally, we provide a real-data case study on an unmanned ground vehicle to evaluate the various aspects of this paper
SciTech News Volume 71, No. 1 (2017)
Columns and Reports From the Editor 3
Division News Science-Technology Division 5 Chemistry Division 8 Engineering Division Aerospace Section of the Engineering Division 9 Architecture, Building Engineering, Construction and Design Section of the Engineering Division 11
Reviews Sci-Tech Book News Reviews 12
Advertisements IEEE
Data Science Technologies for Vibrant Cities
Smart Cities forced IT technologies make a significant step in their development. A new generation of agile
knowledge based software applications and systems have been successfully designed and implemented.
Wide capabilities of the agile applications were sufficient to meet the complete set of requirements of smart
cities. Fast transformation of modern cities from smart cities to vibrant cities throws new even more
complicated challenges to information technologies. While smart cities assumed wide usage of agile means
and tools for solving applied tasks, applications for vibrant cities must provide agile environment for
exploring and managing of all types of data, information and knowledge. Agile environment must be flexible
enough to support iterative data processing and analyses procedures that can be easily reorganized or
changed depending on context. The aim of agile environment creation and support is to extend a set of used
mathematical, technological and program solutions. In the paper it is proposed to build applications for
vibrant cities using agile data science methodologies and toolsets within the commonly used approaches for
developing agile information systems
IoT trust and reputation: a survey and taxonomy
IoT is one of the fastest-growing technologies and it is estimated that more
than a billion devices would be utilized across the globe by the end of 2030.
To maximize the capability of these connected entities, trust and reputation
among IoT entities is essential. Several trust management models have been
proposed in the IoT environment; however, these schemes have not fully
addressed the IoT devices features, such as devices role, device type and its
dynamic behavior in a smart environment. As a result, traditional trust and
reputation models are insufficient to tackle these characteristics and
uncertainty risks while connecting nodes to the network. Whilst continuous
study has been carried out and various articles suggest promising solutions in
constrained environments, research on trust and reputation is still at its
infancy. In this paper, we carry out a comprehensive literature review on
state-of-the-art research on the trust and reputation of IoT devices and
systems. Specifically, we first propose a new structure, namely a new taxonomy,
to organize the trust and reputation models based on the ways trust is managed.
The proposed taxonomy comprises of traditional trust management-based systems
and artificial intelligence-based systems, and combine both the classes which
encourage the existing schemes to adapt these emerging concepts. This
collaboration between the conventional mathematical and the advanced ML models
result in design schemes that are more robust and efficient. Then we drill down
to compare and analyse the methods and applications of these systems based on
community-accepted performance metrics, e.g. scalability, delay,
cooperativeness and efficiency. Finally, built upon the findings of the
analysis, we identify and discuss open research issues and challenges, and
further speculate and point out future research directions.Comment: 20 pages, 5 Figures, 3 tables, Journal of cloud computin
- ā¦