1,128 research outputs found

    2023-2024 Catalog

    Get PDF
    The 2023-2024 Governors State University Undergraduate and Graduate Catalog is a comprehensive listing of current information regarding:Degree RequirementsCourse OfferingsUndergraduate and Graduate Rules and Regulation

    QoS-aware architectures, technologies, and middleware for the cloud continuum

    Get PDF
    The recent trend of moving Cloud Computing capabilities to the Edge of the network is reshaping how applications and their middleware supports are designed, deployed, and operated. This new model envisions a continuum of virtual resources between the traditional cloud and the network edge, which is potentially more suitable to meet the heterogeneous Quality of Service (QoS) requirements of diverse application domains and next-generation applications. Several classes of advanced Internet of Things (IoT) applications, e.g., in the industrial manufacturing domain, are expected to serve a wide range of applications with heterogeneous QoS requirements and call for QoS management systems to guarantee/control performance indicators, even in the presence of real-world factors such as limited bandwidth and concurrent virtual resource utilization. The present dissertation proposes a comprehensive QoS-aware architecture that addresses the challenges of integrating cloud infrastructure with edge nodes in IoT applications. The architecture provides end-to-end QoS support by incorporating several components for managing physical and virtual resources. The proposed architecture features: i) a multilevel middleware for resolving the convergence between Operational Technology (OT) and Information Technology (IT), ii) an end-to-end QoS management approach compliant with the Time-Sensitive Networking (TSN) standard, iii) new approaches for virtualized network environments, such as running TSN-based applications under Ultra-low Latency (ULL) constraints in virtual and 5G environments, and iv) an accelerated and deterministic container overlay network architecture. Additionally, the QoS-aware architecture includes two novel middlewares: i) a middleware that transparently integrates multiple acceleration technologies in heterogeneous Edge contexts and ii) a QoS-aware middleware for Serverless platforms that leverages coordination of various QoS mechanisms and virtualized Function-as-a-Service (FaaS) invocation stack to manage end-to-end QoS metrics. Finally, all architecture components were tested and evaluated by leveraging realistic testbeds, demonstrating the efficacy of the proposed solutions

    Resilient and Scalable Forwarding for Software-Defined Networks with P4-Programmable Switches

    Get PDF
    Traditional networking devices support only fixed features and limited configurability. Network softwarization leverages programmable software and hardware platforms to remove those limitations. In this context the concept of programmable data planes allows directly to program the packet processing pipeline of networking devices and create custom control plane algorithms. This flexibility enables the design of novel networking mechanisms where the status quo struggles to meet high demands of next-generation networks like 5G, Internet of Things, cloud computing, and industry 4.0. P4 is the most popular technology to implement programmable data planes. However, programmable data planes, and in particular, the P4 technology, emerged only recently. Thus, P4 support for some well-established networking concepts is still lacking and several issues remain unsolved due to the different characteristics of programmable data planes in comparison to traditional networking. The research of this thesis focuses on two open issues of programmable data planes. First, it develops resilient and efficient forwarding mechanisms for the P4 data plane as there are no satisfying state of the art best practices yet. Second, it enables BIER in high-performance P4 data planes. BIER is a novel, scalable, and efficient transport mechanism for IP multicast traffic which has only very limited support of high-performance forwarding platforms yet. The main results of this thesis are published as 8 peer-reviewed and one post-publication peer-reviewed publication. The results cover the development of suitable resilience mechanisms for P4 data planes, the development and implementation of resilient BIER forwarding in P4, and the extensive evaluations of all developed and implemented mechanisms. Furthermore, the results contain a comprehensive P4 literature study. Two more peer-reviewed papers contain additional content that is not directly related to the main results. They implement congestion avoidance mechanisms in P4 and develop a scheduling concept to find cost-optimized load schedules based on day-ahead forecasts

    Towards a Peaceful Development of Cyberspace - Challenges and Technical Measures for the De-escalation of State-led Cyberconflicts and Arms Control of Cyberweapons

    Get PDF
    Cyberspace, already a few decades old, has become a matter of course for most of us, part of our everyday life. At the same time, this space and the global infrastructure behind it are essential for our civilizations, the economy and administration, and thus an essential expression and lifeline of a globalized world. However, these developments also create vulnerabilities and thus, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning, visible in the creation of military cyber-departments and the integration of cyberspace into states' security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces, over the last decades, a complex tool set of transparency, de-escalation and arms control measures has been developed and proof-tested. Unfortunately, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain. Against this background, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyberweapons can be developed. In order to answer this question, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behavior and international humanitarian law in cyberspace to identify starting points for technical measures of transparency, arms control and verification. Based on this approach of adopting already existing technical measures from other fields of computer science, the thesis will provide proof of concepts approaches for some mentioned challenges like a classification system for cyberweapons that is based on technical measurable features, an approach for the mutual reduction of vulnerability stockpiles and an approach to plausibly assure the non-involvement in a cyberconflict as a measure for de-escalation. All these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal, like the reduction of its destructive usage, is yet not very common for the engineering thinking of computer science. Therefore, this dissertation also aims to provide some impulses regarding the responsibility and creative options of computer science with a view to the peaceful development and use of cyberspace

    Hybrid Architectures to Improve Coverage in Remote Areas and Incorporate Long-range LPWAN Multi-hop IoT Strategies

    Get PDF
    At the height of M2M communications, there are many alternatives and architectures that present solutions for each case and each environment. The interoperability strategy or the combination of different solutions with adequate flexibility can be solutions to maintain a capacity for easy incorporation of new sensor nodes depending on the coverage or not of operators. In addition to interoperability strategies, this chapter presents some alternatives that include multi-hop techniques, combining different technologies. Special emphasis will be placed on low-power wide area networks systems (LoRa, Narrow Band IoT, LTE, etc.) applied in remote environments, such as nature reserves and ocean or fluvial ecosystems. An estate of art of these areas will be presented, as well as results of different development of our group

    Machine learning approach for dynamic event identification in power systems with wide area measurement systems

    Get PDF
    Orientador: Prof. Dr. Alexandre Rasi AokiCoorientador: Prof. Dr. Ricardo SchumacherDissertação (mestrado) - Universidade Federal do Paraná, Setor de Tecnologia, Programa de Pós-Graduação em Engenharia Elétrica. Defesa : Curitiba, 13/02/2023Inclui referênciasResumo: Ao longo dos últimos dez anos, a disponibilidade de WAMS (Wide Area Measurement Systems) tem constantemente aumentado e, com isso, a necessidade de se otimizar seu uso em relação a uma ampla gama de capacidades requeridas nos centros de operação. Concorrentemente, o sistema brasileiro tem observado diversos eventos em múltiplos níveis de criticalidade e, portanto, formas de rapidamente identificar irregularidades na rede elétrica têm sido requisitadas pelos operadores. Todavia, mesmo com tal diversidade de eventos registrados por PMUs (Phasor Measurement Unit), há dificuldades em se consolidar um banco de dados de eventos e, ademais, sistemas diferem uns dos outros - isto é, os volumes de dados requeridos para machine learning e a especificidade de cada sistema criam desafios para a construção de aplicações para detecção e identificação de eventos em uma dada rede. De tal maneira, o presente trabalho propõe uma forma de endereçar tais restrições e habilitar o uso de modelos de machine learning na vida real ao modelar um sistema real, simular uma grande quantia de eventos (como medição de PMU) e executar o processo de aprendizado de máquina com esses dados simulados. Tendo posse de qualquer conjunto de dados que contenha medições de evento da mesma PMU simulada, uma validação da aplicabilidade e performance do modelo obtido pode ser feita. Assim, um processo reprodutível e escalável foi definido pelo trabalho a partir de um estudo de caso no corredor Salto Caxias, um subsistema da rede elétrica paranaense operado pela COPEL, que forneceu três conjuntos de dados contendo eventos registrados em uma PMU dessa área. Alguns componentes como barras, linhas de transmissão, transformadores, geradores, PSSs, excitadores e controles de turbina foram modelados dentro da Power System Toolbox, embasada em MATLAB, para simulação de eventos. O algoritmo de machine learning selecionado para provar o conceito estabelecido foi rede neural artificial, definindo-se quatro classes possíveis para reconhecimento - "Curto-circuito", "Perda de Carga", "Perda de Linha" e "Normal". Com o modelo de machine learning definido e treinado, se aplicaram os dados de eventos reais nele. Os resultados mostram que as métricas da rede neural no processo de aprendizado foram geralmente suficientes para aplicação em vida real, mas que sua performance nos conjuntos de dados de eventos reais foi abaixo da registrada com os dados simulados. Todavia, considerando-se que os dados reais providenciados são de eventos longínquos à PMU observada e ao próprio sistema modelado, distorções e atenuações de sinal são inerentes. Assim, pode-se dizer que o método proposto é aplicável, com mais etapas de pré-processamento de dados, a qualquer dado sistema - caso ele seja minuciosamente modelado e haja disponibilidade de conjuntos de dados de eventos internos ao sistema.Abstract: Over the last ten years, the availability of WAMS (Wide Area Measurement Systems) has steadily increased and, with it, the need to optimize its usage concerning a large array of capabilities required at the operation centers. Concurrently, the Brazilian system has witnessed various events at multiple levels of criticality, and, thus, ways to quickly identify irregularities in the grid have been more and more requested by power transmission and distribution companies. The introduction of machine learning models and algorithms in such a context has been explored by the scientific community. However, even with such a diversity of events and their PMU (Phasor Measurement Unit) measurements, there is hardship in consolidating an event database and systems differ from each other - that is, the data volume required for machine learning and the specificity of each power system create challenges in constructing applications for detection and identification of events in a given grid. As such, the present work proposes a way to address those constraints and further enable the real-life application of machine learning models in a power system with WAMS through the modeling of a real-life system, simulating a large database of events as if they were registered through a PMU in said system and training machine learning models on this simulated data. If one has any dataset containing event measurements from the same PMU (which was simulated), a validation of model performance and applicability can be performed. A reproducible and scalable process was defined to achieve this through one case study for the Salto Caxias subsystem of the Paraná state grid, operated by COPEL, who provided the author with three event datasets captured from a PMU in the aforementioned system. Some components of the system were modeled in MATLAB-based Power System Toolbox for dynamic simulation, such as generators, PSSs, exciters, and turbine governors in addition to buses, transmission lines, and transformers. The selected algorithm for this proof-of-concept was artificial neural network, defining four distinct possible classes it can recognize - "Short-circuit", "Load Loss", "Line Loss" and "Normal". With the machine learning model defined and trained, its application was executed on real event datasets. The results show that the metrics of the neural network model on the learning process were generally sufficient for real-life solutions, but its performance on the real event datasets was below that of the performance on simulated data. However, considering that the provided datasets were from events that happened far away from the selected PMU and its modeled system, signal distortions and attenuations are present. Thus, it can be stated that the proposed method is applicable, with further data preprocessing, to any given system - as long as it is thoroughly modeled and there is availability of datasets of events that happened within it

    Jornadas Nacionales de Investigación en Ciberseguridad: actas de las VIII Jornadas Nacionales de Investigación en ciberseguridad: Vigo, 21 a 23 de junio de 2023

    Get PDF
    Jornadas Nacionales de Investigación en Ciberseguridad (8ª. 2023. Vigo)atlanTTicAMTEGA: Axencia para a modernización tecnolóxica de GaliciaINCIBE: Instituto Nacional de Cibersegurida

    Secure Communications in Next Generation Digital Aeronautical Datalinks

    Get PDF
    As of 2022, Air Traffic Management (ATM) is gradually digitizing to automate and secure data transmission in civil aviation. New digital data links like the L-band Digital Aeronautical Communications System (LDACS) are being introduced for this purpose. LDACS is a cellular, ground-based digital communications system for flight guidance and safety. Unfortunately, LDACS and many other datalinks in civil aviation lack link layer security measures. This doctoral thesis proposes a cybersecurity architecture for LDACS, developing various security measures to protect user and control data. These include two new authentication and key establishment protocols, along with a novel approach to secure control data of resource-constrained wireless communication systems. Evaluations demonstrate a latency increase of 570 to 620 milliseconds when securely attaching an aircraft to an LDACS cell, along with a 5% to 10% security data overhead. Also, flight trials confirm that Ground-based Augmentation System (GBAS) can be securely transmitted via LDACS with over 99% availability. These security solutions enable future aeronautical applications like 4D-Trajectories, paving the way for a digitized and automated future of civil aviation
    • …
    corecore