57 research outputs found

    Special section on Cyber-Physical & Human Systems (CPHS)

    Get PDF

    Design of a methodology to determine the specifications of a cyber-physical human system. Case study : supply chains

    Get PDF
    Currently, the labor force is being affected by changes in the production systems presenting in the industry. These changes lead to employees being replaced by machines and robots. Because of this, there is a need to consider how technological advances are impacting workers, which remains as a vital resource in manufacturing companies. Therefore, Colombia is at a low level of technification, which means, there are numerous manual operations in companies, the study will focus on this knowledge gap, to improve integration of workers in cyber-physical systems in the country. To achieve the desired integration between humans and machines, this project proposes the creation of a methodology that aims to determine the specifications required in the configuration of a cyber-physical human system. Be part of the identification of the specifications that the system needs to reach to define the requirements of both the client and the product and considerations for the well-being of the human in the mention system. With the identification of these parameters, the characterization of the system is carried out to determine different alternatives of the components, structure, behavior, and dynamics, based on the systems modeling. In conclusion, the validation of the preliminary methodology created with experts and with the implementation is carried out of the system in a case study of the supply chain. Through the configuration of three Workstations according to the desired level of automatization, under a controlled simulation environment.Ingeniero (a) IndustrialPregrad

    Security of the Internet of Things: Vulnerabilities, Attacks and Countermeasures

    Get PDF
    Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium technologies and have wide range of applications in our surrounding environment. The reason behind the vast adoption of WSNs in various applications is that they have tremendously appealing features, e.g., low production cost, low installation cost, unattended network operation, autonomous and longtime operation. WSNs have started to merge with the Internet of Things (IoT) through the introduction of Internet access capability in sensor nodes and sensing ability in Internet-connected devices. Thereby, the IoT is providing access to huge amount of data, collected by the WSNs, over the Internet. Hence, the security of IoT should start with foremost securing WSNs ahead of the other components. However, owing to the absence of a physical line-of-defense, i.e., there is no dedicated infrastructure such as gateways to watch and observe the flowing information in the network, security of WSNs along with IoT is of a big concern to the scientific community. More specifically, for the application areas in which CIA (confidentiality, integrity, availability) has prime importance, WSNs and emerging IoT technology might constitute an open avenue for the attackers. Besides, recent integration and collaboration of WSNs with IoT will open new challenges and problems in terms of security. Hence, this would be a nightmare for the individuals using these systems as well as the security administrators who are managing those networks. Therefore, a detailed review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks are provided in this paper. In this text, attacks are categorized and treated into mainly two parts, most or all types of attacks towards WSNs and IoT are investigated under that umbrella: “Passive Attacks” and “Active Attacks”. Understanding these attacks and their associated defense mechanisms will help paving a secure path towards the proliferation and public acceptance of IoT technology

    Catch, Clean, and Release: A Survey of Obstacles and Opportunities for Network Trace Sanitization

    Get PDF
    Network researchers benefit tremendously from access to traces of production networks, and several repositories of such network traces exist. By their very nature, these traces capture sensitive business and personal activity. Furthermore, network traces contain significant operational information about the target network, such as its structure, identity of the network provider, or addresses of important servers. To protect private or proprietary information, researchers must “sanitize” a trace before sharing it. \par In this chapter, we survey the growing body of research that addresses the risks, methods, and evaluation of network trace sanitization. Research on the risks of network trace sanitization attempts to extract information from published network traces, while research on sanitization methods investigates approaches that may protect against such attacks. Although researchers have recently proposed both quantitative and qualitative methods to evaluate the effectiveness of sanitization methods, such work has several shortcomings, some of which we highlight in a discussion of open problems. Sanitizing a network trace, however challenging, remains an important method for advancing network–based research

    Closed-loop control of anesthesia : survey on actual trends, challenges and perspectives

    Get PDF
    Automation empowers self-sustainable adaptive processes and personalized services in many industries. The implementation of the integrated healthcare paradigm built on Health 4.0 is expected to transform any area in medicine due to the lightning-speed advances in control, robotics, artificial intelligence, sensors etc. The two objectives of this article, as addressed to different entities, are: i) to raise awareness throughout the anesthesiologists about the usefulness of integrating automation and data exchange in their clinical practice for providing increased attention to alarming situations, ii) to provide the actualized insights of drug-delivery research in order to create an opening horizon towards precision medicine with significantly improved human outcomes. This article presents a concise overview on the recent evolution of closed-loop anesthesia delivery control systems by means of control strategies, depth of anesthesia monitors, patient modelling, safety systems, and validation in clinical trials. For decades, anesthesia control has been in the midst of transformative changes, going from simple controllers to integrative strategies of two or more components, but not achieving yet the breakthrough of an integrated system. However, the scientific advances that happen at high speed need a modern review to identify the current technological gaps, societal implications, and implementation barriers. This article provides a good basis for control research in clinical anesthesia to endorse new challenges for intelligent systems towards individualized patient care. At this connection point of clinical and engineering frameworks through (semi-) automation, the following can be granted: patient safety, economical efficiency, and clinicians' efficacy

    IFAC bilten

    Get PDF

    A Systematic Review of the State of Cyber-Security in Water Systems

    Get PDF
    Critical infrastructure systems are evolving from isolated bespoke systems to those that use general-purpose computing hosts, IoT sensors, edge computing, wireless networks and artificial intelligence. Although this move improves sensing and control capacity and gives better integration with business requirements, it also increases the scope for attack from malicious entities that intend to conduct industrial espionage and sabotage against these systems. In this paper, we review the state of the cyber-security research that is focused on improving the security of the water supply and wastewater collection and treatment systems that form part of the critical national infrastructure. We cover the publication statistics of the research in this area, the aspects of security being addressed, and future work required to achieve better cyber-security for water systems

    The Efficacy of Cybersecurity Regulation

    Get PDF
    • 

    corecore