5 research outputs found
Recommended from our members
Cybersecurity through Real-Time Distributed Control Systems
Critical infrastructure sites and facilities are becoming increasingly dependent on interconnected physical and cyber-based real-time distributed control systems (RTDCSs). A mounting cybersecurity threat results from the nature of these ubiquitous and sometimes unrestrained communications interconnections. Much work is under way in numerous organizations to characterize the cyber threat, determine means to minimize risk, and develop mitigation strategies to address potential consequences. While it seems natural that a simple application of cyber-protection methods derived from corporate business information technology (IT) domain would lead to an acceptable solution, the reality is that the characteristics of RTDCSs make many of those methods inadequate and unsatisfactory or even harmful. A solution lies in developing a defense-in-depth approach that ranges from protection at communications interconnect levels ultimately to the control system s functional characteristics that are designed to maintain control in the face of malicious intrusion. This paper summarizes the nature of RTDCSs from a cybersecurity perspec tive and discusses issues, vulnerabilities, candidate mitigation approaches, and metrics
Architecture for a Human-Robot Symbiotic System
This paper describes a human-robot symbiont that is under development at Oak Ridge National Laboratory. An overview of the symbiotic system is described that motivates the architecture that has been developed. The architecture is a hierarchical structure that consists of several expert systems which reside above a robot control interface. This interface allows the manipulator to be operated in both a teleoperated and autonomous mode. All these processes coexist with the lowest level of the hierarchy, which is a numerically intensive control algorithm. The architecture is implemented on five processors in a coarsely parallel system