65 research outputs found

    A game theory model for electricity theft detection and privacy-aware control in AMI systems

    Get PDF
    We introduce a model for the operational costs of an electric distribution utility. The model focuses on two of the new services that are enabled by the Advanced Metering Infrastructure (AMI): (1) the fine-grained anomaly detection that is possible thanks to the frequent smart meter sampling rates (e.g., 15 minute sampling intervals of some smart meter deployments versus monthly-readings from old meters), and (2) the ability to shape the load thanks to advanced demand-response mechanisms that leverage AMI networks, such as direct-load control. We then study two security problems in this context. (1) In the first part of the paper we formulate the problem of electricity theft detection (one of the use-cases of anomaly detection) as a game between the electric utility and the electricity thief. The goal of the electricity thief is to steal a predefined amount of electricity while minimizing the likelihood of being detected, while the electric utility wants to maximize the probability of detection and the degree of operational cost it will incur for managing this anomaly detection mechanism. (2) In the second part of the paper we formulate the problem of privacy-preserving demand response as a control theory problem, and show how to select the maximum sampling interval for smart meters in order to protect the privacy of consumers while maintaining the desired load shaping properties of demand-response programs

    An Observer-based Switching Algorithm for Safety under Sensor Denial-of-Service Attacks

    Full text link
    The design of safe-critical control algorithms for systems under Denial-of-Service (DoS) attacks on the system output is studied in this work. We aim to address scenarios where attack-mitigation approaches are not feasible, and the system needs to maintain safety under adversarial attacks. We propose an attack-recovery strategy by designing a switching observer and characterizing bounds in the error of a state estimation scheme by specifying tolerable limits on the time length of attacks. Then, we propose a switching control algorithm that renders forward invariant a set for the observer. Thus, by satisfying the error bounds of the state estimation, we guarantee that the safe set is rendered conditionally invariant with respect to a set of initial conditions. A numerical example illustrates the efficacy of the approach.Comment: Accepted at the 2023 American Control Conference (ACC

    HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs

    Get PDF
    Most of the work for securing the routing protocols of mobile ad hoc wireless networks has been done in prevention. Intrusion detection systems play a complimentary role to that of prevention for dealing with malicious insiders, incorrect implementation and attack models. We present a statistical framework that allows the incorporation of prior information about the normal behavior of the network and of network attacks in a principled way for the detection of known and unkown attacks. For detecting an attack as soon as possible we use quickest change detection stalgorithms. We use hidden Markov models (HMMs) as a generative view of the dynamic evolution of the hop count distribution. Our results show that simple attacks can be detected by an anomaly detection framework. However, detection of more complex attacks requires incorporation of prior knowledge in the HMMs

    Detection of Greedy Individual and Colluding MAC Layer Attackers

    Get PDF
    Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performance of wireless networks, with effects similar to those of Denial of Service (DoS) attacks. In this paper we consider the problem of detection and prevention of node misbehavior at the MAC layer, focusing on the back-off manipulation by selfish nodes. We propose an algorithm that ensures honest behavior of non-colluding participants. Furthermore, we analyze the problem of colluding selfish nodes, casting the problem within a minimax robust detection framework, providing a detection rule of optimum performance for the worst-case attack. Finally, we compare the effects of colluding attackers with a single attacker in terms of the detection delay. Although our approach is general and can serve as a guideline for the design of any probabilistic distributed MAC protocol, we focus our analysis on the IEEE 802.11 MAC

    Global importance of Indigenous Peoples, their lands, and knowledge systems for saving the world's primates from extinction

    Get PDF
    Publisher Copyright: Copyright © 2022 The Authors, some rights reserved.Primates, represented by 521 species, are distributed across 91 countries primarily in the Neotropic, Afrotropic, and Indo-Malayan realms. Primates inhabit a wide range of habitats and play critical roles in sustaining healthy ecosystems that benefit human and nonhuman communities. Approximately 68% of primate species are threatened with extinction because of global pressures to convert their habitats for agricultural production and the extraction of natural resources. Here, we review the scientific literature and conduct a spatial analysis to assess the significance of Indigenous Peoples' lands in safeguarding primate biodiversity. We found that Indigenous Peoples' lands account for 30% of the primate range, and 71% of primate species inhabit these lands. As their range on these lands increases, primate species are less likely to be classified as threatened or have declining populations. Safeguarding Indigenous Peoples' lands, languages, and cultures represents our greatest chance to prevent the extinction of the world's primates.Peer reviewe

    Perceptions of the appropriate response to norm violation in 57 societies

    Get PDF
    An Author Correction to this article: DOI: 10.1038/s41467-021-22955-x.Norm enforcement may be important for resolving conflicts and promoting cooperation. However, little is known about how preferred responses to norm violations vary across cultures and across domains. In a preregistered study of 57 countries (using convenience samples of 22,863 students and non-students), we measured perceptions of the appropriateness of various responses to a violation of a cooperative norm and to atypical social behaviors. Our findings highlight both cultural universals and cultural variation. We find a universal negative relation between appropriateness ratings of norm violations and appropriateness ratings of responses in the form of confrontation, social ostracism and gossip. Moreover, we find the country variation in the appropriateness of sanctions to be consistent across different norm violations but not across different sanctions. Specifically, in those countries where use of physical confrontation and social ostracism is rated as less appropriate, gossip is rated as more appropriate.Peer reviewe

    Estimating the global conservation status of more than 15,000 Amazonian tree species

    Get PDF

    Aguas del Iténez o Guaporé

    Get PDF
    Bolivia y Brasil comparten una de las cuencas más atractivas y preservadas de la te-giuri amazônica: la cuenca del rio llénez o Guaporé, que escurre tanto sobre el lecho rocoso del Escudo Precámbrico Brasilefto como sobre las Hanuras del Beni. Estas influencias hacen que la cuenca del iténez tenga una elevada heterogeneidad de habitats, una fauna acuálica peculiar y un alto valor de conservation. Este patrimo­nio binacional posée un potencial importante para la conservación de la diversidad regional y cl dcsar rollo sostcniblc participativo de las comunidades locales. El libro contiene un resumen del conotimìento de la cuenca y sus recursos, generado en los últimos 10 anos por un equipo de investigadores bolivianos, brasilefios y de otras nacionalidades. Se presenta una descripeión del medio fisico, así como resultados relevantes sobre la biodiversidad acuática, con énfasis en algas, peces, reptiles y mamíferos. El aporte más notable del libro, adernas de la descripeión ecológica del ecosistema, son las lecciones aprendidas que surgieron de experiências locales sobre la élaboration participativa de herramientas para la gestion de los recursos hidrobiológicos.A Bolívia e o Brasil compartilham uma das bacias hidrográficas mais atrativas e preservadas da região amazônica: a bacia do Rio Iténez ou Guaporé. A combinação das influências do escudo pré-cambriano brasileiro e da planícies do Beni é uma das razões pela qual existem na região elevada heterogeneidade de habitats, fauna aquática peculiar e alto grau valor dc conservação. Eslc patrimônio binacional possui potencial significativo para a conservação da diversidade regional e desenvolvimento sustentável participativo das comunidades locais. O livro contém um resumo do conhecimento da bacia e seus recursos, gerado nos últimos dez anos por uma equipe de pesquisadores bolivianos, brasileiros e de outras nacionalidades. Apresentamos uma descrição do meio físico, bem como resultados relevantes da biodiversidade aquática, com ênfase em algas, peixes, répteis e mamíferos. A contribuição mais notável do livro, além da descrição ecológica do ecossistema, é a descrição das lições aprendidas que surgiram a partir de experiências locais sobre elaboração participativa de ferramentas para a gestão dos recursos aquáticos presentes nesta bacia

    Convalescent plasma in patients admitted to hospital with COVID-19 (RECOVERY): a randomised controlled, open-label, platform trial

    Get PDF
    Background: Many patients with COVID-19 have been treated with plasma containing anti-SARS-CoV-2 antibodies. We aimed to evaluate the safety and efficacy of convalescent plasma therapy in patients admitted to hospital with COVID-19. Methods: This randomised, controlled, open-label, platform trial (Randomised Evaluation of COVID-19 Therapy [RECOVERY]) is assessing several possible treatments in patients hospitalised with COVID-19 in the UK. The trial is underway at 177 NHS hospitals from across the UK. Eligible and consenting patients were randomly assigned (1:1) to receive either usual care alone (usual care group) or usual care plus high-titre convalescent plasma (convalescent plasma group). The primary outcome was 28-day mortality, analysed on an intention-to-treat basis. The trial is registered with ISRCTN, 50189673, and ClinicalTrials.gov, NCT04381936. Findings: Between May 28, 2020, and Jan 15, 2021, 11558 (71%) of 16287 patients enrolled in RECOVERY were eligible to receive convalescent plasma and were assigned to either the convalescent plasma group or the usual care group. There was no significant difference in 28-day mortality between the two groups: 1399 (24%) of 5795 patients in the convalescent plasma group and 1408 (24%) of 5763 patients in the usual care group died within 28 days (rate ratio 1·00, 95% CI 0·93–1·07; p=0·95). The 28-day mortality rate ratio was similar in all prespecified subgroups of patients, including in those patients without detectable SARS-CoV-2 antibodies at randomisation. Allocation to convalescent plasma had no significant effect on the proportion of patients discharged from hospital within 28 days (3832 [66%] patients in the convalescent plasma group vs 3822 [66%] patients in the usual care group; rate ratio 0·99, 95% CI 0·94–1·03; p=0·57). Among those not on invasive mechanical ventilation at randomisation, there was no significant difference in the proportion of patients meeting the composite endpoint of progression to invasive mechanical ventilation or death (1568 [29%] of 5493 patients in the convalescent plasma group vs 1568 [29%] of 5448 patients in the usual care group; rate ratio 0·99, 95% CI 0·93–1·05; p=0·79). Interpretation: In patients hospitalised with COVID-19, high-titre convalescent plasma did not improve survival or other prespecified clinical outcomes. Funding: UK Research and Innovation (Medical Research Council) and National Institute of Health Research
    corecore