93 research outputs found

    Network Localization by Shadow Edges

    Full text link
    Localization is a fundamental task for sensor networks. Traditional network construction approaches allow to obtain localized networks requiring the nodes to be at least tri-connected (in 2D), i.e., the communication graph needs to be globally rigid. In this paper we exploit, besides the information on the neighbors sensed by each robot/sensor, also the information about the lack of communication among nodes. The result is a framework where the nodes are required to be bi-connected and the communication graph has to be rigid. This is possible considering a novel typology of link, namely Shadow Edges, that account for the lack of communication among nodes and allow to reduce the uncertainty associated to the position of the nodes.Comment: preprint submitted to 2013 European Control Conference, July 17-19 2013, Zurich, Switzerlan

    Integrating IoT technologies for an "intelligent" safety management in the process industry

    Get PDF
    Abstract IoT (Internet of Things) technologies are wide spreading in several industrial sector due to a combination of increasing technical performance together with decreasing purchase prices: thus, new tools are been evaluated for adoption in new fields of application, like safety at work. In recent years, several projects and prototypes as well as industrial solutions have been developed using IOT technologies especially to dynamically managing safety levels at complex workplaces. The aim of this study is to describe a prototype system where the so called Smart Objects (SOs) - integrating different IoT technologies- interact in a working environment through a digital platform for managing different type of hazards – e.g. involving safety of plants as well as workers - usually influencing safety levels especially in process industry. The fields of application of the proposed system vary from tracking periodic mandatory maintenance and analyzing aging of equipment, processing or containing hazardous materials, to remote tracking of hazardous conditions of workers

    A Hardware-in-the-Loop Water Distribution Testbed Dataset for Cyber-Physical Security Testing

    Get PDF
    This paper presents a dataset to support researchers in the validation process of solutions such as Intrusion Detection Systems (IDS) based on artificial intelligence and machine learning techniques for the detection and categorization of threats in Cyber Physical Systems (CPS). To this end, data were acquired from a hardware-in-the-loop Water Distribution Testbed (WDT) which emulates water flowing between eight tanks via solenoid-valves, pumps, pressure and flow sensors. The testbed is composed of a real subsystem that is virtually connected to a simulated one. The proposed dataset encompasses both physical and network data in order to highlight the consequences of attacks in the physical process as well as in network traffic behaviour. Simulations data are organized in four different acquisitions for a total duration of 2 hours by considering normal scenario and multiple anomalies due to cyber and physical attacks

    Strategies to improve Critical Infrastructures Robustness against the IEMI threat : a Review of relevant Standards and Guidelines on the topic

    Get PDF
    This paper aims to provide a brief overview of relevant standards, procedures and guidelines to standard bodies to manage the impact of the Intentional ElectroMagnetic Interference (IEMI) threat. It also provides guidelines for CI operators on how to reduce their exposure on IEMI hazards

    A Strategy to Improve Infrastructure Survivability via Prioritizing Critical Nodes Protection

    Get PDF
    From an engineering point of view, the survivability of a system is defined as its ability to continue to operate despite a natural or human-made disturbance; for example a serious mechanical fault, a human error, or a malicious cyber or physical attack. In the context of critical infrastructures, due to their relevance for the public wellness, it is mandatory to improve the robustness of such systems in order to ensure the availability of essential services such as the distribution of water, gas and electrical power. Nowadays, due to the increasing number of cyber incidents, the definition of protection strategies, able to improve the survivability level of this infrastructure, is at the heart of the scientific debate. In this chapter we propose a procedure based on three steps aimed at improving infrastructure survivability. In the first stage we propose some approaches to identify the criticality degree of each subsystem composing the infrastructure, in the second stage we propose a method to aggregate multiple criticality evaluations performed by subject matter experts by providing a unique holistic indicator. Finally, on the basis of such indicator, we propose a protection strategy to improve the robustness of the entire system
    corecore