Article
Automation & Control Systems
Mutaz M. Hamdan, Magdi S. Mahmoud, Uthman A. Baroudi
Summary: Industry Revolution 4.0 drives the digitization of the industry. Cyberphysical Systems (CPSs) introduce opportunities and challenges to the industry. In this article, an event-triggering control scheme is designed to protect CPSs from cyber-attacks. Additionally, an observer-based control approach is proposed to maintain the stability of CPSs.
Article
Automation & Control Systems
Xirong Ning, Jin Jiang
Summary: This article presents a modular experimental platform to support cyber security assessment and enhancement of cyber-physical systems. The platform is designed with a hardware-based prototype and provides effective methods to identify vulnerabilities and evaluate different security enhancement strategies.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Computer Science, Information Systems
Rodrigo D. Trevizan, James Obert, Valerio De Angelis, Tu A. Nguyen, Vittal S. Rao, Babu R. Chalamala
Summary: This paper presents a literature review on the cyberphysical security of grid-connected battery energy storage systems (BESSs). It discusses the challenges of integrating BESS into power systems and the increased attack surface for cyberthreats. The paper also addresses threat vectors, detection methods, protective measures, and research gaps in the field.
Article
Computer Science, Theory & Methods
Jinglin Zou, Debiao He, Sherali Zeadally, Neeraj Kumar, Huaqun Wang, Kkwang Raymond Choo
Summary: Cloud computing is a network model of on-demand access, while blockchain can be applied to provide security services in the cloud computing model, addressing security challenges. Research also indicates that cloud computing can provide performance improvements for blockchain.
ACM COMPUTING SURVEYS
(2021)
Article
Computer Science, Artificial Intelligence
Noureen Talpur, Said Jadid Abdulkadir, Hitham Alhussian, Mohd Hilmi Hasan, Norshakirah Aziz, Alwi Bamhdi
Summary: Deep neuro-fuzzy systems (DNFS) are hybrid systems that have been applied to large and complex datasets with high interpretability and reasonable accuracy in various domains. This study aims to perform a systematic review to evaluate the progress, trends, issues, challenges, and future scope of DNFS studies, as there is a lack of comprehensive research in this field.
ARTIFICIAL INTELLIGENCE REVIEW
(2023)
Article
Computer Science, Artificial Intelligence
Xiaokang Zhou, Shaohua Li, Zheng Li, Weimin Li
Summary: Smart cities utilize information technology to integrate city systems and functions for better management and services. The paper treats smart cities as Cyber-Physical-Social Systems (CPSS) and focuses on information diffusion within CPSS, covering its features, applications in smart city field, and critical technologies. The research also identifies open issues, challenges, and potential future directions for information diffusion in smart city CPSS.
Article
Computer Science, Information Systems
Vibekananda Dutta, Teresa Zielinska
Summary: The development of IoT and autonomous robotic applications has enabled robots to operate in challenging environments with wireless sensors. However, security issues such as information faults and system failures can compromise the safety of collaborative robotic fleets during human-robot interaction. Therefore, a secure control framework for robotic systems is necessary to ensure safety in communication channels, while considering different network attack modes and standardization efforts from organizations like NIST and EP.
Article
Computer Science, Hardware & Architecture
Dimitrios Serpanos, Konstantinos Katsigiannis
Summary: Fuzz testing allows for automated remote testing of cyberphysical and Internet of Things systems, with the crucial aspect being the selection of effective test vector sequences through the incorporation of artificial intelligence and machine learning techniques to determine successful selection criteria.
Article
Automation & Control Systems
Alberto Blanco-Justicia, Josep Domingo-Ferrer, Sergio Martinez, David Sanchez, Adrian Flanagan, Kuan Eeik Tan
Summary: Federated learning is a method that allows a server to learn a machine learning model across multiple decentralized clients, saving computation to the server and protecting the clients' private data. However, FL still faces security and privacy attacks, for which corresponding solutions are needed.
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE
(2021)
Article
Automation & Control Systems
Panpan Zhu, Shangtai Jin, Xuhui Bu, Zhongsheng Hou, Chenkun Yin
Summary: In this article, a novel model-free adaptive control (MFAC) design is proposed for a class of multiple input multiple output (MIMO) nonlinear cyber-physical systems (CPSs) under false data injection (FDI) attacks in the measurement channel. The proposed approach includes a threshold attack detection scheme based on the difference between predicted and transmission data, an attack compensation module that can be changed according to different attack strategies, and a model-free adaptive controller based on partial form dynamic linearization for the reconstructed system after attack compensation. Theoretical analysis shows the ultimate boundedness of tracking error, and numerical simulations demonstrate the effectiveness and flexibility of the proposed approach.
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS
(2023)
Article
Robotics
Michal Yemini, Angelia Nedic, Andrea Goldsmith, Stephanie Gil
Summary: This study proposes a unified mathematical framework for addressing the problem of resilient consensus with stochastic trust values between agents, and provides conclusions under different conditions, showing that convergence to a common limit value is possible even with malicious agents, the deviation of the converged limit can be bounded with high probability, and correct classification of malicious agents can be achieved in finite time. Additionally, the expected convergence rate exponentially decays with the quality of trust observations between agents.
IEEE TRANSACTIONS ON ROBOTICS
(2022)
Article
Computer Science, Information Systems
Fatemeh Golpayegani, Maxime Gueriau, Pierre-Antoine Laharotte, Saeedeh Ghanadbashi, Jiaying Guo, Jack Geraghty, Shen Wang
Summary: Shared Mobility Systems (SMS) face challenges such as facility location, vehicle routing, and resource matching. Existing studies mainly focus on tackling specific challenges using AI, machine learning, and optimization techniques, but lack a holistic view on whole system design. This paper aims to bridge this gap by categorizing the challenges of SMS in different transportation modes and reviewing how the offered solutions address these challenges as a unified system.
Article
Automation & Control Systems
Xiao-Meng Li, Wenbin Xiao, Guohuai Lin, Hongyi Li, Renquan Lu
Summary: This paper investigates the security control problem over a finite horizon for distributed cyber-physical systems (CPSs) under replay attacks and switching topologies. A reasonable attack model is established to describe the randomly occurring replay attacks, where the measurement information is maliciously replaced by previous unnecessary information. A distributed observer-based H infinity$$ {H}_{\infty } $$ control protocol is developed under the Markovian switching communication network to mitigate the influence on system performance resulting from disturbances and replay attacks. Two sufficient conditions are derived using the recursive linear matrix inequality method and stochastic analysis technique to ensure consensus of the closed-loop system while satisfying the prescribed H infinity$$ {H}_{\infty } $$ performance index. Gain matrices of observer and controller are derived by solving the reality solvable matrix inequalities. Simulated examples are presented to compare the control performance under different attack strategies and explore the relationship between the number of consecutive attacks and the performance index.
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL
(2023)
Article
Computer Science, Information Systems
Syed Rizvi, Mark Scanlon, Jimmy McGibney, John Sheppard
Summary: Network forensics focuses on identifying and investigating network attacks, reverse engineering network protocols, and investigating networked devices. It is at the intersection of digital forensics, incident response, and network security. Artificial intelligence methods are increasingly used in network forensics to automatically detect attacks and improve network traffic classification accuracy. This paper provides a comprehensive survey of the latest research and applications in network forensics, including network traffic analysis, intrusion detection systems, IoT devices, cloud forensics, and more. The current challenges and future research directions in each application area are also discussed.
Review
Fisheries
Amanda Spradlin, Subhrajit Saha
Summary: Food insecurity is becoming one of the world's most pressing issues, exacerbated by climate change, inefficient agricultural practices, declining freshwater resources, and population growth. Aquaponics, a climate-smart and alternative agriculture system, is seen as a potential solution with high productivity and minimal resource requirements. Saline aquaponics, specifically in salinity-vulnerable regions, has the potential to alleviate food insecurity, expand aquaculture and salt-tolerant crop markets, and reduce pressure on declining marine populations.