SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Sandberg Henrik) srt2:(2015-2019)"

Sökning: WFRF:(Sandberg Henrik) > (2015-2019)

  • Resultat 1-10 av 143
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  •  
2.
  • Ahlen, Anders, et al. (författare)
  • Toward Wireless Control in Industrial Process Automation : A Case Study at a Paper Mill
  • 2019
  • Ingår i: IEEE Control Systems. - : Institute of Electrical and Electronics Engineers (IEEE). - 1066-033X .- 1941-000X. ; 39:5, s. 36-57
  • Tidskriftsartikel (refereegranskat)abstract
    • Wireless sensors and networks are used only occasionally in current control loops in the process industry. With rapid developments in embedded and highperformance computing, wireless communication, and cloud technology, drastic changes in the architecture and operation of industrial automation systems seem more likely than ever. These changes are driven by ever-growing demands on production quality and flexibility. However, as discussed in "Summary," there are several research obstacles to overcome. The radio communication environment in the process industry is often troublesome, as the environment is frequently cluttered with large metal objects, moving machines and vehicles, and processes emitting radio disturbances [1], [2]. The successful deployment of a wireless control system in such an environment requires careful design of communication links and network protocols as well as robust and reconfigurable control algorithms.
  •  
3.
  • Ahlén, Anders, et al. (författare)
  • Towards Wireless Control in Industrial Process Automation : A Case Study at a Paper Mill
  • 2019
  • Ingår i: IEEE CONTROL SYSTEMS MAGAZINE. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 1066-033X .- 1941-000X. ; 39:5, s. 36-57
  • Tidskriftsartikel (refereegranskat)abstract
    • Wireless sensors and networks are used only occasionally in current control loops in the process industry. With rapid developments in embedded and highperformance computing, wireless communication, and cloud technology, drastic changes in the architecture and operation of industrial automation systems seem more likely than ever. These changes are driven by ever-growing demands on production quality and flexibility. However, as discussed in "Summary," there are several research obstacles to overcome. The radio communication environment in the process industry is often troublesome, as the environment is frequently cluttered with large metal objects, moving machines and vehicles, and processes emitting radio disturbances [1], [2]. The successful deployment of a wireless control system in such an environment requires careful design of communication links and network protocols as well as robust and reconfigurable control algorithms.
  •  
4.
  • Andreasson, Martin, et al. (författare)
  • Performance and scalability of voltage controllers in multi-terminal HVDC networks
  • 2017
  • Ingår i: Proceedings of the American Control Conference. - : Institute of Electrical and Electronics Engineers (IEEE). - 9781509059928 ; , s. 3029-3034
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, we compare the transient performance of a multi-terminal high-voltage DC (MTDC) grid equipped with a slack bus for voltage control to that of two distributed control schemes: A standard droop controller and a distributed averaging proportional-integral (DAPI) controller. We evaluate performance in terms of an ℋ2 metric that quantifies expected deviations from nominal voltages, and show that the transient performance of a droop or DAPI controlled MTDC grid is always superior to that of an MTDC grid with a slack bus. In particular, by studying systems built up over lattice networks, we show that the ℋ2 norm of a slack bus controlled system may scale unboundedly with network size, while the norm remains uniformly bounded with droop or DAPI control. We simulate the control strategies on radial MTDC networks to demonstrate that the transient performance for the slack bus controlled system deteriorates significantly as the network grows, which is not the case with the distributed control strategies.
  •  
5.
  • Briat, C., et al. (författare)
  • The Conservation of Information, Towards an Axiomatized Modular Modeling Approach to Congestion Control
  • 2015
  • Ingår i: IEEE/ACM Transactions on Networking. - 1063-6692 .- 1558-2566. ; 23:3, s. 851-865
  • Tidskriftsartikel (refereegranskat)abstract
    • We derive a modular fluid-flow network congestion control model based on a law of fundamental nature in networks: the conservation of information. Network elements such as queues, users, and transmission channels and network performance indicators like sending/acknowledgment rates and delays are mathematically modeled by applying this law locally. Our contributions are twofold. First, we introduce a modular metamodel that is sufficiently generic to represent any network topology. The proposed model is composed of building blocks that implement mechanisms ignored by the existing ones, which can be recovered from exact reduction or approximation of this new model. Second, we provide a novel classification of previously proposed models in the literature and show that they are often not capable of capturing the transient behavior of the network precisely. Numerical results obtained from packet-level simulations demonstrate the accuracy of the proposed model.
  •  
6.
  • Chen, J., et al. (författare)
  • Protecting Positive and Second-Order Systems against Undetectable Attacks
  • 2017
  • Ingår i: IFAC-PapersOnLine. - : Elsevier. - 2405-8963. ; 50:1, s. 8373-8378
  • Tidskriftsartikel (refereegranskat)abstract
    • Undetectable attacks in security studies of cyber-physical systems render the measurements of the system equal to a possible physical response. In this paper, we investigate defense strategies against the undetectable single-attack for positive systems and second-order systems, which both can be reinterpreted in terms of graphs with nodes and edges, while the undetectable attack is added through one of the nodes. We show that an arbitrary placement of a sensor prevents undetectable single-attack for these classes of systems. It is worth emphasising that we do not need to measure at the corrupted node to prevent the undetectable single-attack, but can measure at any node. The defense strategy is of a low complexity and can be readily implemented.
  •  
7.
  • Herdeiro Teixeira, André, et al. (författare)
  • Strategic stealthy attacks : The output-to-output ℓ2-gain
  • 2016
  • Ingår i: Proceedings of the IEEE Conference on Decision and Control. - : IEEE conference proceedings. - 9781479978861 ; , s. 2582-2587, s. 2582-2587
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, we characterize and analyze the set of strategic stealthy false-data injection attacks on discrete-time linear systems. In particular, the threat scenarios tackled in the paper consider adversaries that aim at deteriorating the system's performance by maximizing the corresponding quadratic cost function, while remaining stealthy with respect to anomaly detectors. As opposed to other work in the literature, the effect of the adversary's actions on the anomaly detector's output is not constrained to be zero at all times. Moreover, scenarios where the adversary has uncertain model knowledge are also addressed. The set of strategic attack policies is formulated as a non-convex constrained optimization problem, leading to a sensitivity metric denoted as the output-to-output ℓ2-gain. Using the framework of dissipative systems, the output-to-output gain is computed through an equivalent convex optimization problem. Additionally, we derive necessary and sufficient conditions for the output-to-output gain to be unbounded, with and without model uncertainties, which are tightly related to the invariant zeros of the system.
  •  
8.
  • Iwaki, Takuya, et al. (författare)
  • Wireless Sensor Network Scheduling for Remote Estimation under Energy Constraints
  • 2017
  • Ingår i: 2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC). - : IEEE. - 9781509028733 ; , s. 3362-3367
  • Konferensbidrag (refereegranskat)abstract
    • This paper studies a design problem of how a group of wireless sensors are selected and scheduled to transmit data efficiently over a multi-hop network subject to energy-saving consideration, when they are observing multiple independent discrete-time linear systems. Each time instant, some sensors are selected to transmit their measurements to a remote estimator. We formulate an optimization problem, minimizing a linear combination of the averaged estimation error and the averaged transmission energy consumption to obtain suitable network scheduling and estimation algorithms. Necessary conditions for optimality are derived and these conditions help trim the feasible solution space so that the optimal solution can be computed efficiently. A numerical example is provided to demonstrate the theoretical results.
  •  
9.
  • Milosevic, Jezdimir, et al. (författare)
  • Analysis and Mitigation of Bias Injection Attacks Against a Kalman Filter
  • 2017
  • Ingår i: IFAC-PapersOnLine. - : Elsevier. - 2405-8963. ; 50:1, s. 8393-8398
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, we consider a state estimation problem for stochastic linear dynamical systems in the presence of bias injection attacks. A Kalman filter is used as an estimator, and a chi-squared test is used to detect anomalies. We first show that the impact of the worst-case bias injection attack in a stochastic setting can be analyzed by a deterministic quadratically constrained quadratic program, which has an analytical solution. Based on this result, we propose a criterion for selecting sensors to secure in order to mitigate the attack impact. Furthermore, we derive a condition on the necessary number of sensors to secure in order for the impact to be less than a desired threshold.
  •  
10.
  • Milosevic, Jezdimir, et al. (författare)
  • Quantifying the Impact of Cyber-Attack Strategies for Control Systems Equipped with an Anomaly Detector
  • 2018
  • Ingår i: 2018 European Control Conference, ECC 2018. - : Institute of Electrical and Electronics Engineers (IEEE). - 9783952426982 ; , s. 331-337
  • Konferensbidrag (refereegranskat)abstract
    • Risk assessment is an inevitable step in the implementation of cost-effective security strategies for control systems. One of the difficulties of risk assessment is to estimate the impact cyber-attacks may have. This paper proposes a framework to estimate the impact of several cyber-attack strategies against a dynamical control system equipped with an anomaly detector. In particular, we consider denial of service, sign alternation, rerouting, replay, false data injection, and bias injection attack strategies. The anomaly detectors we consider are stateless, cumulative sum, and multivariate exponentially weighted moving average detectors. As a measure of the attack impact, we adopt the infinity norm of critical states after a fixed number of time steps. For this measure and the aforementioned anomaly detectors, we prove that the attack impact for all of the attack strategies can be reduced to the problem of solving a set of convex minimization problems. Therefore, the exact value of the attack impact can be obtained easily. We demonstrate how our modeling framework can be used for risk assessment on a numerical example.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 143
Typ av publikation
konferensbidrag (72)
tidskriftsartikel (52)
annan publikation (4)
bokkapitel (4)
licentiatavhandling (4)
doktorsavhandling (3)
visa fler...
rapport (2)
samlingsverk (redaktörskap) (1)
forskningsöversikt (1)
visa färre...
Typ av innehåll
refereegranskat (122)
övrigt vetenskapligt/konstnärligt (20)
populärvet., debatt m.m. (1)
Författare/redaktör
Sandberg, Henrik (96)
Johansson, Karl H., ... (19)
Johansson, Karl Henr ... (18)
Johansson, Karl H. (8)
Teixeira, André (6)
Paridari, Kaveh (6)
visa fler...
Sörensen, Jens (5)
Tegling, Emma (5)
Feldwisch, Joachim (5)
Wennborg, Anders (5)
Lindman, Henrik (5)
Sandberg, Henrik, Pr ... (5)
Imura, Jun-ichi (5)
Tolmachev, Vladimir (4)
Sandberg, Erik (4)
Pålsson, Henrik (4)
Tanaka, Takashi (4)
Sandström, Mattias (4)
Lubberink, Mark (4)
Eriksson, Henrik (4)
Skoglund, Mikael (4)
Olofsson, Helena (4)
Nekouei, Ehsan (4)
Sandberg, Erik, 1978 ... (3)
Sandberg, Mats (3)
Hansson, Helena (3)
Johansson, Karl Henr ... (3)
Berg, Lotta (3)
Hultgren, Jan (3)
Wilhelmsson, Marcus, ... (3)
Nilsson, Hans-Erik, ... (3)
Besselink, Bart (3)
Herlin, Anders Henri ... (3)
Jacobson, Magdalena (3)
Keeling, Linda (3)
Sandberg, Eva (3)
Steen, Margareta (3)
Velikyan, Irina (3)
Pare, Philip E. (3)
Wall, Helena (3)
Fall, Nils (3)
De Koning, Dirk-Jan (3)
Engholm, Magnus (3)
Carlsson, Jörgen (3)
Andreasson, Martin (3)
Hellström, Ingrid (3)
Füchtbauer, Anders F ... (3)
Lunner Kolstrup, Chr ... (3)
Littorin, Linnea (3)
Gradén, Henrik, 1968 (3)
visa färre...
Lärosäte
Kungliga Tekniska Högskolan (100)
Uppsala universitet (20)
Linköpings universitet (9)
Göteborgs universitet (8)
Lunds universitet (6)
RISE (5)
visa fler...
Umeå universitet (4)
Karolinska Institutet (4)
Röda Korsets Högskola (4)
Mittuniversitetet (3)
Chalmers tekniska högskola (3)
Sveriges Lantbruksuniversitet (3)
Luleå tekniska universitet (2)
Mälardalens universitet (2)
Jönköping University (2)
Stockholms universitet (1)
Örebro universitet (1)
Linnéuniversitetet (1)
Naturhistoriska riksmuseet (1)
Blekinge Tekniska Högskola (1)
Marie Cederschiöld högskola (1)
Kungl. Musikhögskolan (1)
visa färre...
Språk
Engelska (134)
Svenska (9)
Forskningsämne (UKÄ/SCB)
Teknik (104)
Medicin och hälsovetenskap (17)
Naturvetenskap (16)
Samhällsvetenskap (7)
Lantbruksvetenskap (3)
Humaniora (2)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy