SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Ferrari R) srt2:(2020-2022);lar1:(miun)"

Sökning: WFRF:(Ferrari R) > (2020-2022) > Mittuniversitetet

  • Resultat 1-8 av 8
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Alves, H. B. M., et al. (författare)
  • Introducing a survey methodology for assessing LoRaWAN coverage in Smart Campus scenarios
  • 2020
  • Ingår i: Proceedings. - : Institute of Electrical and Electronics Engineers Inc.. - 9781728148922 ; , s. 708-712
  • Konferensbidrag (refereegranskat)abstract
    • The LoRa is a Low Power Wide Area Network (LPWAN) technology. It has been proposed as a viable wireless connection method for the implementation of the Internet of Things (IoT), thanks to its wide coverage, low complexity and low energy consumption. Several studies ave been carried out about real coverage performance. In this article, a new test methodology for the experimental evaluation of LoRaWAN coverage within a smart campus is presented. The new approach consists in the definition of devices, method and procedures. The architecture of the mobile node is outlined. The survey procedure is based on a mapping phase, necessary to highlight the LoRaWAN coverage in the test area. Finally, a use case is described in the article: it is not intended for evaluating a specific implementation, but for assessing the suitability of the proposed methodology. The use case results demonstrate the effectiveness of the survey methodology in a real smart campus. © 2020 IEEE.
  •  
2.
  • Ferrari, P., et al. (författare)
  • Model-Based Stealth Attack to Networked Control System Based on Real-Time Ethernet
  • 2021
  • Ingår i: IEEE Transactions on Industrial Electronics. - : Institute of Electrical and Electronics Engineers Inc.. - 0278-0046 .- 1557-9948. ; 68:8, s. 7672-7683
  • Tidskriftsartikel (refereegranskat)abstract
    • In this article, industrial control systems include networked control systems (NCS), which use real-time Ethernet (RTE) protocols since many years, well before the time sensitive networking initiative debut. Today, ethernet-based control systems are used all across Industry 4.0, including in critical applications, allowing for straight integration with information technology layers. Even if it is known that current RTE protocols do not have strong authentication or ciphering options, it is still very challenging to perform undetected cyber-attacks to these protocols while the NSC is in operation, in particular because such attacks must comply with very strict and small temporal constraints. In this article, a model-based attack is proposed for service degradation of NCS. The attack is carried out in real-time and it can remain undetected for the entire plant life. The attack can be applied to any RTE protocols and, without loss of generality, a detailed analysis of stealth techniques is provided for a specific real use case based on PROFINET. The experimental results demonstrate the feasibility of the proposed attack and its high effectiveness. The article also points out some possible future investigation directions in order to mitigate the attack. © 1982-2012 IEEE.
  •  
3.
  • Pasetti, M., et al. (författare)
  • Artificial Neural Network-Based Stealth Attack on Battery Energy Storage Systems
  • 2021
  • Ingår i: IEEE Transactions on Smart Grid. - : Institute of Electrical and Electronics Engineers Inc.. - 1949-3053 .- 1949-3061.
  • Tidskriftsartikel (refereegranskat)abstract
    • As the number of installed Battery Energy Storage Systems (BESSs) increases, the concerns related to possible cyberattacks to these systems rise accordingly. The most of BESS owners knows their systems may be vulnerable, but they often consider only denial of service attacks in their risk assessment. Unfortunately, other, subtler and more dangerous attacks exist. In this paper we show that a stealth attack to BESSs can be performed by applying a Man-in-the-Middle (MitM) approach. The aim of the attack is to stealthily manage the physical system by hiding the actual behavior of the system to its supervisory controller. In this case the attacker would be able to: (i) degrade the BESS by reducing its expected lifetime, (ii) produce economic losses for the prosumer, and (iii) affect the security and stability of the grid. The feasibility of the attack is demonstrated by providing an example of a stealth MitM attack on a real BESS coupled with a photovoltaic power plant. The proposed case study demonstrates that such attack can be performed without being discovered by end-users and shows that its effects can be severe. Finally, possible strategies to avoid or detect such kind of attack are discussed. IEEE
  •  
4.
  • Silva, D. R. C., et al. (författare)
  • IoT framework with flexible management of multi-protocol nodes for redundancy applications
  • 2021
  • Ingår i: 2021 IEEE International Workshop on Metrology for Industry 4.0 and IoT, MetroInd 4.0 and IoT 2021 - Proceedings. - : Institute of Electrical and Electronics Engineers Inc.. - 9781665419802 ; , s. 677-681
  • Konferensbidrag (refereegranskat)abstract
    • The spreading of IoT in every applications triggered the creation of many IoT frameworks. Many of them are compatible with several transmission protocols to collect data from IoT end-nodes (e.g. sensors/actuators). This paper introduces a new approach for the management of multi-protocol IoT architecture with redundancy features. Assuming the functional view diagram of IoT Architecture reference project (IoT-A), adaptations in communication and management functional blocks have been introduced to support redundancy based on multi-protocol and all the related management issues. The main goal is to keep this feature transparent for the rest of the system, which includes the application and its users. An experimental setup was designed and experiments were carried out to demonstrate feasibility and to characterize performance of the proposed solution. The results show that, with the multi-protocol redundancy activated, the IoT framework is capable of transparently delivering more information to the user application. © 2021 IEEE.
  •  
5.
  • Almeida, N. C., et al. (författare)
  • Proposal of a Hybrid LoRa Mesh / LoRaWAN Network
  • 2020
  • Ingår i: Proceedings. - : Institute of Electrical and Electronics Engineers Inc.. - 9781728148922 ; , s. 702-707
  • Konferensbidrag (refereegranskat)abstract
    • There is a recent interest in the deployment of Low Power Wide Area Networks (LPWANs), such as LoRaWAN, to support Internet of Things (IoT) applications. Even though the main advantage of these LPWANs are the long rage communication, the challenge of providing seamless and shadow area coverage still remains. This paper presents a proposal of a hybrid LoRa Mesh/LoRaWAN network to cope with this challenge. In this proposal, a mesh network of LoRa nodes are connected to a Proxy node that works as a mesh coordinator and is also connected to the LoRaWAN network. The advantage of this topology is the improvement of the communication coverage in shadow areas where a regular LoRaWAN node cannot be reachable in cases of obstacles or topography. The development of the LoRa Mesh network as well as the routing mechanism are presented and verified with experimental results. Finally, the integration of the LoRa Mesh with the LoRaWAN networks is discussed and a proposal is presented. © 2020 IEEE.
  •  
6.
  • Ferrari, P., et al. (författare)
  • Work-in-Progress : Compromising Security of Real-time Ethernet Devices by means of Selective Queue Saturation Attack
  • 2020
  • Ingår i: Proceedings. - : Institute of Electrical and Electronics Engineers Inc.. - 9781728152974
  • Konferensbidrag (refereegranskat)abstract
    • The industrial control systems (ICS) are using Real-Time Ethernet (RTE) protocols for many years. Today, Ethernet based control systems are widely used in industries. The Time Sensitive Networking (TSN) initiative will definitely push their further diffusion. With the introduction of Industry 4.0, production machines and their components have been connected to the Internet. Currently adopted RTE protocols do not require authentication, and hence may exchange data also with potentially malicious partners. In this paper, a selective Denial of Service (DoS) attack is presented. The proposed Selective Queue Saturation Attack (SQSA) is aimed to jam the message queue of the RTE communication stack in selected devices. The SQSA minimizes the chances of being detected by keeping its requirements (in term generated traffic) as low as possible. The SQSA has been applied to a real scenario based on PROFINET. The results of the use case demonstrate: the feasibility of the proposed attack; the reduced footprint compared to known DoS attacks (more than one thousand times less); and the selectivity of the attack, which can disrupt the realtime behavior of even a single target node inside the RTE network. © 2020 IEEE.
  •  
7.
  • Pasetti, M., et al. (författare)
  • On the use of LoRaWAN for the monitoring and control of distributed energy resources in a smart campus
  • 2020
  • Ingår i: Applied Sciences. - : MDPI AG. - 2076-3417. ; 10:1
  • Tidskriftsartikel (refereegranskat)abstract
    • The application of the most recent advances of the Internet-of-Things (IoT) technology to the automation of buildings is emerging as a promising solution to achieve greater efficiencies in energy consumption, and to allow the realization of sustainable models. The application of IoT has been demonstrated as effective in many fields, such as confirmed, for instance, by the Industry 4.0 concepts, which are revolutionizing modern production chains. By following this approach, the use of distributed control architectures and of IoT technologies (both wired and wireless) would result in effective solutions for the management of smart environments composed of groups of buildings, such as campuses. In this case, heterogeneous IoT solutions are typically adopted to satisfy the requirements of the very diverse possible scenarios (e.g., indoor versus outdoor coverage, mobile versus fixed nodes, just to mention a few), making their large-scale integration cumbersome. To cope with this issue, this paper presents an IoT architecture able to transparently manage different communication protocols in smart environments, and investigates its possible application for the monitoring and control of distributed energy resources in a smart campus. In particular, a use-case focused on the integration of the Long Range Wide Area Network (LoRaWAN) technology is considered to cope with heterogeneous indoor and outdoor communication scenarios. The feasibility analysis of the proposed solution is carried out by computing the scalability limits of the approach, based on the proposed smart campus data model. The results of the study showed that the proposed solution would be able to manage more than 10,000 nodes. An experimental validation of the LoRaWAN technology confirms its suitability in terms of coverage and latency, with a minimum LoRaWAN cell coverage range of 250 m, and a communication latency of about 400 ms. Finally, the advantages of the proposed solution in the supervision and management of a PV system are highlighted in a real-world scenario. © 2020 by the authors.
  •  
8.
  • Turcato, A. C., et al. (författare)
  • Introducing a cloud based architecture for the distributed analysis of Real-Time Ethernet traffic
  • 2020
  • Ingår i: Proceedings. - : Institute of Electrical and Electronics Engineers Inc.. - 9781728148922 ; , s. 235-240
  • Konferensbidrag (refereegranskat)abstract
    • The use of industrial communication protocols based on Real-Time Ethernet (RTE) standards is completely replacing traditional industrial fieldbuses. As usual, when a technology becomes mature, the need of efficient diagnostic and maintenance tools quickly raises. Very often, following the paradigm of Industry 4.0, the most effective diagnostic systems are today based on distributed, cloud-centric, architectures and artificial intelligence. However, the distributed analysis of RTE systems is challenging, considering the plurality of protocols and the stringent cost constrains which are common in industry. In this paper, a new architecture for the distributed analysis of RTE networks is proposed, leveraging on distributed probes that send traffic samples to Matlab cloud for remote analysis. The paper also proposes a software conversion tool to adapt general PCAP files captured by popular sniffers (e.g. Wireshark) into MAT file for easier Matlab elaboration. Last, a test bench for characterization (in terms of transfer delays) of the first part of the chain for RTE traffic sampling is described. The results show that in less than 10 seconds it is possible to transfer chunks of RTE traffic data (captured on industrial networks with hundreds of real-time devices) directly to the cloud and to have them converted in Matlab format. © 2020 IEEE.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-8 av 8

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy