Visible to the public Biblio

Filters: Keyword is Delay effects  [Clear All Filters]
2023-09-20
Zhang, Zhe, Wang, Yaonan, Zhang, Jing, Xiao, Xu.  2022.  Dynamic analysis for a novel fractional-order malware propagation model system with time delay. 2022 China Automation Congress (CAC). :6561—6566.
The rapid development of network information technology, individual’s information networks security has become a very critical issue in our daily life. Therefore, it is necessary to study the malware propagation model system. In this paper, the traditional integer order malware propagation model system is extended to the field of fractional-order. Then we analyze the asymptotic stability of the fractional-order malware propagation model system when the equilibrium point is the origin and the time delay is 0. Next, the asymptotic stability and bifurcation analysis of the fractional-order malware propagation model system when the equilibrium point is the origin and the time delay is not 0 are carried out. Moreover, we study the asymptotic stability of the fractional-order malware propagation model system with an interior equilibrium point. In the end, so as to verify our theoretical results, many numerical simulations are provided.
2023-07-13
Kori, Prachi, Cecil, Kanchan.  2022.  Secure Wireless Sensor Network Design Using a New Method of High-Speed Lightweight Encryption. 2022 6th International Conference On Computing, Communication, Control And Automation (ICCUBEA. :1–8.
Data streaming over a wireless network such as Wireless Sensor Networks, where wireless terminals (like PDAs, mobile phones, palmtops) access in data conferencing system, new challenges will be brought about. goal for this paper is to propose a high-speed lightweight encryption (HSLE) for low computational capability controller of WSN, HSLE scheme which reduces latency overhead by modifying existing approaches in order to encrypting data using a probabilistic encryption of data blocks. Proposed work is also useful when we communicate our confidential data on WSN or IoT it should be secure, we just have to save an encrypted data on cloud servers. proposed work is a new key-based algorithm and uses HSLE encryption instead for high end AES. Proposed methods cause significant speed enhancement for data encryption with similar security, in addition, it is best suited in order to communication between hand-held devices such as mobile phones, palmtops etc. algorithm may be used between sites where processing capacity and battery power are limited and efficient encryption is main necessity. This work is implemented on MATLAB and a wireless sensor network of maximum 100 nodes developed for testing the proposed network node encryption system, the time delay observed for the communication in 100 nodes WSN is less in compare with the other available works.
ISSN: 2771-1358
2023-06-09
Kumar, Vivek, Hote, Yogesh V..  2022.  Analyzing and Mitigating of Time Delay Attack (TDA) by using Fractional Filter based IMC-PID with Smith Predictor. 2022 IEEE 61st Conference on Decision and Control (CDC). :3194—3199.
In this era, with a great extent of automation and connection, modern production processes are highly prone to cyber-attacks. The sensor-controller chain becomes an obvious target for attacks because sensors are commonly used to regulate production facilities. In this research, we introduce a new control configuration for the system, which is sensitive to time delay attacks (TDA), in which data transfer from the sensor to the controller is intentionally delayed. The attackers want to disrupt and damage the system by forcing controllers to use obsolete data about the system status. In order to improve the accuracy of delay identification and prediction, as well as erroneous limit and estimation for control, a new control structure is developed by an Internal Model Control (IMC) based Proportional-Integral-Derivative (PID) scheme with a fractional filter. An additional concept is included to mitigate the effect of time delay attack, i.e., the smith predictor. Simulation studies of the established control framework have been implemented with two numerical examples. The performance assessment of the proposed method has been done based on integral square error (ISE), integral absolute error (IAE) and total variation (TV).
2023-04-28
Zhang, Zongyu, Zhou, Chengwei, Yan, Chenggang, Shi, Zhiguo.  2022.  Deterministic Ziv-Zakai Bound for Compressive Time Delay Estimation. 2022 IEEE Radar Conference (RadarConf22). :1–5.
Compressive radar receiver has attracted a lot of research interest due to its capability to keep balance between sub-Nyquist sampling and high resolution. In evaluating the performance of compressive time delay estimator, Cramer-Rao bound (CRB) has been commonly utilized for lower bounding the mean square error (MSE). However, behaving as a local bound, CRB is not tight in the a priori performance region. In this paper, we introduce the Ziv-Zakai bound (ZZB) methodology into compressive sensing framework, and derive a deterministic ZZB for compressive time delay estimators as a function of the compressive sensing kernel. By effectively incorporating the a priori information of the unknown time delay, the derived ZZB performs much tighter than CRB especially in the a priori performance region. Simulation results demonstrate that the derived ZZB outperforms the Bayesian CRB over a wide range of signal-to-noise ratio, where different types of a priori distribution of time delay are considered.
2023-01-06
Yang, Xuefeng, Liu, Li, Zhang, Yinggang, Li, Yihao, Liu, Pan, Ai, Shili.  2022.  A Privacy-preserving Approach to Distributed Set-membership Estimation over Wireless Sensor Networks. 2022 9th International Conference on Dependable Systems and Their Applications (DSA). :974—979.
This paper focuses on the system on wireless sensor networks. The system is linear and the time of the system is discrete as well as variable, which named discrete-time linear time-varying systems (DLTVS). DLTVS are vulnerable to network attacks when exchanging information between sensors in the network, as well as putting their security at risk. A DLTVS with privacy-preserving is designed for this purpose. A set-membership estimator is designed by adding privacy noise obeying the Laplace distribution to state at the initial moment. Simultaneously, the differential privacy of the system is analyzed. On this basis, the real state of the system and the existence form of the estimator for the desired distribution are analyzed. Finally, simulation examples are given, which prove that the model after adding differential privacy can obtain accurate estimates and ensure the security of the system state.
2022-09-16
Liu, Shiqin, Jiang, Ning, Zhang, Yiqun, Peng, Jiafa, Zhao, Anke, Qiu, Kun.  2021.  Security-enhanced Key Distribution Based on Chaos Synchronization Between Dual Path-injected Semiconductor Lasers. 2021 International Conference on UK-China Emerging Technologies (UCET). :109—112.
We propose and numerically demonstrate a novel secure key distribution scheme based on the chaos synchronization of two semiconductor lasers (SLs) subject to symmetrical double chaotic injections, which are outputted by two mutually-coupled semiconductor lasers. The results show that high quality chaos synchronization can be observed between two local SLs with suitable injection strength and identical injection time delays for Alice and Bob. On the basis of satisfactory chaos synchronization and a post-processing technology, identical secret keys for Alice and Bob are successfully generated with bit error ratio (BER) below the HD-FEC threshold of $^\textrm-3\$$\$.
2022-07-29
Ponomarenko, Vladimir, Kulminskiy, Danil, Prokhorov, Mikhail.  2021.  Laminar chaos in systems with variable delay time. 2021 5th Scientific School Dynamics of Complex Networks and their Applications (DCNA). :159–161.
In this paper, we investigated a self-oscillating ring system with variation of the delay time, which demonstrates the phenomenon of laminar chaos. The presence of laminar chaos is demonstrated for various laws of time delay variation - sinusoidal, sawtooth, and triangular. The behavior of coupled systems with laminar chaos and diffusive coupling is investigated. The presence of synchronous behavior is shown.
2022-03-23
Li, Zhong, Xie, Yan, Han, Qi, Zhang, Ao, Tian, Sheng.  2021.  Group Consensus of Second-order Multi-agent Systems via Intermittent Sampled Control. 2021 International Conference on Security, Pattern Analysis, and Cybernetics(SPAC). :185–189.
This article considers the group consistency of second-order MAS with directly connected spanning tree communication topology. Because the MAS is divided into several groups, we proposed a group consistency control method based on intermittent control, and the range of parameters is given when the system achieves consensus. The protocol can realize periodic control and reduce the working hours of the controller in period. Furthermore, the group consistency of MAS is turn to the stability analysis of error, and a group consistency protocol of MAS with time-delays is designed. Finally, two examples are used for verify the theory.
2021-09-30
Xudong, Yang.  2020.  Network congestion control and reliability optimization with multiple time delays from the perspective of information security. 2020 International Conference on Advance in Ambient Computing and Intelligence (ICAACI). :16–20.
As a new type of complex system, multi delay network in the field of information security undertakes the important responsibility of solving information congestion, balancing network bandwidth and traffic. The problems of data loss, program failure and a large number of system downtime still exist in the conventional multi delay system when dealing with the problem of information jam, which makes the corresponding reliability of the whole system greatly reduced. Based on this, this paper mainly studies and analyzes the stability system and reliability of the corresponding multi delay system in the information security perspective. In this paper, the stability and reliability analysis of multi delay systems based on linear matrix and specific function environment is innovatively proposed. Finally, the sufficient conditions of robust asymptotic stability of multi delay systems are obtained. At the same time, the relevant stability conditions and robust stability conditions of multi delay feedback switched systems are given by simulation. In the experimental part, the corresponding data and conclusions are simulated. The simulation results show that the reliability and stability analysis data of multi delay system proposed in this paper have certain experimental value.
2021-03-29
Shaout, A., Schmidt, N..  2020.  Keystroke Identifier Using Fuzzy Logic to Increase Password Security. 2020 21st International Arab Conference on Information Technology (ACIT). :1—8.

Cybersecurity is a major issue today. It is predicted that cybercrime will cost the world \$6 trillion annually by 2021. It is important to make logins secure as well as to make advances in security in order to catch cybercriminals. This paper will design and create a device that will use Fuzzy logic to identify a person by the rhythm and frequency of their typing. The device will take data from a user from a normal password entry session. This data will be used to make a Fuzzy system that will be able to identify the user by their typing speed. An application of this project could be used to make a more secure log-in system for a user. The log-in system would not only check that the correct password was entered but also that the rhythm of how the password was typed matched the user. Another application of this system could be used to help catch cybercriminals. A cybercriminal may have a certain rhythm at which they type at and this could be used like a fingerprint to help officials locate cybercriminals.

2021-03-17
Kushal, T. R. B., Gao, Z., Wang, J., Illindala, M. S..  2020.  Causal Chain of Time Delay Attack on Synchronous Generator Control. 2020 IEEE Power Energy Society General Meeting (PESGM). :1—5.

Wide integration of information and communication technology (ICT) in modern power grids has brought many benefits as well as the risk of cyber attacks. A critical step towards defending grid cyber security is to understand the cyber-physical causal chain, which describes the progression of intrusion in cyber-space leading to the formation of consequences on the physical power grid. In this paper, we develop an attack vector for a time delay attack at load frequency control in the power grid. Distinct from existing works, which are separately focused on cyber intrusion, grid response, or testbed validation, the proposed attack vector for the first time provides a full cyber-physical causal chain. It targets specific vulnerabilities in the protocols, performs a denial-of-service (DoS) attack, induces the delays in control loop, and destabilizes grid frequency. The proposed attack vector is proved in theory, presented as an attack tree, and validated in an experimental environment. The results will provide valuable insights to develop security measures and robust controls against time delay attacks.

2021-03-15
Shahkar, S., Khorasani, K..  2020.  A Resilient Control Against Time-Delay Switch and Denial of Service Cyber Attacks on Load Frequency Control of Distributed Power Systems. 2020 IEEE Conference on Control Technology and Applications (CCTA). :718—725.

A time-delay switch (TDS) cyber attack is a deliberate attempt by malicious adversaries aiming at destabilizing a power system by impeding the communication signals to/from the centralized controller from/to the network sensors and generating stations that participate in the load frequency control (LFC). A TDS cyber attack can be targeting the sensing loops (transmitting network measurements to the centralized controller) or the control signals dispatched from the centralized controller to the governor valves of the generating stations. A resilient TDS control strategy is proposed and developed in this work that thwarts network instabilities that are caused by delays in the sensing loops, and control commands, and guarantees normal operation of the LFC mechanism. This will be achieved by augmenting the telemetered control commands with locally generated feedback control laws (i.e., “decentralized” control commands) taking measurements that are available and accessible at the power generating stations (locally) independent from all the telemetered signals to/from the centralized controller. Our objective is to devise a controller that is capable of circumventing all types of TDS and DoS (Denial of Service) cyber attacks as well as a broad class of False Data Injection (FDI) cyber attacks.

2021-03-01
Shi, W., Liu, S., Zhang, J., Zhang, R..  2020.  A Location-aware Computation Offloading Policy for MEC-assisted Wireless Mesh Network. 2020 IEEE/CIC International Conference on Communications in China (ICCC Workshops). :53–58.
Mobile edge computing (MEC), an emerging technology, has the characteristics of low latency, mobile energy savings, and context-awareness. As a type of access network, wireless mesh network (WMN) has gained wide attention due to its flexible network architecture, low deployment cost, and self-organization. The combination of MEC and WMN can solve the shortcomings of traditional wireless communication such as storage capacity, privacy, and security. In this paper, we propose a location-aware (LA) algorithm to cognize the location and a location-aware offloading policy (LAOP) algorithm considering the energy consumption and time delay. Simulation results show that the proposed LAOP algorithm can obtain a higher completion rate and lower average processing delay compared with the other two methods.
2020-08-07
Lou, Xin, Tran, Cuong, Yau, David K.Y., Tan, Rui, Ng, Hongwei, Fu, Tom Zhengjia, Winslett, Marianne.  2019.  Learning-Based Time Delay Attack Characterization for Cyber-Physical Systems. 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). :1—6.
The cyber-physical systems (CPSes) rely on computing and control techniques to achieve system safety and reliability. However, recent attacks show that these techniques are vulnerable once the cyber-attackers have bypassed air gaps. The attacks may cause service disruptions or even physical damages. This paper designs the built-in attack characterization scheme for one general type of cyber-attacks in CPS, which we call time delay attack, that delays the transmission of the system control commands. We use the recurrent neural networks in deep learning to estimate the delay values from the input trace. Specifically, to deal with the long time-sequence data, we design the deep learning model using stacked bidirectional long short-term memory (LSTM) units. The proposed approach is tested by using the data generated from a power plant control system. The results show that the LSTM-based deep learning approach can work well based on data traces from three sensor measurements, i.e., temperature, pressure, and power generation, in the power plant control system. Moreover, we show that the proposed approach outperforms the base approach based on k-nearest neighbors.
2020-05-08
Su, Yu, Wu, Jing, Long, Chengnian, Li, Shaoyuan.  2018.  Event-triggered Control for Networked Control Systems Under Replay Attacks. 2018 Chinese Automation Congress (CAC). :2636—2641.
With wide application of networked control systems(N CSs), NCSs security have encountered severe challenges. In this paper, we propose a robust event-triggered controller design method under replay attacks, and the control signal on the plant is updated only when the event-triggering condition is satisfied. We develop a general random replay attack model rather than predetermined specific patterns for the occurrences of replay attacks, which allows to obtain random states to replay. We show that the proposed event-triggered control (ETC) scheme, if well designed, can tolerate some consecutive replay attacks, without affecting the corresponding closed-loop system stability and performance. A numerical examples is finally given to illustrate the effectiveness of our method.
2020-04-24
Bellec, Q., le Claire, J.C., Benkhoris, M.F., Coulibaly, P..  2019.  Investigation of time delay effects on the current in a power converter regulated by Phase-Shift Self-Oscillating Current Controller. 2019 21st European Conference on Power Electronics and Applications (EPE '19 ECCE Europe). :P.1–P.10.

This paper deals with effects of current sensor bandwidth and time delays in a system controlled by a Phase-Shift Self-Oscillating Current Controller (PSSOCC). The robustness of this current controller has been proved in former works showing its good performances in a large range of applications including AC/DC and DC/AC converters, power factor correction, active filters, isolation amplifiers and motor control. As switching frequencies can be upper than 30kHz, time delays and bandwidth limitations cannot be neglected in comparison with former works on this robust current controller. Thus, several models are proposed in this paper to analyze system behaviours. Those models permit to find analytical expressions binding maximum oscillation frequency with time delay and/or additional filter parameters. Through current spectrums analysis, quality of analytical expressions is proved for each model presented in this work. An experimental approach shows that every element of the electronic board having a low-pass effect or delaying command signals need to be included in the model in order to have a perfect match between calculations, simulations and practical results.

2019-12-30
Kubo, Ryogo.  2018.  Detection and Mitigation of False Data Injection Attacks for Secure Interactive Networked Control Systems. 2018 IEEE International Conference on Intelligence and Safety for Robotics (ISR). :7-12.

Cybersecurity in control systems has been actively discussed in recent years. In particular, networked control systems (NCSs) over the Internet are exposed to various types of cyberattacks such as false data injection attacks. This paper proposes a detection and mitigation method of the false data injection attacks in interactive NCSs, i.e., bilateral teleoperation systems. A bilateral teleoperation system exchanges position and force information through the Internet between the master and slave robots. The proposed method utilizes two redundant communication channels for both the master-to-slave and slave-to-master paths. The attacks are detected by a tamper detection observer (TDO) on each of the master and slave sides. The TDO compares the position responses of actual robots and robot models. A path selector on each side chooses the appropriate position and force responses from the responses received through the two communication channels, based on the outputs of the TDO. The proposed method is validated by simulations with attack models.

2015-05-05
Zhang Deping, Wang Quan, Wang Qingping, Wu WeiWei, Yuan NaiChang.  2014.  A real continuously moving target simulation system design without time delay error. Signal Processing, Communications and Computing (ICSPCC), 2014 IEEE International Conference on. :258-261.

The time delay of echo generated by the moving target simulator based on digital delay technique is discrete. So there are range and phase errors between the simulated target and real target, and the simulated target will move discontinuously due to the discrete time delay. In order to solve this problem and generate a continuously moving target, this paper uses signal processing technique to adjust the range and phase errors between the two targets. By adjusting the range gate, the time delay error is reduced to be smaller than sampling interval. According to the relationship between range and phase, the left error within one range bin can be removed equivalently by phase compensation. The simulation results show that by adjusting the range gate, the time delay errors are greatly reduced, and the left errors can be removed by phase compensation. In other words, a real continuously moving target is generated and the problem is solved.