Posters (Sessions 8 & 11)
file
The prevalence of battery-powered systems such as electric vehicles, smartphones, and IoT devices has made batteries crucial to everyone's daily life and business. Battery health, however, degrades over time, not only decreasing system reliability such as unexpected system shutoffs, but also causing overheating/gassing which, in turn, increases safety risks such as thermal runaway or even battery fire/explosion. To address these problems, we must monitor, prognose, and optimize battery health throughout the physical system life.
file
Visual impairment and blindness preclude many essential activities of daily living. Among these is independent navigation in unfamiliar indoor spaces. Promising research to date has yielded several new assistive technologies for indoor navigation that require the use of tags and/or access points deployed in the environment, which can be impractical in many settings, thus rendering the indoor navigation system inaccessible.
file
Ultrasound is widely accepted as one of the best forms of medical imaging compared to similar technologies, such as CT scans and MRI, due its low operating cost and safety for the patients. At the same time, it is well known that there can be large variability in image quality obtained by different experts imaging the same patient. Therefore, new imaging methods are necessary that will decrease this variability and at the same time allow the users to best utilize their expertise.
file
Wireless sensor actuator networks (WSANs) are gaining rapid adoption in industrial automation and manufacturing due to their low deployment cost and flexibility. While early success of industrial WSANs focused on monitoring applications, there are significant advantages, and also challenges, in employing WSANs in feedback control applications, since they require careful design and testing of both network configurations as well as control algorithms.
file
We address the problem of cyber security of process control systems. We consider the context of industrial control systems in which an attacked sensor node sends false measurements of the system state, resulting in damage to the physical plant. We employ a "dynamic watermarking" technique to secure process control systems against malicious attacks. First, our simulation results demonstrate that this method successfully detects a malicious activity in time to prevent overflows in coupled water tanks.
file
Novel techniques in micro-fabrication are integrated with geometric-based motion planning techniques to dramatically change the fundamental capabilities in applications as diverse as noninvasive surgical procedures and nano-scale manufacturing. This integration is achieved through the development of a closed-loop process that informs mechanical design via geometric modeling, constructs prototype systems across different physical scales, and conducts experimental trials to validate results.
file
The wide-area measurement systems technology using Phasor Measurement Units (PMUs) has been regarded as the key to guaranteeing stability, reliability, state estimation, and control of next-generation power systems. However, with the exponentially increasing number of PMUs, and the resulting explosion in data volume, the design and deployment of an efficient wide-area communication and computing infrastructure is evolving as one of the greatest challenges to the power system and IT communities.
file
Explanation of Demonstration: (1) Demonstration of a realistic CPS Security Testbed for the power grid and its use-cases for research experimentation, education, and industry cybersecurity training. (2) Demonstration of real cyber attack-defense scenarios, such as Ukraine 2015 and 2016 attacks and suitable mitigations. (3) Demonstration of advanced wide-area protection and control applications, such as oscillation monitoring and control, automatic generation control, and remedial action schemes.
file
The increasing set of functionalities, network interoperability, and system design complexity have introduced security vulnerabilities in cyber-physical systems (CPS). As recently demonstrated, a remote attacker can disrupt the operation of a car to either disable the vehicle or hijack it. High-profile security incidents in other CPS domains include a large-scale attack on Ukraine's power-grid and the StuxNet attack on an industrial system, while the RQ-170 Sentinel drone capture has shown that even safety-critical military CPS can be compromised.