Conference paper

file

Visible to the public Resiliency-Aware Deployment of SDN in Smart Grid SCADA: A Formal Synthesis Model

The supervisory control and data acquisition (SCADA) network in a smart grid must be reliable and efficient to transmit real-time data to the controller, especially when the system is under contingencies or cyberattacks. Introducing the features of software-defined networks (SDN) into a SCADA network helps in better management of communication and deployment of novel grid control operations.

file

Visible to the public Formal Synthesis of Trajectories for Unmanned Aerial Vehicles to Perform Resilient Surveillance of Critical Power Transmission

A smart grid is a widely distributed engineering system with overhead transmission lines. Physical damage to these power lines, from natural calamities or technical failures, will disrupt the functional integrity of the grid. To ensure the continuation of the grid's operational flow when those phenomena happen, the grid operator must immediately take steps to nullify the impacts and repair the problems, even if those occur in hardly-reachable remote areas.

file

Visible to the public DDAF: Deceptive Data Acquisition Framework against Stealthy Attacks in Cyber-Physical Systems

Cyber-physical systems (CPSs) and the Internet of Things (IoT) are converging towards a hybrid platform that is becoming ubiquitous in all modern infrastructures. The massive deployment of CPS requires comprehensive, secure, and reliable communication. The integration of complex and heterogeneous systems makes enormous space for the adversaries to get into the network and inject malicious data. To obfuscate and mislead the attackers, we propose DDAF, a deception defense-based data acquisition framework for a hierarchical communication network of CPSs.

file

Visible to the public Control Synthesis for Cyber-Physical Systems to Satisfy MITL Objectives under Timing and Actuator Atta

This paper studies the synthesis of controllers for

cyber-physical systems (CPSs) that are required to carry out

complex tasks that are time-sensitive, in the presence of an

adversary. The task is specified as a formula in metric interval

temporal logic (MITL). The adversary is assumed to have the

ability to tamper with the control input to the CPS and also

manipulate timing information perceived by the CPS. In order

to model the interaction between the CPS and the adversary, and

file

Visible to the public Cyber Threat Analysis Framework for the Wind Energy Based Power System

Wind energy is one of the major sources of renewable energy. Countries around the world are increasingly deploying large wind farms that can generate a significant amount of clean energy. A wind farm consists of many turbines, often spread across a large geographical area. Modern wind turbines are equipped with meteorological sensors. The wind farm control center monitors the turbine sensors and adjusts the power generation parameters for optimal power production.

file

Visible to the public Nonsmooth Barrier Functions with Applications to Multi-Robot Systems

As multi-agent systems become ubiquitous, the ability to satisfy multiple system-level constraints in these systems grows increasingly important. In applications ranging from automated cruise control to safety in robot swarms, barrier functions have emerged as a tool to provably meet such constraints by guaranteeing forward invariance of a set. However, satisfying multiple constraints typically implies formulating multiple barrier functions, bringing up the need to address the degree to which multiple barrier functions may be composed through Boolean logic.

file

Visible to the public Event-Triggered Interactive Gradient Descent for Real-Time Multi-Objective Optimization

This paper proposes an event-triggered interactive gradient descent method for solving multi-objective optimization problems. We consider scenarios where a human decision maker works with a robot in a supervisory manner in order to find the best Pareto solution to an optimization problem. The human has a time-invariant function that represents the value she gives to the different outcomes. However, this function is implicit, meaning that the human does not know it in closed form, but can respond to queries about it.

event

Visible to the public  The 5th Conference on Sustainable Internet and ICT for Sustainability (SustainIT 2017)
Dec 06, 2017 8:00 am - Dec 07, 2017 8:00 pm WET

The 5th Conference on Sustainable Internet and ICT for Sustainability (SustainIT 2017)
Funchal, Portugal - December 6-7, 2017
https://sustainit2017.m-iti.org

CALL FOR PAPERS

forum

Visible to the public Call for Papers: SustainIT 2017

The 5th Conference on Sustainable Internet and ICT for Sustainability (SustainIT 2017)
Funchal, Portugal - December 6-7, 2017
https://sustainit2017.m-iti.org

CALL FOR PAPERS