• Title/Summary/Keyword: Cyber Physical Systems

Search Result 177, Processing Time 0.031 seconds

Development of field programmable gate array-based encryption module to mitigate man-in-the-middle attack for nuclear power plant data communication network

  • Elakrat, Mohamed Abdallah;Jung, Jae Cheon
    • Nuclear Engineering and Technology
    • /
    • v.50 no.5
    • /
    • pp.780-787
    • /
    • 2018
  • This article presents a security module based on a field programmable gate array (FPGA) to mitigate man-in-the-middle cyber attacks. Nowadays, the FPGA is considered to be the state of the art in nuclear power plants I&C systems due to its flexibility, reconfigurability, and maintainability of the FPGA technology; it also provides acceptable solutions for embedded computing applications that require cybersecurity. The proposed FPGA-based security module is developed to mitigate information-gathering attacks, which can be made by gaining physical access to the network, e.g., a man-in-the-middle attack, using a cryptographic process to ensure data confidentiality and integrity and prevent injecting malware or malicious data into the critical digital assets of a nuclear power plant data communication system. A model-based system engineering approach is applied. System requirements analysis and enhanced function flow block diagrams are created and simulated using CORE9 to compare the performance of the current and developed systems. Hardware description language code for encryption and serial communication is developed using Vivado Design Suite 2017.2 as a programming tool to run the system synthesis and implementation for performance simulation and design verification. Simple windows are developed using Java for physical testing and communication between a personal computer and the FPGA.

An ETRI CPS Modeling Language for Specifying Hybrid Systems (하이브리드 시스템을 명세하기 위한 ETRI CPS 모델링 언어)

  • Yoon, Sanghyun;Chun, In-geol;Kim, Won-Tae;Jo, Jaeyeon;Yoo, Junbeom
    • Journal of KIISE
    • /
    • v.42 no.7
    • /
    • pp.823-833
    • /
    • 2015
  • Hybrid system is a dynamic system that is composed of both a continuous and discrete system, suitable for automobile, avionic and defense systems. Various modeling languages and their supporting tools have been proposed and used in the hybrid system. The languages and tools have specific characteristics for their purpose. Electronics and Telecommunications Research Institute (ETRI) proposed a hybrid system modeling language, ECML (ETRI CPS Modeling Language). ECML extends DEV&DESS (Differential Event and Differential Equation Specified System) formalism with consideration of CPS (Cyber-Physical System), which supports modeling and simulation. In this paper, we introduce ECML and suggest a formal definition. The case study specifies a simple vehicle model using the suggested formal definition.

Demystifying the Definition of Digital Twin for Built Environment

  • Davari, Saman;Shahinmoghadam, Mehrzad;Motamedi, Ali;Poirier, Erik
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.1122-1129
    • /
    • 2022
  • The concept of Digital Twin (DT) has been receiving an increasing amount of attention in the construction management and building engineering research domains. Although the benefits of DT are evident, confusion with regards to the concept of DTs and its relationship with others such as Cyber-Physical Systems (CPS), Building Information Modelling (BIM) and Internet of Things (IoT) remains. This paper aims to help allay this confusion through an in-depth analysis of the definition of DT and its unique characteristics. As such, a review of the past and current definitions of DT and CPS in various domains is performed. An analysis is then conducted to identify the overlaps between the definition of DT with CPS, as well as with BIM and IoT. Finally, given the relatively closer resemblances between DT and CPS, a set of four distinct dimensions enabling their comparative analysis and highlighting their shared and unique characteristics is discussed. This paper contributes to the existing literature by exploring the definition of DT and presenting two original conceptualizations that help further refine the concept of DT in the construction and management and building engineering domain.

  • PDF

Design of Smart City Considering Carbon Emissions under The Background of Industry 5.0

  • Fengjiao Zhou;Rui Ma;Mohamad Shaharudin bin Samsurijan;Xiaoqin Xie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.903-921
    • /
    • 2024
  • Industry 5.0 puts forward higher requirements for smart cities, including low-carbon, sustainable, and people-oriented, which pose challenges to the design of smart cities. In response to the above challenges, this study introduces the cyber-physical-social system (CPSS) and parallel system theory into the design of smart cities, and constructs a smart city framework based on parallel system theory. On this basis, in order to enhance the security of smart cities, a sustainable patrol subsystem for smart cities has been established. The intelligent patrol system uses a drone platform, and the trajectory planning of the drone is a key problem that needs to be solved. Therefore, a mathematical model was established that considers various objectives, including minimizing carbon emissions, minimizing noise impact, and maximizing coverage area, while also taking into account the flight performance constraints of drones. In addition, an improved metaheuristic algorithm based on ant colony optimization (ACO) algorithm was designed for trajectory planning of patrol drones. Finally, a digital environmental map was established based on real urban scenes and simulation experiments were conducted. The results show that compared with the other three metaheuristic algorithms, the algorithm designed in this study has the best performance.

A Study on Application of Systems Engineering Approach to Design of Smart Manufacturing Execution System (스마트 제조 실행 시스템 기본설계를 위한 시스템 엔지니어링 적용 방법에 대한 연구)

  • Jeon, Byeong-woo;Shin, Kee-Young;Hong, Dae-Geun;Suh, Suk-Hwan
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.11 no.2
    • /
    • pp.95-105
    • /
    • 2015
  • Manufacturing Execution System(MES) is in charge of manufacturing execution in the shop floor based on the inputs given by high level information such as ERP, etc. The typical MES implemented is not tightly interconnected with shop floor control system including real (or near real) time monitoring and control devices such as PLC. The lack of real-time interfaces is one of the major obstacles to achieve accurate and optimization of the total performance index of the shop floor system. Smart factory system in the paradigm of Industry 4.0 tries to solve the problems via CPS (Cyber Physical System) technology and FILS (Factory In-the-Loop System). In this paper, we conducted Systems Engineering Approach to design an advanced MES (namely Smart MES) that can accommodate CPS and FILS concept. Specifically, we tailored Systems Engineering Process (SEP) based on an International Standard formalized as ISO/IEC 15288 to develop Stakeholders' Requirements (StR), System Requirements (SyR). The deliverables of each process are modeled and represented by the SysML, UML customized to Systems Engineering. The results of the research can provide a conceptual framework for future MES that can play a crucial role in the Smart Factory.

Ontology Based-Security Issues for Internet of Thing (IoT): Ontology Development

  • Amir Mohamed Talib
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.168-176
    • /
    • 2023
  • The use of sensors and actuators as a form of controlling cyber-physical systems in resource networks has been integrated and referred to as the Internet of Things (IoT). However, the connectivity of many stand-alone IoT systems through the Internet introduces numerous security challenges as sensitive information is prone to be exposed to malicious users. In this paper, IoT based-security issues ontology is proposed to collect, examine, analyze, prepare, acquire and preserve evidence of IoT security issues challenges. Ontology development has consists three main steps, 1) domain, purpose and scope setting, 2) important terms acquisition, classes and class hierarchy conceptualization and 3) instances creation. Ontology congruent to this paper is method that will help to better understanding and defining terms of IoT based-security issue ontology. Our proposed IoT based-security issue ontology resulting from the protégé has a total of 44 classes and 43 subclasses.

XML Converter Design and Implementation for OCIL based Security Level Evaluation (OCIL기반 보안수준평가를 위한 XML Converter 설계 및 구현)

  • Kim, Jongmin;Kim, Sang-Choon
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.29-35
    • /
    • 2020
  • The cyber attacks targeting the systems of national and public organizations in the front line of cyber security have been advanced, and the number of cyber attacks has been on the constant rise. In this circumstance, it is necessary to develop the security evaluation technology to prevent cyber attacks to the systems of national and public organizations. Most of the studies of the vulnerability analysis on the information systems of national and public organizations almost focus on automation. In actual security inspection, it is hard to automate some parts. In terms of security policies for threats, many different plans have been designed and applied in the managerial, physical, and technical fields, giving particular answers no matter how they are subjective or situational. These tendencies can be standardized in OCIL(Open Checklist Interactive Language), and partial automation can be achieved. Therefore, this study tries to implement XML Converter in order for OCIL based security level evaluation with typical evaluation questions.

A Leverage Strategy of the Cyber warfare Security Policy Based on systems Thinking (시스템 사고를 이용한 사이버전 보안 정책 레버리지 전략 연구)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Park, Ho-Kyun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.77-83
    • /
    • 2013
  • As the network composed of numerous sensor nodes, sensor network conducts the function of sensing the surrounding information by sensor and of the sensed information. The concept of the battlefield is also changing to one that includes not only physical spaces but all areas including the networks of the nation's key industries and military facilities, energy facilities, transportation, and communication networks. In light of the changing warfare in terms of how it is conducted and what form it takes, the Korea military has to seek ways to effectively respond to threats of cyber warfare. In the past, although partial strategies on cyber warfare were studied, no research was done through the overall system flow. In this paper, key variables related to cyber warfare security are classified into personnel, management, and technology. A simple model and an extended model are suggested for each area, and based on the technology area of the extended model, formal methods are used to verify the validity and a detailed response strategy is suggested according to the identified leverage.

Efficient Data Distribution Service in CPS (CPS에서 효율적인 데이터분배 기술)

  • Lee, Soo-Hyung;Kim, Won-Tae;Ryou, Jae-Cheol
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.5
    • /
    • pp.241-246
    • /
    • 2012
  • As the convergence between the conventional physical systems and IT computing resource is increased, the new paradigm of embedded system called Cyber Physical System (CPS) emerged. CPSs have many sensors, actuators and computing devices to understand and to control the physical system. As these all components are tightly coupled each other, standardized middleware such as Data Distribution Service (DDS) is considered to be deployed. But DDS takes too long time to discover each other in the large-scal CPS environment and has not precise specification of its execution architecture to provide efficient data exchange. In this paper, we design the efficient DDS architecture for development with interoperability to provide the high reliable data distribution. in real-time and propose the communication entity discovery procedure.

A Study on Cloud Network and Security System Analysis for Enhanced Security of Legislative Authority (입법기관의 보안강화를 위한 Cloud 네트워크 분석 및 보안 시스템 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1320-1326
    • /
    • 2011
  • National institutions on the importance of information security is being recognized, information security laws are being discussed in Congress 3.4 DDoS incident and Nonghyup hacking, etc. However, National Assembly Secretariat when the results of the Information Security Consulting has been assessed very low 61.2 points, evaluation of hardware and software in secure areas were vulnerable. This paper, the legislative support agencies National Assembly and National Assembly Secretariat on the network and computer systems, and managerial, technical and physical security elements are analyzed for the status. And network should have the legislative support agencies and system for the physical network separation, DDoS attack response, Virus attack response, hacking attacks response, and Cyber Emergency Response Team/Coordination Center for Cyber infringing design and research through the confidentiality, integrity, availability, access control, authentication and security analysis is based on the evaluation criteria. Through this study, the legislative support agencies to strengthen the security of data and security laws enacted to provide the basis for.