Abstract: Hybrid fieldbus network integrating wireless networks with existing wired fieldbuses has become new a research direction in industrial automation systems. In comparison to wired fieldbuses, the hybrid wired/wireless fieldbus network has a different system architecture, data transmission mechanism, communication protocol, etc. This leads to different challenges that need to be addressed. This paper proposes a hybrid wired/wireless fieldbus network which consists of a wireless industrial control network (WICN), a wired PROFIBUS-DP (Process Field Bus-Decentralized Periphery) fieldbus network, and a wired MODBUS/TCP (Mod Bus/Transmission Control Protocol) fieldbus network. They are connected by a new gateway which uses a shared data model to solve data exchange in different network protocols. In this paper, we describe the architecture of the proposed hybrid wired/wireless fieldbus network and data transmission mechanisms in detail, and then evaluate the performance of hybrid fieldbus network via a set of experiments. The experiment results confirm that the proposed hybrid wired/wireless fieldbus network can satisfy the performance requirement of industrial network control systems. Furthermore, in order to further investigate feasibility of the proposed hybrid wired/wireless fieldbus network, it is deployed at a steam turbine power generation system, and the performance figures obtained further verify its feasibility and effectiveness.
Abstract: The automotive industry has successfully collaborated to release the ISO 26262 standard for developing safe software for cars. The standard describes in detail how to conduct hazard analysis and risk assessments to determine the necessary safety measures for each feature. However, the standard does not concern threat analysis for malicious attackers or how to select appropriate security countermeasures. We propose the application of ISO 27001 for this purpose and show how it can be applied together with ISO 26262. We show how ISO 26262 documentation can be re-used and enhanced to satisfy the analysis and documentation demands of the ISO 27001 standard. We illustrate our approach based on an electronic steering column lock system.
Abstract: This paper addresses the challenge of measuring security, understood as a system property, of cyberphysical systems, in the category of similar properties, such as safety and reliability. First, it attempts to define precisely what security, as a system property, really is. Then, an application context is presented, in terms of an attack surface in cyberphysical systems. Contemporary approaches related to the principles of measuring software properties are also discussed, with emphasis on building models. These concepts are illustrated in several case studies, based on previous work of the authors, to conduct experimental security measurements.
Abstract: Security patterns are intended to support software developers as the patterns encapsulate security expert knowledge. However, these patterns may be inappropriately applied because most developers are not security experts, leading to threats and vulnerabilities. Here we propose a support method for security design patterns in the implementation phase of software development. Our method creates a test template from a security design pattern, consisting of an “aspect test template” to observe the internal processing and a “test case template”. Providing design information creates a test from the test template with a tool. Because our test template is reusable, it can easily perform a test to validate a security design pattern. In an experiment involving four students majoring in information sciences, we confirm that our method can realize an effective test, verify pattern applications, and support pattern implementation.
Abstract: Due to the decrease of sensor and actuator prices and their ease of installation, smart homes and smart environments are more and more exploited in automation and health applications. In these applications, activity recognition has an important place. This article presents a general architecture that is responsible for adapting automation for the different users of the smart home while recognizing their activities. For that, semi-supervised learning algorithms and Markov-based models are used to determine the preferences of the user considering a combination of: (1) observations of the data that have been acquired since the start of the experiment and (2) feedback of the users on decisions that have been taken by the automation. We present preliminarily simulated experimental results regarding the determination of preferences for a user.
Abstract: Speech compression is a key technology underlying digital cellular communications, VoIP, voicemail, and voice response systems. We trace the evolution of speech coding based on the linear prediction model, highlight the key milestones in speech coding, and outline the structures of the most important speech coding standards. Current challenges, future research directions, fundamental limits on performance, and the critical open problem of speech coding for emergency first responders are all discussed.