In this paper, intrinsic safety and positive security distance control for an up/down elevator which extracts the materials from an underground coal mine is approached. For a better understanding of intrinsic safety a...In this paper, intrinsic safety and positive security distance control for an up/down elevator which extracts the materials from an underground coal mine is approached. For a better understanding of intrinsic safety and positive security, the first part of the paper describes the potential risk the workers are facing while working in dangerous environments like coal mining with “grisou” atmospheres and what the conditions of an unfortunate event to take place are. We presented the diagram and working principle for intrinsic safety equipment used in potential explosive areas based on which we modeled and simulated the intrinsic and positive security distance control in order to get a software solution for it. We created an algorithm and simulated the process in Matlab Simulink. The simulation results done in Matlab Simulink were then entered into a Moeller PLC using a ladder-type programming language. For protection against explosive atmospheres, the PLC is inserted into a metal housing with intrinsic protection and Positive Security.展开更多
Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation inform...Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts.Thus,this paper introduces the probabilistic linguistic term sets(PLTSs)to model the evaluation information of experts.Meanwhile,we propose a probabilistic linguistic multi-criteria decision-making(PL-MCDM)method to solve the information security assessment problem of ICSs.Firstly,we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods.Secondly,we use the Best Worst Method(BWM)method and Criteria Importance Through Inter-criteria Correlation(CRITIC)method to obtain the subjective weights and objective weights,which are used to derive the combined weights.Thirdly,we use the subscript equivalence distance measure method and the combined weight method to improve the probabilistic linguistic Visekriterijumska Optimizacija I Kompromisno Resenje(PL-VIKOR)method.Finally,we apply the proposed method to solve the information security assessment problem of ICSs.When comparing with the existing methods such as the probabilistic linguistic Tomada deDecisão Iterativa Multicritério(PL-TODIM)method and probabilistic linguistic Technique for Order Preference by Similarity to Ideal Solution(PL-TOPSIS)method,the case example shows that the proposed method can provide more reasonable ranking results.By evaluating and ranking the information security level of different ICSs,managers can identify problems in time and guide their work better.展开更多
Due to the fact that a high share of renewable energy sources(RESs)are connected to high-voltage direct current(HVDC)sending-end AC power systems,the voltage and frequency regulation capabilities of HVDC sending-end A...Due to the fact that a high share of renewable energy sources(RESs)are connected to high-voltage direct current(HVDC)sending-end AC power systems,the voltage and frequency regulation capabilities of HVDC sending-end AC power systems have diminished.This has resulted in potential system operating problems such as overvoltage and overfrequency,which occur simultaneously when block faults exist in the HVDC link.In this study,a steady-state voltage security-constrained optimal frequency control method for weak HVDC sending-end AC power systems is proposed.The integrated virtual inertia control of RESs is employed for system frequency regulation.Additional dynamic reactive power compensation devices are utilized to control the voltage of all nodes meet voltage security constraints.Then,an optimization model that simultaneously considers the frequency and steady-state voltage security constraints for weak HVDC sending-end AC power systems is established.The optimal control scheme with the minimum total cost of generation tripping and additional dynamic reactive power compensation required is obtained through the optimization solution.Simulations are conducted on a modified IEEE 9-bus test system and practical Qing-Yu line commutated converter based HVDC(LCC-HVDC)sending-end AC power system to verify the effectiveness of the proposed method.展开更多
We construct a circuit based on PBS and CNOT gates, which can be used to determine whether the input pulse is empty or not according to the detection result of the auxiliary state, while the input state will not be ch...We construct a circuit based on PBS and CNOT gates, which can be used to determine whether the input pulse is empty or not according to the detection result of the auxiliary state, while the input state will not be changed. The circuit can be treated as a pre-detection device. Equipping the pre-detection device in the front of the receiver of the quantum key distribution (QKD) can reduce the influence of the dark count of the detector, hence increasing the secure communication distance significantly. Simulation results show that the secure communication distance can reach 516 km and 479 km for QKD with perfect single photon source and decoy-state QKD with weak coherent photon source, respectively.展开更多
The extensively built long-distance water transmission pipelines have become the main water sources for urban areas. To ensure the reliability and safety of the water supply, from the viewpoint of overall management, ...The extensively built long-distance water transmission pipelines have become the main water sources for urban areas. To ensure the reliability and safety of the water supply, from the viewpoint of overall management, it would be necessary to establish a system of information management for the pipeline. The monitoring, calculating and analyzing functions of the system serve to give controlling instructions and safe operating rules to the automatic equipment and technician, making sure the resistance coefficient distribution along the pipeline is reasonable; the hydraulic state transition is smooth when operating conditions change or water supply accidents occur, avoiding the damage of water hammer. This paper covered the composition structures of the information management system of long-distance water transmission pipelines and the functions of the subsystems, and finally elaborated on the approaches and steps of building a mathematics model for the analysis of dynamic hydraulic status.展开更多
Machine Learning(ML)systems often involve a re-training process to make better predictions and classifications.This re-training process creates a loophole and poses a security threat for ML systems.Adversaries leverag...Machine Learning(ML)systems often involve a re-training process to make better predictions and classifications.This re-training process creates a loophole and poses a security threat for ML systems.Adversaries leverage this loophole and design data poisoning attacks against ML systems.Data poisoning attacks are a type of attack in which an adversary manipulates the training dataset to degrade the ML system’s performance.Data poisoning attacks are challenging to detect,and even more difficult to respond to,particularly in the Internet of Things(IoT)environment.To address this problem,we proposed DISTINIT,the first proactive data poisoning attack detection framework using distancemeasures.We found that Jaccard Distance(JD)can be used in the DISTINIT(among other distance measures)and we finally improved the JD to attain an Optimized JD(OJD)with lower time and space complexity.Our security analysis shows that the DISTINIT is secure against data poisoning attacks by considering key features of adversarial attacks.We conclude that the proposed OJD-based DISTINIT is effective and efficient against data poisoning attacks where in-time detection is critical for IoT applications with large volumes of streaming data.展开更多
Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-...Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-party computation. In this paper, we devote to investigating the solutions to some secure geometric problems in a cooperative environment. The problem is collaboratively computing the Euclid-distance between two private vectors without disclosing the private input to each other. A general privacy-preserving Euclid-distance protocol is firstly presented as a building block and is proved to be secure and efficient in the comparison with the previous methods. And we proposed a new protocol for the application in Wireless Sensor Networks (WSNs), based on the novel Euclid-distance protocol and Density-Based Clustering Protocol (DBCP), so that the nodes from two sides can compute cooperatively to divide them into clusters without disclosing their location information to the opposite side.展开更多
Internet of Things(IoT)networks are characterized by a multitude of wireless,interconnected devices that can dynamically join or exit the network without centralized administration or fixed infrastructure for routing....Internet of Things(IoT)networks are characterized by a multitude of wireless,interconnected devices that can dynamically join or exit the network without centralized administration or fixed infrastructure for routing.While multipath routing in IoT networks can improve data transmission reliability and load balancing by establishing multiple paths between source and destination nodes,these networks are susceptible to security threats due to their wireless nature.Traditional security solutions developed for conventional networks are often ill-suited to the unique challenges posed by IoT environments.In response to these challenges,this paper proposes the integration of the Ad hoc On-demand Multipath Distance Vector(AOMDV)routing protocol with a trust model to enhance network performance.Key findings from this research demonstrate the successful fusion of AOMDV with a trust model,resulting in tangible improvements in network performance.The assessment of trustworthiness bolsters both security and routing capabilities in IoT networks.The trust model plays a crucial role in mitigating black hole attacks in IoT networks by evaluating the trustworthiness of nodes and helping in the identification and avoidance of malicious nodes that may act as black holes.Simulation results validate the efficacy of the proposed trust-based routing mechanism in achieving its objectives.Trust plays a pivotal role in decision-making and in the creation of secure distribution systems.By assessing the trustworthiness of nodes,both network security and routing efficiency can be enhanced.The effectiveness of the proposed trust-based routing mechanism is scrutinized through simulations,offering insights into its potential advantages in terms of improved network security and routing performance in the context of the IoT.展开更多
This paper proposes a security region of transporta-tion networks,which is defined as the set of flow states(operating points)satisfying the N-1 security in transportation networks.The boundary of the set is closed,in...This paper proposes a security region of transporta-tion networks,which is defined as the set of flow states(operating points)satisfying the N-1 security in transportation networks.The boundary of the set is closed,inside all the operating points are N-1 secure;oppositely,outside all the operating points are insecure.First,N-1 security of the transportation networks is defined,which means that when a road is blocked,vehicles on other roads within the networks can also reach their destination through different paths without being trapped on the road.Then,the security region of transportation networks is modeled.The algorithm of a boundary calculation is studied and the boundary equations of security distances are proposed.Finally,the proposed security of the transportation networks is presented in different examples.This paper demonstrates the following:1)the security region can be accurately predicted by the simulation of N-1;2)the boundary distance can show the necessary degree of security;3)security can be improved by a preventive control scheme.The simulation on TransCAD is used to verify the correctness of the results.Index Terms-Boundary distance,evolution,security region,transportation network,TransCAD.展开更多
文摘In this paper, intrinsic safety and positive security distance control for an up/down elevator which extracts the materials from an underground coal mine is approached. For a better understanding of intrinsic safety and positive security, the first part of the paper describes the potential risk the workers are facing while working in dangerous environments like coal mining with “grisou” atmospheres and what the conditions of an unfortunate event to take place are. We presented the diagram and working principle for intrinsic safety equipment used in potential explosive areas based on which we modeled and simulated the intrinsic and positive security distance control in order to get a software solution for it. We created an algorithm and simulated the process in Matlab Simulink. The simulation results done in Matlab Simulink were then entered into a Moeller PLC using a ladder-type programming language. For protection against explosive atmospheres, the PLC is inserted into a metal housing with intrinsic protection and Positive Security.
文摘Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts.Thus,this paper introduces the probabilistic linguistic term sets(PLTSs)to model the evaluation information of experts.Meanwhile,we propose a probabilistic linguistic multi-criteria decision-making(PL-MCDM)method to solve the information security assessment problem of ICSs.Firstly,we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods.Secondly,we use the Best Worst Method(BWM)method and Criteria Importance Through Inter-criteria Correlation(CRITIC)method to obtain the subjective weights and objective weights,which are used to derive the combined weights.Thirdly,we use the subscript equivalence distance measure method and the combined weight method to improve the probabilistic linguistic Visekriterijumska Optimizacija I Kompromisno Resenje(PL-VIKOR)method.Finally,we apply the proposed method to solve the information security assessment problem of ICSs.When comparing with the existing methods such as the probabilistic linguistic Tomada deDecisão Iterativa Multicritério(PL-TODIM)method and probabilistic linguistic Technique for Order Preference by Similarity to Ideal Solution(PL-TOPSIS)method,the case example shows that the proposed method can provide more reasonable ranking results.By evaluating and ranking the information security level of different ICSs,managers can identify problems in time and guide their work better.
基金supported in part by the National Key R&D Program of China(No.2022YFB2402700)the Science and Technology Project of State Grid Corporation of China(No.52272222001J).
文摘Due to the fact that a high share of renewable energy sources(RESs)are connected to high-voltage direct current(HVDC)sending-end AC power systems,the voltage and frequency regulation capabilities of HVDC sending-end AC power systems have diminished.This has resulted in potential system operating problems such as overvoltage and overfrequency,which occur simultaneously when block faults exist in the HVDC link.In this study,a steady-state voltage security-constrained optimal frequency control method for weak HVDC sending-end AC power systems is proposed.The integrated virtual inertia control of RESs is employed for system frequency regulation.Additional dynamic reactive power compensation devices are utilized to control the voltage of all nodes meet voltage security constraints.Then,an optimization model that simultaneously considers the frequency and steady-state voltage security constraints for weak HVDC sending-end AC power systems is established.The optimal control scheme with the minimum total cost of generation tripping and additional dynamic reactive power compensation required is obtained through the optimization solution.Simulations are conducted on a modified IEEE 9-bus test system and practical Qing-Yu line commutated converter based HVDC(LCC-HVDC)sending-end AC power system to verify the effectiveness of the proposed method.
基金supported by the National Natural Science Foundation of China(Grant No.61372076)the Programme of Introducing Talents of Discipline to Universities,China(Grant No.B08038)the Fundamental Research Funds for the Central Universities,China(Grant No.K5051201021)
文摘We construct a circuit based on PBS and CNOT gates, which can be used to determine whether the input pulse is empty or not according to the detection result of the auxiliary state, while the input state will not be changed. The circuit can be treated as a pre-detection device. Equipping the pre-detection device in the front of the receiver of the quantum key distribution (QKD) can reduce the influence of the dark count of the detector, hence increasing the secure communication distance significantly. Simulation results show that the secure communication distance can reach 516 km and 479 km for QKD with perfect single photon source and decoy-state QKD with weak coherent photon source, respectively.
基金Hi-Tech Research and Development Program of China (863 Program)(2002AA601140)
文摘The extensively built long-distance water transmission pipelines have become the main water sources for urban areas. To ensure the reliability and safety of the water supply, from the viewpoint of overall management, it would be necessary to establish a system of information management for the pipeline. The monitoring, calculating and analyzing functions of the system serve to give controlling instructions and safe operating rules to the automatic equipment and technician, making sure the resistance coefficient distribution along the pipeline is reasonable; the hydraulic state transition is smooth when operating conditions change or water supply accidents occur, avoiding the damage of water hammer. This paper covered the composition structures of the information management system of long-distance water transmission pipelines and the functions of the subsystems, and finally elaborated on the approaches and steps of building a mathematics model for the analysis of dynamic hydraulic status.
基金This work was supported by a National Research Foundation of Korea(NRF)grant funded by the Korea Government(MSIT)under Grant 2020R1A2B5B01002145.
文摘Machine Learning(ML)systems often involve a re-training process to make better predictions and classifications.This re-training process creates a loophole and poses a security threat for ML systems.Adversaries leverage this loophole and design data poisoning attacks against ML systems.Data poisoning attacks are a type of attack in which an adversary manipulates the training dataset to degrade the ML system’s performance.Data poisoning attacks are challenging to detect,and even more difficult to respond to,particularly in the Internet of Things(IoT)environment.To address this problem,we proposed DISTINIT,the first proactive data poisoning attack detection framework using distancemeasures.We found that Jaccard Distance(JD)can be used in the DISTINIT(among other distance measures)and we finally improved the JD to attain an Optimized JD(OJD)with lower time and space complexity.Our security analysis shows that the DISTINIT is secure against data poisoning attacks by considering key features of adversarial attacks.We conclude that the proposed OJD-based DISTINIT is effective and efficient against data poisoning attacks where in-time detection is critical for IoT applications with large volumes of streaming data.
基金Supported by the National Natural Science Foundation ofChina(No.61170065,61003039)Postdoctoral Foundation(2012M511753,1101011B)+1 种基金Science & Technology Innovation Fund for Higher Education Institutions of Jiangsu Province(CXLX12_0486)the Priority Academic Program Development of Jiangsu Higher Education Institutions(yx002001)
文摘Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-party computation. In this paper, we devote to investigating the solutions to some secure geometric problems in a cooperative environment. The problem is collaboratively computing the Euclid-distance between two private vectors without disclosing the private input to each other. A general privacy-preserving Euclid-distance protocol is firstly presented as a building block and is proved to be secure and efficient in the comparison with the previous methods. And we proposed a new protocol for the application in Wireless Sensor Networks (WSNs), based on the novel Euclid-distance protocol and Density-Based Clustering Protocol (DBCP), so that the nodes from two sides can compute cooperatively to divide them into clusters without disclosing their location information to the opposite side.
文摘Internet of Things(IoT)networks are characterized by a multitude of wireless,interconnected devices that can dynamically join or exit the network without centralized administration or fixed infrastructure for routing.While multipath routing in IoT networks can improve data transmission reliability and load balancing by establishing multiple paths between source and destination nodes,these networks are susceptible to security threats due to their wireless nature.Traditional security solutions developed for conventional networks are often ill-suited to the unique challenges posed by IoT environments.In response to these challenges,this paper proposes the integration of the Ad hoc On-demand Multipath Distance Vector(AOMDV)routing protocol with a trust model to enhance network performance.Key findings from this research demonstrate the successful fusion of AOMDV with a trust model,resulting in tangible improvements in network performance.The assessment of trustworthiness bolsters both security and routing capabilities in IoT networks.The trust model plays a crucial role in mitigating black hole attacks in IoT networks by evaluating the trustworthiness of nodes and helping in the identification and avoidance of malicious nodes that may act as black holes.Simulation results validate the efficacy of the proposed trust-based routing mechanism in achieving its objectives.Trust plays a pivotal role in decision-making and in the creation of secure distribution systems.By assessing the trustworthiness of nodes,both network security and routing efficiency can be enhanced.The effectiveness of the proposed trust-based routing mechanism is scrutinized through simulations,offering insights into its potential advantages in terms of improved network security and routing performance in the context of the IoT.
基金supported by National Key Research and Development Program of China(2016YFB0900100)National Natural Science Foundation of China(51877144)China Postdoctoral Science(2020M6700668).
文摘This paper proposes a security region of transporta-tion networks,which is defined as the set of flow states(operating points)satisfying the N-1 security in transportation networks.The boundary of the set is closed,inside all the operating points are N-1 secure;oppositely,outside all the operating points are insecure.First,N-1 security of the transportation networks is defined,which means that when a road is blocked,vehicles on other roads within the networks can also reach their destination through different paths without being trapped on the road.Then,the security region of transportation networks is modeled.The algorithm of a boundary calculation is studied and the boundary equations of security distances are proposed.Finally,the proposed security of the transportation networks is presented in different examples.This paper demonstrates the following:1)the security region can be accurately predicted by the simulation of N-1;2)the boundary distance can show the necessary degree of security;3)security can be improved by a preventive control scheme.The simulation on TransCAD is used to verify the correctness of the results.Index Terms-Boundary distance,evolution,security region,transportation network,TransCAD.