Search results for "Oriente"
showing 10 items of 684 documents
Do Not Cancel My Race with Cyber-Physical Systems
2014
Abstract To engineer the factory of the future the paper argues for a reference model that is not necessary restricted to the control component, but integrates the physical and human components as well. This is due to the real need to accommodate the latest achievements in factory automation where the human is not merely playing a simple and clear role inside the control-loop, but is becoming a composite factor in a highly automated system (“man in the mesh”). The concept is demonstrated by instantiating the anthropocentric cyber-physical reference architecture for smart factories (ACPA4SF) in a concrete case study that needs to accommodate the ongoing researches from the SmartFactory KL fa…
Decentralized intrusion detection for secure cooperative multi-agent systems
2007
In this paper we address the problem of detecting faulty behaviors of cooperative mobile agents. A novel decentralized and scalable architecture that can be adopted to realize a monitor of the agents’ behavior is proposed. We consider agents which may perform different independent tasks, but cooperate to guarantee the entire system’s safety. Agents plan their next actions by following a set of rules which is shared among them. Such rules are decentralized, i.e. they dictate actions that depend only on configurations of neighboring agents. Some agents may not be acting according to this cooperation protocol, due to tampering or spontaneous failure. To detect such misbehaviors we propose a so…
Consensus-based Distributed Intrusion Detection for Multi-Robot Systems
2008
This paper addresses a security problem in robotic multi-agent systems, where agents are supposed to cooperate according to a shared protocol. A distributed Intrusion Detection System (IDS) is proposed here, that detects possible non-cooperative agents. Previous work by the authors showed how single monitors embedded on-board the agents can detect non- cooperative behavior, using only locally available information. In this paper, we allow such monitors to share the collected information in order to overcome their sensing limitation. In this perspective, we show how an agreement on the type of behavior of a target-robot may be reached by the monitors, through execution of a suitable consensu…
Distributed Intrusion Detection for the Security of Industrial Cooperative Robotic Systems
2014
Abstract This paper addresses the problem of detecting possible intruders in a group of autonomous robots which coexist in a shared environment and interact with each other according to a set of common rules. We consider intruders as robots which misbehave, i.e. do not follow the rules, because of either spontaneous failures or malicious reprogramming. Our goal is to detect intruders by observing the congruence of their behavior with the social rules as applied to the current state of the overall system. Moreover, in accordance with the fully distributed nature of the problem, the detection itself must be performed by individual robots, based only on local information. We present a general …
Distributed Multi-level Motion Planning for Autonomous Vehicles in Large Scale Industrial Environments
2013
In this paper we propose a distributed coordination algorithm for safe and efficient traffic management of heterogeneous robotic agents, moving within dynamic large scale industrial environments. The algorithm consists of a distributed resource--sharing protocol involving a re--planning strategy. Once every agent is assigned with a desired motion path, the algorithm ensures ordered traffic flows of agents, that avoid inter--robot collision and system deadlock (stalls). The algorithm allows multi--level representation of the environment, i.e. large or complex rooms may be seen as a unique resource with given capacity at convenience, which makes the approach appealing for complex industrial e…
Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi–Agent Systems
2007
This paper focuses on the detection of misbehav- ing agents within a group of mobile robots. A novel approach to automatically synthesize a decentralized Intrusion Detection System (IDS) as well as an efficient implementation of local monitors are presented. In our scenario, agents perform possi- bly different independent tasks, but cooperate to guarantee the entire system’s safety. Indeed, agents plan their next actions by following a set of logic rules which is shared among them. Such rules are decentralized, i.e. they depend only on configurations of neighboring agents. However, some agents may not be acting according to this cooperation protocol, due to spontaneous failure or tampering.…
Market-oriented analysis for active distribution systems
2009
Distribution networks are today the place where demand and offer are physically located and meet. Offer comes from Generation companies, through distributed generation, while demand is usually represented by simple users. Distribution company both buy and sell energy so they implement both sides. The EU promotes the free market and the renewable energy sources (RES) supported by the distributed generation technology. The technical-economical scenario in which distributed generation is thus growing is complex and comprises a large number of stakeholders. The authors, on the basis of previous studies want to analyse the problem of identifying sets of stakeholders sharing the common interest o…
Cyber Security for Wireless Semantic (SCADA/DCS) Systems
2016
International audience; Supervisory Control and Data Acquisition and Distributed Control Systems named (SCADA/DCS) have played a key role in the design of modern power smart applications, particularly in the automatic management of real time energetic platforms. In this work, we present a semantic cyber security vulnerabilities add to classic one, with the use of semantic embedded application in smart devices in semantic wireless (SCADA/DCS) systems, focusing on the semantic attacks. In this work, we present a new security semantic wireless protocol as a secure communication support for these modern semantic wireless systems named (ZIGBEE/SOAP/SECURITY), obtained by the combination between …
Reconfigurable control of robotized manufacturing cells
2007
This paper investigates the field of manufacturing system control. The addressed subject is indeed very fascinating, due to the importance that it has reached in the last decades both at research and industrial level. On the other hand, it seems to the author that most of the complexity intrinsic to the subject itself relies on the different meanings or levels of abstraction that both the terms ''manufacturing system'' and ''control'' may symbolize. The presented research aims to face the topic in a concrete fashion, i.e., by developing a control software system for a specific, although easy to be generalized, robotized manufacturing cell. Two different development methodologies, from the c…
Closed-loop bandwidth impact on MVSA for rotor broken bar diagnosis in IRFOC double squirrel cage induction motor drives
2013
This paper investigates the detectability of rotor broken bars in indirect rotor flux oriented control (IRFOC) for variable speed double cage induction motor drives, using vibration signature analysis techniques. The Impact of the closed loop control system cannot be neglected when the detection of rotor asymmetries in the machine is based on the signature analysis of electrical or mechanical variables. Therefore, the investigation of rotor fault components for different bandwidths of closed-loop regulators is necessary to evaluate its relevance in the above listed variables. This paper investigates the impact of the control system on relevance of the fault components computed from axial an…