Cyber-Physical System Checkpointing and Recovery

Size: px
Start display at page:

Download "Cyber-Physical System Checkpointing and Recovery"

Transcription

1 Cyber-Physical System Checkpointing and Recovery Fanxin Kong, Meng Xu, James Weimer, Oleg Sokolsky, Insup Lee Department of Computer and Information Science University of Pennsylvania

2 Cyber-Physical System Checkpointing and Recovery Fanxin Kong, Meng Xu, James Weimer, Oleg Sokolsky, Insup Lee Department of Computer and Information Science University of Pennsylvania

3 Security 2

4 CPS Attack Surfaces Cyber attack surfaces - e.g., communication, networks, computers,... Environmental attack surfaces - e.g., GPS signal, electromagnetic interference,... Physical attack surfaces - e.g., locks, casings, cables, Human attack surfaces - e.g., phishing, blackmail, Smart Power Grid 3

5 Outline What we study Our idea: checkpointing and recovery Design for recovery Checkpointing protocol design Evaluation 4

6 What we study and why? Target: Sensor Attacks The attacker can arbitrarily change sensor measurements - environmental attack surfaces - cyber attack surfaces Malicious signals Malicious packets Physical system Sensor Actuator Network 30mi/h 100mi/h Controller 5

7 What we study and why? Target: Sensor Attacks The attacker can arbitrarily change sensor measurements - environmental attack surfaces - cyber attack surfaces Goal: Resilience To ensure control performance with sensor attacks Malicious signals Malicious packets Physical system Sensor Actuator Network Controller 6

8 Ideally Speed sensor attack Ideally, the system performs (almost) the same as if there is no attack - Example: cruise control under a speed sensor attack 7

9 How sensor attacks affect control? Controller Sensor Physical system Actuator 1. A sensor attack or fault occurs 4. The actuator performs the misled actuation 5. The physical system drifts off 8

10 Limitations of Existing Approaches Existing approaches rely on sensor redundancy - Multiple sensors (partially) measure the same physical variables Existing approaches limit the number of compromised sensors - E.g., less than half of the total number of sensors In question: how to handle the case that violates these limitations? 9

11 Outline What we study Our idea: checkpointing and recovery Design for recovery Checkpointing protocol design Evaluation 10

12 My idea: checkpointing and recovery Controller Sensor Physical system Actuator Recovery: restore the system so that state estimations / predictions correctly reflect the system s physical states Advantage: no need to modify the controller 11

13 Can we apply roll-back recovery directly? It is often infeasible to roll back a CPS system - e.g., power flow in the power grid - irreversible processes 12

14 Can we apply roll-back recovery directly? It is often infeasible to roll back a CPS system - e.g., power flow in the power grid - irreversible processes Physically rolling back physical states incurs considerable overhead and usually unnecessary - e.g., speed sensor attack Roll-back -- desired speed Better 13

15 Outline What we study Our idea: checkpointing and recovery Design for recovery Checkpointing protocol design Evaluation 14

16 Propose roll-forward recovery Physical-State Recovery: Rolling the system to the current time by starting from a consistent global physical-state. Prediction using historical state Estimated speed 15

17 How does it work? Idea: model-based prediction E.g., A linear time-invariant system By prediction (step 1, 2) Unchanged Step 1: predict the current state Step 2: recover the faulty state 16

18 Outline What we study Our idea: checkpointing and recovery Design for recovery Checkpointing protocol design Evaluation 17

19 What kind of states is used? Cyber state: logical consistency Message send-receive Physical state: timed consistency Difference of timestamp 18

20 Which consistent state is used? detection window?? used for recovery pending detection States that pass detection can be used for recovery Attack detection usually has substantial delay States during the detection interval may be incorrect Idea: use states outside detection window for recovery 19

21 Checkpointing CPS A sliding window based protocol detection window???? deleted deleted states states buffered buffered states states the stored the state stored state Step 1: states are buffered, before passing the detection Step 2: the state is stored, after passing the detection Step 3: stored states are discarded, if no longer needed 20

22 The overall system design Physical system checkpointing attacked YES recovered NO YES NO? prediction recovery Controller Recovery-based control: predict future states based on the recovered state time Normal operation Recovery Recovery-based control 21

23 Outline What we study Our idea: checkpointing and recovery Design for recovery Checkpointing protocol design Evaluation 22

24 Scenario: lane keep Testbed: an unmanned vehicle. Each front wheel is driven by a motor, and each motor has a speed sensor Goal: to keep a vehicle travel in a straight line, i.e., the two front wheels have the same speed Controller: a PID controller supervises and controls the speed difference of the two front wheels Attack: the attacker modifies a speed sensor s measurements to a constant value 23

25 How well does it work? No protection speed difference large The vehicle keeps turning speed difference recovery With protection small The vehicle travels almost straightly 24

26 Summary Goal: Securing Cyber-Physical Systems CPS Checkpointing and Recovery A Roll-forward Recovery A Sliding-Window Based Checkpointing Protocol Case Study: Sensor Attacks on Automobiles Thank you! 25

Attack Resilient State Estimation for Vehicular Systems

Attack Resilient State Estimation for Vehicular Systems December 15 th 2013. T-SET Final Report Attack Resilient State Estimation for Vehicular Systems Nicola Bezzo (nicbezzo@seas.upenn.edu) Prof. Insup Lee (lee@cis.upenn.edu) PRECISE Center University of Pennsylvania

More information

Vehicle Trust Management for Connected Vehicles

Vehicle Trust Management for Connected Vehicles Vehicle Trust Management for Connected Vehicles FINAL RESEARCH REPORT Insup Lee (PI), Nicola Bezzo, Jian Chang Contract No. DTRT12GUTG11 DISCLAIMER The contents of this report reflect the views of the

More information

AirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems

AirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems AirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems Alan Burns, James Harbin, Leandro Indrusiak, Iain Bate, Robert Davis and David Griffin Real-Time Systems Research Group

More information

T ransaction Management 4/23/2018 1

T ransaction Management 4/23/2018 1 T ransaction Management 4/23/2018 1 Air-line Reservation 10 available seats vs 15 travel agents. How do you design a robust and fair reservation system? Do not enough resources Fair policy to every body

More information

MC-SDN: Supporting Mixed-Criticality Scheduling on Switched-Ethernet Using Software-Defined Networking

MC-SDN: Supporting Mixed-Criticality Scheduling on Switched-Ethernet Using Software-Defined Networking MC-SDN: Supporting Mixed-Criticality Scheduling on Switched-Ethernet Using Software-Defined Networking Kilho Lee, Taejune Park, Minsu Kim, Hoon Sung Chwa, Jinkyu Lee* Seungwon Shin, and Insik Shin * 1

More information

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID Sherif Abdelwahed Department of Electrical and Computer Engineering Mississippi State University Autonomic Security Management Modern

More information

Failure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data

Failure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data Failure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data Anurag Srivastava, Bo Cui, P. Banerjee Washington State University NASPI March 2017 Outline

More information

Fault Tolerance. Distributed Systems IT332

Fault Tolerance. Distributed Systems IT332 Fault Tolerance Distributed Systems IT332 2 Outline Introduction to fault tolerance Reliable Client Server Communication Distributed commit Failure recovery 3 Failures, Due to What? A system is said to

More information

A Multi-Modal Composability Framework for Cyber-Physical Systems

A Multi-Modal Composability Framework for Cyber-Physical Systems S5 Symposium June 12, 2012 A Multi-Modal Composability Framework for Cyber-Physical Systems Linh Thi Xuan Phan Insup Lee PRECISE Center University of Pennsylvania Avionics, Automotive Medical Devices Cyber-physical

More information

Real-Time Internet of Things

Real-Time Internet of Things Real-Time Internet of Things Chenyang Lu Cyber-Physical Systems Laboratory h7p://www.cse.wustl.edu/~lu/ Internet of Things Ø Convergence of q Miniaturized devices: integrate processor, sensors and radios.

More information

Failure Models. Fault Tolerance. Failure Masking by Redundancy. Agreement in Faulty Systems

Failure Models. Fault Tolerance. Failure Masking by Redundancy. Agreement in Faulty Systems Fault Tolerance Fault cause of an error that might lead to failure; could be transient, intermittent, or permanent Fault tolerance a system can provide its services even in the presence of faults Requirements

More information

Resilient Smart Grids

Resilient Smart Grids Resilient Smart Grids André Teixeira Kaveh Paridari, Henrik Sandberg KTH Royal Institute of Technology, Sweden SPARKS 2nd Stakeholder Workshop Cork, Ireland March 25th, 2015 Legacy Distribution Grids Main

More information

Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices

Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices Against Cyber Attacks (CODEF) Cyber Security of the

More information

Distributed Systems COMP 212. Revision 2 Othon Michail

Distributed Systems COMP 212. Revision 2 Othon Michail Distributed Systems COMP 212 Revision 2 Othon Michail Synchronisation 2/55 How would Lamport s algorithm synchronise the clocks in the following scenario? 3/55 How would Lamport s algorithm synchronise

More information

Viewstamped Replication to Practical Byzantine Fault Tolerance. Pradipta De

Viewstamped Replication to Practical Byzantine Fault Tolerance. Pradipta De Viewstamped Replication to Practical Byzantine Fault Tolerance Pradipta De pradipta.de@sunykorea.ac.kr ViewStamped Replication: Basics What does VR solve? VR supports replicated service Abstraction is

More information

Analysis and Implementation of Global Preemptive Fixed-Priority Scheduling with Dynamic Cache Allocation

Analysis and Implementation of Global Preemptive Fixed-Priority Scheduling with Dynamic Cache Allocation Analysis and Implementation of Global Preemptive Fixed-Priority Scheduling with Dynamic Cache Allocation Meng Xu Linh Thi Xuan Phan Hyon-Young Choi Insup Lee Department of Computer and Information Science

More information

CHAPTER 3 RECOVERY & CONCURRENCY ADVANCED DATABASE SYSTEMS. Assist. Prof. Dr. Volkan TUNALI

CHAPTER 3 RECOVERY & CONCURRENCY ADVANCED DATABASE SYSTEMS. Assist. Prof. Dr. Volkan TUNALI CHAPTER 3 RECOVERY & CONCURRENCY ADVANCED DATABASE SYSTEMS Assist. Prof. Dr. Volkan TUNALI PART 1 2 RECOVERY Topics 3 Introduction Transactions Transaction Log System Recovery Media Recovery Introduction

More information

Legacy-Compliant Data Authentication for Industrial Control System Traffic

Legacy-Compliant Data Authentication for Industrial Control System Traffic Legacy-Compliant Data Authentication for Industrial Control System Traffic John Henry Castellanos, Daniele Antonioli, Nils Ole Tippenhauer and Martín Ochoa Singapore University of Technology and Design

More information

Practical Byzantine Fault Tolerance (The Byzantine Generals Problem)

Practical Byzantine Fault Tolerance (The Byzantine Generals Problem) Practical Byzantine Fault Tolerance (The Byzantine Generals Problem) Introduction Malicious attacks and software errors that can cause arbitrary behaviors of faulty nodes are increasingly common Previous

More information

Introduction to Software Fault Tolerance Techniques and Implementation. Presented By : Hoda Banki

Introduction to Software Fault Tolerance Techniques and Implementation. Presented By : Hoda Banki Introduction to Software Fault Tolerance Techniques and Implementation Presented By : Hoda Banki 1 Contents : Introduction Types of faults Dependability concept classification Error recovery Types of redundancy

More information

Smart grid control based on heterogeneous communications and adaptive layers

Smart grid control based on heterogeneous communications and adaptive layers SmartGridComm 2014: Workshop "Managing Heterogeneous and Secure Communication Networks for Smart Grids" Smart grid control based on heterogeneous communications and adaptive layers Hans-Peter Schwefel

More information

Distributed Systems (ICE 601) Fault Tolerance

Distributed Systems (ICE 601) Fault Tolerance Distributed Systems (ICE 601) Fault Tolerance Dongman Lee ICU Introduction Failure Model Fault Tolerance Models state machine primary-backup Class Overview Introduction Dependability availability reliability

More information

FAULT TOLERANCE. Fault Tolerant Systems. Faults Faults (cont d)

FAULT TOLERANCE. Fault Tolerant Systems. Faults Faults (cont d) Distributed Systems Fö 9/10-1 Distributed Systems Fö 9/10-2 FAULT TOLERANCE 1. Fault Tolerant Systems 2. Faults and Fault Models. Redundancy 4. Time Redundancy and Backward Recovery. Hardware Redundancy

More information

Diagnosis in the Time-Triggered Architecture

Diagnosis in the Time-Triggered Architecture TU Wien 1 Diagnosis in the Time-Triggered Architecture H. Kopetz June 2010 Embedded Systems 2 An Embedded System is a Cyber-Physical System (CPS) that consists of two subsystems: A physical subsystem the

More information

Distributed Systems

Distributed Systems 15-440 Distributed Systems 11 - Fault Tolerance, Logging and Recovery Tuesday, Oct 2 nd, 2018 Logistics Updates P1 Part A checkpoint Part A due: Saturday 10/6 (6-week drop deadline 10/8) *Please WORK hard

More information

Distributed Systems COMP 212. Lecture 19 Othon Michail

Distributed Systems COMP 212. Lecture 19 Othon Michail Distributed Systems COMP 212 Lecture 19 Othon Michail Fault Tolerance 2/31 What is a Distributed System? 3/31 Distributed vs Single-machine Systems A key difference: partial failures One component fails

More information

Luca Schenato Workshop on cooperative multi agent systems Pisa, 6/12/2007

Luca Schenato Workshop on cooperative multi agent systems Pisa, 6/12/2007 Distributed consensus protocols for clock synchronization in sensor networks Luca Schenato Workshop on cooperative multi agent systems Pisa, 6/12/2007 Outline Motivations Intro to consensus algorithms

More information

Development of Intrusion Detection System for vehicle CAN bus cyber security

Development of Intrusion Detection System for vehicle CAN bus cyber security Development of Intrusion Detection System for vehicle CAN bus cyber security Anastasia Cornelio, Elisa Bragaglia, Cosimo Senni, Walter Nesci Technology Innovation - SSEC 14 Workshop Automotive SPIN Italia

More information

Intrusion Recovery for Database-backed Web Applications

Intrusion Recovery for Database-backed Web Applications Intrusion Recovery for Database-backed Web Applications Ramesh Chandra, Taesoo Kim, Meelap Shah, Neha Narula, Nickolai Zeldovich MIT CSAIL Web applications routinely compromised Web applications routinely

More information

Fault Tolerance. Distributed Systems. September 2002

Fault Tolerance. Distributed Systems. September 2002 Fault Tolerance Distributed Systems September 2002 Basics A component provides services to clients. To provide services, the component may require the services from other components a component may depend

More information

CSC 774 Advanced Network Security

CSC 774 Advanced Network Security Computer Science CSC 774 Advanced Network Security Topic 4.3 Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks 1 Wireless Sensor Networks (WSN) A WSN consists of a potentially

More information

Using RecurDyn. Contents

Using RecurDyn. Contents Using RecurDyn Contents 1.0 Multibody Dynamics Overview... 2 2.0 Multibody Dynamics Applications... 3 3.0 What is RecurDyn and how is it different?... 4 4.0 Types of RecurDyn Analysis... 5 5.0 MBD Simulation

More information

Issues in Programming Language Design for Embedded RT Systems

Issues in Programming Language Design for Embedded RT Systems CSE 237B Fall 2009 Issues in Programming Language Design for Embedded RT Systems Reliability and Fault Tolerance Exceptions and Exception Handling Rajesh Gupta University of California, San Diego ES Characteristics

More information

Science & Technology Directorate: R&D Overview

Science & Technology Directorate: R&D Overview Science & Technology Directorate: R&D Overview August 6 th, 2012 UNCLASSIFIED//FOUO DHS S&T Mission Strengthen America s security and resiliency by providing knowledge products and innovative technology

More information

CMP-3440 Database Systems

CMP-3440 Database Systems CMP-3440 Database Systems Concurrency Control with Locking, Serializability, Deadlocks, Database Recovery Management Lecture 10 zain 1 Basic Recovery Facilities Backup Facilities: provides periodic backup

More information

RoSES. Robust Self-configuring Embedded Systems ENGINEERING. Prof. Philip Koopman

RoSES. Robust Self-configuring Embedded Systems ENGINEERING. Prof. Philip Koopman RoSES Robust Self-configuring Embedded Systems http://www.ece.cmu.edu/roses Prof. Philip Koopman Bill Nace Charles Shelton Meredith Beveridge Tridib Chakravarty Chris Martin Mike Bigrigg Institute for

More information

Impact of transmission errors on TCP performance. Outline. Random Errors

Impact of transmission errors on TCP performance. Outline. Random Errors Impact of transmission errors on TCP performance 1 Outline Impact of transmission errors on TCP performance Approaches to improve TCP performance Classification Discussion of selected approaches 2 Random

More information

A Tree-Based µtesla Broadcast Authentication for Sensor Networks

A Tree-Based µtesla Broadcast Authentication for Sensor Networks A Tree-Based µtesla Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia Cyber Defense Laboratory Department of Computer Center for Secure Department of Computer

More information

Jeff Fletcher, Vivek Vichare, Chaitanya Ganoo, James Moyne {jgfletch vvichare caganoo November 4, 2009

Jeff Fletcher, Vivek Vichare, Chaitanya Ganoo, James Moyne {jgfletch vvichare caganoo November 4, 2009 Engineering Research Center for Reconfigurable Manufacturing Systems Time Synchronization Applications in the Smart Grid and Beyond Jeff Fletcher, Vivek Vichare, Chaitanya Ganoo, James Moyne {jgfletch

More information

Fault Tolerance. Basic Concepts

Fault Tolerance. Basic Concepts COP 6611 Advanced Operating System Fault Tolerance Chi Zhang czhang@cs.fiu.edu Dependability Includes Availability Run time / total time Basic Concepts Reliability The length of uninterrupted run time

More information

Fault-Tolerant Computer Systems ECE 60872/CS Recovery

Fault-Tolerant Computer Systems ECE 60872/CS Recovery Fault-Tolerant Computer Systems ECE 60872/CS 59000 Recovery Saurabh Bagchi School of Electrical & Computer Engineering Purdue University Slides based on ECE442 at the University of Illinois taught by Profs.

More information

Ethernet TSN as Enabling Technology for ADAS and Automated Driving Systems

Ethernet TSN as Enabling Technology for ADAS and Automated Driving Systems IEEE-2016 January 17-22, Atlanta, Georgia Ethernet TSN as Enabling Technology for ADAS and Automated Driving Systems Michael Potts General Motors Company co-authored by Soheil Samii General Motors Company

More information

Transaction Management. Pearson Education Limited 1995, 2005

Transaction Management. Pearson Education Limited 1995, 2005 Chapter 20 Transaction Management 1 Chapter 20 - Objectives Function and importance of transactions. Properties of transactions. Concurrency Control Deadlock and how it can be resolved. Granularity of

More information

Reliable Statements about a Fault-Tolerant X-by-Wire ecar. Reliable Statements about a Fault-Tolerant X-by-Wire ecar Unrestricted 2017 Siemens AG

Reliable Statements about a Fault-Tolerant X-by-Wire ecar. Reliable Statements about a Fault-Tolerant X-by-Wire ecar Unrestricted 2017 Siemens AG Reliable Statements about a Fault-Tolerant X-by-Wire ecar Reliable Statements about a Fault-Tolerant X-by-Wire ecar Unrestricted 2017 Siemens AG Reliable Statements about a Fault-Tolerant X-by-Wire ecar

More information

RT- Xen: Real- Time Virtualiza2on. Chenyang Lu Cyber- Physical Systems Laboratory Department of Computer Science and Engineering

RT- Xen: Real- Time Virtualiza2on. Chenyang Lu Cyber- Physical Systems Laboratory Department of Computer Science and Engineering RT- Xen: Real- Time Virtualiza2on Chenyang Lu Cyber- Physical Systems Laboratory Department of Computer Science and Engineering Embedded Systems Ø Consolidate 100 ECUs à ~10 multicore processors. Ø Integrate

More information

Speculative Lock Elision: Enabling Highly Concurrent Multithreaded Execution

Speculative Lock Elision: Enabling Highly Concurrent Multithreaded Execution Speculative Lock Elision: Enabling Highly Concurrent Multithreaded Execution Ravi Rajwar and Jim Goodman University of Wisconsin-Madison International Symposium on Microarchitecture, Dec. 2001 Funding

More information

Internet-Zero Future and Past Danny Cohen Sun Microsystems Oct

Internet-Zero Future and Past Danny Cohen Sun Microsystems Oct Internet-Zero Future and Past Danny Cohen Sun Microsystems Oct-1-2004 Page 1 Page 2 Outline I-0: The Future Problems and Approaches I-1: Lessons from the Past Summary Page 3 Log of Something (Source IDC)

More information

Ferdinand von Tüllenburg Layer-2 Failure Recovery Methods in Critical Communication Networks

Ferdinand von Tüllenburg Layer-2 Failure Recovery Methods in Critical Communication Networks Ferdinand von Tüllenburg Layer-2 Failure Recovery Methods in Critical Communication Networks Dependable Communication for Critical Infrastructures Electricity Health Transport Finance Dependable Communication

More information

University of Strathclyde

University of Strathclyde University of Strathclyde Validation of the EFCC scheme at the Power Networks Demonstration Centre (PNDC) Dr Qiteng Hong, Dr Ibrahim Abdulhadi and Prof Campbell Booth 0 Overview Brief introduction to PNDC

More information

Introduction to Control Systems Design

Introduction to Control Systems Design Experiment One Introduction to Control Systems Design Control Systems Laboratory Dr. Zaer Abo Hammour Dr. Zaer Abo Hammour Control Systems Laboratory 1.1 Control System Design The design of control systems

More information

A FAULT- AND INTRUSION-TOLERANT ARCHITECTURE FOR THE PORTUGUESE POWER DISTRIBUTION SCADA

A FAULT- AND INTRUSION-TOLERANT ARCHITECTURE FOR THE PORTUGUESE POWER DISTRIBUTION SCADA A FAULT- AND INTRUSION-TOLERANT ARCHITECTURE FOR THE PORTUGUESE POWER DISTRIBUTION SCADA Nuno Medeiros Alysson Bessani 1 Context: EDP Distribuição EDP Distribuição is the utility responsible for the distribution

More information

Time-Awareness in the Internet of Things. ITSF 2014 Marc Weiss, NIST Consultant

Time-Awareness in the Internet of Things. ITSF 2014 Marc Weiss, NIST Consultant Time-Awareness in the Internet of Things ITSF 2014 Marc Weiss, NIST Consultant mweiss@nist.gov ++1-303-497-3261 Cisco White Paper GE White Paper Energy Saving (I2E) Defense Predictive maintenance Enable

More information

SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics

SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics 1 SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics Qin Liu, John C.S. Lui 1 Cheng He, Lujia Pan, Wei Fan, Yunlong Shi 2 1 The Chinese University of Hong Kong 2 Huawei Noah s

More information

LXRS and LXRS+ Wireless Sensor Protocol

LXRS and LXRS+ Wireless Sensor Protocol LORD TECHNICAL NOTE LXRS and LXRS+ Wireless Sensor Protocol Using LXRS and LXRS+ For Long-Term Monitoring and High Bandwidth Test and Measurement Introduction LORD Sensing has developed and deployed two

More information

Enhancement of CoAP Packet Delivery Performance for Internet of Things. Hang Liu

Enhancement of CoAP Packet Delivery Performance for Internet of Things. Hang Liu Enhancement of CoAP Packet Delivery Performance for Internet of Things Hang Liu Outline Motivation and Industrial Relevance Project Objectives Approach and Previous Results Future Work Outcome and Impact

More information

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Maurizio Bocca, M.Sc. Control Engineering Research Group Automation and Systems Technology Department maurizio.bocca@tkk.fi

More information

Resilient Multidimensional Sensor Fusion Using Measurement History

Resilient Multidimensional Sensor Fusion Using Measurement History University of Pennsylvania ScholarlyCommons Departmental Papers (CIS) Department of Computer & Information Science 2-2014 Resilient Multidimensional Sensor Fusion Using Measurement History Radoslav Ivanov

More information

Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids

Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids Hui Lin, Adam Slagell, Zbigniew Kalbarczyk, Peter W. Sauer, and Ravishankar K. Iyer Department of Electrical

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #19 Location Privacy & Tracking Agenda Location privacy and tracking Implications / risks of location information Location privacy and anonymity

More information

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes Replica Distribution Scheme for Location-Dependent Data in Vehicular d Hoc Networks using a Small Number of Fixed Nodes Junichiro Okamoto and Susumu Ishihara Graduate School of Engineering, Shizuoka University,

More information

Continuous Data Protection

Continuous Data Protection Continuous Data Protection Comprehensive protection of data is a critical responsibility of a data warehouse. This includes both protection against unauthorized access and protection against data loss

More information

An Empirical Study of High Availability in Stream Processing Systems

An Empirical Study of High Availability in Stream Processing Systems An Empirical Study of High Availability in Stream Processing Systems Yu Gu, Zhe Zhang, Fan Ye, Hao Yang, Minkyong Kim, Hui Lei, Zhen Liu Stream Processing Model software operators (PEs) Ω Unexpected machine

More information

ROBOT TEAMS CH 12. Experiments with Cooperative Aerial-Ground Robots

ROBOT TEAMS CH 12. Experiments with Cooperative Aerial-Ground Robots ROBOT TEAMS CH 12 Experiments with Cooperative Aerial-Ground Robots Gaurav S. Sukhatme, James F. Montgomery, and Richard T. Vaughan Speaker: Jeff Barnett Paper Focus Heterogeneous Teams for Surveillance

More information

Synchronization in Sensor Networks

Synchronization in Sensor Networks Synchronization in Sensor Networks Blerta Bishaj Helsinki University of Technology 1. Introduction... 2 2. Characterizing Time Synchronization... 2 3. Causes of clock desynchronization... 3 4. Algorithms...

More information

CSE 380 Computer Operating Systems

CSE 380 Computer Operating Systems CSE 380 Computer Operating Systems Instructor: Insup Lee University of Pennsylvania Fall 2003 Lecture Note on Disk I/O 1 I/O Devices Storage devices Floppy, Magnetic disk, Magnetic tape, CD-ROM, DVD User

More information

The role of ICT in managing the complex Smart Grid Infrastructure. Nampuraja Enose Infosys Labs

The role of ICT in managing the complex Smart Grid Infrastructure. Nampuraja Enose Infosys Labs The role of ICT in managing the complex Smart Grid Infrastructure Nampuraja Enose Infosys Labs Smart Grid The Smart Grid isn t a thing, but rather a Vision for the power system of the future Its a mix

More information

Today: Fault Tolerance. Failure Masking by Redundancy

Today: Fault Tolerance. Failure Masking by Redundancy Today: Fault Tolerance Agreement in presence of faults Two army problem Byzantine generals problem Reliable communication Distributed commit Two phase commit Three phase commit Failure recovery Checkpointing

More information

Today: Fault Tolerance. Replica Management

Today: Fault Tolerance. Replica Management Today: Fault Tolerance Failure models Agreement in presence of faults Two army problem Byzantine generals problem Reliable communication Distributed commit Two phase commit Three phase commit Failure recovery

More information

Practical Byzantine Fault Tolerance. Miguel Castro and Barbara Liskov

Practical Byzantine Fault Tolerance. Miguel Castro and Barbara Liskov Practical Byzantine Fault Tolerance Miguel Castro and Barbara Liskov Outline 1. Introduction to Byzantine Fault Tolerance Problem 2. PBFT Algorithm a. Models and overview b. Three-phase protocol c. View-change

More information

Fortum SGEM Program Presentation of ongoing research activities

Fortum SGEM Program Presentation of ongoing research activities Fortum SGEM Program Presentation of ongoing research activities MV and LV Network Automation Solutions in EU Benchmarking Research 1 Existing Distribution Grid Little change in the past few decades Mostly

More information

Schedulability Analysis of AADL Models

Schedulability Analysis of AADL Models Schedulability Analysis of AADL Models Oleg Sokolsky Insup Lee University of Pennsylvania Duncan Clarke Fremont Associates Overview AADL modeling language Why is it useful and what it has Formal schedulability

More information

Automatic Recovery from Runtime Failures Authors: Antonio Carzaniga, Alessandra Gorlay, Andrea Mattavelli, Nicol`o Perino, Mauro Pezz`e

Automatic Recovery from Runtime Failures Authors: Antonio Carzaniga, Alessandra Gorlay, Andrea Mattavelli, Nicol`o Perino, Mauro Pezz`e Automatic Recovery from Runtime Failures Authors: Antonio Carzaniga, Alessandra Gorlay, Andrea Mattavelli, Nicol`o Perino, Mauro Pezz`e slide author names omitted for FERPA compliance The Approach Intrinsic

More information

Why Security Fails in Federated Systems

Why Security Fails in Federated Systems Why Security Fails in Federated Systems Dr. Clifford Neuman, Director USC Center for Computer Systems Security Information Sciences Institute University of Southern California CSSE Research Review University

More information

DISTRIBUTED REAL-TIME SYSTEMS

DISTRIBUTED REAL-TIME SYSTEMS Distributed Systems Fö 11/12-1 Distributed Systems Fö 11/12-2 DISTRIBUTED REAL-TIME SYSTEMS What is a Real-Time System? 1. What is a Real-Time System? 2. Distributed Real Time Systems 3. Predictability

More information

The Internet of Things: Secure Distributed. Inference

The Internet of Things: Secure Distributed. Inference The Internet of Things: Secure Distributed 1 Inference Yuan Chen, Soummya Kar, and José M. F. Moura arxiv:1806.09199v1 [cs.dc] 24 Jun 2018 Abstract The growth in the number of devices connected to the

More information

Heavy Vehicle Cyber Security Bulletin

Heavy Vehicle Cyber Security Bulletin Heavy Vehicle Cyber Security Update National Motor Freight Traffic Association, Inc. 1001 North Fairfax Street, Suite 600 Alexandria, VA 22314 (703) 838-1810 Heavy Vehicle Cyber Security Bulletin Bulletin

More information

Resilient Multidimensional Sensor Fusion Using Measurement History

Resilient Multidimensional Sensor Fusion Using Measurement History Resilient Multidimensional Sensor Fusion Using Measurement History Radoslav Ivanov Computer and Information Science Department University of Pennsylvania Philadelphia, PA 19104 rivanov@seas.upenn.edu Miroslav

More information

Smart Grid Vision DRAFT FOR DISCUSSION PURPOSES ONLY

Smart Grid Vision DRAFT FOR DISCUSSION PURPOSES ONLY Smart Grid Vision Vision Statement PG&E s vision for the Smart Grid: Smart Grid will leverage advanced communications and control technology to transform the operation of our electric network, from generation

More information

ReVirt: Enabling Intrusion Analysis through Virtual Machine Logging and Replay

ReVirt: Enabling Intrusion Analysis through Virtual Machine Logging and Replay ReVirt: Enabling Intrusion Analysis through Virtual Machine Logging and Replay Or We Can Remember It for You Wholesale (with apologies to Philip K. Dick) George Dunlap, Sam King, SukruCinar, MurtazaBasraiand

More information

RT- Xen: Real- Time Virtualiza2on from embedded to cloud compu2ng

RT- Xen: Real- Time Virtualiza2on from embedded to cloud compu2ng RT- Xen: Real- Time Virtualiza2on from embedded to cloud compu2ng Chenyang Lu Cyber- Physical Systems Laboratory Department of Computer Science and Engineering Real- Time Virtualiza2on for Cars Ø Consolidate

More information

Lecture 21: Reliable, High Performance Storage. CSC 469H1F Fall 2006 Angela Demke Brown

Lecture 21: Reliable, High Performance Storage. CSC 469H1F Fall 2006 Angela Demke Brown Lecture 21: Reliable, High Performance Storage CSC 469H1F Fall 2006 Angela Demke Brown 1 Review We ve looked at fault tolerance via server replication Continue operating with up to f failures Recovery

More information

A Markovian Approach for Attack Resilient Control of Mobile Robotic Systems

A Markovian Approach for Attack Resilient Control of Mobile Robotic Systems A Markovian Approach for Attack Resilient Control of Mobile Robotic Systems Nicola Bezzo Yanwei Du Insup Lee Dept. of Computer & Information Science University of Pennsylvania {nicbezzo, duyanwei}@seas.upenn.edu

More information

CHAPTER OUTLINE Last Updated: 12 April 2014

CHAPTER OUTLINE Last Updated: 12 April 2014 Developing a Research Roadmap for Smart Fire Fighting CHAPTER OUTLINE Last Updated: 12 April 2014 The purpose of this Outline document is to provide the details for the content and organization of a roadmap

More information

Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network

Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network P.S Patheja, Akhilesh Waoo & Parul Shrivastava Dept.of Computer Science and Engineering, B.I.S.T, Anand Nagar,

More information

University of Strathclyde

University of Strathclyde University of Strathclyde Validation of the EFCC scheme at the Power Networks Demonstration Centre (PNDC) Prof Campbell Booth EFCC Academic Dissemination Event Glasgow, 19/06/2018 Dr Qiteng Hong, Dr Ibrahim

More information

Land & Lee (1994) Where do we look when we steer

Land & Lee (1994) Where do we look when we steer Automobile Steering Land & Lee (1994) Where do we look when we steer Eye movements of three subjects while driving a narrow dirt road with tortuous curves around Edinburgh Scotland. Geometry demanded almost

More information

A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications 28/05/2012

A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications 28/05/2012 1 A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications I R F A N S. A L - A N B A G I, M E L I K E E R O L - K A N T A R C I, H U S S E I N T. M O U F T A H U N I V E

More information

Behavioral Analysis for Intrusion Resilience. Ahmed Fawaz Dec 6, 2016

Behavioral Analysis for Intrusion Resilience. Ahmed Fawaz Dec 6, 2016 Behavioral Analysis for Intrusion Resilience Ahmed Fawaz Dec 6, 2016 1 Recent Cyber Attacks on Private and Public Entities 2 Design for Resiliency Diverse Monitoring Secure Monitoring Monitoring Fusion

More information

NOTES W2006 CPS610 DBMS II. Prof. Anastase Mastoras. Ryerson University

NOTES W2006 CPS610 DBMS II. Prof. Anastase Mastoras. Ryerson University NOTES W2006 CPS610 DBMS II Prof. Anastase Mastoras Ryerson University Recovery Transaction: - a logical unit of work. (text). It is a collection of operations that performs a single logical function in

More information

Is This What the Future Will Look Like?

Is This What the Future Will Look Like? Is This What the Future Will Look Like? Implementing fault tolerant system architectures with AUTOSAR basic software Highly automated driving adds new requirements to existing safety concepts. It is no

More information

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No

More information

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall 2008.

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall 2008. Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.828 Fall 2008 Quiz II Solutions 1 I File System Consistency Ben is writing software that stores data in

More information

Lecture 22: Fault Tolerance

Lecture 22: Fault Tolerance Lecture 22: Fault Tolerance Papers: Token Coherence: Decoupling Performance and Correctness, ISCA 03, Wisconsin A Low Overhead Fault Tolerant Coherence Protocol for CMP Architectures, HPCA 07, Spain Error

More information

Wireless TCP Performance Issues

Wireless TCP Performance Issues Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the

More information

Trusted Software Repair for System Resiliency. Westley Weimer, Stephanie Forrest, Miryung Kim, Claire Le Goues, Patrick Hurley

Trusted Software Repair for System Resiliency. Westley Weimer, Stephanie Forrest, Miryung Kim, Claire Le Goues, Patrick Hurley Trusted Software Repair for System Resiliency, Stephanie Forrest, Miryung Kim, Claire Le Goues, Patrick Hurley For The Next 17 Minutes Program Repair: Resilient but Untrusted Can we assess post-repair

More information

Operating Systems. Deadlock. User OS. Kernel & Device Drivers. Interface Programs. Brian Mitchell - Operating Systems

Operating Systems. Deadlock. User OS. Kernel & Device Drivers. Interface Programs. Brian Mitchell - Operating Systems User OS Kernel & Device Drivers Interface Programs Deadlock 1 Deadlocks Computer resources are full of resources that can only be used by one process at a time Unpredictable results can occur if two or

More information

SMD149 - Operating Systems - File systems

SMD149 - Operating Systems - File systems SMD149 - Operating Systems - File systems Roland Parviainen November 21, 2005 1 / 59 Outline Overview Files, directories Data integrity Transaction based file systems 2 / 59 Files Overview Named collection

More information

Safety and Reliability of Software-Controlled Systems Part 14: Fault mitigation

Safety and Reliability of Software-Controlled Systems Part 14: Fault mitigation Safety and Reliability of Software-Controlled Systems Part 14: Fault mitigation Prof. Dr.-Ing. Stefan Kowalewski Chair Informatik 11, Embedded Software Laboratory RWTH Aachen University Summer Semester

More information

TSW Reliability and Fault Tolerance

TSW Reliability and Fault Tolerance TSW Reliability and Fault Tolerance Alexandre David 1.2.05 Credits: some slides by Alan Burns & Andy Wellings. Aims Understand the factors which affect the reliability of a system. Introduce how software

More information

Different attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT

Different attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT Different attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT environment (e.g., Windows vs Linux) Levels of abstraction

More information