3 results on '"resource-limitations"'
Search Results
2. Security of Cyber-Physical Systems.
- Author
-
Sargolzaei, Arman and Sargolzaei, Arman
- Subjects
History of engineering & technology ,Technology: general issues ,Cyber Physical System ,Federated Learning ,Lyapunov theory ,anomaly detection ,anomaly isolation ,artificial neural networks ,attack estimation ,autonomous vehicles ,blockchain ,contested environments ,cooperative automated driving systems ,demand response ,device authentication ,disaster ,edge intelligence ,enhanced security ,false data injection ,fault detection ,financial transactions ,greybox fuzzing ,hardware-in-the-loop testing ,home area networks ,industrial control systems ,intrusion detection system ,inverter-based energy resources ,islanded microgrids ,machine learning ,networked control systems ,out-of-bounds ,patch ,power system resilience ,privacy ,remedial testing ,resilience management systems ,resilient control design ,resource-limitations ,road capacity ,safety ,secondary control ,secure control design ,security ,situational awareness ,smart grids ,time-delay switch attack ,traffic microsimulation tool ,transportation systems ,vehicle powertrain ,vulnerability detection ,vulnerable detection - Abstract
Summary: Cyber-physical system (CPS) innovations, in conjunction with their sibling computational and technological advancements, have positively impacted our society, leading to the establishment of new horizons of service excellence in a variety of applicational fields. With the rapid increase in the application of CPSs in safety-critical infrastructures, their safety and security are the top priorities of next-generation designs. The extent of potential consequences of CPS insecurity is large enough to ensure that CPS security is one of the core elements of the CPS research agenda. Faults, failures, and cyber-physical attacks lead to variations in the dynamics of CPSs and cause the instability and malfunction of normal operations. This reprint discusses the existing vulnerabilities and focuses on detection, prevention, and compensation techniques to improve the security of safety-critical systems.
3. FedResilience: A Federated Learning Application to Improve Resilience of Resource-Constrained Critical Infrastructures.
- Author
-
Imteaj, Ahmed, Khan, Irfan, Khazaei, Javad, and Amini, Mohammad Hadi
- Subjects
SYSTEM failures ,LEARNING strategies ,MACHINE learning ,INFORMATION sharing ,DISTRIBUTED algorithms - Abstract
Critical infrastructures (e.g., energy and transportation systems) are essential lifelines for most modern sectors and have utmost significance in our daily lives. However, these important domains can fail to operate due to system failures or natural disasters. Though the major disturbances in such critical infrastructures are rare, the severity of such events calls for the development of effective resilience assessment strategies to mitigate relative losses. Traditional critical infrastructure resilience approaches consider that the available critical infrastructure agents are resource-sufficient and agree to exchange local data with the server and other agents. Such assumptions create two issues: (1) uncertainty in reaching convergence while applying learning strategies on resource-constrained critical infrastructure agents, and (2) a huge risk of privacy leakage. By understanding the pressing need to construct an effective resilience model for resource-constrained critical infrastructure, this paper aims at leveraging a distributed machine learning technique called Federated Learning (FL) to tackle an agent's resource limitations effectively and at the same time keep the agent's information private. Particularly, this paper is focused on predicting the probable outage and resource status of critical infrastructure agents without sharing any local data and carrying out the learning process even when most of the agents are incapable of accomplishing a given computational task. To that end, an FL algorithm is designed specifically for a resource-constrained critical infrastructure environment that could facilitate the training of each agent in a distributed fashion, restrict them from sharing their raw data with any other external entities (e.g., server, neighbor agents), choose proficient clients by analyzing their resources, and allow a partial amount of computation tasks to be performed by the resource-constrained agents. We considered a different number of agents with various stragglers and checked the performance of FedAvg and our proposed FedResilience algorithm with prediction tasks for a probable outage, as well as checking the agents' resource-sharing scope. Our simulation results show that if the majority of the FL agents are stragglers and we drop them from the training process, then the agents learn very slowly and the overall model performance is negatively affected. We also demonstrate that the selection of proficient agents and allowing them to complete only parts of their tasks can significantly improve the knowledge of each agent by eliminating the straggler effects, and the global model convergence is accelerated. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.