首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
鲜继清 《压电与声光》2005,27(4):438-441
网络控制是计算机、通信与控制技术结合发展的必然产物,具有开放性特征的网络控制系统面临着控制信息安全问题。针对网络控制系统的典型体系结构和信息安全需求,提出了基于分层思想和资源匹配的网络控制系统信息安全求解策略。  相似文献   

2.
The need for global‐scale cyber physical system (CPS) is increasing with the evolution of CPS research. A global‐scale CPS requires additional considerations beyond the well‐known CPS requirements, such as security, reliability, and timely delivery, which cannot be easily satisfied when a CPS becomes global scale. Building an entire dedicated network for a global‐scale CPS cannot be a solution, because it requires a large capital outlay in order to be actualized. To overcome these obstacles, we implement a virtual platform named Xebra that includes effective CPS middleware for realizing a global‐scale CPS and isolation techniques based on virtualization. In this paper, we discuss the requirements for realizing global‐scale CPS network, and also, we introduce our implementation as a virtual platform with its performance evaluation. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

3.
网络化体系作战是信息化战争的主要作战样式.将潜艇融入网络化体系作战对潜艇作战系统提出了更高的要求.面向服务的潜艇作战系统是实施网络化指挥控制的技术基础,而赛博物理融合系统(CPS)的出现又为将潜艇融入网络化体系作战提供了新的技术思路.从面向服务的潜艇作战系统构建面临的问题出发,在军事信息服务框架的基础上,利用面向服务的体系结构(SOA)和CPS设计了潜艇作战系统体系结构的物理框架和功能框架,给出了各框架的组成和结构,并与已有框架做了对比分析.结果表明,所提的框架更加全面、可靠和灵活,为开展潜艇作战系统服务化研究打下了坚实的基础.  相似文献   

4.
基于微分动态逻辑的CPS建模与属性验证   总被引:1,自引:0,他引:1       下载免费PDF全文
随着信息物理融合系统(Cyber-Physical Systems,CPS)应用的越来越普及,CPS的设计和实现能否满足实际需求显得至关重要.本文提出了一种CPS建模与属性验证框架.在框架中,首先使用HybridUML对CPS进行建模,然后将该通用模型转换为形式化模型,进而进行形式化验证.本文采用的形式化验证方法为dL(Differential Dynamic Log-ic),其操作模型为hybrid program.将HybridUML模型转换为hybrid program时,基于语义一致性的原则定义转换规则.转换完成后,结合得到的hybrid program对验证的CPS属性进行规约,最后使用定理证明器KeYmaera对属性进行自动化验证.  相似文献   

5.
网络安全应用体系的实施为检察院机关承担的检察院管理和服务实现电子化、网络化和透明、高效开辟了广阔的空间。然而检察院机关电子政务信息系统的安全问题也变得更加突出、严重。认识检察院机关电子政务信息系统安全的威胁,把握系统安全的影响因素和要求,建设系统安全保障体系,对保证检察院机关电子政务的有效运行具有重要意义。  相似文献   

6.
从信息物理融合系统(CPS,cyber physical system)的设计理念来看,要求系统中的通信计算部分和被控制物理对象进行紧密耦合操作。遵照这种紧耦合操作原则,针对无线网络控制系统(WNCS,wireless networked control system),提出一种紧耦合自适应模糊控制方法。模拟实验数据显示这种设计方法能根据实时的NCS紧迫度和网络的拥塞度有效地调整被控系统的采样周期及网络信道占用优先级,从而优化利用了有限的网络资源,改善了整个网络控制系统的性能。  相似文献   

7.
Atat  Rachad  Liu  Lingjia  Wu  Jinsong  Ashdown  Jonathan  Yi  Yang 《Mobile Networks and Applications》2019,24(4):1364-1372

While the number of things is growing accompanied with an explosive increase in wireless traffic, network providers are facing a set of challenges, especially that the massive number of devices are expected to communicate over the current cellular networks. In an attempt to relieve network congestion and increase throughput, we turn toward cell shrinking and offloading, a key technology in future 5G networks. Using this potential solution, we are mainly targeting two important issues: i) enabling cyber-physical systems (CPS) communications over cellular networks to provide CPS with several benefits such as ubiquitous coverage, global connectivity, reliability and security; and ii) offloading a proportion of CPS traffic to small cells, which in tun increases the throughput of macrocells, and frees more network resources to other users. Using stochastic geometry, we present an analysis on CPS offloading rate and achievable throughput when small cells base stations (SCBSs) are powered by solar energy. The solar energy harvesting allows SCBSs to offset the costs of serving CPS devices. Our results show the potential benefits for both macrocells and small cells in terms of minimum achievable throughput when the CPS offloading rate is high.

  相似文献   

8.
9.
银行业是视频监控应用的一个主要行业.2004年以前,国内绝大部分银行的监控系统以营业网点、金库、24小时自助银行等本地监控管理为主,与报警系统和门禁系统各自独立.随着国内银行金库被盗、暴力抢劫自助银行和离行式ATM机等多起事件的发生,包括视频监控系统在内的安防系统联网建设逐渐被银行高层纳入议事日程,网络视频监控逐渐成为银行监控应用的主要方式.本文介绍了银行安防系统的组成,着重分析了银行联网监控系统的架构,各监控场景的需求以及典型的案例.  相似文献   

10.
The Medusa project at Olivetti Research aims to provide a networked multimedia environment in which many streams of multimedia data, perhaps thousands, are active simultaneously. Medusa uses a peer-to-peer architecture to control networked multimedia devices. In the software model presented to the applications programmer, active objects called modules represent cameras, displays, format converters, and so on. Data flows from module to module through connections between them, with proxy modules to restrict access for security reasons. The Medusa project is based on hardware that is a collection of asynchronous transfer mode (ATM) direct peripherals, including cameras, audio systems, multimedia storage servers, LCD displays, and televisions, as well as ATM networked workstations  相似文献   

11.
Digital networked communications are the key to all Internet-of-Things applications, especially to smart metering systems and the smart grid. In order to ensure a safe operation of systems and the privacy of users, the transport layer security (TLS) protocol, a mature and well standardized solution for secure communications, may be used. We implemented the TLS protocol in its latest version in a way suitable for embedded and resource-constrained systems. This paper outlines the challenges and opportunities of deploying TLS in smart metering and smart grid applications and presents performance results of our TLS implementation. Our analysis shows that given an appropriate implementation and configuration, deploying TLS in constrained smart metering systems is possible with acceptable overhead.  相似文献   

12.
在物理信息系统深度融合背景下,将信息系统引入传统的电力系统中,构建出新型CPS系统。然而信息系统的引入在提高电力系统可靠性的同时,也增加了电力系统的不安全、不稳定因素。针对信息带来的隐患文中提出一种基于CPS的电力系统可靠评估模型,并将新模型与传统电力系统评估模型进行对比,根据评估新型模型提出计算可靠性的理论方法。介绍了评估过程中面临的挑战,且对整个评估进行总结。  相似文献   

13.
修玲玲 《移动信息》2024,46(3):259-261
随着汽车的电动化、智能化和网联化,智能网联汽车已经成为汽车转型的重要发展方向之一。智能网联汽车上的电控系统、传感器等电子元件和系统的数量更多,这要求各系统之间的通信更加安全、迅速、准确,因此智能网联汽车必定是一个庞大的网络系统。文中从智能网联汽车网络的类型和特点、车载自组织网络以及车载移动互联网等方面,介绍了智能网联汽车的网络系统。  相似文献   

14.
Gain adaptation of networked DC motor controllers based on QoS variations   总被引:3,自引:0,他引:3  
Connecting a complex control system with various sensors, actuators, and controllers as a networked control system by a shared data network can effectively reduce complicated wiring connections. This system is also easy to install and maintain. The trend is to use networked control systems for time-sensitive applications, such as remote DC motor actuation control. The performance of a networked control system can be improved if the network can guarantee quality-of-service (QoS). Due to time-varying network traffic demands and disturbances, QoS requirements provided by a network may change. In this case, a network has to reallocate its resources and may not be able to provide QoS requirements to a networked control application as needed. Therefore, the application may have to gracefully degrade its performance and perform the task as best as possible with the provided network QoS. This paper proposes a novel approach for networked DC motor control systems using controller gain adaptation to compensate for the changes in QoS requirements. Numerical and experimental simulations, and prototyping, are presented to demonstrate the feasibility of the proposed adaptation scheme to handle network QoS variation in a control loop. The effective results show the promising future of the use of gain adaptation in networked control applications.  相似文献   

15.
IoT/CPS的安全体系结构及关键技术   总被引:1,自引:0,他引:1  
物联网(IoT)和信息物理融合系统(CPS)作为下一代网络的核心技术,被业界广泛关注。与传统网络不同,IoT/CPS异构融合、协同自治、开放互连的网络特性带来了巨大的系统安全方面的挑战。挑战包括安全协议的无缝衔接、用户隐私保护等。研发新的安全模型、关键安全技术和方法是IoT/CPS发展中的重点。文章基于IoT/CPS安全需求和威胁模型,提出了一种层次化的安全体系结构,并针对隐私保护、跨网认证和安全控制等IoT/CPS的关键安全技术展开讨论。  相似文献   

16.
An ANSA overview     
《IEEE network》1994,8(1):18-23
With the appropriate architecture, telecommunications services can work with computer applications components to support networked information services. ANSA is an architecture that enables telecommunications services and computer application components to work together despite diversity of programming languages, operating systems, computer hardware, networks, communications protocols and management, and security policies. The architecture is relevant to telecommunications, manufacturing, sales, cooperative working, banking, health service, research, and other applications. It provides a framework for the design and implementation of distributed computer systems supporting networked information services. The framework ensures that different design choices, made for particular applications, present the maximum opportunity for interworking  相似文献   

17.
郜富晓 《移动信息》2024,46(3):172-174
智能网联汽车集人工智能、车联网、大数据、移动互联等新技术于一身,给人们带来了许多传统汽车无法提供的新功能,让用户获得了比传统汽车更智能、舒适、便捷的用车体验。但是,智能网联汽车需要实时联网,深度依赖网络,存在诸多安全风险,需要予以重视。文中分析了智能网联汽车的安全风险,并提出了制定智能网联汽车信息安全标准、构建智能网联汽车数据安全防护体系、建立常态化的风险评估机制、提升车企技术水平、应用标识密钥技术、确保数据跨境流动安全等对策,以提升智能网联汽车的安全性。  相似文献   

18.
Distributed smart camera systems are becoming increasingly important in a wide range of applications. As they are often deployed in public space and/or our personal environment, they increasingly access and manipulate sensitive or private information. Their architectures need to address security and privacy issues appropriately, considering them from the inception of the overall system structure. In this paper, we present security and privacy issues of distributed smart camera systems. We describe security requirements, possible attacks, and common risks, analyzing issues at the node and at the network level and presenting available solutions. Although security issues of distributed smart cameras are analogous to networked embedded systems and sensor networks, emphasis is given to special requirements of smart camera networks, including privacy and continuous real-time operation.   相似文献   

19.
辽阳地市级办公自动化系统(NOTES)已正式运行并投入使用中。以往我局职工用户数据均存储在省局服务器上,经常出现数据涨死及传输延时等情况,地市级NOTES服务器建设成功不但为省局数据库分担压力,同时也使我局全部科室及职工均具备独立个人邮箱,使得公文流转更加便捷,文件保密程度进一步提高。目前,我局NOTES系统运行正常,全地区用户均已投入使用中,本人就系统一些功能及出现的问题进行简单分析总结。  相似文献   

20.
郭伟博  王力 《微电子学与计算机》2006,23(10):131-133,137
首先讨论了现有各种口令认证方法的特点,然后提出了一种可以进行密钥自动分发的不可重复口令认证方案。该方案具有以下基本特征:非法用户无法以重发攻击的方式入侵网络;主机系统可以自动分发加密密钥;用户不需事先取得加密密钥.可以不受限制的自由更改口令;系统管理者可以随时更改加密,解密密钥,并自动分发更新。显然,该方案在保持强安全性的同时具有很大的灵活性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号