Do you want to publish a course? Click here

Fast Security Evaluation for Operation of Water Distribution Systems Against Extreme Conditions

79   0   0.0 ( 0 )
 Added by Mostafa Goodarzi
 Publication date 2021
and research's language is English




Ask ChatGPT about the research

This paper defines a security injection region (SIR) to guarantee reliable operation of water distribution systems (WDS) under extreme conditions. The model of WDSs is highly nonlinear and nonconvex. Understanding the accurate SIRs of WDSs involves the analysis of nonlinear constraints, which is computationally expensive. To reduce the computational burden, this paper first investigates the convexity of the SIR of WDSs under certain conditions. Then, an algorithm based on a monotone inner polytope sequence is proposed to effectively and accurately determine these SIRs. The proposed algorithm estimates a sequence of inner polytopes that converge to the whole convex region. Each polytope adds a new area to the SIR. The algorithm is validated on two different WDSs, and the conclusion is drawn. The computational study shows this method is applicable and fast for both systems.



rate research

Read More

Given a network with the set of vulnerable actuators (and sensors), the security index of an actuator equals the minimum number of sensors and actuators that needs to be compromised so as to conduct a perfectly undetectable attack using the said actuator. This paper deals with the problem of computing actuator security indices for discrete-time LTI network systems. Firstly, we show that, under a structured systems framework, the actuator security index is generic. Thereafter, we provide graph-theoretic conditions for computing the structural actuator security index. The said conditions are in terms of existence of linkings on appropriately-defined directed (sub)graphs. Based on these conditions, we present an algorithm for computing the structural index.
In this paper, a method to evaluate the flexibility of aggregates of domestic electric water heaters is proposed and applied to the Italian case. Flexibility is defined as the capability of the aggregate to vary its power demand for a given time interval. The evaluation method consists of a Monte Carlo analysis, that uses the thermal model of electric water heaters and a proper elaboration of the external inputs, such as ambient and cold water temperatures, and hot water demand. The case of large aggregates defined along the Italian territory has been studied showing the dependence of flexibility on seasons and on time.
244 - Shuai Sun , Yilin Mo 2021
Due to the wide application of average consensus algorithm, its security and privacy problems have attracted great attention. In this paper, we consider the system threatened by a set of unknown agents that are both malicious and curious, who add additional input signals to the system in order to perturb the final consensus value or prevent consensus, and try to infer the initial state of other agents. At the same time, we design a privacy-preserving average consensus algorithm equipped with an attack detector with a time-varying exponentially decreasing threshold for every benign agent, which can guarantee the initial state privacy of every benign agent, under mild conditions. The attack detector will trigger an alarm if it detects the presence of malicious attackers. An upper bound of false alarm rate in the absence of malicious attackers and the necessary and sufficient condition for there is no undetectable input by the attack detector in the system are given. Specifically, we show that under this condition, the system can achieve asymptotic consensus almost surely when no alarm is triggered from beginning to end, and an upper bound of convergence rate and some quantitative estimates about the error of final consensus value are given. Finally, numerical case is used to illustrate the effectiveness of some theoretical results.
For a class of Cyber-Physical Systems (CPSs), we address the problem of performing computations over the cloud without revealing private information about the structure and operation of the system. We model CPSs as a collection of input-output dynamical systems (the system operation modes). Depending on the mode the system is operating on, the output trajectory is generated by one of these systems in response to driving inputs. Output measurements and driving inputs are sent to the cloud for processing purposes. We capture this processing through some function (of the input-output trajectory) that we require the cloud to compute accurately - referred here as the trajectory utility. However, for privacy reasons, we would like to keep the mode private, i.e., we do not want the cloud to correctly identify what mode of the CPS produced a given trajectory. To this end, we distort trajectories before transmission and send the corrupted data to the cloud. We provide mathematical tools (based on output-regulation techniques) to properly design distorting mechanisms so that: 1) the original and distorted trajectories lead to the same utility; and the distorted data leads the cloud to misclassify the mode.
We consider a security setting in which the Cyber-Physical System (CPS) is composed of subnetworks where each subnetwork is under ownership of one defender. Such CPS can be represented by an attack graph where the defenders are required to invest (subject to a budget constraint) on the graphs edges in order to protect their critical assets (where each defenders critical asset has a certain value to the defender if compromised). We model such CPS using Hybrid Input-Output Automaton (HIOA) where each subnetwork is represented by a HIOA module. We first establish the building blocks needed in our setting. We then present our model that characterizes the continuous time evolution of the investments and discrete transitions between different states (where each state represents different condition and/or perturbation) within the system. Finally, we provide a real-world CPS example to validate our modeling.
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا