• Title/Summary/Keyword: industrial control networks

Search Result 218, Processing Time 0.024 seconds

A Study on the Performance Improvements of Congestion Control of Multiple Time Scale Under in TCP-MT network (TCP-MT네트워크에서 다중 시간 간격을 이용한 혼잡제어 성능 개선에 관한 연구)

  • Cho, Hyun-Seob;Oh, Myoung-Kwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.1
    • /
    • pp.75-80
    • /
    • 2008
  • Measurement of network traffic have shown that the self-similarity is a ubiquitous phenomenon spanning across diverse network environments. In previous work, we have explored the feasibility of exploiting the long-range correlation structure in a self-similar traffic for the congestion control. We have advanced the framework of the multiple time scale congestion control and showed its effectiveness at enhancing performance for the rate-based feedback control. Our contribution is threefold. First, we define a modular extension of the TCP-a function called with a simple interface-that applies to various flavours of the TCP-e.g., Tahoe, Reno, Vegas and show that it significantly improves performance. Second, we show that a multiple time scale TCP endows the underlying feedback control with proactivity by bridging the uncertainty gap associated with reactive controls which is exacerbated by the high delay-bandwidth product in broadband wide area networks. Third, we investigate the influence of the three traffic control dimensions-tracking ability, connection duration, and fairness-on performance.

Symmetric Encryption Application to Cyber Security of KEPCO SCADA Network (SCADA 시스템 정보보안들 위한 대칭키 암호 적용)

  • Kang, Dong-Joo;Kim, Hak-Man
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.291-293
    • /
    • 2007
  • SCADA (Supervisory Control and Data Acquisition) SCADA refers to the combination of telemetry and data acquisition [1]. SCADA system has been used for remote measurement and control on the critical infrastructures as well as modem industrial facilities. Electric Power system is a representative system using SCADA network for its communication. Integration between many networks and increasing threatens of terrorism have made the potential risk by cyber attacks real and bigger in power system. Recently, many researching efforts have been made on SCADA network for improving its security. In general aspect, there are already several ways to secure the system like encryption, firewall, authentication, etc. In this paper, we focus on symmetric encryption method and propose the proper key distribution method to reflect the unique characteristics of SCADA network communication.

  • PDF

A Reliable Group Key Management Scheme for Broadcast Encryption

  • Hur, Junbeom;Lee, Younho
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.246-260
    • /
    • 2016
  • A major challenge achieving scalable access control for a large number of subscribers in a public broadcast is to distribute key update messages reliably to all stateless receivers. However, in a public broadcast, the rekeying messages can be dropped or compromised during transmission over an insecure broadcast channel, or transmitted to receivers while they were off-line. In this study, we propose a novel group key management scheme. It features a mechanism to allow legitimate receivers to recover the current group key, even if they lose key update messages for long-term sessions. The scheme uses short hint messages and member computation. Performance analysis shows that the proposed scheme has the advantages of scalability and efficient rekeying compared to previous reliable group key distribution schemes. The proposed key management scheme targets a conditional access system in a media broadcast in which there is no feedback channel from receivers to the broadcasting station.

Effective Network Design Using Reflective Memory System (리플렉티브 메모리 시스템을 이용한 효과적인 네트워크 설계)

  • Lee Sung-Woo
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.54 no.6
    • /
    • pp.403-408
    • /
    • 2005
  • As the increasing integrity of VLSI, the BIST(Built-In Self Test) is used as an effective method to test chips. Generally the pseudo-random test pattern generation is used for BIST. But it requires too many test patterns when there exist random This paper proposes and presents a new efficient network architecture for Reflective Memory System (RMS). A time to copy shared-data among nodes effects critically on the entire performance of the RMS. In this paper, the recent researches about the RMS are investigated and compared. The device named Topology Conversion Switch(TCS) is introduced to realize the proposed network architecture. One of the RMS based industrial control networks, Ethernet based Real-time Control Network (ERCnet), is adopted to evaluate the performance of the proposed network architecture for RMS.

System Performance and Traffic Control for the AAL Type 2 Traffic in IMT-2000 Networks (IMT-2000 망에서 AAL-2 구조의 트래픽 제어 및 시스템 성능)

  • Ryu, Byung-Han;Ahn, Jee-Hwan;Baek, Jang-Hyun
    • IE interfaces
    • /
    • v.13 no.2
    • /
    • pp.178-187
    • /
    • 2000
  • In this paper, we investigate the system performance when the voice traffic is constructed as the ATM Adaptation Layer type 2(AAL-2) and then it is transmitted to the Base Station Controller(BSC) from the Base Station Transceiver Subsystem(BTS) through El link in International Mobile Telecommunication-2000 (IMT-2000) network. For this purpose, we first briefly describe the architecture of the BTS and the BSC, and then model it as a queueing network. By simulation study, we present the required processing time at traffic control blocks and the timeout time which should be set for multiplexing the user packets in the LIU(Line Interface Unit). Further, we evaluate the performance of physical links and the timeout probability that user packets can not be multiplexed within the established timeout time, and the multiplexing gain. Finally, we present the number of voice users who can be simultaneously admitted on one El link and 99.9% value of the transmission delay from the Radio Channel Element(RCE) to the Selector & Transcoder Subsystem(STS).

  • PDF

Securing SCADA Systems: A Comprehensive Machine Learning Approach for Detecting Reconnaissance Attacks

  • Ezaz Aldahasi;Talal Alkharobi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.1-12
    • /
    • 2023
  • Ensuring the security of Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) is paramount to safeguarding the reliability and safety of critical infrastructure. This paper addresses the significant threat posed by reconnaissance attacks on SCADA/ICS networks and presents an innovative methodology for enhancing their protection. The proposed approach strategically employs imbalance dataset handling techniques, ensemble methods, and feature engineering to enhance the resilience of SCADA/ICS systems. Experimentation and analysis demonstrate the compelling efficacy of our strategy, as evidenced by excellent model performance characterized by good precision, recall, and a commendably low false negative (FN). The practical utility of our approach is underscored through the evaluation of real-world SCADA/ICS datasets, showcasing superior performance compared to existing methods in a comparative analysis. Moreover, the integration of feature augmentation is revealed to significantly enhance detection capabilities. This research contributes to advancing the security posture of SCADA/ICS environments, addressing a critical imperative in the face of evolving cyber threats.

Design and Performance Analysis of Control Network on the Intelligent Large-scaled Ship using Industrial Ethernet (산업용 이더넷 기반의 선박용 제어망의 구조 설계 및 성능 분석)

  • Kwon, Ki-Hyup;Kim, Joon-Woo;Kim, Dong-Sung;Kim, Tae-Min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.709-711
    • /
    • 2010
  • This paper discusses a design and performance analysis of control network on large-scaled ship. Ship control network can be composed many actuator, sensors and controllers considering reliability and real-time performance. SMS(Ship Message Specification) is based on real time Ethernet is proposed for ship control networks. Considering ship environment, the proposed scheme is investigated through computer simulation.

  • PDF

Efficient Resource Allocation for Energy Saving with Reinforcement Learning in Industrial IoT Network

  • Dongyeong Seo;Kwansoo Jung;Sangdae Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.9
    • /
    • pp.169-177
    • /
    • 2024
  • Industrial Wireless Sensor Network (IWSN) is a key feature of Industrial IoT that enables industrial automation through process monitoring and control by connecting industrial equipment such as sensors, robots, and machines wirelessly, and must support the strict requirements of modern industrial environments such as real-time, reliability, and energy efficiency. To achieve these goals, IWSN uses reliable communication methods such as multipath routing, fixed redundant resource allocation, and non-contention-based scheduling. However, the issue of wasting redundant resources that are not utilized for communication degrades not only the efficiency of limited radio resources but also the energy efficiency. In this paper, we propose a scheme that utilizes reinforcement learning in communication scheduling to periodically identify unused wireless resources and reallocate them to save energy consumption of the entire industrial network. The experimental performance evaluation shows that the proposed approach achieves about 30% improvement of resource efficiency in scheduling compared to the existing method while supporting high reliability. In addition, the energy efficiency and latency are improbed by more than 21% and 38%, respectively, by reducing unnecessary communication.

An Efficient Multiple Event Detection in Sensor Networks (센서 네트워크에서 효율적인 다중 이벤트 탐지)

  • Yang, Dong-Yun;Chung, Chin-Wan
    • Journal of KIISE:Databases
    • /
    • v.36 no.4
    • /
    • pp.292-305
    • /
    • 2009
  • Wireless sensor networks have a lot of application areas such as industrial process control, machine and resource management, environment and habitat monitoring. One of the main objects of using wireless sensor networks in these areas is the event detection. To detect events at a user's request, we need a join processing between sensor data and the predicates of the events. If there are too many predicates of events compared with a node's capacity, it is impossible to store them in a node and to do an in-network join with the generated sensor data This paper proposes a predicate-merge based in-network join approach to efficiently detect multiple events, considering the limited capacity of a sensor node and many predicates of events. It reduces the number of the original predicates of events by substituting some pairs of original predicates with some merged predicates. We create an estimation model of a message transmission cost and apply it to the selection algorithm of targets for merged predicates. The experiments validate the cost estimation model and show the superior performance of the proposed approach compared with the existing approaches.

Development of multi-media multi-path Optimization Network Technology Using RNN Algorithm (RNN 알고리즘을 이용한 다매체 다중경로 최적화 네트워크 기술 개발)

  • Pokki Park;Youngdong Kim
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.95-104
    • /
    • 2024
  • The performance capability of the future battlefield depends on whether the next-generation technology of the Fourth Industrial Revolution, called ABCMS (AI, Bigdata, Cloud, Mobile, Security), can be applied to secure innovative defense capabilities It is no exaggeration to say. In addition, the future military operation environment is rapidly changing into a net work-oriented war (NCW) in which all weapon systems mutually share battlefield information and operate in real-time within a single integrated information and communication network based on the network and is expanding to the scope of operation of the manned and unmanned complex combat system. In particular, communication networks responsible for high-speed and hyperconnectivity require high viability and efficiency in power operation based on multi-tier (defense mobile, satellite, M/W, wired) networks for the connection of multiple combat elements and smooth distribution of information. From this point of view, this study is different from conventional single-media, single-path transmission with fixed specifications, It is an artificial intelligence-based transmission technology using RNN (Recurrent Neural Networks) algorithm and load distribution during traffic congestion using available communication wired and wireless infrastructure multimedia simultaneously and It is the development of MMMP-Multi-Media Multi-Path adaptive network technology.