Position-Velocity/Position Based Robust Control for Shared Autonomous System Over Open Communication Networks-Experimental Results

Author(s):  
Shafiqul Islam
2015 ◽  
Vol 2015 (1) ◽  
pp. 4-24 ◽  
Author(s):  
Aaron D. Jaggard ◽  
Aaron Johnson ◽  
Sarah Cortes ◽  
Paul Syverson ◽  
Joan Feigenbaum

Abstract Motivated by the effectiveness of correlation attacks against Tor, the censorship arms race, and observations of malicious relays in Tor, we propose that Tor users capture their trust in network elements using probability distributions over the sets of elements observed by network adversaries. We present a modular system that allows users to efficiently and conveniently create such distributions and use them to improve their security. To illustrate this system, we present two novel types of adversaries. First, we study a powerful, pervasive adversary that can compromise an unknown number of Autonomous System organizations, Internet Exchange Point organizations, and Tor relay families. Second, we initiate the study of how an adversary might use Mutual Legal Assistance Treaties (MLATs) to enact surveillance. As part of this, we identify submarine cables as a potential subject of trust and incorporate data about these into our MLAT analysis by using them as a proxy for adversary power. Finally, we present preliminary experimental results that show the potential for our trust framework to be used by Tor clients and services to improve security.


2017 ◽  
Vol 40 (9) ◽  
pp. 2901-2911 ◽  
Author(s):  
Zhangbao Xu ◽  
Dawei Ma ◽  
Jianyong Yao

In this paper, an adaptive robust controller with uniform robust exact differentiator has been proposed for a class of nonlinear systems with structured and unstructured uncertainties. The adaptive robust controller is integrated with an uniform robust differentiator to handle the problem of the incalculable part of the derivative of virtual controls and the differential explosion happened in backstepping techniques. The stability of the closed loop system is demonstrated via Lyapunov method ensuring a prescribed transient and tracking performance. Simulation and experimental results are carried out to verify the advantages of the proposed method.


2019 ◽  
Vol 2019 ◽  
pp. 1-22 ◽  
Author(s):  
Krzysztof Cabaj ◽  
Marcin Gregorczyk ◽  
Wojciech Mazurczyk ◽  
Piotr Nowakowski ◽  
Piotr Żórawski

Currently 5G communication networks are envisioned to offer in a near future a wide range of high-quality services and unfaltering user experiences. In order to achieve this, several issues including security, privacy, and trust aspects need to be solved so that the 5G networks can be widely welcomed and accepted. Considering above, in this paper, we take a step towards these requirements by proposing a dedicated SDN-based integrated security framework for the Internet of Radio Light (IoRL) system that is following 5G architecture design. In particular, we present how TCP SYN-based scanning activities and DHCP-related network threats like Denial of Service (DoS), traffic eavesdropping, etc. can be detected and mitigated using such an approach. Enclosed experimental results prove that the proposed security framework is effective and efficient and thus can be considered as a promising defensive solution.


2009 ◽  
Vol 147-149 ◽  
pp. 302-307 ◽  
Author(s):  
Arkadiusz Mystkowski ◽  
Zdzisław Gosiewski

An optimal robust vibration control of a rotor supported magnetically over a wide angular speed range is presented in the paper. The laboratory stand with the high speed rotor (max. 24000 rpm) was designed. The wide bandwidth controller with required gain, which is necessary to stabilize the structurally unstable and active magnetic bearing system was computed. For controller design, the weighting functions putted on the input and output signals were chosen. For control design, the dynamics of the rotor and uncertain parameters were considered. The optimized control system by minimization of the H norm putted on transient process of the system was presented. The robust controller was designed with considered asymmetrically magnetic bearings, signal limits and power amplifiers dynamic. The success of the robust control is demonstrated through computer simulations and experimental results. Matlab-Simulink was used for the numerical simulation. The experimental results show the effectiveness of the control system as good vibrations reducing and robustness of the designed controller in all dynamic states.


Author(s):  
Oladotun O. Okediran

Advances in computing and communication technologies have provided new methods to store and access medical data electronically and distribute them over open communication networks. Today, patients themselves can access their medical information themselves and medical information can be transmitted among medical institutions as well as stakeholders in the health sector.  Accompanying these benefits are concomitant risks for patient medical records in electronic formats and strictly personal medical documentations being transmitted and accessible over open communication channels such as the Internet. Thus it is common knowledge that there should be in place network-level security measures and protocols in medical information systems. Many security schemes that were based on cryptography, watermarking and steganography have been proposed and implemented to secure medical data. However, an apt review of relevant literature revealed that in many implementations robustness against attacks is not guaranteed. Issues bordering on low embedding capacity, low robustness, low imperceptibility and bad trade tradeoff between robustness and capacity are evident in many implementations. In this paper, a hybrid Rivest-Shamir-Adleman (RSA) algorithm, Rivest Cipher 4 (RC4) algorithm and Spread Spectrum techniques were proposed for securing medical image data over open communication networks. The performance of the proposed scheme was evaluated using Peak Signal to Noise Ratio (PSNR), Signal to Noise Ratio (SNR), Mean Square Error (MSE) and Bit Error Rate (BER). For the five sample medical images used to test the scheme, the BER value is zero while the PNSR and SNR are consistent and they returned desirable high values. The MSE values for the images were low. The average values of the PSNR, SNR and MSE are 51.88 dB, 43.38 dB and 0.113 respectively. Hence, the proposed scheme is utterly revertible, robust and highly imperceptible; the original images can be retrieved by the recipient without any deformation or alteration.


2003 ◽  
Vol 125 (3) ◽  
pp. 374-383 ◽  
Author(s):  
Hemanshu R. Pota ◽  
Ian R. Petersen ◽  
Atul G. Kelkar

This paper reports experimental results in the application of feedback control of acoustic noise in a 2D enclosure. It is shown that the feedback control of 2D enclosures poses peculiar problems compared to simple 1D ducts. The chief among them are the need for explicit budgeting of uncertainties and dealing with high model orders. This paper demonstrates a practical way to design controllers for such systems using minimax LQG methods. It is shown that an important step in the controller design is the proper choice of a weighting function. The results presented in this paper are impressive and they can be further improved by proper choice of actuator and sensor placements.


Sign in / Sign up

Export Citation Format

Share Document