- Network Time Synchronization Technologies
- Security and Verification in Computing
- Real-Time Systems Scheduling
- Embedded Systems Design Techniques
- Smart Grid Security and Resilience
- Petri Nets in System Modeling
- IoT and Edge/Fog Computing
- IoT Networks and Protocols
- Advanced Wireless Communication Technologies
- Network Security and Intrusion Detection
- Wireless Body Area Networks
- Formal Methods in Verification
- Low-power high-performance VLSI design
- Cloud Data Security Solutions
- Distributed systems and fault tolerance
- Analog and Mixed-Signal Circuit Design
Linköping University
2016-2024
Real-time communication over Ethernet is becoming important in various application areas of cyber-physical systems such as industrial automation and control, avionics, automotive networking. Since applications are typically time critical, technology has been enhanced to support time-driven through the IEEE 802.1 TSN standards. The performance stability control strongly impacted by timing network communication. Thus, order guarantee requirements, when synthesizing schedule routing, it needed...
Today, it is common knowledge in the cyber-physical systems domain that tight interaction between cyber and physical elements provides possibility of substantially improving performance these otherwise impossible. On downside, however, this with makes easier for an adversary to compromise safety system. This becomes particularly important, since such typically are composed several critical components, e.g., adaptive cruise control or engine allow deep intervention driving a vehicle. As...
Increasing internet connectivity poses an existential threat for cyber-physical systems. Securing these safety-critical systems becomes important challenge. Cyber-physical often comprise several control applications that are implemented on shared platforms where both high and low criticality tasks execute together (to reduce cost). Such resource sharing may lead to complex timing behaviors and, in turn, counter-intuitive anomalies can be exploited by adversaries destabilize a critical...
This paper presents JitterTime, a small Matlab toolbox for calculating the transient performance of control system in non-ideal timing scenarios. Such scenarios arise networked and embedded systems, where several applications share set limited varying resources. Technically, evaluates time-varying state covariance mixed continuous/discrete linear driven by white noise. It also integrates quadratic cost function system. The passing time updating discrete-time systems are explicitly managed...
<italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Editor's notes:</i> The cross-layer approach presented in this article involves co-designing a feedback controller's parameters together with the schedule of an Ethernet network used for communicating state information and control signals.— xmlns:xlink="http://www.w3.org/1999/xlink">Samarjit Chakraborty, University North Carolina at Chapel Hill</i>
5G is expected to support ultra-reliable low latency communication enable real-time applications such as industrial automation and control. configured grant (CG) scheduling features a pre-allocated periodicity-based approach which reduces control signaling time guarantees service quality. Although this enables hard periodic traffics, efficiently synthesizing the schedule achieving high resource efficiency while serving multiple still an open problem. To address problem, we first formulate it...
With cyber-physical systems opening to the outside world, security can no longer be considered a secondary issue. One of key aspects in cyber-phyiscal is deal with intrusions. In this paper, we highlight several unique properties control applications systems. Using these properties, propose systematic intrusion-damage assessment and mitigation mechanism for class observable controllable attacks.
Security for outsourced control applications can be provided if the physical plant is enabled with a mechanism to verify signal received from cloud. Recent developments in modern cryptography claim applicability of verifiable computation techniques. Such techniques allow client check correctness remote execution. This article delivers proof concept scheme over We showcase practicality on plants different timing demands and deliver real-life example using watertank system as Microsoft Azure...
The fifth-generation (5G) technology standard in telecommunications is expected to support ultra-reliable low latency communication enable real-time applications such as industrial automation and control. 5G configured grant (CG) scheduling features a pre-allocated periodicity-based approach, which reduces control signaling time guarantees service quality. Although this enables hard periodic traffics, synthesizing the schedule efficiently achieving high resource efficiency, while serving...