5 resultados para Cyber

em Archivo Digital para la Docencia y la Investigación - Repositorio Institucional de la Universidad del País Vasco


Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is an increasing number of Ambient Intelligence (AmI) systems that are time-sensitive and resource-aware. From healthcare to building and even home/office automation, it is now common to find systems combining interactive and sensing multimedia traffic with relatively simple sensors and actuators (door locks, presence detectors, RFIDs, HVAC, information panels, etc.). Many of these are today known as Cyber-Physical Systems (CPS). Quite frequently, these systems must be capable of (1) prioritizing different traffic flows (process data, alarms, non-critical data, etc.), (2) synchronizing actions in several distributed devices and, to certain degree, (3) easing resource management (e.g., detecting faulty nodes, managing battery levels, handling overloads, etc.). This work presents FTT-MA, a high-level middleware architecture aimed at easing the design, deployment and operation of such AmI systems. FTT-MA ensures that both functional and non-functional aspects of the applications are met even during reconfiguration stages. The paper also proposes a methodology, together with a design tool, to create this kind of systems. Finally, a sample case study is presented that illustrates the use of the middleware and the methodology proposed in the paper.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

[ES]Los sistemas Ciber-Físicos (Cyber-Physical Systems – CPS) son dispositivos que integran computación, control y comunicaciones. Actualmente se puede encontrar este tipo de sistemas en áreas tan diversas como la industria aeroespacial, automotriz, procesos químicos, infraestructura civil, etc. Entre las arquitecturas de comunicación empleadas en estos dispositivos, OPC UA se consolida como la más adecuada. OPC Unified Architecture es la nueva generación de tecnología propuesta por OPC Foundation para transmitir datos en bruto e información pre procesada entre los niveles de producción y los sistemas de planificación de producto de la empresa. Mediante OPC UA se puede disponer de toda la información deseada para cualquier aplicación y usuario autorizados, en cualquier instante y en cualquier lugar. En este proyecto se pretende desarrollar una arquitectura basada en OPC UA sobre CPSs para el acceso a datos de producción. Para ello se partirá de arquitecturas basadas en PC empotrados y redes de comunicación industriales.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

[ES]El presente trabajo de fin de grado tiene como objetivo la investigación del cibercontrol y del ciberacoso durante las relaciones de noviazgo. Para ello se aplicó el cuestionario de Actitudes hacia el Género y la Violencia de Género, creado por Díaz-Aguado y que ha sido validado y utilizado en numerosos estudios, a adolescentes y jóvenes de edades comprendidas entre 14 y 17 años residentes en Txurdinaga-Otxarkoaga del municipio de Bilbao. Nuestra investigación nos ayudará a recabar información sobre la posible victimización padecida por adolescentes y jóvenes de la mano de su pareja actual o pasada. Una problemática que va en aumento con la incorporación de las TIC a todos los aspectos de nuestra vida.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nowadays, Power grids are critical infrastructures on which everything else relies, and their correct behavior is of the highest priority. New smart devices are being deployed to be able to manage and control power grids more efficiently and avoid instability. However, the deployment of such smart devices like Phasor Measurement Units (PMU) and Phasor Data Concentrators (PDC), open new opportunities for cyber attackers to exploit network vulnerabilities. If a PDC is compromised, all data coming from PMUs to that PDC is lost, reducing network observability. Our approach to solve this problem is to develop an Intrusion detection System (IDS) in a Software-defined network (SDN). allowing the IDS system to detect compromised devices and use that information as an input for a self-healing SDN controller, which redirects the data of the PMUs to a new, uncompromised PDC, maintaining the maximum possible network observability at every moment. During this research, we have successfully implemented Self-healing in an example network with an SDN controller based on Ryu controller. We have also assessed intrinsic vulnerabilities of Wide Area Management Systems (WAMS) and SCADA networks, and developed some rules for the Intrusion Detection system which specifically protect vulnerabilities of these networks. The integration of the IDS and the SDN controller was also successful. \\To achieve this goal, the first steps will be to implement an existing Self-healing SDN controller and assess intrinsic vulnerabilities of Wide Area Measurement Systems (WAMS) and SCADA networks. After that, we will integrate the Ryu controller with Snort, and create the Snort rules that are specific for SCADA or WAMS systems and protocols.