-
Motion Planning for Autonomous Ground Vehicles Using Artificial Potential Fields: A Review
Authors:
Aziz ur Rehman,
Ahsan Tanveer,
M. Touseef Ashraf,
Umer Khan
Abstract:
Autonomous ground vehicle systems have found extensive potential and practical applications in the modern world. The development of an autonomous ground vehicle poses a significant challenge, particularly in identifying the best path plan, based on defined performance metrics such as safety margin, shortest time, and energy consumption. Various techniques for motion planning have been proposed by…
▽ More
Autonomous ground vehicle systems have found extensive potential and practical applications in the modern world. The development of an autonomous ground vehicle poses a significant challenge, particularly in identifying the best path plan, based on defined performance metrics such as safety margin, shortest time, and energy consumption. Various techniques for motion planning have been proposed by researchers, one of which is the use of artificial potential fields. Several authors in the past two decades have proposed various modified versions of the artificial potential field algorithms. The variations of the traditional APF approach have given an answer to prior shortcomings. This gives potential rise to a strategic survey on the improved versions of this algorithm. This study presents a review of motion planning for autonomous ground vehicles using artificial potential fields. Each article is evaluated based on criteria that involve the environment type, which may be either static or dynamic, the evaluation scenario, which may be real-time or simulated, and the method used for improving the search performance of the algorithm. All the customized designs of planning models are analyzed and evaluated. At the end, the results of the review are discussed, and future works are proposed.
△ Less
Submitted 22 October, 2023;
originally announced October 2023.
-
False Data Injection Attacks in Smart Grids: State of the Art and Way Forward
Authors:
Muhammad Irfan,
Alireza Sadighian,
Adeen Tanveer,
Shaikha J. Al-Naimi,
Gabriele Oligeri
Abstract:
In the recent years cyberattacks to smart grids are becoming more frequent Among the many malicious activities that can be launched against smart grids False Data Injection FDI attacks have raised significant concerns from both academia and industry FDI attacks can affect the internal state estimation processcritical for smart grid monitoring and controlthus being able to bypass conventional Bad D…
▽ More
In the recent years cyberattacks to smart grids are becoming more frequent Among the many malicious activities that can be launched against smart grids False Data Injection FDI attacks have raised significant concerns from both academia and industry FDI attacks can affect the internal state estimation processcritical for smart grid monitoring and controlthus being able to bypass conventional Bad Data Detection BDD methods Hence prompt detection and precise localization of FDI attacks is becomming of paramount importance to ensure smart grids security and safety Several papers recently started to study and analyze this topic from different perspectives and address existing challenges Datadriven techniques and mathematical modelings are the major ingredients of the proposed approaches The primary objective of this work is to provide a systematic review and insights into FDI attacks joint detection and localization approaches considering that other surveys mainly concentrated on the detection aspects without detailed coverage of localization aspects For this purpose we select and inspect more than forty major research contributions while conducting a detailed analysis of their methodology and objectives in relation to the FDI attacks detection and localization We provide our key findings of the identified papers according to different criteria such as employed FDI attacks localization techniques utilized evaluation scenarios investigated FDI attack types application scenarios adopted methodologies and the use of additional data Finally we discuss open issues and future research directions
△ Less
Submitted 20 August, 2023;
originally announced August 2023.
-
Genetic-Algorithm-Based Proportional Integral Controller (GAPI) for ROV Steering Control
Authors:
Ahsan Tanveer,
Sarvat Mushtaq Ahmad
Abstract:
This article presents the design and real-time implementation of an optimal controller for precise steering control of a remotely operated underwater vehicle (ROV). A PI controller is investigated to achieve the desired steering performance. The gain parameters of the controller are tuned using the genetic algorithm (GA). The experimental response corresponding to the step waveform for the GA is o…
▽ More
This article presents the design and real-time implementation of an optimal controller for precise steering control of a remotely operated underwater vehicle (ROV). A PI controller is investigated to achieve the desired steering performance. The gain parameters of the controller are tuned using the genetic algorithm (GA). The experimental response corresponding to the step waveform for the GA is obtained. A root-locus-tuned PI controller alongside a simulated-annealing-based PI controller (SAPI) is used to benchmark the response characteristics such as overshoot, peak time, and settling time. The experimental findings indicate that GAPI provides considerably better performance than SAPI and the root-locus-tuned controller.
△ Less
Submitted 20 April, 2023;
originally announced April 2023.
-
Unmanned Surface Vehicle: Yaw Modeling and Identification
Authors:
Ahsan Tanveer,
Sarvat Mushtaq Ahmad
Abstract:
In this article, a simplified modeling and system identification procedure for yaw motion of an unmanned surface vehicle (USV) is presented. Two thrusters that allow for both speed and direction control propel the USV. The outputs of the vehicle under inquiry include parameters that define the mobility of the USV in horizontal plane, such as yaw angle and yaw rate. A linear second order model is f…
▽ More
In this article, a simplified modeling and system identification procedure for yaw motion of an unmanned surface vehicle (USV) is presented. Two thrusters that allow for both speed and direction control propel the USV. The outputs of the vehicle under inquiry include parameters that define the mobility of the USV in horizontal plane, such as yaw angle and yaw rate. A linear second order model is first developed, and the unknown coefficients are then determined using data from pool trials. Finally, simulations are carried out to verify the model so that it may be used in a later study to implement various control algorithms.
△ Less
Submitted 23 March, 2023;
originally announced March 2023.
-
Design of a Low-Cost Prototype Underwater Vehicle
Authors:
Ahsan Tanveer,
Sarvat Mushtaq Ahmad
Abstract:
In this study, a small, inexpensive remotely driven underwater vehicle that can navigate in shallow water for the purpose of monitoring water quality and demonstrating vehicle control algorithms is presented. The vehicle is operated by an onboard micro-controller, and the sensor payload comprises a turbidity sensor for determining the quality of the water, a depth sensor, and a 9-axis inertial mea…
▽ More
In this study, a small, inexpensive remotely driven underwater vehicle that can navigate in shallow water for the purpose of monitoring water quality and demonstrating vehicle control algorithms is presented. The vehicle is operated by an onboard micro-controller, and the sensor payload comprises a turbidity sensor for determining the quality of the water, a depth sensor, and a 9-axis inertial measurement unit. The developed vehicle is an open frame remotely operated vehicle (ROV) with a small footprint and a modular physical and electrical architecture. With a net weight of 1.6 kg, a maximum depth rating of 20 meters, and a development cost of around $80, the ROV frame is composed of polyvinyl chloride tubes and has a length of 0.35 meters. As a ground station, a dedicated laptop shows crucial vehicle data in real time and can send commands to the vehicle. Initial testing in the pool demonstrates that the vehicle is completely operational and effectively complies with pilot commands.
△ Less
Submitted 23 March, 2023;
originally announced March 2023.
-
Boolean and $\mathbb{F}_p$-Matrix Factorization: From Theory to Practice
Authors:
Fedor Fomin,
Fahad Panolan,
Anurag Patil,
Adil Tanveer
Abstract:
Boolean Matrix Factorization (BMF) aims to find an approximation of a given binary matrix as the Boolean product of two low-rank binary matrices. Binary data is ubiquitous in many fields, and representing data by binary matrices is common in medicine, natural language processing, bioinformatics, computer graphics, among many others. Unfortunately, BMF is computationally hard and heuristic algorith…
▽ More
Boolean Matrix Factorization (BMF) aims to find an approximation of a given binary matrix as the Boolean product of two low-rank binary matrices. Binary data is ubiquitous in many fields, and representing data by binary matrices is common in medicine, natural language processing, bioinformatics, computer graphics, among many others. Unfortunately, BMF is computationally hard and heuristic algorithms are used to compute Boolean factorizations. Very recently, the theoretical breakthrough was obtained independently by two research groups. Ban et al. (SODA 2019) and Fomin et al. (Trans. Algorithms 2020) show that BMF admits an efficient polynomial-time approximation scheme (EPTAS). However, despite the theoretical importance, the high double-exponential dependence of the running times from the rank makes these algorithms unimplementable in practice. The primary research question motivating our work is whether the theoretical advances on BMF could lead to practical algorithms.
The main conceptional contribution of our work is the following. While EPTAS for BMF is a purely theoretical advance, the general approach behind these algorithms could serve as the basis in designing better heuristics. We also use this strategy to develop new algorithms for related $\mathbb{F}_p$-Matrix Factorization. Here, given a matrix $A$ over a finite field GF($p$) where $p$ is a prime, and an integer $r$, our objective is to find a matrix $B$ over the same field with GF($p$)-rank at most $r$ minimizing some norm of $A-B$. Our empirical research on synthetic and real-world data demonstrates the advantage of the new algorithms over previous works on BMF and $\mathbb{F}_p$-Matrix Factorization.
△ Less
Submitted 25 July, 2022;
originally announced July 2022.
-
Secure Links: Secure-by-Design Communications in IEC 61499 Industrial Control Applications
Authors:
Awais Tanveer,
Roopak Sinha,
Matthew M. Y. Kuo
Abstract:
Increasing automation and external connectivity in industrial control systems (ICS) demand a greater emphasis on software-level communication security. In this article, we propose a secure-by-design development method for building ICS applications, where requirements from security standards like ISA/IEC 62443 are fulfilled by design-time abstractions called secure links. Proposed as an extension t…
▽ More
Increasing automation and external connectivity in industrial control systems (ICS) demand a greater emphasis on software-level communication security. In this article, we propose a secure-by-design development method for building ICS applications, where requirements from security standards like ISA/IEC 62443 are fulfilled by design-time abstractions called secure links. Proposed as an extension to the IEC 61499 development standard, secure links incorporate both light-weight and traditional security mechanisms into applications with negligible effort. Applications containing secure links can be automatically compiled into fully IEC 61499-compliant software. Experimental results show secure links significantly reduce design and code complexity and improve application maintainability and requirements traceability.
△ Less
Submitted 24 July, 2021;
originally announced July 2021.
-
On Design-time Security in IEC 61499 Systems: Conceptualisation, Implementation, and Feasibility
Authors:
Awais Tanveer,
Roopak Sinha,
Stephen G. MacDonell
Abstract:
Cyber-attacks on Industrial Automation and Control Systems (IACS) are rising in numbers and sophistication. Embedded controller devices such as Programmable Logic Controllers (PLCs), which are central to controlling physical processes, must be secured against attacks on confidentiality, integrity and availability. The focus of this paper is to add design-level support for security in IACS applicat…
▽ More
Cyber-attacks on Industrial Automation and Control Systems (IACS) are rising in numbers and sophistication. Embedded controller devices such as Programmable Logic Controllers (PLCs), which are central to controlling physical processes, must be secured against attacks on confidentiality, integrity and availability. The focus of this paper is to add design-level support for security in IACS applications, especially around inter-PLC communications. We propose an end-to-end solution to develop IACS applications with inherent, and parametric support for security. Built using the IEC 61499 Function Blocks standard, this solution allows us to annotate certain communications as 'secure' during design time. When the application is compiled, these annotations are transformed into a security layer that implements encrypted communication between PLCs. In this paper, we implement a part of this security layer focussed on confidentiality, called Confidentiality Layer for Function Blocks (CL4FB), which provides a range of encryption/decryption and secure key exchange functionalities. We study the impact of using CL4FB in IACS applications with real-time constraints. Through a case study focussing on protection functions in smart-grids, we show that varying levels of confidentiality can be achieved while also meeting hard real-time deadlines.
△ Less
Submitted 18 April, 2021;
originally announced April 2021.
-
Designing Actively Secure, Highly Available Industrial Automation Applications
Authors:
Awais Tanveer,
Roopak Sinha,
Stephen G. MacDonell,
Paulo Leitao,
Valeriy Vyatkin
Abstract:
Programmable Logic Controllers (PLCs) execute critical control software that drives Industrial Automation and Control Systems (IACS). PLCs can become easy targets for cyber-adversaries as they are resource-constrained and are usually built using legacy, less-capable security measures. Security attacks can significantly affect system availability, which is an essential requirement for IACS. We prop…
▽ More
Programmable Logic Controllers (PLCs) execute critical control software that drives Industrial Automation and Control Systems (IACS). PLCs can become easy targets for cyber-adversaries as they are resource-constrained and are usually built using legacy, less-capable security measures. Security attacks can significantly affect system availability, which is an essential requirement for IACS. We propose a method to make PLC applications more security-aware. Based on the well-known IEC 61499 function blocks standard for developing IACS software, our method allows designers to annotate critical parts of an application during design time. On deployment, these parts of the application are automatically secured using appropriate security mechanisms to detect and prevent attacks. We present a summary of availability attacks on distributed IACS applications that can be mitigated by our proposed method. Security mechanisms are achieved using IEC 61499 Service-Interface Function Blocks (SIFBs) embedding Intrusion Detection and Prevention System (IDPS), added to the application at compile time. This method is more amenable to providing active security protection from attacks on previously unknown (zero-day) vulnerabilities. We test our solution on an IEC 61499 application executing on Wago PFC200 PLCs. Experiments show that we can successfully log and prevent attacks at the application level as well as help the application to gracefully degrade into safe mode, subsequently improving availability.
△ Less
Submitted 5 January, 2021;
originally announced January 2021.