skip to main content


Title: Low-Cost Remote Supervisory Control System for an Industrial Process
A low-cost remote supervisory control capability is added to a packaging process, in which a low-voltage signal is used to communicate between a distant HMI control panel and a PLC network using the AC power line as a communication medium. The network is a star-topology and uses a Mater-slave protocol. Remote Supervisory control is achieved using a user-defined toolbox of control functions. In this system, a Programmable Logic Controller (PLC) is used to control a process and interface with the operator through a Human Machine Interface (HMI) Panel. A star topology ethernet network is used to connect the PLCs and the HMI panel.  more » « less
Award ID(s):
1801120
NSF-PAR ID:
10091559
Author(s) / Creator(s):
; ;
Date Published:
Journal Name:
NSF-ATE National Conference
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. In this paper we demonstrate two applications of a low-cost remote supervisory control and data acquisition system in two models. The first model is demonstrated with a Profibus-DP protocol based system in which a master Programmable Logic Controller (PLC) unit with control inputs and display outputs controls the speed and monitors the overload condition of a DC motor that is connected to a slave PLC in real time. In the upgraded model, a Profinet protocol is used to connect PLCs, and a power-line communication link is used to remotely connect the control HMI to the network. In both models, remote Supervisory control is achieved using user-defined control functions that act altogether as a block-oriented function library or toolbox. High levels of performance are achieved in real time control and data acquisition in both models. 
    more » « less
  2. In recent years, there has been a growing interest in so-called smart cities. These cities use technology to connect and enhance the lives of their citizens. Smart cities use many Internet of Things (loT) devices, such as sensors and video cameras, that are interconnected to provide constant feedback and up-to-date information on everything that is happening. Despite the benefits of these cities, they introduce a numerous new vulnerabilities as well. These smart cities are now susceptible to cyber-attacks that aim to “alter, disrupt, deceive, degrade, or destroy computer systems.” Through the use of an educational and research-based loT test-bed with multiple networking layers and heterogeneous devices connected to simultaneously support networking research, anomaly detection, and security principles, we can pinpoint some of these vulnerabilities. This work will contribute potential solutions to these vulnerabilities that can hopefully be replicated in smart cities around the world. Specifically, in the transportation section of our educational smart city several vulnerabilities in the signal lights, street lights, and the cities train network were discovered. To conduct this research two scenarios were developed. These consisted of inside the network security and network perimeter security. For the latter we were able to find extensive vulnerabilities that would allow an attacker to map the entire smart city sub-network. Solutions to this problem are outlined that utilize an Intrusion Detection System and Port Mirroring. However, while we were able to exploit the city's Programmable Logic Controller (PLC) once inside the network, it was found that due to dated Supervisory Control and Data Acquisition (SCADA) systems, there were almost no solutions to these exploits. 
    more » « less
  3. Abstract

    Soft robots have attracted great attention in the past decades owing to their unique flexibility and adaptability for accomplishing tasks via simple control strategies, as well as their inherent safety for interactions with humans and environments. Here, a soft robotic manipulation system capable of stiffness variation and dexterous operations through a remotely controlled manner is reported. The smart manipulation system consists of a soft omnidirectional arm, a dexterous multimaterial gripper, and a self‐powered human–machine interface (HMI) for teleoperation. The cable‐driven soft arm is made of soft elastomers and embedded with low melting point alloy as a stiffness‐tuning mechanism. The self‐powered HMI patches are designed based on the triboelectric nanogenerator that utilizes a sliding mode of tribo‐layers made of copper and polytetrafluoroethylene. The novel soft manipulation system has great potential for soft and remote manipulation and human machine interactions in a variety of applications from elderly care to surgical operation to agriculture harvesting.

     
    more » « less
  4. null (Ed.)
    Ensuring the integrity of embedded programmable logic controllers (PLCs) is critical for safe operation of industrial control systems. In particular, a cyber-attack could manipulate control logic running on the PLCs to bring the process of safety-critical application into unsafe states. Unfortunately, PLCs are typically not equipped with hardware support that allows the use of techniques such as remote attestation to verify the integrity of the logic code. In addition, so far remote attestation is not able to verify the integrity of the physical process controlled by the PLC. In this work, we present PAtt, a system that combines remote software attestation with control process validation. PAtt leverages operation permutations—subtle changes in the operation sequences based on integrity measurements—which do not affect the physical process but yield unique traces of sensor readings during execution. By encoding integrity measurements of the PLC’s memory state (software and data) into its control operation, our system allows to remotely verify the integrity of the control logic based on the resulting sensor traces. We implement the proposed system on a real PLC controlling a robot arm, and demonstrate its feasibility. Our implementation enables the detection of attackers that manipulate the PLC logic to change process state and/or report spoofed sensor readings (with an accuracy of 97% against tested attacks). 
    more » « less
  5. Summary

    Predicting gene regulatory networks (GRNs) from expression profiles is a common approach for identifying important biological regulators. Despite the increased use of inference methods, existing computational approaches often do not integrate RNA‐sequencing data analysis, are not automated or are restricted to users with bioinformatics backgrounds. To address these limitations, we developedtuxnet, a user‐friendly platform that can process raw RNA‐sequencing data from any organism with an existing reference genome using a modifiedtuxedopipeline (hisat 2 + cufflinkspackage) and infer GRNs from these processed data.tuxnetis implemented as a graphical user interface and can mine gene regulations, either by applying a dynamic Bayesian network (DBN) inference algorithm,genist, or a regression tree‐based pipeline,rtp‐star. We obtained time‐course expression data of aPERIANTHIA(PAN) inducible line and inferred a GRN usinggenistto illustrate the use oftuxnetwhile gaining insight into the regulations downstream of the Arabidopsis root stem cell regulatorPAN. Usingrtp‐star, we inferred the network ofATHB13, a downstream gene of PAN, for which we obtained wild‐type and mutant expression profiles. Additionally, we generated two networks using temporal data from developmental leaf data and spatial data from root cell‐type data to highlight the use oftuxnetto form new testable hypotheses from previously explored data. Our case studies feature the versatility oftuxnetwhen using different types of gene expression data to infer networks and its accessibility as a pipeline for non‐bioinformaticians to analyze transcriptome data, predict causal regulations, assess network topology and identify key regulators.

     
    more » « less