liu.seSearch for publications in DiVA
Change search
Link to record
Permanent link

Direct link
Mahfouzi, Rouhollah
Publications (6 of 6) Show all publications
Pan, Y., Mahfouzi, R., Samii, S., Eles, P. I. & Peng, Z. (2024). Multi-Traffic Resource Optimization for Real-Time Applications with 5G Configured Grant Scheduling. ACM Transactions on Embedded Computing Systems, 23(4), Article ID 63.
Open this publication in new window or tab >>Multi-Traffic Resource Optimization for Real-Time Applications with 5G Configured Grant Scheduling
Show others...
2024 (English)In: ACM Transactions on Embedded Computing Systems, ISSN 1539-9087, E-ISSN 1558-3465, Vol. 23, no 4, article id 63Article in journal (Refereed) Published
Abstract [en]

The fifth-generation (5G) technology standard in telecommunications is expected to support ultra-reliable low latency communication to enable real-time applications such as industrial automation and control. 5G configured grant (CG) scheduling features a pre-allocated periodicity-based scheduling approach, which reduces control signaling time and guarantees service quality. Although this enables 5G to support hard real-time periodic traffics, synthesizing the schedule efficiently and achieving high resource efficiency, while serving multiple communications, are still an open problem. In this work, we study the trade-off between scheduling flexibility and control overhead when performing CG scheduling. To address the CG scheduling problem, we first formulate it using satisfiability modulo theories (SMT) so that an SMT solver can be used to generate optimal solutions. To enhance scalability, we propose two heuristic approaches. The first one as the baseline, Co1, follows the basic idea of the 5G CG scheduling scheme that minimizes the control overhead. The second one, CoU, enables increased scheduling flexibility while considering the involved control overhead. The effectiveness and scalability of the proposed techniques and the superiority of CoU compared to Co1 have been evaluated using a large number of generated benchmarks as well as a realistic case study for industrial automation.

Place, publisher, year, edition, pages
ASSOC COMPUTING MACHINERY, 2024
Keywords
5G; URLLC; deterministic periodic traffic; configured grant scheduling; satisfiability modulo theories; resource optimization
National Category
Embedded Systems
Identifiers
urn:nbn:se:liu:diva-207759 (URN)10.1145/3664621 (DOI)001288115200010 ()
Note

Funding Agencies|ELLIIT (Excellence Center at Linkoping-Lund in Information Technology); SSF (Swedish Foundation for Strategic Research) [FUS21-0033]

Available from: 2024-09-20 Created: 2024-09-20 Last updated: 2024-10-10
Mahfouzi, R., Aminifar, A., Samii, S., Rezine, A., Eles, P. & Peng, Z. (2021). Breaking Silos to Guarantee Control Stability with Communication over Ethernet TSN. IEEE design & test, 38(5), 48-56
Open this publication in new window or tab >>Breaking Silos to Guarantee Control Stability with Communication over Ethernet TSN
Show others...
2021 (English)In: IEEE design & test, ISSN 2168-2356, E-ISSN 2168-2364, ISSN 2168-2356, Vol. 38, no 5, p. 48-56Article in journal (Refereed) Published
Abstract [en]

This article presents a methodology for cross-layer control–communication co-synthesis of cyber-physical systems (CPSs), communicating over Ethernet networks, with stability guarantees. We consider the recently developed IEEE 802.1 Time-Sensitive Networking standards for real-time Ethernet communication, in particular 802.1Qbv-2015, which is gaining traction in automotive and industrial automation applications. Specifically, we address routing and static scheduling of Ethernet control packets in a CPS with a switched Ethernet communication network connecting sensors, computers, and actuators. The design problem spans the network and control application layers. Our proposed SMT-based solution integrates many decision variables and objectives related to message routing, scheduling, and control application stability.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2021
Keywords
Embedded Control Systems, Real-Time Control Systems, Cyber-Physical Systems, Automotive Systems, Control-Scheduling Co-Design, Stability-Aware Design, Integrated Routing and Scheduling, Ethernet Networks
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-164267 (URN)10.1109/MDAT.2020.2968281 (DOI)000701241400013 ()2-s2.0-85078087581 (Scopus ID)
Available from: 2020-03-13 Created: 2020-03-13 Last updated: 2023-01-09Bibliographically approved
Mahfouzi, R., Aminifar, A., Samii, S., Eles, P. I. & Peng, Z. (2021). Secure Cloud Control Using Verifiable Computation. In: 2021 IEEE International Conference on Omni-Layer Intelligent Systems (IEEE COINS 2021): . Paper presented at IEEE International Conference on Omni-Layer Intelligent Systems (IEEE COINS), ELECTR NETWORK, aug 23-26, 2021 (pp. 21-26). Barcelona, Spain: IEEE
Open this publication in new window or tab >>Secure Cloud Control Using Verifiable Computation
Show others...
2021 (English)In: 2021 IEEE International Conference on Omni-Layer Intelligent Systems (IEEE COINS 2021), Barcelona, Spain: IEEE, 2021, p. 21-26Conference paper, Published paper (Refereed)
Abstract [en]

Security for outsourced control applications can be provided if the physical plant is enabled with a mechanism to verify the control signal received from the cloud. Recent developments in modern cryptography claim the applicability of verifiable computation techniques. Such techniques allow a client to check the correctness of a remote execution. This article delivers a proof of concept for applicability of the verifiable computation scheme to control applications over the cloud. We showcase the practicality of verifiable computation on physical plants with different timing demands and deliver a real-life example using a watertank system as the client and Microsoft Azure as the cloud. We show the effectiveness of the verifiable computation scheme on cloud-based implementation of advanced control methods, such as Model Predictive Control.

Place, publisher, year, edition, pages
Barcelona, Spain: IEEE, 2021
Keywords
verifiable computation; predictive control; outsourced control; secure cloud control
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:liu:diva-179044 (URN)10.1109/COINS51742.2021.9524115 (DOI)000855957700004 ()9781665431569 (ISBN)9781665431576 (ISBN)
Conference
IEEE International Conference on Omni-Layer Intelligent Systems (IEEE COINS), ELECTR NETWORK, aug 23-26, 2021
Available from: 2021-09-08 Created: 2021-09-08 Last updated: 2022-10-12
Mahfouzi, R. (2021). Security-Aware Design of Cyber-Physical Systems for Control Applications. (Doctoral dissertation). Linköping: Linköping University Electronic Press
Open this publication in new window or tab >>Security-Aware Design of Cyber-Physical Systems for Control Applications
2021 (English)Doctoral thesis, monograph (Other academic)
Abstract [en]

With cyber-physical systems opening to the outside world, security can no longer be considered a secondary issue. In this work, we focus on security threats to control applications in cyber-physical systems. We provide detection, prevention, and mitigation solutions to attacks considering the stringent resource constraints and important properties of such systems. 

First, we highlight some important properties of control applications that are used to design an intrusion detection and mitigation mechanism. We show how the control laws, derived from the physical properties of control applications, can facilitate the intrusion detection mechanism. We also use a resource management approach to maintain the performance of the control application under attack. 

Second, we elaborate on the challenges derived from sharing a processor among several controller tasks. We investigate the counter-intuitive timing anomalies that result from such resource sharing and introduce the Butterfly attack which exploits these anomalies. With the Butterfly attack, the adversary interferes with a low criticality and less protected task to change the timing behavior of the other tasks sharing the same platform. We experimentally show how this attack can indirectly destabilize a high criticality and, potentially, more protected task. 

Then, we consider real-time communication of control applications over a Time-Triggered Ethernet network. We demonstrate the impact of varying delays on control stability and identify the route and schedule constraints that are necessary to guarantee stability. On top of that, we study the impact of encryption and decryption delays on stability and employ a design space exploration approach to maximize security while continuing to satisfy stability guarantees. 

Place, publisher, year, edition, pages
Linköping: Linköping University Electronic Press, 2021. p. 196
Series
Linköping Studies in Science and Technology. Dissertations, ISSN 0345-7524 ; 2168
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-178320 (URN)10.3384/diss.diva-178320 (DOI)9789179290214 (ISBN)
Public defence
2021-11-25, Ada Lovelace, b-building, Campus Valla, Linköping, 14:15 (English)
Opponent
Supervisors
Note

Funding agencies: The research presented in this thesis has been partially funded by the Swedish Graduate School in Computer Science (CUGS) and the Excellence Center at Linköping–Lund in Information Technology (ELLIIT)

Available from: 2021-10-20 Created: 2021-08-18 Last updated: 2021-10-20Bibliographically approved
Mahfouzi, R., Aminifar, A., Samii, S., Eles, P. & Peng, Z. (2020). Security-aware Routing and Scheduling for Control Applications on Ethernet TSN Networks. ACM Transactions on Design Automation of Electronic Systems, 25(1)
Open this publication in new window or tab >>Security-aware Routing and Scheduling for Control Applications on Ethernet TSN Networks
Show others...
2020 (English)In: ACM Transactions on Design Automation of Electronic Systems, ISSN 1084-4309, E-ISSN 1557-7309, Vol. 25, no 1Article in journal (Refereed) Published
Abstract [en]

Today, it is common knowledge in the cyber-physical systems domain that the tight interaction between the cyber and physical elements provides the possibility of substantially improving the performance of these systems that is otherwise impossible. On the downside, however, this tight interaction with cyber elements makes it easier for an adversary to compromise the safety of the system. This becomes particularly important, since such systems typically are composed of several critical physical components, e.g., adaptive cruise control or engine control that allow deep intervention in the driving of a vehicle. As a result, it is important to ensure not only the reliability of such systems, e.g., in terms of schedulability and stability of control plants, but also resilience to adversarial attacks.

In this article, we propose a security-aware methodology for routing and scheduling for control applications in Ethernet networks. The goal is to maximize the resilience of control applications within these networked control systems to malicious interference while guaranteeing the stability of all control plants, despite the stringent resource constraints in such cyber-physical systems. Our experimental evaluations demonstrate that careful optimization of available resources can significantly improve the resilience of these networked control systems to attacks.

Place, publisher, year, edition, pages
ACM Publications, 2020
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-162609 (URN)10.1145/3358604 (DOI)000535715700001 ()
Available from: 2019-12-11 Created: 2019-12-11 Last updated: 2020-09-03Bibliographically approved
Mahfouzi, R., Aminifar, A., Samii, S., Payer, M., Eles, P. I. & Peng, Z. (2019). Butterfly Attack: Adversarial Manipulation of Temporal Properties of Cyber-Physical Systems. In: : . Paper presented at 2019 IEEE Real-Time Systems Symposium (RTSS). IEEE
Open this publication in new window or tab >>Butterfly Attack: Adversarial Manipulation of Temporal Properties of Cyber-Physical Systems
Show others...
2019 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Increasing internet connectivity poses an existential threat for cyber-physical systems. Securing these safety-critical systems becomes an important challenge. Cyber-physical systems often comprise several control applications that are implemented on shared platforms where both high and low criticality tasks execute together (to reduce cost). Such resource sharing may lead to complex timing behaviors and, in turn, counter-intuitive timing anomalies that can be exploited by adversaries to destabilize a critical control system, resulting in irreversible consequences. We introduce the butterfly attack, a new attack scenario against cyber-physical systems that carefully exploits the sensitivity of control applications with respect to the implementation on the underlying execution platforms. We illustrate the possibility of such attacks using two case-studies from the automotive and avionic domains.

Place, publisher, year, edition, pages
IEEE, 2019
Series
IEEE Real-Time Systems Symposium (RTSS), ISSN 1052-8725, E-ISSN 2576-3172
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-168752 (URN)10.1109/RTSS46320.2019.00019 (DOI)000568160700009 ()978-1-7281-6463-2 (ISBN)978-1-7281-6464-9 (ISBN)
Conference
2019 IEEE Real-Time Systems Symposium (RTSS)
Available from: 2020-08-31 Created: 2020-08-31 Last updated: 2020-09-30
Organisations

Search in DiVA

Show all publications