Authors :
Bitrus Haruna; Mathew Ehikhamenle
Volume/Issue :
Volume 9 - 2024, Issue 7 - July
Google Scholar :
https://tinyurl.com/ynn82s44
Scribd :
https://tinyurl.com/yeyahy8h
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24JUL664
Abstract :
This study investigated the impact of artificial
intelligent based embedded security solution model for
PID controller. Recent studies have revealed that the
conventional mitigation techniques like zoning,
demilitarization, firewalls, company’s policies to mention
but a few are no longer enough to match the sophisticated
intelligence being deployed by attackers hence the urgent
need for the adoption of artificial intelligent based
embedded security solution model. Furthermore,
conventional IT security solutions cannot be deployed
directly in process controllers given the real time
availability requirement of industrial control systems.
This has limited the security solutions to firewalls,
network segmentation and some laid down policies which
the control system operators are not expected to violate.
This study will ultimately help deliver algorithms that will
be implemented in industrial field device controllers
making them resilient to cyber-attacks whose
consequences have far reaching implications. With
regards to the methodology of the work, four sets of data
were collected from the test bed. The first data, Data_1,
shown in appendix D is the plant’s response to the existing
PID algorithm. This was done by taking the temperatures
of the plant at interval of 3 seconds after loading the
controller with the existing (insecure) PID algorithm
shown in appendix A. A total of 100 samples were taken.
From the methodology employed, it was discovered that
it is seen that the existing PID algorithm was able to
achieve the control objective of maintaining the
temperature of the process plant within the temperature
range of 38 o C and 43 o C with 40 o C as the optimal or
ideal performance. From table I in appendix I, the mean
steady state error (MSSE) of the existing PID algorithm
considering the 27th to 101th temperature data is
0.062631579 which is approximately 0.06. It means the
accuracy of the existing PID algorithm is ((40 –
0.06)/40) ∗ 100 = 99. 85 %. This showed that the
existing PID control algorithm’s performance is
acceptable under normal condition since the minimum
control accuracy required to achieve the control objective
in the considered process plant is (40 – (3-2)/2)/40) ∗
100 = 98. 75 %.
Keywords :
Artificial Intelligence, Security Solution Model, PID Controller.
References :
- bdel-geliel, M., Qaud, F., & Ashour, H. (2020). Realization of adaptable PID controller within an industrial automated system. IEEE 11th international conference on control & automation (pp. 965-970). Taichung: IEEE.
- Anthony, K. (2018). Fundamental of PID control. PDH Center.
- Eric, D. K. (2011). Industrial network security: securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems. USA: Elsevier publisher.
- Fairchild, S. (2017, August 29). Datasheet catalog. Retrieved August 29, 2017, from Datasheetcatalog: http://www.datasheetcatalog.com/datasheets_pdf/4/N/3/5/4N35.shtml
- Fawzi, H., Tabuada, P., & Diggavi, S. (2012). Security for control systems under sensor and actuator attacks. IEEE international conference on Decision and Contro (pp. 3412 – 3417). Maui HI : IEEE.
- Gupta, D., Mohapatra, P., & Chuah, C. (2008). Efficient monitoring in wireless mesh networks: overheads and accuracy trade-offs. IEEE 5th international conference on Mobile Ad Hoc and Sensor systems (pp. 13-23). Atlanta: IEEE hjkml. (2017). gghhl. ghjk (p. 67). bbb: bb
- Hong, R. (2011). Research and application of TCP/IP protocol in embedded system. IEEE 3rd international conference on communication software and networks (pp. 584-587). Xi'an: IEEE.
- Hongji, W., & Zhenqiu, H. (2011). PID parameter optimization of pressure and phear testing controller based on CLPSO algorithm. International conference on computer-aided design, manufacturing, modelling and simulation (pp. 105-109). Switzerland: Trans Tech Publications.
- ICS-CERT. (2019, December 12). ICS-CERT. Retrieved September 24, 2015, from https://ics-cert.us-cert.gov/Training-Available-Through-ICS-CERT#need: https://d36spl5w3z9i0o.cloudfront.net/dcd/scormapi_v60/launcher.html?host=ics-cert-training.inl.gov&id_user=22129&id_reference=203&scorm_version=1.3&id_resource=24203&id_item=111&idscorm_organization=111&id_package=111&id_course=17&launch_type=popup&auth_ ICS-CERT. (2021, June 30). ICS-CERT.
- Ikhlef, A., Kihel, M., Boukhezzar, B., Mansouri, N., & Hobar, F. (2015). Remote PID control of tank level system. International Conference on Interactive Collaborative Learning (pp. 20-24). Italy: IEEE.
- NIST. (2021, January 30). National Institute of Standards and Technology. Retrieved 2 3, 2015, from www.csrc.nist.gov: http://csrc.nist.gov/publications/nistpubs/800-82/SP800-82-final.pdf
- Okeke, P. N., & Ndupu, B. L. (1983). Ordinary level physics. New Jersey: Prentice Hall Press.
- Peng, Z. (2010). Advanced Industrial Control Technology. Amsterdam: Elsevier.
- Peter, L. (2013, April 23). TechTarget. Retrieved September 25, 2015, from http://searchsecurity.techtarget.com: http://searchsecurity.techtarget.com/resources/Hacker-Tools-and-Techniques-Underground-Sites-and-Hacking-Groups
- Philips. (2021, August 29). Datasheet Catalog. Retrieved August 29, 2017, from DataSheetcatalog: http://www.datasheetcatalog.com/datasheets_pdf/B/T/1/3/BT139.shtml
- Reddy, Y. J. (2015). Industrial process automation systems: design and implementation. Amsterdan: Elsevier.
- Schneidar, E. (2013, July 23). The Engineering Toolbox. Retrieved October 23, 2015, from www.engineeringtoolbox.com: http://www.engineeringtoolbox.com/air-properties-d_156.html
- Schneider, E. (2021, September 25). PID Control made easy. Retrieved August 28, 2017, from Eurotherm: http://www.eurotherm.com/pid-control-made-easy
- Shahrukh, A., & Sandip, G. (2014). Microcontroller implementation of digital pid . Rourkela: National Institute of Technology.
- Shell Global Solutions, I. (2015). DESIGN AND ENGINEERING PRACTICE. Netherlands: Shell Group of Companies.
- Shell group of Companies. (2021, May 12). DEP-00.00.05.05-GEN. Retrieved February 03, 2015, from www.scribd.com: Shell group of Companies, “Design Engineering Practice Specification: prowww.scribd.com/archive/plans?doc=238070612&escape=false&
- Silva, V., Carvalho, V., Vasconcelos, R., & Soares, F. (2016). Remote PID Control of a DC Motor. International Journal of Online Engineering.
- Smith, D. J., & Kenneth, G. S. (2011). Safety Critical Systems Handbook: a straightforward guide to functional Safety, IEC 61508 and related standards. USA: Elsevier pulishers.
- Stan, Ż. (2013). An Introduction to Proportional-Integral-Derivative (PID) Controllers. Lafayette: Purdue University.
- Stuart, M. (2000). Operational aspects of oil and gas well testing. USA: Elsevier publisher.
- Texas, I. (2015, June 4). DatasheetCatalog.com. Retrieved November 10, 2015, from LM35 Precision Centigrade Temperature Sensors: http://www.datasheetcatalog.com/datasheets_pdf/L/M/3/5/LM35.shtml
- Timberlake. (2015). Chemistry: An Introduction to General, Organic, and Biological Chemistry. Los Angeles: Pearson .
- Torres, G. (2014, November 13). Hardwaresecrets. Retrieved March 25, 2015, from www.hardwaresecrets.com: www.hardwaresecrets.com/article/433
- Vicomsoft. (2014, September 12). Vicomsoft Leraning Centre. Retrieved April 4, 2015, from www.vicomsoft.com: www.vicomsoft.com/learning-center/firewalls/ Weli, W. (2014). Bonga South West Instrument Operation Summary. Lagos: SNEPCo.
- Wikipedia. (2015, January 3). Wikipedia encyclopedia. Retrieved February 12, 2015, from http://en.wikipedia.org: http://en.wikipedia.org/wiki/Systems_analysis
- WWittrisch, C., & Chole, H. (2012). Progressing cavity pumps: oil well production artificial lift. Energies Nouvelles.
- Yadong, L., Wenqiang, C., Danlan, L., & Ru, i. Z. (2011). Research based on OSI model. IEEE international conference on communication software and Networks (pp. 554-557). Xi'an: IEEE.
This study investigated the impact of artificial
intelligent based embedded security solution model for
PID controller. Recent studies have revealed that the
conventional mitigation techniques like zoning,
demilitarization, firewalls, company’s policies to mention
but a few are no longer enough to match the sophisticated
intelligence being deployed by attackers hence the urgent
need for the adoption of artificial intelligent based
embedded security solution model. Furthermore,
conventional IT security solutions cannot be deployed
directly in process controllers given the real time
availability requirement of industrial control systems.
This has limited the security solutions to firewalls,
network segmentation and some laid down policies which
the control system operators are not expected to violate.
This study will ultimately help deliver algorithms that will
be implemented in industrial field device controllers
making them resilient to cyber-attacks whose
consequences have far reaching implications. With
regards to the methodology of the work, four sets of data
were collected from the test bed. The first data, Data_1,
shown in appendix D is the plant’s response to the existing
PID algorithm. This was done by taking the temperatures
of the plant at interval of 3 seconds after loading the
controller with the existing (insecure) PID algorithm
shown in appendix A. A total of 100 samples were taken.
From the methodology employed, it was discovered that
it is seen that the existing PID algorithm was able to
achieve the control objective of maintaining the
temperature of the process plant within the temperature
range of 38 o C and 43 o C with 40 o C as the optimal or
ideal performance. From table I in appendix I, the mean
steady state error (MSSE) of the existing PID algorithm
considering the 27th to 101th temperature data is
0.062631579 which is approximately 0.06. It means the
accuracy of the existing PID algorithm is ((40 –
0.06)/40) ∗ 100 = 99. 85 %. This showed that the
existing PID control algorithm’s performance is
acceptable under normal condition since the minimum
control accuracy required to achieve the control objective
in the considered process plant is (40 – (3-2)/2)/40) ∗
100 = 98. 75 %.
Keywords :
Artificial Intelligence, Security Solution Model, PID Controller.