Artificial Intelligence Based Embedded Security Solution Model for PID Controller


Authors : Bitrus Haruna; Mathew Ehikhamenle

Volume/Issue : Volume 9 - 2024, Issue 7 - July

Google Scholar : https://tinyurl.com/ynn82s44

Scribd : https://tinyurl.com/yeyahy8h

DOI : https://doi.org/10.38124/ijisrt/IJISRT24JUL664

Abstract : This study investigated the impact of artificial intelligent based embedded security solution model for PID controller. Recent studies have revealed that the conventional mitigation techniques like zoning, demilitarization, firewalls, company’s policies to mention but a few are no longer enough to match the sophisticated intelligence being deployed by attackers hence the urgent need for the adoption of artificial intelligent based embedded security solution model. Furthermore, conventional IT security solutions cannot be deployed directly in process controllers given the real time availability requirement of industrial control systems. This has limited the security solutions to firewalls, network segmentation and some laid down policies which the control system operators are not expected to violate. This study will ultimately help deliver algorithms that will be implemented in industrial field device controllers making them resilient to cyber-attacks whose consequences have far reaching implications. With regards to the methodology of the work, four sets of data were collected from the test bed. The first data, Data_1, shown in appendix D is the plant’s response to the existing PID algorithm. This was done by taking the temperatures of the plant at interval of 3 seconds after loading the controller with the existing (insecure) PID algorithm shown in appendix A. A total of 100 samples were taken. From the methodology employed, it was discovered that it is seen that the existing PID algorithm was able to achieve the control objective of maintaining the temperature of the process plant within the temperature range of 38 o C and 43 o C with 40 o C as the optimal or ideal performance. From table I in appendix I, the mean steady state error (MSSE) of the existing PID algorithm considering the 27th to 101th temperature data is 0.062631579 which is approximately 0.06. It means the accuracy of the existing PID algorithm is ((40 – 0.06)/40) ∗ 100 = 99. 85 %. This showed that the existing PID control algorithm’s performance is acceptable under normal condition since the minimum control accuracy required to achieve the control objective in the considered process plant is (40 – (3-2)/2)/40) ∗ 100 = 98. 75 %.

Keywords : Artificial Intelligence, Security Solution Model, PID Controller.

References :

  1. bdel-geliel, M., Qaud, F., & Ashour, H. (2020). Realization of adaptable PID controller within an industrial automated system. IEEE 11th international conference on control & automation (pp. 965-970). Taichung: IEEE.
  2. Anthony, K. (2018). Fundamental of PID control. PDH Center.
  3. Eric, D. K. (2011). Industrial network security: securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems. USA: Elsevier publisher.
  4. Fairchild, S. (2017, August 29). Datasheet catalog. Retrieved August 29, 2017, from Datasheetcatalog: http://www.datasheetcatalog.com/datasheets_pdf/4/N/3/5/4N35.shtml
  5. Fawzi, H., Tabuada, P., & Diggavi, S. (2012). Security for control systems under sensor and actuator attacks. IEEE international conference on Decision and Contro (pp. 3412 – 3417). Maui HI : IEEE.
  6. Gupta, D., Mohapatra, P., & Chuah, C. (2008). Efficient monitoring in wireless mesh networks: overheads and accuracy trade-offs. IEEE 5th international conference on Mobile Ad Hoc and Sensor systems (pp. 13-23). Atlanta: IEEE hjkml. (2017). gghhl. ghjk (p. 67). bbb: bb
  7. Hong, R. (2011). Research and application of TCP/IP protocol in embedded system. IEEE 3rd international conference on communication software and networks (pp. 584-587). Xi'an: IEEE.
  8. Hongji, W., & Zhenqiu, H. (2011). PID parameter optimization of pressure and phear testing controller based on CLPSO algorithm. International conference on computer-aided design, manufacturing, modelling and simulation (pp. 105-109). Switzerland: Trans Tech Publications.
  9. ICS-CERT. (2019, December 12). ICS-CERT. Retrieved September 24, 2015, from https://ics-cert.us-cert.gov/Training-Available-Through-ICS-CERT#need: https://d36spl5w3z9i0o.cloudfront.net/dcd/scormapi_v60/launcher.html?host=ics-cert-training.inl.gov&id_user=22129&id_reference=203&scorm_version=1.3&id_resource=24203&id_item=111&idscorm_organization=111&id_package=111&id_course=17&launch_type=popup&auth_ ICS-CERT. (2021, June 30). ICS-CERT.
  10. Ikhlef, A., Kihel, M., Boukhezzar, B., Mansouri, N., & Hobar, F. (2015). Remote PID control of tank level system. International Conference on Interactive Collaborative Learning (pp. 20-24). Italy: IEEE.
  11. NIST. (2021, January 30). National Institute of Standards and Technology. Retrieved 2 3, 2015, from www.csrc.nist.gov: http://csrc.nist.gov/publications/nistpubs/800-82/SP800-82-final.pdf
  12. Okeke, P. N., & Ndupu, B. L. (1983). Ordinary level physics. New Jersey: Prentice Hall Press.
  13. Peng, Z. (2010). Advanced Industrial Control Technology. Amsterdam: Elsevier.
  14. Peter, L. (2013, April 23). TechTarget. Retrieved September 25, 2015, from http://searchsecurity.techtarget.com: http://searchsecurity.techtarget.com/resources/Hacker-Tools-and-Techniques-Underground-Sites-and-Hacking-Groups
  15. Philips. (2021, August 29). Datasheet Catalog. Retrieved August 29, 2017, from DataSheetcatalog: http://www.datasheetcatalog.com/datasheets_pdf/B/T/1/3/BT139.shtml
  16. Reddy, Y. J. (2015). Industrial process automation systems: design and implementation. Amsterdan: Elsevier.
  17. Schneidar, E. (2013, July 23). The Engineering Toolbox. Retrieved October 23, 2015, from www.engineeringtoolbox.com: http://www.engineeringtoolbox.com/air-properties-d_156.html
  18. Schneider, E. (2021, September 25). PID Control made easy. Retrieved August 28, 2017, from Eurotherm: http://www.eurotherm.com/pid-control-made-easy
  19. Shahrukh, A., & Sandip, G. (2014). Microcontroller implementation of digital pid . Rourkela: National Institute of Technology.
  20. Shell Global Solutions, I. (2015). DESIGN AND ENGINEERING PRACTICE. Netherlands: Shell Group of Companies.
  21. Shell group of Companies. (2021, May 12). DEP-00.00.05.05-GEN. Retrieved February 03, 2015, from www.scribd.com: Shell group of Companies, “Design Engineering Practice Specification: prowww.scribd.com/archive/plans?doc=238070612&escape=false&
  22. Silva, V., Carvalho, V., Vasconcelos, R., & Soares, F. (2016). Remote PID Control of a DC Motor. International Journal of Online Engineering.
  23. Smith, D. J., & Kenneth, G. S. (2011). Safety Critical Systems Handbook: a straightforward guide to functional Safety, IEC 61508 and related standards. USA: Elsevier pulishers.
  24. Stan, Ż. (2013). An Introduction to Proportional-Integral-Derivative (PID) Controllers. Lafayette: Purdue University.
  25. Stuart, M. (2000). Operational aspects of oil and gas well testing. USA: Elsevier publisher.
  26. Texas, I. (2015, June 4). DatasheetCatalog.com. Retrieved November 10, 2015, from LM35 Precision Centigrade Temperature Sensors: http://www.datasheetcatalog.com/datasheets_pdf/L/M/3/5/LM35.shtml
  27. Timberlake. (2015). Chemistry: An Introduction to General, Organic, and Biological Chemistry. Los Angeles: Pearson .
  28. Torres, G. (2014, November 13). Hardwaresecrets. Retrieved March 25, 2015, from www.hardwaresecrets.com: www.hardwaresecrets.com/article/433
  29. Vicomsoft. (2014, September 12). Vicomsoft Leraning Centre. Retrieved April 4, 2015, from www.vicomsoft.com: www.vicomsoft.com/learning-center/firewalls/ Weli, W. (2014). Bonga South West Instrument Operation Summary. Lagos: SNEPCo.
  30. Wikipedia. (2015, January 3). Wikipedia encyclopedia. Retrieved February 12, 2015, from http://en.wikipedia.org: http://en.wikipedia.org/wiki/Systems_analysis
  31. WWittrisch, C., & Chole, H. (2012). Progressing cavity pumps: oil well production artificial lift. Energies Nouvelles.
  32. Yadong, L., Wenqiang, C., Danlan, L., & Ru, i. Z. (2011). Research based on OSI model. IEEE international conference on communication software and Networks (pp. 554-557). Xi'an: IEEE.

This study investigated the impact of artificial intelligent based embedded security solution model for PID controller. Recent studies have revealed that the conventional mitigation techniques like zoning, demilitarization, firewalls, company’s policies to mention but a few are no longer enough to match the sophisticated intelligence being deployed by attackers hence the urgent need for the adoption of artificial intelligent based embedded security solution model. Furthermore, conventional IT security solutions cannot be deployed directly in process controllers given the real time availability requirement of industrial control systems. This has limited the security solutions to firewalls, network segmentation and some laid down policies which the control system operators are not expected to violate. This study will ultimately help deliver algorithms that will be implemented in industrial field device controllers making them resilient to cyber-attacks whose consequences have far reaching implications. With regards to the methodology of the work, four sets of data were collected from the test bed. The first data, Data_1, shown in appendix D is the plant’s response to the existing PID algorithm. This was done by taking the temperatures of the plant at interval of 3 seconds after loading the controller with the existing (insecure) PID algorithm shown in appendix A. A total of 100 samples were taken. From the methodology employed, it was discovered that it is seen that the existing PID algorithm was able to achieve the control objective of maintaining the temperature of the process plant within the temperature range of 38 o C and 43 o C with 40 o C as the optimal or ideal performance. From table I in appendix I, the mean steady state error (MSSE) of the existing PID algorithm considering the 27th to 101th temperature data is 0.062631579 which is approximately 0.06. It means the accuracy of the existing PID algorithm is ((40 – 0.06)/40) ∗ 100 = 99. 85 %. This showed that the existing PID control algorithm’s performance is acceptable under normal condition since the minimum control accuracy required to achieve the control objective in the considered process plant is (40 – (3-2)/2)/40) ∗ 100 = 98. 75 %.

Keywords : Artificial Intelligence, Security Solution Model, PID Controller.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe