Presentation is loading. Please wait.

Presentation is loading. Please wait.

Misc Project Slides 2005 - projects. PLANNING, EXECUTION AND CONTROL LINKAGES IN MANUFACTURING ENTERPRISE.

Similar presentations


Presentation on theme: "Misc Project Slides 2005 - projects. PLANNING, EXECUTION AND CONTROL LINKAGES IN MANUFACTURING ENTERPRISE."— Presentation transcript:

1 Misc Project Slides 2005 - projects

2 PLANNING, EXECUTION AND CONTROL LINKAGES IN MANUFACTURING ENTERPRISE

3 Common Plant Information Tool (IndustrialSQL) Plant Historian Unified Data Storage Process Control & Monitoring (InTouch) Plant-wide Manufacturing Decisions (InTrack) Engineering CAD, CAE, CAPP Parts storage And AGV control Cell control Cell control Cell control Assembly control Measuring Control Finished goods storage AGV Manufacturing Production Dispatching Schedule Execution WIP & Resource Tracking Data Collection Resource Management Quality Management Operations Sequencing Working Instructions Labor Instruction Maintenance Plant Floor System Wonderware SuiteVoyager Internet

4 The intelligent nodes are connected to a server where data is digitized and stored Readers Controller Card Reader Proximity Readers Biometric Gateway Fingerprint Reader Camera (Pan Tilt Zoom) Intelligent Node LAN External Monitoring Station Secure Internet Central rules-engine and data warehouse Cameras, alarms, analog devices, card readers and others are connected and controlled via distributed intelligent nodes

5 Self-Organizing Wireless Networks

6 Active, wearable RF transmitters Dedicated receiver / sensors Centralized data server Multiple client terminals Real Time Location Systems (RTLS) Receiver / Sensors Location Receiver WherePort Transmitters Wrist-Worn Asset Data Severs / Client Terminals Wireless PDA Clients Servers & Remote Clients RTLS Fills the Gap between RFID and GPS An Ideal Radio Channel for Large Sensor Networks RTLS = Active RFID + Receiver Network + Software

7 Application Issues around deployment Self organization – nodes must self- organize into useable network Node adaptation to other nodes’ planned/unplanned changes to operating and environmental conditions Cost and reliability of sensors Data security and integrity Systems integration

8 Related Research work Sokwood Rhee at Millennial Net [an MIT spin-off] Olariu, Wadaa, Wilson and Jones (NASA, Langley) of ODU MIT Auto ID laboratory RFID tag and sensor vendors

9 An generic sensor network [Olariu, Wadaa, Wilson – ODU] Sink End user Satellite Internet Event

10 Sensor networks Wireless sensor network – massive collection of tiny sensors linked by a wireless medium :Main goal: global info from local data Must integrate sensing, data fusion and low-power communication Must work unattended Amorphous  self-organized Massive fault tolerance An inherently distributed platform

11 Ubiquitous WSNs/ Temporary Infrastructures Agile multi-service sensor network system self-organized to serve a rescue

12 Sensors Each sensor packs: –micro-sensor technology –low power signal processing –low power computation –low power networking capabilities Non-renewable energy budget Anonymity: no fabrication-time identity Sleep as much as possible - conserve energy Sense and compute freely – limit communication- conserve energy

13 Security goals addressed  Availability: ensure the survivability of network services despite denial-of-service (DoS) attacks  Confidentiality: ensure that information is not disclosed to unauthorized entities – Integrity: guarantee that a message being transferred is not corrupted – Authentication: enable a node to ensure the identity of the peer node – Anonymity: hide the identity of sources, destinations, and routes – Tamper Proofing: Ensure that nodes cannot be physically forced to divulge secrets

14 NSA—Tamper proofing, authentication After deployment each sensor transmits on a specified sets of frequenciesAfter deployment each sensor transmits on a specified sets of frequencies Each sensor collects an array of signal strengths from the sensors in its localeEach sensor collects an array of signal strengths from the sensors in its locale NSA – the Neighborhood Signature ArrayNSA – the Neighborhood Signature Array Removal from deployment area  changes in the NSARemoval from deployment area  changes in the NSA

15 Security techniques in a nutshell  Initialize sensors with secrets and synchronize clocks  Deploy sensors over the desired area  FH communications only  NSA  Resynchronize clocks periodically  Train the sensors to provide temporary virtual infrastructure  Assign tasks to the trained network  Randomly vary sources, destinations and communication paths  Partition the network into color sets - concurrent tasking  Lightweight data encryption available

16 Conclusions [Olariu, et. al.] Contributions: Virtual infrastructure leveraged for security Physical level encoding via FH, very light weight and highly effective – DoS, Confidentiality, Integrity Physical level encoding via FH, very light weight and highly effective – DoS, Confidentiality, Integrity NSA – Authentication, Tamper Proofing Software NSA – Authentication, Tamper Proofing Software Random routing - Anonymity Random routing - Anonymity Current Situation:  Wireless sensor network research is still in its infancy Securing sensor networks – a subject for active research Securing sensor networks – a subject for active research


Download ppt "Misc Project Slides 2005 - projects. PLANNING, EXECUTION AND CONTROL LINKAGES IN MANUFACTURING ENTERPRISE."

Similar presentations


Ads by Google