Publications by authors named "Gerhard P Hancke"

Due to cyber-physical fusion and nonsmooth characteristics of energy management, this article proposes a security event-trigger-based distributed approach to address these issues with developed smoothing technique. To tackle with nonconvex and nondifferentiable issue, a randomized gradient-free-based successive convex approximation is developed to smooth economic objective function. Due to resilience ability against security issue, a security event-triggered mechanism-based distributed energy management is proposed to optimize social welfare, which coordinately controls both power generators and load demand.

View Article and Find Full Text PDF

The ever-increasing requirements of demand response dynamics, competition among different stakeholders, and information privacy protection intensify the challenge of the optimal operation of microgrids. To tackle the above problems, this article proposes a three-stage optimization strategy with a deep reinforcement learning (DRL)-based distributed privacy optimization. In the upper layer of the model, the rule-based deep deterministic policy gradient (DDPG) algorithm is proposed to optimize the load migration problem with demand response, which enhances dynamic characteristics with the interaction between electricity prices and consumer behavior.

View Article and Find Full Text PDF

Group communication enables Internet of Things (IoT) devices to communicate in an efficient and fast manner. In most instances, a group message needs to be encrypted using a cryptographic key that only devices in the group know. In this paper, we address the problem of establishing such a key using a lattice-based one-way function, which can easily be inverted using a suitably designed lattice trapdoor.

View Article and Find Full Text PDF

The ever-increasing false data injection (FDI) attack on the demand side brings great challenges to the energy management of interconnected microgrids. To address those aspects, this article proposes a resilient optimal defensive strategy with the distributed deep reinforcement learning (DRL) approach. To evaluate the FDI attack on demand response (DR), an online evaluation approach with the recursive least-square (RLS) method is proposed to evaluate the extent of supply security or voltage stability of the microgrids system is affected by the FDI attack.

View Article and Find Full Text PDF

Due to the existence of different stakeholders, it makes competitive game characteristic in hybrid energy systems (HESs). Combined with the high-dimensional complexity and output uncertainty of distributed energy resources, the optimal operation of HESs can be a more challenging problem. Here, this article proposes a potential game-based two-layered hierarchical optimization strategy to deal with this problem.

View Article and Find Full Text PDF

The novel coronavirus (COVID-19), declared by the World Health Organization (WHO) as a global pandemic, has brought with it changes to the general way of life. Major sectors of the world industry and economy have been affected and the Internet of Things (IoT) management and framework is no exception in this regard. This article provides an up to date survey on how a global pandemic such as COVID-19 has affected the world of IoT technologies.

View Article and Find Full Text PDF

Due to the high resistance/reactance (R/X) ratio of a low-voltage microgrid (LVMG), virtual complex impedance-based P-· V/Q-ω droop control is adopted in this article as the primary control (PC) technique for stabilizing the system. A distributed event-triggered restoration mechanism (ETSM) is proposed as the secondary control (SC) technique to restore the output-voltage frequency and improve power sharing accuracy. The proposed ETSM ensures that neighboring communication happens only at some discrete instants when a predefined event-triggering condition (ETC) is fulfilled.

View Article and Find Full Text PDF

The Internet of Things (IoT) is an emerging paradigm that enables many beneficial and prospective application areas, such as smart metering, smart homes, smart industries, and smart city architectures, to name but a few. These application areas typically comprise end nodes and gateways that are often interconnected by low power wide area network (LPWAN) technologies, which provide low power consumption rates to elongate the battery lifetimes of end nodes, low IoT device development/purchasing costs, long transmission range, and increased scalability, albeit at low data rates. However, most LPWAN technologies are often confronted with a number of physical (PHY) layer challenges, including increased interference, spectral inefficiency, and/or low data rates for which cognitive radio (CR), being a predominantly PHY layer solution, suffices as a potential solution.

View Article and Find Full Text PDF

Long-Range Wide Area Network (LoRaWAN) is a fast-growing communication system for Low Power Wide Area Networks (LPWAN) in the Internet of Things (IoTs) deployments. LoRaWAN is built to optimize LPWANs for battery lifetime, capacity, range, and cost. LoRaWAN employs an Adaptive Data Rate (ADR) scheme that dynamically optimizes data rate, airtime, and energy consumption.

View Article and Find Full Text PDF
Article Synopsis
  • This paper examines the security risks associated with Personal Identification Numbers (PINs) used in various electronic applications for user verification.
  • The authors propose a side-channel attack that leverages the sound produced by keystrokes to recover 4-6 digit PINs, achieving a 60% success rate in PIN recovery.
  • They also introduce a user verification method that demonstrates an 88% accuracy rate in identifying legitimate users, suggesting it could enhance security for devices reliant on PINs.
View Article and Find Full Text PDF

Bluetooth Low Energy (BLE) based Wireless Indoor Localization System (WILS) with high localization accuracy and high localization precision is a key requirement in enabling the Internet of Things (IoT) in today's applications. In this paper, we investigated the effect of BLE signal variations on indoor localization caused by the change in BLE transmission power levels. This issue is not often discussed as most of the works on localization algorithms use the highest power levels but has important practical implications for energy efficiency, e.

View Article and Find Full Text PDF

The overcrowding of the wireless space has triggered a strict competition for scare network resources. Therefore, there is a need for a dynamic spectrum access (DSA) technique that will ensure fair allocation of the available network resources for diverse network elements competing for the network resources. Spectrum handoff (SH) is a DSA technique through which cognitive radio (CR) promises to provide effective channel utilization, fair resource allocation, as well as reliable and uninterrupted real-time connection.

View Article and Find Full Text PDF

In recent times, Wireless Sensor Networks (WSNs) are broadly applied in the Industrial Internet of Things (IIoT) in order to enhance the productivity and efficiency of existing and prospective manufacturing industries. In particular, an area of interest that concerns the use of WSNs in IIoT is the concept of sensor network virtualization and overlay networks. Both network virtualization and overlay networks are considered contemporary because they provide the capacity to create services and applications at the edge of existing virtual networks without changing the underlying infrastructure.

View Article and Find Full Text PDF

Wireless Sensor Networks (WSNs), in recent times, have become one of the most promising network solutions with a wide variety of applications in the areas of agriculture, environment, healthcare and the military. Notwithstanding these promising applications, sensor nodes in WSNs are vulnerable to different security attacks due to their deployment in hostile and unattended areas and their resource constraints. One of such attacks is the DoS jamming attack that interferes and disrupts the normal functions of sensor nodes in a WSN by emitting radio frequency signals to jam legitimate signals to cause a denial of service.

View Article and Find Full Text PDF

Using a single sensor to determine the pose estimation of a device cannot give accurate results. This paper presents a fusion of an inertial sensor of six degrees of freedom (6-DoF) which comprises the 3-axis of an accelerometer and the 3-axis of a gyroscope, and a vision to determine a low-cost and accurate position for an autonomous mobile robot. For vision, a monocular vision-based object detection algorithm speeded-up robust feature (SURF) and random sample consensus (RANSAC) algorithms were integrated and used to recognize a sample object in several images taken.

View Article and Find Full Text PDF

Wireless sensor networks (WSNs) are becoming increasingly popular with the advent of the Internet of things (IoT). Various real-world applications of WSNs such as in smart grids, smart farming and smart health would require a potential deployment of thousands or maybe hundreds of thousands of sensor nodes/actuators. To ensure proper working order and network efficiency of such a network of sensor nodes, an effective WSN management system has to be integrated.

View Article and Find Full Text PDF

Vehicular traffic is endlessly increasing everywhere in the world and can cause terrible traffic congestion at intersections. Most of the traffic lights today feature a fixed green light sequence, therefore the green light sequence is determined without taking the presence of the emergency vehicles into account. Therefore, emergency vehicles such as ambulances, police cars, fire engines, etc.

View Article and Find Full Text PDF

Nowadays, the number of vehicles has increased exponentially, but the bedrock capacities of roads and transportation systems have not developed in an equivalent way to efficiently cope with the number of vehicles traveling on them. Due to this, road jamming and traffic correlated pollution have increased with the associated adverse societal and financial effect on different markets worldwide. A static control system may block emergency vehicles due to traffic jams.

View Article and Find Full Text PDF

In a world where resources are scarce and urban areas consume the vast majority of these resources, it is vital to make cities greener and more sustainable. Advanced systems to improve and automate processes within a city will play a leading role in smart cities. From smart design of buildings, which capture rain water for later use, to intelligent control systems, which can monitor infrastructures autonomously, the possible improvements enabled by sensing technologies are immense.

View Article and Find Full Text PDF