Conference Proceeding
Refine
Year of publication
Institute
- Fachbereich Elektrotechnik und Informationstechnik (310) (remove)
Language
- English (241)
- German (68)
- Multiple languages (1)
Document Type
- Conference Proceeding (310) (remove)
Keywords
- Enterprise Architecture (5)
- Serious Game (3)
- Education (2)
- Engineering education (2)
- Engineering optimization (2)
- Gamification (2)
- MINLP (2)
- Machine Learning (2)
- Robotic Process Automation (2)
- Smart Building (2)
Design and Development of a Novel Self-Igniting Microwave Plasma Jet for Industrial Applications
(2019)
Motivation-based Learning: Teaching Fundamentals of Electrical Engineering with an LED Spinning Top
(2018)
MedicVR : Acceleration and Enhancement Techniques for Direct Volume Rendering in Virtual Reality
(2019)
Phase Repeatable Synthesizers as a New Harmonic Phase Standard for Nonlinear Network Analysis
(2018)
Wireless CAN
(2018)
Das vorgestellte System zu Wireless CAN bietet die Möglichkeit, CAN kabellos zu übertragen. Beide vorgestellten und entwickelten Konzepte funktionieren korrekt und ermöglichen den Auf-bau von kabellosen CAN Schnittstellen. Durch den kleinen Aufbau kann diese Technologie auch für eingebettete Systeme verwendet werden. Zudem bietet dieser Ansatz die Möglichkeit, durch die Entwicklung von geeigneten ICs die Größe des Systems bis auf Bauteilgröße zu reduzieren, um eine noch bessere Integration in eingebettete Systeme zu ermöglichen. Dadurch wird die Technologie attraktiv für Einsatzgebiete, wo die oben aufgelisteten Vorteile zum Tragen kommen können. Diese Einsatzgebiete können sowohl im Automobil als auch im Industriebereich liegen.
This paper introduces a hardware setup to measure efficiency maps of low-power electric motors and their associated inverters. Here, the power of the device under test (DUT) ranges from some Watts to a few hundred Watts. The torque and speed of the DUT are measured independent of voltage and current in multiple load points. A Matlab-based software approach in combination with an open Texas-Instruments (TI) hardware setup ensures flexibility. Exemplarily, the efficiency field of a Permanent Magnet Synchronous Machine (PMSM) is measured to proof the concept. Brushless-DC (BLDC) motors can be tested as well. The nomenclature in this paper is based on the new European standard DIN EN 50598. Special attention is paid to the calculation of the measurement error.
Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.
ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.