A distributed single-input multiple-output (SIMO) sonar system is composed of a sound source and multiple underwater receivers. It provides an important framework for underwater target localization. However, underwater hostile environments bring more challenges for underwater target localization than terrestrial target localization, such as the difficulties of synchronizing all the underwater receiver clocks, the varying underwater sound speed and the uncertainties of the locations of the underwater receivers. In this paper, we take the sound speed variation, the time synchronization and the uncertainties of the receiver locations into account, and propose the underwater target localization and synchronization (UTLS) algorithm for the distributed SIMO sonar system. In the distributed SIMO sonar system, the receivers are organized in a star topology, where the information fusion is carried out in the central receiver (CR). All the receivers are not synchronized and their positions are known with uncertainties. Moreover, the underwater sound speed is approximately modeled by a depth-dependent sound speed profile (SSP). We evaluate our proposed UTLS algorithm by comparing it with several benchmark algorithms via numerical simulations. The simulation results reveal the superiority of our proposed UTLS algorithm.
Standard Ethernet (IEEE 802.3 and the TCP/IP protocol suite) is gradually applied in industrial control system (ICS) with the development of information technology. It breaks the natural isolation of ICS, but contains no security mechanisms. An improved intrusion detection system (IDS), which is strongly correlated to specific industrial scenarios, is necessary for modern ICS. On one hand, this paper outlines three kinds of attack models, including infiltration attacks, creative forging attacks, and false data injection attacks. On the other hand, a two stage IDS is proposed, which contains a traffic prediction model and an anomaly detection model. The traffic prediction model, which is based on the autoregressive integrated moving average (ARIMA), can forecast the traffic of the ICS network in the short term and detect infiltration attacks precisely according to the abnormal changes in traffic patterns. Furthermore, the anomaly detection model, using a one class support vector machine (OCSVM), is able to detect malicious control instructions by analyzing the key field in Ethernet/IP packets. The confusion matrix is selected to testify to the effectiveness of the proposed method, and two other innovative IDSs are used for comparison. The experiment results show that the proposed two stage IDS in this paper has an outstanding performance in detecting infiltration attacks, forging attacks, and false data injection attacks compared with other IDSs.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.