Journal articles on the topic 'Cyber-Physical Systems (CPSs)'

To see the other types of publications on this topic, follow the link: Cyber-Physical Systems (CPSs).

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyber-Physical Systems (CPSs).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yan, He Hua, Jia Fu Wan, and Hui Suo. "Adaptive Resource Management for Cyber-Physical Systems." Applied Mechanics and Materials 157-158 (February 2012): 747–51. http://dx.doi.org/10.4028/www.scientific.net/amm.157-158.747.

Full text
Abstract:
Cyber-physical systems (CPSs) perfectly integrate computing with physical processes, and the emergence of CPSs has attracted significant interest in recent years. In order to fully utilize system resource and improve quality of service (QoS), the innovative resource management method for CPSs is essential. According to a representative case of CPSs (e. g., unmanned vehicle with wireless sensor network navigation), we propose a hierarchical architecture for CPSs, and further establish a system performance optimization model with resource constraints. The particle swarm optimization (PSO) algorithm is applied to solve the considered constraint model. The simulation experiment results verify the efficiency of PSO algorithm, and some instructive proposals for promoting QoS are also outlined.
APA, Harvard, Vancouver, ISO, and other styles
2

Sadiku, Matthew N. O., Yonghui Wang, Suxia Cui, and Sarhan M. Musa. "Cyber-Physical Systems: A Literature Review." European Scientific Journal, ESJ 13, no. 36 (December 31, 2017): 52. http://dx.doi.org/10.19044/esj.2017.v13n36p52.

Full text
Abstract:
Cyber-physical systems (CPSs) are smart systems that depend on the synergy of cyber and physical components. They link the physical world (e.g. through sensors, actuators, robotics, and embedded systems) with the virtual world of information processing. Applications of CPS have the tremendous potential of improving convenience, comfort, and safety in our daily life. This paper provides a brief introduction to CPSs and their applications.
APA, Harvard, Vancouver, ISO, and other styles
3

He, Xudong, Zhijiang Dong, Heng Yin, and Yujian Fu. "A Framework for Developing Cyber-Physical Systems." International Journal of Software Engineering and Knowledge Engineering 27, no. 09n10 (November 2017): 1361–86. http://dx.doi.org/10.1142/s0218194017400010.

Full text
Abstract:
Cyber-physical systems (CPSs) are pervasive in our daily life from mobile phones to auto-driving cars. CPSs are inherently complex due to their sophisticated behaviors and thus difficult to build. In this paper, we propose a framework to develop CPSs based on a model-driven approach with quality assurance throughout the development process. An agent-oriented approach is used to model individual physical and computation processes using high-level Petri nets, and an aspect-oriented approach is used to integrate individual models. The Petri net models are systematically mapped to classes and threads in Java, which are enhanced and extended with domain-specific functionalities. Complementary quality assurance techniques are applied throughout system development and deployment, including simulation and model checking of design models, model checking of Java code, and runtime verification of Java executable. We demonstrate our framework using a car parking system.
APA, Harvard, Vancouver, ISO, and other styles
4

Abrahamsson, Pekka, Goetz Botterweck, Hadi Ghanbari, Martin Gilje Jaatun, Petri Kettunen, Tommi J. Mikkonen, Anila Mjeda, et al. "Towards a Secure DevOps Approach for Cyber-Physical Systems." International Journal of Systems and Software Security and Protection 11, no. 2 (July 2020): 38–57. http://dx.doi.org/10.4018/ijsssp.2020070103.

Full text
Abstract:
With the expansion of cyber-physical systems (CPSs) across critical and regulated industries, systems must be continuously updated to remain resilient. At the same time, they should be extremely secure and safe to operate and use. The DevOps approach caters to business demands of more speed and smartness in production, but it is extremely challenging to implement DevOps due to the complexity of critical CPSs and requirements from regulatory authorities. In this study, expert opinions from 33 European companies expose the gap in the current state of practice on DevOps-oriented continuous development and maintenance. The study contributes to research and practice by identifying a set of needs. Subsequently, the authors propose a novel approach called Secure DevOps and provide several avenues for further research and development in this area. The study shows that, because security is a cross-cutting property in complex CPSs, its proficient management requires system-wide competencies and capabilities across the CPSs development and operation.
APA, Harvard, Vancouver, ISO, and other styles
5

Zeadally, Sherali, Teodora Sanislav, and George Dan Mois. "Self-Adaptation Techniques in Cyber-Physical Systems (CPSs)." IEEE Access 7 (2019): 171126–39. http://dx.doi.org/10.1109/access.2019.2956124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Feng, Jun, Laurence T. Yang, Yuxiang Zhu, Nicholaus J. Gati, and Yijun Mo. "Blockchain-enabled Tensor-based Conditional Deep Convolutional GAN for Cyber-physical-Social Systems." ACM Transactions on Internet Technology 21, no. 2 (June 21, 2021): 1–17. http://dx.doi.org/10.1145/3404890.

Full text
Abstract:
Deep learning techniques have shown significant success in cyber-physical-social systems (CPSS). As an instance of deep learning models, generative adversarial nets (GAN) model enables powerful and flexible image augmentation, image generation, and classification, thus can be applied to real-world CPSS settings. GAN model training needs a large collection of cyber-physical-social data originating from various CPSS devices. Numerous prevailing GAN models depend on a tacit assumption that several cyber-physical-social data providers present a reliable source to collect training data, which is seldom the case in real CPSS. The existing GAN models also fail to consider multi-dimensional latent structure. In our work, we put forward a novel blockchain-enabled tensor-based conditional deep convolutional GAN (TCDC-GAN) model for cyber-physical-social systems. The blockchain is employed to develop a decentralized and reliable cyber-physical-social data-sharing platform between numerous cyber-physical-social data providers, such that the training data and the model are documented on a ledger that is distributed. Furthermore, a tensor-based generator and a tensor-based discriminator are well designed by employing the tensor model. The results of extensive simulation experiments show the efficacy of the proposed TCDC-GAN model. Compared with the state-of-the-art models, our model gains superior estimation performance.
APA, Harvard, Vancouver, ISO, and other styles
7

Kumar, Amit. "Cyber Physical Systems (CPSs) – Opportunities and Challenges for Improving Cyber Security." International Journal of Computer Applications 137, no. 14 (March 22, 2016): 19–27. http://dx.doi.org/10.5120/ijca2016908877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rajamäki, Jyri, and Rauno Pirinen. "Design science research towards resilient cyber-physical eHealth systems." Finnish Journal of eHealth and eWelfare 9, no. 2-3 (May 21, 2017): 203. http://dx.doi.org/10.23996/fjhw.61000.

Full text
Abstract:
Most eHealth systems are cyber-physical systems (CPSs) making safety-critical decisions based on information from other systems not known during development. In this design science research, a conceptual resilience governance framework for eHealth CPSs is built utilizing 1) cybersecurity initiatives, standards and frameworks, 2) science of design for software-intensive systems and 3) empowering cyber trust and resilience. According to our study, a resilient CPS consists of two sub-systems: the proper resilient system and the situational awareness system. In a system of CPSs, three networks are composed: platform, software and social network. The resilient platform network is the basis on which information sharing between stakeholders could be created via software layers. However, the trust inside social networks quantifies the pieces of information that will be shared - and with whom. From citizens’ point of view, eHealth is wholeness in which requirements of information security hold true. Present procedures emphasize confidentiality at the expense of integrity and availability, and regulations/instructions are used as an excuse not to change even vital information. The mental-picture of cybersecurity should turn from “threat, crime, attack” to “trust” and “resilience”. Creating confidence in safe digital future is truly needed in the integration of the digital and physical world’s leading to a new digital revolution. The precondition for the exchange of information “trust” must be systematically built at every CPS’ level. In health sector, increasingly interconnected social, technical and economic networks create large complex CPSs, and risk assessment of many individual components becomes cost and time prohibitive. When no-one can control all aspects of CPSs, protection-based risk management is not enough to help prepare for and prevent consequences of foreseeable events, but resilience must be built into systems to help them quickly recover and adapt when adverse events do occur.
APA, Harvard, Vancouver, ISO, and other styles
9

Zivi, Edwin. "Teaching Cyber-Physical Systems." Mechanical Engineering 139, no. 03 (March 1, 2017): S3—S8. http://dx.doi.org/10.1115/1.2017-mar-4.

Full text
Abstract:
This article discusses various aspects of a course on cyber-physical systems (CPS) in the educational programs of defense organizations. CPS are engineered systems that are built from, and depend upon, the seamless integration of computational algorithms and physical components. The article also highlights various objectives of the CPS course. A central challenge to deploying resilient CPSs involves the appreciation for the multi-disciplinary challenges and the lack of a unified framework for CPS analysis, design and implementation. A significant part of the course focuses on a case study in industrial control of a Vinyl Acetate (VAc) chemical plant. The course described herein presents fundamental concepts within the rapidly expanding field of CPS and has been tailored to and is well received by U.S. Naval Academy Systems Engineering senior level engineering students. The U.S. Naval Academy thrust in cyber security studies includes a new major, Cyber Sciences, and construction of a new facility, Hopper Hall, to house the assembled multi-disciplinary teaching and research team.
APA, Harvard, Vancouver, ISO, and other styles
10

Jacobs, Nicholas, Shamina Hossain-McKenzie, and Adam Summers. "Modeling Data Flows with Network Calculus in Cyber-Physical Systems: Enabling Feature Analysis for Anomaly Detection Applications." Information 12, no. 6 (June 19, 2021): 255. http://dx.doi.org/10.3390/info12060255.

Full text
Abstract:
The electric grid is becoming increasingly cyber-physical with the addition of smart technologies, new communication interfaces, and automated grid-support functions. Because of this, it is no longer sufficient to only study the physical system dynamics, but the cyber system must also be monitored as well to examine cyber-physical interactions and effects on the overall system. To address this gap for both operational and security needs, cyber-physical situational awareness is needed to monitor the system to detect any faults or malicious activity. Techniques and models to understand the physical system (the power system operation) exist, but methods to study the cyber system are needed, which can assist in understanding how the network traffic and changes to network conditions affect applications such as data analysis, intrusion detection systems (IDS), and anomaly detection. In this paper, we examine and develop models of data flows in communication networks of cyber-physical systems (CPSs) and explore how network calculus can be utilized to develop those models for CPSs, with a focus on anomaly and intrusion detection. This provides a foundation for methods to examine how changes to behavior in the CPS can be modeled and for investigating cyber effects in CPSs in anomaly detection applications.
APA, Harvard, Vancouver, ISO, and other styles
11

Hao, Zhaojun, Francesco Di Maio, and Enrico Zio. "Multi-State Reliability Assessment Model of Base-Load Cyber-Physical Energy Systems (CPES) during Flexible Operation Considering the Aging of Cyber Components." Energies 14, no. 11 (June 1, 2021): 3241. http://dx.doi.org/10.3390/en14113241.

Full text
Abstract:
Cyber-Physical Energy Systems (CPESs) are energy systems which rely on cyber components for energy production, transmission and distribution control, and other functions. With the penetration of Renewable Energy Sources (RESs), CPESs are required to provide flexible operation (e.g., load-following, frequency regulation) to respond to any sudden imbalance of the power grid, due to the variability in power generation by RESs. This raises concerns on the reliability of CPESs traditionally used as base-load facilities, such as Nuclear Power Plants (NPPs), which were not designed for flexible operation, and more so, since traditionally only hardware components aging and stochastic failures have been considered for the reliability assessment, whereas the contribution of the degradation and aging of the cyber components of CPSs has been neglected. In this paper, we propose a multi-state model that integrates the hardware components stochastic failures with the aging of cyber components, and quantify the unreliability of CPES in load-following operations under normal/emergency conditions. To show the application of the reliability assessment model, we consider the case of the Control Rod System (CRS) of a NPP typically used for a base-load energy supply.
APA, Harvard, Vancouver, ISO, and other styles
12

Lin, Siyu, and Hao Wu. "Bloom Filter-Based Secure Data Forwarding in Large-Scale Cyber-Physical Systems." Mathematical Problems in Engineering 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/150512.

Full text
Abstract:
Cyber-physical systems (CPSs) connect with the physical world via communication networks, which significantly increases security risks of CPSs. To secure the sensitive data, secure forwarding is an essential component of CPSs. However, CPSs require high dimensional multiattribute and multilevel security requirements due to the significantly increased system scale and diversity, and hence impose high demand on the secure forwarding information query and storage. To tackle these challenges, we propose a practical secure data forwarding scheme for CPSs. Considering the limited storage capability and computational power of entities, we adopt bloom filter to store the secure forwarding information for each entity, which can achieve well balance between the storage consumption and query delay. Furthermore, a novel link-based bloom filter construction method is designed to reduce false positive rate during bloom filter construction. Finally, the effects of false positive rate on the performance of bloom filter-based secure forwarding with different routing policies are discussed.
APA, Harvard, Vancouver, ISO, and other styles
13

Shen, Jiajun, and Dongqin Feng. "Stackelberg Interdependent Security Game in Distributed and Hierarchical Cyber-Physical Systems." Security and Communication Networks 2017 (2017): 1–19. http://dx.doi.org/10.1155/2017/9017039.

Full text
Abstract:
With the integration of physical plant and network, cyber-physical systems (CPSs) are increasingly vulnerable due to their distributed and hierarchical framework. Stackelberg interdependent security game (SISG) is proposed for characterizing the interdependent security in CPSs, that is, the interactions between individual CPSs, which are selfish but nonmalicious with the payoff function being formulated from a cross-layer perspective. The pure-strategy equilibria for two-player symmetric SISG are firstly analyzed with the strategy gap between individual and social optimum being characterized, which is known as negative externalities. Then, the results are further extended to the asymmetric and m-player SISG. At last, a numerical case of practical experiment platform is analyzed for determining the comprehensively optimal security configuration for administrator.
APA, Harvard, Vancouver, ISO, and other styles
14

Bao, Xuecai, Hao Liang, and Longzhe Han. "Transmission Optimization of Social and Physical Sensor Nodes via Collaborative Beamforming in Cyber-Physical-Social Systems." Sensors 18, no. 12 (December 6, 2018): 4300. http://dx.doi.org/10.3390/s18124300.

Full text
Abstract:
The recently emerging cyber-physical-social system (CPSS) can enable efficient interactions between the social world and cyber-physical system (CPS). The wireless sensor network (WSN) with physical and social sensor nodes plays an important role in CPSS. The integration of the social sensors and physical sensors in CPSS provides an advantage for smart services in different application areas. However, the dynamics of social mobility for social sensors pose new challenges for implementing the coordination of transmission. Furthermore, the integration of social and physical sensors also faces the challenges in term of improving energy efficiency and increasing transmission range. To solve these problems, we integrate the model of social dynamics with collaborative beamforming (CB) technique to formulate the transmission optimization problem as a dynamic game. A novel transmission scheme based on reinforcement learning is proposed to solve the formulated problem. The corresponding implementation of the proposed transmission scheme in CPSS is presented by the design of message exchange processes. The extensive simulation results demonstrate that the proposed transmission scheme presents lower interference to noise ratio (INR) and better signal to noise ratio (SNR) performance in comparison with the existing schemes. The results also indicate that the proposed method has effective adaptation to the dynamic mobility of social sensor nodes in CPSS.
APA, Harvard, Vancouver, ISO, and other styles
15

Zoppi, Tommaso, Mohamad Gharib, Muhammad Atif, and Andrea Bondavalli. "Meta-Learning to Improve Unsupervised Intrusion Detection in Cyber-Physical Systems." ACM Transactions on Cyber-Physical Systems 5, no. 4 (October 31, 2021): 1–27. http://dx.doi.org/10.1145/3467470.

Full text
Abstract:
Artificial Intelligence (AI)- based classifiers rely on Machine Learning (ML) algorithms to provide functionalities that system architects are often willing to integrate into critical Cyber-Physical Systems (CPSs) . However, such algorithms may misclassify observations, with potential detrimental effects on the system itself or on the health of people and of the environment. In addition, CPSs may be subject to threats that were not previously known, motivating the need for building Intrusion Detectors (IDs) that can effectively deal with zero-day attacks. Different studies were directed to compare misclassifications of various algorithms to identify the most suitable one for a given system. Unfortunately, even the most suitable algorithm may still show an unsatisfactory number of misclassifications when system requirements are strict. A possible solution may rely on the adoption of meta-learners, which build ensembles of base-learners to reduce misclassifications and that are widely used for supervised learning. Meta-learners have the potential to reduce misclassifications with respect to non-meta learners: however, misleading base-learners may let the meta-learner leaning towards misclassifications and therefore their behavior needs to be carefully assessed through empirical evaluation. To such extent, in this paper we investigate, expand, empirically evaluate, and discuss meta-learning approaches that rely on ensembles of unsupervised algorithms to detect (zero-day) intrusions in CPSs. Our experimental comparison is conducted by means of public datasets belonging to network intrusion detection and biometric authentication systems, which are common IDSs for CPSs. Overall, we selected 21 datasets, 15 unsupervised algorithms and 9 different meta-learning approaches. Results allow discussing the applicability and suitability of meta-learning for unsupervised anomaly detection, comparing metric scores achieved by base algorithms and meta-learners. Analyses and discussion end up showing how the adoption of meta-learners significantly reduces misclassifications when detecting (zero-day) intrusions in CPSs.
APA, Harvard, Vancouver, ISO, and other styles
16

Bazydło, Grzegorz. "Designing Reconfigurable Cyber-Physical Systems Using Unified Modeling Language." Energies 16, no. 3 (January 25, 2023): 1273. http://dx.doi.org/10.3390/en16031273.

Full text
Abstract:
Technological progress in recent years in the Cyber-Physical Systems (CPSs) area has given designers unprecedented possibilities and computational power, but as a consequence, the modeled CPSs are becoming increasingly complex, hierarchical, and concurrent. Therefore, new methods of CPSs design (especially using abstract modeling) are needed. The paper presents an approach to the CPS control part modeling using state machine diagrams from Unified Modelling Language (UML). The proposed design method attempts to combine the advantages of graphical notation (intuitiveness, convenience, readability) with the benefits of text specification languages (unambiguity, precision, versatility). The UML specification is transformed using Model-Driven Development (MDD) techniques into an effective program in Hardware Description Language (HDL), using Concurrent Finite State Machine (CFSM) as a temporary model. The obtained HDL specification can be analyzed, validated, synthesized, and finally implemented in Field Programmable Gate Array (FPGA) devices. The dynamic, partial reconfiguration (a feature of modern FPGAs) allows for the exchange of a part of the implemented CPS algorithm without stopping the device. But to use this feature, the model must be safe, which in the proposed approach means, that it should possess special idle states, where the control is transferred during the reconfiguration process. Applying the CFSM model greatly facilitates this task. The proposed design method offers efficient graphical modeling of a control part of CPS, and automatic translation of the behavior model into a synthesizable Verilog description, which can be directly implemented in FPGA devices, and dynamically reconfigured as needed. A practical example illustrating the successive stages of the proposed method is also presented.
APA, Harvard, Vancouver, ISO, and other styles
17

Li, Wei, Yahong Shi, and Yajie Li. "Research on secure control and communication for cyber-physical systems under cyber-attacks." Transactions of the Institute of Measurement and Control 41, no. 12 (February 12, 2019): 3421–37. http://dx.doi.org/10.1177/0142331219826658.

Full text
Abstract:
This paper investigates the co-design problem of secure control and communication quality for cyber-physical systems (CPSs) to solve unavoidable problems, in which both actuator faults and cyber-attacks occur in practical implementations of CPSs. Firstly, based on the discrete event-triggered communication scheme (DETCS), a system framework for active fault-tolerant and passive attack-tolerant control is proposed. Then, a model of a closed-loop CPS is established that integrates a triggering condition, actuator faults and cyber-attacks into a single uniform framework. Secondly, using the partition and definition of different delay functions, the appropriate Lyapunov functions are constructed based on the time-delay system theory, and design methods for a robust observer with passive attack tolerance for estimation of the state and fault, and an active fault-tolerant and passive attack-tolerant controller are developed in terms of linear matrix inequality. In this way, the co-design goal involving active fault tolerant control, passive attack-tolerant control and the communication network is achieved. Finally, a simulation experiment of a quadruple-tank is carried out to demonstrate the effectiveness of the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
18

Dixit, Ms Keerti. "Attack Taxonomy for Cyber-Physical System." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (January 31, 2022): 194–200. http://dx.doi.org/10.22214/ijraset.2022.39734.

Full text
Abstract:
Abstract: Cyber-physical systems are the systems that combine the physical world with the world of information processing. CPS involves interaction between heterogeneous components that include electronic chips, software systems, sensors and actuators. It makes the CPS vulnerable to attacks. How to deal with the attacks in CPSs has become a research hotspot. In this paper we have study the Architecture of CPS and various security threats at each layer of the archicture of CPS. We have also developed attack taxonomy for CPS. Keywords: Cyber Physical System, Threat, Attack
APA, Harvard, Vancouver, ISO, and other styles
19

Nath, Bhagawan, Timo Hamaleinen, and Soundararajan Ezekiel. "Data Mining for the Security of Cyber Physical Systems Using Deep-Learning Methods." International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 591–98. http://dx.doi.org/10.34190/iccws.17.1.74.

Full text
Abstract:
Cyber Physical Systems (CPSs) have become widely popular in recent years, and their applicability have been growing exponentially. A CPS is an advanced system that incorporates a computation unit along with a hardware unit, allowing for computing processes to interact with the physical world. However, this increased usage has also led to the security concerns in them, as they allow potential attack vendors to exploit the possibilities of committing misconduct for their own benefit. It is of paramount importance that these systems have comprehensive security mechanisms to mitigate these security threats. A typical attack vector for a CPS is malicious data supplied by compromised sensors that are part of the CPSs. To combat this attack vector, many systems are secured through fault tolerance, including methods such as checkpointing to recover the system. Looking at the diverse nature of attacks and their ever growing complexities, traditional security approaches may not counter them efficiently, which creates a vacuum to be filled with sophisticated state-of-the-art techniques. In this paper, Deep Learning methods such as autoencoders, and Support Vector Machines are proposed to secure CPSs against these attacks. The networks in these applied methods are trained with a normal data profile devoid of any malicious data. Data collected from the system’s sensors at specified intervals is used to form a data series and input to the neural networks. The networks compare and analyze new data to the normal profile to detect anomalies, if there is any. In the presence of anomalous data, the networks generate corrective action(s) for these sensors and the physical states they are recording. Through detection of anomalies, effective security of CPSs may be improved in addition to providing protection for the sensors. Moreover, the proposed method of securing CPSs opens up the possibility of further research by showcasing the applicability of neural networks in securing CPSs.
APA, Harvard, Vancouver, ISO, and other styles
20

Zhang, Binghan, Bin Yang, Congjun Wang, Zhichen Wang, Boda Liu, and Tengwei Fang. "Computer Vision-Based Construction Process Sensing for Cyber–Physical Systems: A Review." Sensors 21, no. 16 (August 13, 2021): 5468. http://dx.doi.org/10.3390/s21165468.

Full text
Abstract:
Cyber–physical systems (CPSs) are generally considered to be the next generation of engineered systems. However, the actual application of CPSs in the Architecture, Engineering and Construction (AEC) industry is still at a low level. The sensing method in the construction process plays a very important role in the establishment of CPSs. Therefore, the purpose of this paper is to discuss the application potential of computer vision-based sensing methods and provide practical suggestions through a literature review. This paper provides a review of the current application of CPSs in the AEC industry, summarizes the current knowledge gaps, and discusses the problems with the current construction site sensing approach. Considering the unique advantages of the computer vision (CV) method at the construction site, the application of CV for different construction entities was reviewed and summarized to achieve a CV-based construction site sensing approach for construction process CPSs. The potential of CPS can be further stimulated by providing rich information from on-site sensing using CV methods. According to the review, this approach has unique advantages in the specific environment of the construction site. Based on the current knowledge gap identified in the literature review, this paper proposes a novel concept of visual-based construction site sensing method for CPS application, and an architecture for CV-based CPS is proposed as an implementation of this concept. The main contribution of this paper is to propose a CPS architecture using computer vision as the main information acquisition method based on the literature review. This architecture innovatively introduces computer vision as a sensing method of construction sites, and realizes low-cost and non-invasive information acquisition in complex construction scenarios. This method can be used as an important supplement to on-site sensing to further promote the automation and intelligence of the construction process.
APA, Harvard, Vancouver, ISO, and other styles
21

Luo, Yuan, Ya Xiao, Long Cheng, Guojun Peng, and Danfeng (Daphne) Yao. "Deep Learning-based Anomaly Detection in Cyber-physical Systems." ACM Computing Surveys 54, no. 5 (June 2021): 1–36. http://dx.doi.org/10.1145/3453155.

Full text
Abstract:
Anomaly detection is crucial to ensure the security of cyber-physical systems (CPS). However, due to the increasing complexity of CPSs and more sophisticated attacks, conventional anomaly detection methods, which face the growing volume of data and need domain-specific knowledge, cannot be directly applied to address these challenges. To this end, deep learning-based anomaly detection (DLAD) methods have been proposed. In this article, we review state-of-the-art DLAD methods in CPSs. We propose a taxonomy in terms of the type of anomalies, strategies, implementation, and evaluation metrics to understand the essential properties of current methods. Further, we utilize this taxonomy to identify and highlight new characteristics and designs in each CPS domain. Also, we discuss the limitations and open problems of these methods. Moreover, to give users insights into choosing proper DLAD methods in practice, we experimentally explore the characteristics of typical neural models, the workflow of DLAD methods, and the running performance of DL models. Finally, we discuss the deficiencies of DL approaches, our findings, and possible directions to improve DLAD methods and motivate future research.
APA, Harvard, Vancouver, ISO, and other styles
22

Balador, Ali, Anis Kouba, Dajana Cassioli, Fotis Foukalas, Ricardo Severino, Daria Stepanova, Giovanni Agosta, et al. "Wireless Communication Technologies for Safe Cooperative Cyber Physical Systems." Sensors 18, no. 11 (November 21, 2018): 4075. http://dx.doi.org/10.3390/s18114075.

Full text
Abstract:
Cooperative Cyber-Physical Systems (Co-CPSs) can be enabled using wireless communication technologies, which in principle should address reliability and safety challenges. Safety for Co-CPS enabled by wireless communication technologies is a crucial aspect and requires new dedicated design approaches. In this paper, we provide an overview of five Co-CPS use cases, as introduced in our SafeCOP EU project, and analyze their safety design requirements. Next, we provide a comprehensive analysis of the main existing wireless communication technologies giving details about the protocols developed within particular standardization bodies. We also investigate to what extent they address the non-functional requirements in terms of safety, security and real time, in the different application domains of each use case. Finally, we discuss general recommendations about the use of different wireless communication technologies showing their potentials in the selected real-world use cases. The discussion is provided under consideration in the 5G standardization process within 3GPP, whose current efforts are inline to current gaps in wireless communications protocols for Co-CPSs including many future use cases.
APA, Harvard, Vancouver, ISO, and other styles
23

Kim, Sangjun, and Kyung-Joon Park. "A Survey on Machine-Learning Based Security Design for Cyber-Physical Systems." Applied Sciences 11, no. 12 (June 12, 2021): 5458. http://dx.doi.org/10.3390/app11125458.

Full text
Abstract:
A cyber-physical system (CPS) is the integration of a physical system into the real world and control applications in a computing system, interacting through a communications network. Network technology connecting physical systems and computing systems enables the simultaneous control of many physical systems and provides intelligent applications for them. However, enhancing connectivity leads to extended attack vectors in which attackers can trespass on the network and launch cyber-physical attacks, remotely disrupting the CPS. Therefore, extensive studies into cyber-physical security are being conducted in various domains, such as physical, network, and computing systems. Moreover, large-scale and complex CPSs make it difficult to analyze and detect cyber-physical attacks, and thus, machine learning (ML) techniques have recently been adopted for cyber-physical security. In this survey, we provide an extensive review of the threats and ML-based security designs for CPSs. First, we present a CPS structure that classifies the functions of the CPS into three layers: the physical system, the network, and software applications. Then, we discuss the taxonomy of cyber-physical attacks on each layer, and in particular, we analyze attacks based on the dynamics of the physical system. We review existing studies on detecting cyber-physical attacks with various ML techniques from the perspectives of the physical system, the network, and the computing system. Furthermore, we discuss future research directions for ML-based cyber-physical security research in the context of real-time constraints, resiliency, and dataset generation to learn about the possible attacks.
APA, Harvard, Vancouver, ISO, and other styles
24

Rehman, Shafiq, and Volker Gruhn. "An Effective Security Requirements Engineering Framework for Cyber-Physical Systems." Technologies 6, no. 3 (July 12, 2018): 65. http://dx.doi.org/10.3390/technologies6030065.

Full text
Abstract:
Context and motivation: Cyber-Physical Systems (CPSs) are gaining priority over other systems. The heterogeneity of these systems increases the importance of security. Both the developer and the requirement analyst must consider details of not only the software, but also the hardware perspective, including sensor and network security. Several models for secure software engineering processes have been proposed, but they are limited to software; therefore, to support the processes of security requirements, we need a security requirements framework for CPSs. Question/Problem: Do existing security requirements frameworks fulfil the needs of CPS security requirements? The answer is no; existing security requirements frameworks fail to accommodate security concerns outside of software boundaries. Little or even no attention has been given to sensor, hardware, network, and third party elements during security requirements engineering in different existing frameworks. Principal Ideas/results: We have proposed, applied, and assessed an incremental security requirements evolution approach, which configures the heterogeneous nature of components and their threats in order to generate a secure system. Contribution: The most significant contribution of this paper is to propose a security requirements engineering framework for CPSs that overcomes the issue of security requirements elicitation for heterogeneous CPS components. The proposed framework supports the elicitation of security requirements while considering sensor, receiver protocol, network channel issues, along with software aspects. Furthermore, the proposed CPS framework has been evaluated through a case study, and the results are shown in this paper. The results would provide great support in this research direction.
APA, Harvard, Vancouver, ISO, and other styles
25

Mubeen, Saad, Elena Lisova, and Aneta Vulgarakis Feljan. "Timing Predictability and Security in Safety-Critical Industrial Cyber-Physical Systems: A Position Paper." Applied Sciences 10, no. 9 (April 30, 2020): 3125. http://dx.doi.org/10.3390/app10093125.

Full text
Abstract:
Cyber Physical Systems (CPSs) are systems that are developed by seamlessly integrating computational algorithms and physical components, and they are a result of the technological advancement in the embedded systems and distributed systems domains, as well as the availability of sophisticated networking technology. Many industrial CPSs are subject to timing predictability, security and functional safety requirements, due to which the developers of these systems are required to verify these requirements during the their development. This position paper starts by exploring the state of the art with respect to developing timing predictable and secure embedded systems. Thereafter, the paper extends the discussion to time-critical and secure CPSs and highlights the key issues that are faced when verifying the timing predictability requirements during the development of these systems. In this context, the paper takes the position to advocate paramount importance of security as a prerequisite for timing predictability, as well as both security and timing predictability as prerequisites for functional safety. Moreover, the paper identifies the gaps in the existing frameworks and techniques for the development of time- and safety-critical CPSs and describes our viewpoint on ensuring timing predictability and security in these systems. Finally, the paper emphasises the opportunities that artificial intelligence can provide in the development of these systems.
APA, Harvard, Vancouver, ISO, and other styles
26

Bae, Kyungmin, and Peter Csaba Ölveczky. "MSYNC: A Generalized Formal Design Pattern for Virtually Synchronous Multirate Cyber-physical Systems." ACM Transactions on Embedded Computing Systems 20, no. 5s (October 31, 2021): 1–26. http://dx.doi.org/10.1145/3477036.

Full text
Abstract:
TTA and PALS are two prominent formal design patterns—with different strengths and weaknesses—for virtually synchronous distributed cyber-physical systems (CPSs). They greatly simplify the design and verification of such systems by allowing us to design and verify their underlying synchronous designs. In this paper we introduce and verify MSYNC as a formal design (and verification) pattern/synchronizer for hierarchical multirate CPSs that generalizes, and combines the advantages of, both TTA and (single-rate and multirate) PALS. We also define an extension of TTA to multirate CPSs as a special case. We show that MSYNC outperforms both TTA and PALS in terms of allowing shorter periods, and illustrate the MSYNC design and verification approach with a case study on a fault-tolerant distributed control system for turning an airplane.
APA, Harvard, Vancouver, ISO, and other styles
27

Horváth, Imre. "A Computational Framework for Procedural Abduction Done by Smart Cyber-Physical Systems." Designs 3, no. 1 (December 25, 2018): 1. http://dx.doi.org/10.3390/designs3010001.

Full text
Abstract:
To be able to provide appropriate services in social and human application contexts, smart cyber-physical systems (S-CPSs) need ampliative reasoning and decision-making (ARDM) mechanisms. As one option, procedural abduction (PA) is suggested for self-managing S-CPSs. PA is a knowledge-based computation and learning mechanism. The objective of this article is to provide a comprehensive description of the computational framework proposed for PA. Towards this end, first the essence of smart cyber-physical systems is discussed. Then, the main recent research results related to computational abduction and ampliative reasoning are discussed. PA facilitates beliefs-driven contemplation of the momentary performance of S-CPSs, including a ‘best option’-based setting of the servicing objective and realization of any demanded adaptation. The computational framework of PA includes eight clusters of computational activities: (i) run-time extraction of signals and data by sensing, (ii) recognition of events, (iii) inferring about existing situations, (iv) building awareness of the state and circumstances of operation, (v) devising alternative performance enhancement strategies, (vi) deciding on the best system adaptation, (vii) devising and scheduling the implied interventions, and (viii) actuating effectors and controls. Several cognitive algorithms and computational actions are used to implement PA in a compositional manner. PA necessitates not only a synergic interoperation of the algorithms, but also an objective-dependent fusion of the pre-programmed and the run time acquired chunks of knowledge. A fully fledged implementation of PA is underway, which will make verification and validation possible in the context of various smart CPSs.
APA, Harvard, Vancouver, ISO, and other styles
28

Grazioso, Stanislao, Annarita Tedesco, Mario Selvaggio, Stefano Debei, and Sebastiano Chiodini. "Towards the development of a cyber-physical measurement system (CPMS): case study of a bioinspired soft growing robot for remote measurement and monitoring applications." ACTA IMEKO 10, no. 2 (June 29, 2021): 104. http://dx.doi.org/10.21014/acta_imeko.v10i2.1123.

Full text
Abstract:
The most effective expression of the 4.0 Era is represented by cyber-physical systems (CPSs). Historically, measurement and monitoring systems (MMSs) have been an essential part of CPSs; however, by introducing the 4.0 enabling technologies into MMSs, a MMS can evolve into a cyber-physical measurement system (CPMS). Starting from this consideration, this work reports a preliminary case study of a CPMS, namely an innovative robotic platform to be used for measurement systems in confined and constrained remote environments. The innovative system is a soft growing robot composed of a robot base, to be placed outside the remote environments and a robot body that accesses the site through growth. A pneumatic actuation mechanism enables the controllable growth of the system through lengthening at its tip, as well as its controllable steering. The system can be endowed with sensors to enable remote measurement and monitoring tasks, or can be used to transport sensors in remote locations. A digital twin of the system is developed for simulation of a practical measurement scenario. The ultimate goal is to achieve a self-adapting, fully autonomous system for remote monitoring operations to be used reliably and safely for the inspection of unknown and/or constrained environments.
APA, Harvard, Vancouver, ISO, and other styles
29

Vaagensmith, Bjorn, Vivek Kumar Singh, Robert Ivans, Daniel L. Marino, Chathurika S. Wickramasinghe, Jacob Lehmer, Tyler Phillips, Craig Rieger, and Milos Manic. "Review of Design Elements within Power Infrastructure Cyber–Physical Test Beds as Threat Analysis Environments." Energies 14, no. 5 (March 4, 2021): 1409. http://dx.doi.org/10.3390/en14051409.

Full text
Abstract:
Cyber–physical systems (CPSs) are an integral part of modern society; thus, enhancing these systems’ reliability and resilience is paramount. Cyber–physical testbeds (CPTs) are a safe way to test and explore the interplay between the cyber and physical domains and to cost-effectively enhance the reliability and resilience of CPSs. Here a review of CPT elements, broken down into physical components (simulators, emulators, and physical hardware), soft components (communication protocols, network timing protocols), and user interfaces (visualization-dashboard design considerations) is presented. Various methods used to validate CPS performance are reviewed and evaluated for potential applications in CPT performance validation. Last, initial simulated results for a CPT design, based on the IEEE 33 bus system, are presented, along with a brief discussion on how model-based testing and fault–injection-based testing (using scaling and ramp-type attacks) may be used to help validate CPT performance.
APA, Harvard, Vancouver, ISO, and other styles
30

Yilma, Bereket Abera, Yannick Naudet, and Hervé Panetto. "Towards a Personalisation Framework for Cyber-Physical-Social System (CPSS)." IFAC-PapersOnLine 54, no. 1 (2021): 243–48. http://dx.doi.org/10.1016/j.ifacol.2021.08.028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Jiang, Jielin, Xing Zhang, and Shengjun Li. "A Task Offloading Method with Edge for 5G-Envisioned Cyber-Physical-Social Systems." Security and Communication Networks 2020 (August 7, 2020): 1–9. http://dx.doi.org/10.1155/2020/8867094.

Full text
Abstract:
Recently, Cyber-Physical-Social Systems (CPSS) have been introduced as a new information physics system, which enables personnel organizations to control physical entities in a reliable, real-time, secure, and collaborative manner through cyberspace. Moreover, with the maturity of edge computing technology, the data generated by physical entities in CPSS are usually sent to edge computing nodes for effective processing. Nevertheless, it remains a challenge to ensure that edge nodes maintain load balance while minimizing the completion time in the event of the edge node outage. Given these problems, a Unique Task Offloading Method (UTOM) for CPSS is designed in this paper. Technically, the system model is constructed firstly and then a multi-objective problem is defined. Afterward, Improving the Strength Pareto Evolutionary Algorithm (SPEA2) is utilized to generate the feasible solutions of the above problem, whose aims are optimizing the propagation time and achieving load balance. Furthermore, the normalization method has been leveraged to produce standard data and select the global optimal solution. Finally, several necessary experiments of UTOM are introduced in detail.
APA, Harvard, Vancouver, ISO, and other styles
32

Tepjit, Sirasak, Imre Horváth, and Zoltán Rusák. "The state of framework development for implementing reasoning mechanisms in smart cyber-physical systems: A literature review." Journal of Computational Design and Engineering 6, no. 4 (April 12, 2019): 527–41. http://dx.doi.org/10.1016/j.jcde.2019.04.002.

Full text
Abstract:
Abstract Smart CPSs (S-CPSs) have been evolving beyond what was identified by the traditional definitions of CPSs. The objective of our research is to investigate the concepts and implementations of reasoning processes for S-CPSs, and more specifically, the frameworks proposed for the fuzzy front end of their reasoning mechanisms. The objectives of the paper are: (i) to analyze the framework concepts and implementations of CPS, (ii) to review the literature concerning system-level reasoning and its enablers from the points of view of the processed knowledge, building awareness, reasoning mechanisms, decision making, and adaptation. Our findings are: (i) awareness and adaptation behaviors are considered as system-level smartness of S-CPSs that are not achieved by traditional design approaches; (ii) model-based and composability approaches insufficiently support the development of reasoning mechanisms for S-CPSs; (iii) frameworks for development of reasoning in S-CPS should support compositional design. Based on the conclusions above, we argue that coping with the challenges of compositionality requires both software-level integration and holistic fusion of knowledge by means of semantic transformations. This entails the need for a multi aspect framework that is able to capture at least conceptual, functional, architectural, informational, interoperation, and behavioral aspects. It needs further investigation if a compositionality enabling framework should appear in the form of a meta-framework (abstract) or in the form of a semantically integrated (concrete) framework. Highlights Smartness in CPSs is a holistic and synergistic behavioral characteristic. Complex mental representations are compositional. Compositionality is necessary for smart CPSs. Without a rigorous unifying framework, designing synthesis reasoning remains ad hoc.
APA, Harvard, Vancouver, ISO, and other styles
33

Ghosh, Uttam, Deepak Tosh, Nawab Muhammad Faseeh Qureshi, Ali Kashif Bashir, Al-Sakib Khan Pathan, and Zhaolong Ning. "Cyber-Physical Systems: Prospects, Challenges and Role in Software-Defined Networking and Blockchains." Future Internet 14, no. 12 (December 18, 2022): 382. http://dx.doi.org/10.3390/fi14120382.

Full text
Abstract:
In recent years, cyber-physical systems (CPSs) have gained a lot of attention from academia, industry and government agencies, considered to be the world’s third wave of information technology, following computers and the internet [...]
APA, Harvard, Vancouver, ISO, and other styles
34

Bragatto, Paolo, and Silvia Ansaldi. "Cyber Physical Systems for occupational safety at industrial sites: Opportunities and challenges." Serbian Journal of Management 17, no. 2 (2022): 451–61. http://dx.doi.org/10.5937/sjm17-41131.

Full text
Abstract:
In last decade, many Cyber Physical Systems CPSs for occupational safety have been developed within research programs funded by national and transnational bodies. Many of them are now ready for the market. The paper focuses on the industrial sectors, where the safety of the worker and the safety of machines, equipment and processes are linked each other. The papers proposes to safety managers criteria and suggestions for choosing appropriate CPS for seizing the great opportunities for safety improvement. The paper discusses a few issues, including cybersecurity and privacy, which are critical for a successful implementation of the CPSs in occupational safety. Safety Management System SMS, in particular, must be adequate to collect the amount of data generated by many sensors distributed in work ambient and worn by workers.
APA, Harvard, Vancouver, ISO, and other styles
35

Lai, Xiaoyang, and Huan Wang. "Combined Channel Estimation with Interference Suppression in CPSS." Sensors 18, no. 11 (November 8, 2018): 3823. http://dx.doi.org/10.3390/s18113823.

Full text
Abstract:
With social characteristics integrated into cyber-physical systems (CPS), the wireless channel has been a complex electromagnetic environment due to the subjectivity of human behaviour. For the low-power and resource-constrained nodes in cyber-physical-social systems (CPSS), minimum research is available focusing on conquering the issues of computational complexity, external interference and transmission fading simultaneously. This study aims to explore channel estimation with interference suppression based on machine learning. A novel channel estimation scheme is proposed, which combined interference suppression in channel impulse response (CIR) of frequency domain with K-means algorithm and noise cancellation in CIR of time domain with K-nearest neighbor (KNN) algorithm into an integrated process. Complexity analysis and simulation results showed that the proposed scheme has relatively lower complexity and the performance is proven better than traditional schemes, which meets the requirements of CPSS in complex electromagnetic environments.
APA, Harvard, Vancouver, ISO, and other styles
36

Liu, Zhijie, Jinglei Tang, Zhijia Zhao, and Shuang Zhang. "Adaptive neural network control for nonlinear cyber-physical systems subject to false data injection attacks with prescribed performance." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 379, no. 2207 (August 16, 2021): 20200372. http://dx.doi.org/10.1098/rsta.2020.0372.

Full text
Abstract:
Cyber-physical systems (CPSs), as emerging products of industry 4.0 , play a key role in the development of intelligent manufacturing. This paper proposes an observer-based adaptive neural network (NN) control for nonlinear strict-feedback CPSs subject to false data injection attacks. Since there may be strict constraints on the state or output signals of nonlinear cyber-physical systems (NCPSs), we propose a time-varying asymmetric barrier Lyapunov function to realize the specific output constraints of NCPSs under cyber-attacks. Besides, since false data injection attacks will corrupt the transmitted state variables, an observer is designed to obtain observations of the exact states, and NN is used to approximate the unknown nonlinearity of NCPSs. With the proposed control strategy, the constraint control problem of NCPSs subject to false data injection attacks is settled. Finally, a numerical simulation example verifies the effectiveness of the proposed controller. This article is part of the theme issue ‘Towards symbiotic autonomous systems’.
APA, Harvard, Vancouver, ISO, and other styles
37

Ibrahim, Mariam, Qays Al-Hindawi, Ruba Elhafiz, Ahmad Alsheikh, and Omar Alquq. "Attack Graph Implementation and Visualization for Cyber Physical Systems." Processes 8, no. 1 (December 20, 2019): 12. http://dx.doi.org/10.3390/pr8010012.

Full text
Abstract:
Cyber-attacks threaten the safety of cyber physical systems (CPSs) as a result of the existence of weaknesses in the multiple structural units constituting them. In this paper, three cyber physical systems case studies of a pressurized water nuclear power plant (NPP), an industrial control system (ICS), and a vehicular network system (VNS) are examined, formally presented, and implemented utilizing Architecture Analysis and Design Language, determining system design, links, weaknesses, resources, potential attack instances, and their pre-and post-conditions. Then, the developed plant models are checked with a security property using JKind model checker embedded software. The attack graphs causing plants disruptions for the three applications are graphically visualized using a new graphical user interface (GUI) windows application.
APA, Harvard, Vancouver, ISO, and other styles
38

Lovas, Róbert, Attila Farkas, Attila Csaba Marosi, Sándor Ács, József Kovács, Ádám Szalóki, and Botond Kádár. "Orchestrated Platform for Cyber-Physical Systems." Complexity 2018 (July 5, 2018): 1–16. http://dx.doi.org/10.1155/2018/8281079.

Full text
Abstract:
One of the main driving forces in the era of cyber-physical systems (CPSs) is the introduction of massive sensor networks (or nowadays various Internet of things solutions as well) into manufacturing processes, connected cars, precision agriculture, and so on. Therefore, large amounts of sensor data have to be ingested at the server side in order to generate and make the “twin digital model” or virtual factory of the existing physical processes for (among others) predictive simulation and scheduling purposes usable. In this paper, we focus on our ultimate goal, a novel software container-based approach with cloud agnostic orchestration facilities that enable the system operators in the industry to create and manage scalable, virtual IT platforms on-demand for these two typical major pillars of CPS: (1) server-side (i.e., back-end) framework for sensor networks and (2) configurable simulation tool for predicting the behavior of manufacturing systems. The paper discusses the scalability of the applied discrete-event simulation tool and the layered back-end framework starting from simple virtual machine-level to sophisticated multilevel autoscaling use case scenario. The presented achievements and evaluations leverage on (among others) the synergy of the existing EasySim simulator, our new CQueue software container manager, the continuously developed Occopus cloud orchestrator tool, and the latest version of the evolving MiCADO framework for integrating such tools into a unified platform.
APA, Harvard, Vancouver, ISO, and other styles
39

Wiesner, Stefan, Eugenia Marilungo, and Klaus-Dieter Thoben. "Cyber-Physical Product-Service Systems – Challenges for Requirements Engineering." International Journal of Automation Technology 11, no. 1 (January 5, 2017): 17–28. http://dx.doi.org/10.20965/ijat.2017.p0017.

Full text
Abstract:
These days, manufacturers need to improve both their products and services, as well as their technological base to achieve a more sustainable value proposition, to become more efficient and effective in the market, and to satisfy user needs. Significant emerging technologies being discussed in various research studies include networked and smart-environments connected by Internet of Things (IoT), wearable technologies, tangible interfaces, human-robot collaboration, evolving tools, processes and interactions, virtual reality, the ubiquitous use of machine learning, and deep-learning algorithms. Such aspects are increasing the benefits of technology and opening the way toward technical breakthroughs, and have led to the emergence of cyber-physical systems (CPSs), which can be seen as systems of systems, requiring collaboration among different disciplines such as mechanical engineering, electrical engineering, and computer science for their realization. To enable the full potential of a CPS and generate a substantial competitive advantage, however, the service perspective cannot be neglected. Servitization of product offerings has recently accumulated in so-called product-service systems (PSSs), which describe the integrated development, realization, and provisioning of product-service bundles as a solution for customers. Thus, it is more and more important to consider both the technological and service aspects early in the development process. An integration of the two concepts will lead to product-service bundles provided on a cyber-physical basis, creating cyber-physical product-service systems (CPSSs). To base these complex systems on stakeholder needs and allow a successful and dynamic change to CPSSs in industry, multi-disciplinary requirements engineering (RE) for the hardware, software, and service components is a key aspect. The objective of this paper is to provide an introduction to the CPSS concept, understand its application in an industrial case, and elaborate on the specific challenges for systems engineering, focusing on the RE process.
APA, Harvard, Vancouver, ISO, and other styles
40

Garg, Deepak, Shalli Rani, Norbert Herencsar, Sahil Verma, Marcin Wozniak, and Muhammad Fazal Ijaz. "Hybrid Technique for Cyber-Physical Security in Cloud-Based Smart Industries." Sensors 22, no. 12 (June 19, 2022): 4630. http://dx.doi.org/10.3390/s22124630.

Full text
Abstract:
New technologies and trends in industries have opened up ways for distributed establishment of Cyber-Physical Systems (CPSs) for smart industries. CPSs are largely based upon Internet of Things (IoT) because of data storage on cloud servers which poses many constraints due to the heterogeneous nature of devices involved in communication. Among other challenges, security is the most daunting challenge that contributes, at least in part, to the impeded momentum of the CPS realization. Designers assume that CPSs are themselves protected as they cannot be accessed from external networks. However, these days, CPSs have combined parts of the cyber world and also the physical layer. Therefore, cyber security problems are large for commercial CPSs because the systems move with one another and conjointly with physical surroundings, i.e., Complex Industrial Applications (CIA). Therefore, in this paper, a novel data security algorithm Dynamic Hybrid Secured Encryption Technique (DHSE) is proposed based on the hybrid encryption scheme of Advanced Encryption Standard (AES), Identity-Based Encryption (IBE) and Attribute-Based Encryption (ABE). The proposed algorithm divides the data into three categories, i.e., less sensitive, mid-sensitive and high sensitive. The data is distributed by forming the named-data packets (NDPs) via labelling the names. One can choose the number of rounds depending on the actual size of a key; it is necessary to perform a minimum of 10 rounds for 128-bit keys in DHSE. The average encryption time taken by AES (Advanced Encryption Standard), IBE (Identity-based encryption) and ABE (Attribute-Based Encryption) is 3.25 ms, 2.18 ms and 2.39 ms, respectively. Whereas the average time taken by the DHSE encryption algorithm is 2.07 ms which is very much less when compared to other algorithms. Similarly, the average decryption times taken by AES, IBE and ABE are 1.77 ms, 1.09 ms and 1.20 ms and the average times taken by the DHSE decryption algorithms are 1.07 ms, which is very much less when compared to other algorithms. The analysis shows that the framework is well designed and provides confidentiality of data with minimum encryption and decryption time. Therefore, the proposed approach is well suited for CPS-IoT.
APA, Harvard, Vancouver, ISO, and other styles
41

Tran, Park, Nguyen, and Hoang. "Development of a Smart Cyber-Physical Manufacturing System in the Industry 4.0 Context." Applied Sciences 9, no. 16 (August 13, 2019): 3325. http://dx.doi.org/10.3390/app9163325.

Full text
Abstract:
The complexity and dynamic of the manufacturing environment are growing due to the changes of manufacturing demand from mass production to mass customization that require variable product types, small lot sizes, and a short lead-time to market. Currently, the automatic manufacturing systems are suitable for mass production. To cope with the changes of the manufacturing environment, the paper proposes the model and technologies for developing a smart cyber-physical manufacturing system (Smart-CPMS). The transformation of the actual manufacturing systems to the Smart-CPMS is considered as the next generation of manufacturing development in Industry 4.0. The Smart-CPMS has advanced characteristics inspired from biology such as self-organization, self-diagnosis, and self-healing. These characteristics ensure that the Smart-CPMS is able to adapt with continuously changing manufacturing requirements. The model of Smart-CPMS is inherited from the organization of living systems in biology and nature. Consequently, in the Smart-CPMS, each resource on the shop floor such as machines, robots, transporters, and so on, is an autonomous entity, namely a cyber-physical system (CPS) which is equipped with cognitive capabilities such as perception, reasoning, learning, and cooperation. The Smart-CPMS adapts to the changes of manufacturing environment by the interaction among CPSs without external intervention. The CPS implementation uses the cognitive agent technology. Internet of things (IoT) with wireless networks, radio frequency identification (RFID), and sensor networks are used as information and communication technology (ICT) infrastructure for carrying out the Smart-CPMS.
APA, Harvard, Vancouver, ISO, and other styles
42

Fan, Youping, Jingjiao Li, Dai Zhang, Jie Pi, Jiahan Song, and Guo Zhao. "Supporting Sustainable Maintenance of Substations under Cyber-Threats: An Evaluation Method of Cybersecurity Risk for Power CPS." Sustainability 11, no. 4 (February 14, 2019): 982. http://dx.doi.org/10.3390/su11040982.

Full text
Abstract:
In the increasingly complex cyber-environment, appropriate sustainable maintenance of substation auto systems (SASs) can lead to many positive effects on power cyber-physical systems (CPSs). Evaluating the cybersecurity risk of power CPSs is the first step in creating sustainable maintenance plans for SASs. In this paper, a mathematical framework for evaluating the cybersecurity risk of a power CPS is proposed considering both the probability of successful cyberattacks on SASs and their consequences for the power system. First, the cyberattacks and their countermeasures are introduced, and the probability of successful cyber-intruding on SASs is modeled from the defender’s perspective. Then, a modified hypergraph model of the SAS’s logical structure is established to quantitatively analyze the impacts of cyberattacks on an SAS. The impacts will ultimately act on the physical systems of the power CPS. The modified hypergraph model can describe more information than a graph or hypergraph model and potentially can analyze complex networks like CPSs. Finally, the feasibility and effectiveness of the proposed evaluation method is verified by the IEEE 14-bus system, and the test results demonstrate that this proposed method is more reasonable to assess the cybersecurity risk of power CPS compared with some other models.
APA, Harvard, Vancouver, ISO, and other styles
43

Zhou, Hao, Mengyao Zhao, Linbo Wu, and Xiaohong Chen. "Simulating Timing Behaviors for Cyber-Physical Systems Using Modelica." International Journal of Software Science and Computational Intelligence 11, no. 3 (July 2019): 44–67. http://dx.doi.org/10.4018/ijssci.2019070103.

Full text
Abstract:
Cyber-physical systems (CPSs) connect the cyber world with the physical world through a network of interrelated elements, such as sensors and actuators, robots, and other computing devices. Timing constraints on the interactions (timing behaviors) should be modelled and verified as cyber-physical systems are becoming more and more complex. This article proposes modeling the typical timing behaviors according to their time characteristics, periodicity, multiform time, and synchronization, and verifies them against properties using simulations. Sequence diagrams are presented for the modeling, and modelica is used for simulation. In the simulation, the time dependence relations are defined, and used for simulation parameter data automatic generation, in addition to the paths from the sequence diagrams. Finally, a Parachute System is used as an example to show the feasibility and effectiveness of the approach.
APA, Harvard, Vancouver, ISO, and other styles
44

Heikkilä, Tapio, Tuomas Seppälä, Timo Kuula, and Hannu Karvonen. "Remote Robot-Sensor Calibration Service." International Journal of Mobile Devices, Wearable Technology, and Flexible Electronics 10, no. 1 (January 2019): 15–36. http://dx.doi.org/10.4018/ijmdwtfe.2019010102.

Full text
Abstract:
Cyber physical systems (CPSs) are integrating computation, networking, and physical processes. CPSs facilitate improvements especially for asset management. The authors have contributed to robot automation with CPS technologies by a pilot system to support setup and maintenance of sensor-based robot systems with remote calibration services. This paper has focused to support remotely-located technology specialists as well as local field personnel by appropriate user interface design. A design example is given for a remote robot-sensor calibration procedure. In the user interface design, the authors follow loosely the Ecological Interface Design (EID) approach.
APA, Harvard, Vancouver, ISO, and other styles
45

Kavallieratos, Georgios, Georgios Spathoulas, and Sokratis Katsikas. "Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems." Sensors 21, no. 5 (March 1, 2021): 1691. http://dx.doi.org/10.3390/s21051691.

Full text
Abstract:
The increasingly witnessed integration of information technology with operational technology leads to the formation of Cyber-Physical Systems (CPSs) that intertwine physical and cyber components and connect to each other to form systems-of-systems. This interconnection enables the offering of functionality beyond the combined offering of each individual component, but at the same time increases the cyber risk of the overall system, as such risk propagates between and aggregates at component systems. The complexity of the resulting systems-of-systems in many cases leads to difficulty in analyzing cyber risk. Additionally, the selection of cybersecurity controls that will effectively and efficiently treat the cyber risk is commonly performed manually, or at best with limited automated decision support. In this work, we propose a method for analyzing risk propagation and aggregation in complex CPSs utilizing the results of risk assessments of their individual constituents. Additionally, we propose a method employing evolutionary programming for automating the selection of an optimal set of cybersecurity controls out of a list of available controls, that will minimize the residual risk and the cost associated with the implementation of these measures. We illustrate the workings of the proposed methods by applying them to the navigational systems of two variants of the Cyber-Enabled Ship (C-ES), namely the autonomous ship and the remotely controlled ship. The results are sets of cybersecurity controls applied to those components of the overall system that have been identified in previous studies as the most vulnerable ones; such controls minimize the residual risk, while also minimizing the cost of implementation.
APA, Harvard, Vancouver, ISO, and other styles
46

Ashok, Pradeepkumar, Ganesh Krishnamoorthy, and Delbert Tesar. "Guidelines for Managing Sensors in Cyber Physical Systems with Multiple Sensors." Journal of Sensors 2011 (2011): 1–15. http://dx.doi.org/10.1155/2011/321709.

Full text
Abstract:
Cyber physical systems (CPSs) typically have numerous sensors monitoring the various physical processes involved. Some sensor failures are inevitable and may have catastrophic effects. The relational nature of the diverse measurands can be very useful in detecting faulty sensors, monitoring the health of the system, and reducing false alarms. This paper provides procedures on how one may integrate data from the various sensors, by careful design of a sensor relationship network. Once such a network has been adopted, choices become available in real time for enhancing the reliability, safety, and performance of the overall system.
APA, Harvard, Vancouver, ISO, and other styles
47

Ali, Nazakat, Manzoor Hussain, and Jang-Eui Hong. "SafeSoCPS: A Composite Safety Analysis Approach for System of Cyber-Physical Systems." Sensors 22, no. 12 (June 13, 2022): 4474. http://dx.doi.org/10.3390/s22124474.

Full text
Abstract:
The System of Cyber-Physical Systems (SoCPS) comprises several independent Cyber-Physical Systems (CPSs) that interact with each other to achieve a common mission that the individual systems cannot achieve on their own. SoCPS are rapidly gaining attention in various domains, e.g., manufacturing, automotive, avionics, healthcare, transportation, and more. SoCPS are extremely large, complex, and safety-critical. As these systems are safety-critical in nature, it is necessary to provide an adequate safety analysis mechanism for these collaborative SoCPS so that the whole network of these CPSs work safely. This safety mechanism must include composite safety analysis for a network of collaborative CPS as a whole. However, existing safety analysis techniques are not built for analyzing safety for dynamically forming networks of CPS. This paper introduces a composite safety analysis approach called SafeSoCPS to analyze hazards for a network of SoCPS. In SafeSoCPS, we analyze potential hazards for the whole network of CPS and trace the faults among participating systems through a fault propagation graph. We developed a tool called SoCPSTracer to support the SafeSoCPS approach. Human Rescue Robot System—a collaborative system—is taken as a case study to validate our proposed approach. The result shows that the SafeSoCPS approach enables us to identify 18 percent more general faults and 63 percent more interaction-related faults in a network of a SoCPS.
APA, Harvard, Vancouver, ISO, and other styles
48

Zhu, Zhiliang, Yingli Wen, Zhengjiang Zhang, Zhengbing Yan, Shipei Huang, and Xiaofeng Xu. "Accurate Position Estimation of Mobile Robot Based on Cyber-Physical-Social Systems (CPSS)." IEEE Access 8 (2020): 56359–70. http://dx.doi.org/10.1109/access.2020.2980558.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Hussain, Manzoor, Nazakat Ali, and Jang-Eui Hong. "Vision beyond the Field-of-View: A Collaborative Perception System to Improve Safety of Intelligent Cyber-Physical Systems." Sensors 22, no. 17 (September 1, 2022): 6610. http://dx.doi.org/10.3390/s22176610.

Full text
Abstract:
Cyber-physical systems (CPSs) that interact with each other to achieve common goals are known as collaborative CPSs. Collaborative CPSs can achieve complex goals that individual CPSs cannot achieve on their own. One of the examples of collaborative CPSs is the vehicular cyber-physical systems (VCPSs), which integrate computing and physical resources to interact with each other to improve traffic safety, situational awareness, and efficiency. The perception system of individual VCPS has limitations on its coverage and detection accuracy. For example, the autonomous vehicle’s sensor cannot detect occluded objects and obstacles beyond its field of view. The VCPS can combine its own data with other collaborative VCPSs to enhance perception, situational awareness, accuracy, and traffic safety. This paper proposes a collaborative perception system to detect occluded objects through the camera sensor’s image fusion and stitching technique. The proposed collaborative perception system combines the perception of surrounding autonomous driving systems (ADSs) that extends the detection range beyond the field of view. We also applied logistic chaos map-based encryption in our collaborative perception system in order to avoid the phantom information shared by malicious vehicles and improve safety in collaboration. It can provide the real-time perception of occluded objects, enabling safer control of ADSs. The proposed collaborative perception can detect occluded objects and obstacles beyond the field of view that individual VCPS perception systems cannot detect, improving the safety of ADSs. We investigated the effectiveness of collaborative perception and its contribution toward extended situational awareness on the road in the simulation environment. Our simulation results showed that the average detection rate of proposed perception systems was 45.4% more than the perception system of an individual ADS. The safety analysis showed that the response time was increased up to 1 s, and the average safety distance was increased to 1.2 m when the ADSs were using collaborative perception compared to those scenarios in which the ADSs were not using collaborative perception.
APA, Harvard, Vancouver, ISO, and other styles
50

Alshammari, Kaznah, Thomas Beach, and Yacine Rezgui. "Cybersecurity for digital twins in the built environment: current research and future directions." Journal of Information Technology in Construction 26 (April 26, 2021): 159–73. http://dx.doi.org/10.36680/j.itcon.2021.010.

Full text
Abstract:
Recent technological developments in the construction industry are seeking to create smart cities by using Cyber-Physical Systems (CPSs) to enhance information models such as BIM. Currently, BIM models are commonly adopted to work with IoT-based systems and embrace smart technologies that offer interoperability in the communication layer. In future, it is envisioned that digital twins will provide new possibilities for cyber-physical systems via monitoring and simulation. However, rarely in this rapidly developing field is security fully considered. This paper reviews the relevant literature regarding the use of the IoT in the built environment and analyses current practices. It also presents examples of cities that use the IoT to improve construction and the lived experience. Finally, it reviews how digital twins factor in multiple layers defined in CPSs, from physical objects to information models. Based on this review, recommendations are provided documenting how BIM specifications can be expanded to become IoT compliant, enhancing standards to support cybersecurity, and ensuring digital twin and city standards can be fully integrated in future secure smart cities.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography