scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Design Techniques and Applications of Cyberphysical Systems: A Survey

01 Jun 2015-IEEE Systems Journal (IEEE)-Vol. 9, Iss: 2, pp 350-365
TL;DR: The aim of this survey is to enable researchers and system designers to get insights into the working and applications of CPSs and motivate them to propose novel solutions for making wide-scale adoption of CPS a tangible reality.
Abstract: Cyberphysical systems (CPSs) are new class of engineered systems that offer close interaction between cyber and physical components. The field of CPS has been identified as a key area of research, and CPSs are expected to play a major role in the design and development of future systems. In this paper, we survey recent advancements made in the development and applications of CPSs. We classify the existing research work based on their characteristics and identify the future challenges. We also discuss the examples of prototypes of CPSs. The aim of this survey is to enable researchers and system designers to get insights into the working and applications of CPSs and motivate them to propose novel solutions for making wide-scale adoption of CPS a tangible reality.
Citations
More filters
Journal ArticleDOI
TL;DR: A systematic literature review was carried out to analyse the academic articles within the Industry 4.0 topic that were published online until the end of June 2016 and indicates existing deficiencies and potential research directions through proposing a research agenda.
Abstract: Over the last few years, the fourth industrial revolution has attracted more and more attentions all around the world. In the current literature, there is still a lack of efforts to systematically review the state of the art of this new industrial revolution wave. The aim of this study is to address this gap by investigating the academic progresses in Industry 4.0. A systematic literature review was carried out to analyse the academic articles within the Industry 4.0 topic that were published online until the end of June 2016. In this paper, the obtained results from both the general data analysis of included papers (e.g. relevant journals, their subject areas and categories, conferences, keywords) and the specific data analysis corresponding to four research sub-questions are illustrated and discussed. These results not only summarise the current research activities (e.g. main research directions, applied standards, employed software and hardware), but also indicate existing deficiencies and potential re...

1,287 citations

Journal ArticleDOI
TL;DR: This survey starts by providing an overview and fundamental of fog computing architecture, and provides an extensive overview of state-of-the-art network applications and major research aspects to design these networks.
Abstract: Fog computing is an emerging paradigm that extends computation, communication, and storage facilities toward the edge of a network. Compared to traditional cloud computing, fog computing can support delay-sensitive service requests from end-users (EUs) with reduced energy consumption and low traffic congestion. Basically, fog networks are viewed as offloading to core computation and storage. Fog nodes in fog computing decide to either process the services using its available resource or send to the cloud server. Thus, fog computing helps to achieve efficient resource utilization and higher performance regarding the delay, bandwidth, and energy consumption. This survey starts by providing an overview and fundamental of fog computing architecture. Furthermore, service and resource allocation approaches are summarized to address several critical issues such as latency, and bandwidth, and energy consumption in fog computing. Afterward, compared to other surveys, this paper provides an extensive overview of state-of-the-art network applications and major research aspects to design these networks. In addition, this paper highlights ongoing research effort, open challenges, and research trends in fog computing.

475 citations


Cites background from "Design Techniques and Applications ..."

  • ...Generally, CPS [207] enables seamless integration between the physical component and cyber services such as networking and computation....

    [...]

  • ...Stojmenovic et al. [42], [47], discussed the application of fog computing to real scenarios, such as smart grid, vehicular networks, Cyber-Physical Systems (CPS)....

    [...]

Journal ArticleDOI
TL;DR: This survey conducts this survey to bring more attention to this critical intersection between cyber physical systems and big data and highlight the future research direction to achieve the fully autonomy in Industry 4.0.
Abstract: With the technology development in cyber physical systems and big data, there are huge potential to apply them to achieve personalization and improve resource efficiency in Industry 4.0. As Industr...

398 citations


Cites background from "Design Techniques and Applications ..."

  • ...…to ensure security, resiliency, and reliability Besides the common research questions on system infrastructures to be able to collect and store big data, there are some unique requirements for CPS systems related to its security, resiliency, and reliability issues (Khaitan and McCalley 2015)....

    [...]

  • ...Among them, Lee (2008), Khaitan and McCalley (2015), Lee (2015), Lee et al. (2015a), Lee, Bagheri, and Kao (2015b) are related to cyber physical systems in industry 4.0, and Lee et al. (2013), Lee, Kao, and Yang (2014), Lee et al. (2015a), and Yin and Kaynak (2015) are related to big data in…...

    [...]

Journal ArticleDOI
TL;DR: In this article, the authors highlight the functionality and data models necessary for real-time geometry assurance and how this concept allows moving from mass production to more individualized production, a concept referred to as a Digital Twin.
Abstract: Simulations of products and production processes are extensively used in the engineering phase. To secure good geometrical quality in the final product, tolerances, locator positions, clamping strategies, welding sequence, etc. are optimized during design and pre-production. Faster optimization algorithms, increased computer power and amount of available data, can leverage the area of simulation toward real-time control and optimization of products and production systems - a concept often referred to as a Digital Twin. This paper specifies and highlights functionality and data models necessary for real-time geometry assurance and how this concept allows moving from mass production to more individualized production.

389 citations

BookDOI
24 Jun 2016
TL;DR: In this article, a comprehensive overview of the current state of 5G is presented, covering the most likely use cases, spectrum aspects, and a wide range of technology options to potential 5G system architectures.
Abstract: Written by leading experts in 5G research, this book is a comprehensive overview of the current state of 5G. Covering everything from the most likely use cases, spectrum aspects, and a wide range of technology options to potential 5G system architectures, it is an indispensable reference for academics and professionals involved in wireless and mobile communications. Global research efforts are summarised, and key component technologies including D2D, mm-wave communications, massive MIMO, coordinated multi-point, wireless network coding, interference management and spectrum issues are described and explained. The significance of 5G for the automotive, building, energy, and manufacturing economic sectors is addressed, as is the relationship between IoT, machine type communications, and cyber-physical systems. This essential resource equips you with a solid insight into the nature, impact and opportunities of 5G.

317 citations

References
More filters
Proceedings ArticleDOI
05 May 2008
TL;DR: It is concluded that it will not be sufficient to improve design processes, raise the level of abstraction, or verify designs that are built on today's abstractions to realize the full potential of cyber-Physical Systems.
Abstract: Cyber-Physical Systems (CPS) are integrations of computation and physical processes. Embedded computers and networks monitor and control the physical processes, usually with feedback loops where physical processes affect computations and vice versa. The economic and societal potential of such systems is vastly greater than what has been realized, and major investments are being made worldwide to develop the technology. There are considerable challenges, particularly because the physical components of such systems introduce safety and reliability requirements qualitatively different from those in general- purpose computing. Moreover, physical components are qualitatively different from object-oriented software components. Standard abstractions based on method calls and threads do not work. This paper examines the challenges in designing such systems, and in particular raises the question of whether today's computing and networking technologies provide an adequate foundation for CPS. It concludes that it will not be sufficient to improve design processes, raise the level of abstraction, or verify (formally or otherwise) designs that are built on today's abstractions. To realize the full potential of CPS, we will have to rebuild computing and networking abstractions. These abstractions will have to embrace physical dynamics and computation in a unified way.

3,309 citations


"Design Techniques and Applications ..." refers background in this paper

  • ...mechanisms for interaction with sensor and actuator hardware are not fully represented by existing programming languages [266]....

    [...]

Proceedings ArticleDOI
05 Nov 2008
TL;DR: The CenceMe application is presented, which represents the first system that combines the inference of the presence of individuals using off-the-shelf, sensor-enabled mobile phones with sharing of this information through social networking applications such as Facebook and MySpace.
Abstract: We present the design, implementation, evaluation, and user ex periences of theCenceMe application, which represents the first system that combines the inference of the presence of individuals using off-the-shelf, sensor-enabled mobile phones with sharing of this information through social networking applications such as Facebook and MySpace. We discuss the system challenges for the development of software on the Nokia N95 mobile phone. We present the design and tradeoffs of split-level classification, whereby personal sensing presence (e.g., walking, in conversation, at the gym) is derived from classifiers which execute in part on the phones and in part on the backend servers to achieve scalable inference. We report performance measurements that characterize the computational requirements of the software and the energy consumption of the CenceMe phone client. We validate the system through a user study where twenty two people, including undergraduates, graduates and faculty, used CenceMe continuously over a three week period in a campus town. From this user study we learn how the system performs in a production environment and what uses people find for a personal sensing system.

1,184 citations


Additional excerpts

  • ...[197] discussed the design and implementation...

    [...]

Journal ArticleDOI
01 Jan 2012
TL;DR: The significance of cyber infrastructure security in conjunction with power application security to prevent, mitigate, and tolerate cyber attacks is highlighted and a layered approach is introduced to evaluating risk based on the security of both the physical power applications and the supporting cyber infrastructure.
Abstract: The development of a trustworthy smart grid requires a deeper understanding of potential impacts resulting from successful cyber attacks. Estimating feasible attack impact requires an evaluation of the grid's dependency on its cyber infrastructure and its ability to tolerate potential failures. A further exploration of the cyber-physical relationships within the smart grid and a specific review of possible attack vectors is necessary to determine the adequacy of cybersecurity efforts. This paper highlights the significance of cyber infrastructure security in conjunction with power application security to prevent, mitigate, and tolerate cyber attacks. A layered approach is introduced to evaluating risk based on the security of both the physical power applications and the supporting cyber infrastructure. A classification is presented to highlight dependencies between the cyber-physical controls required to support the smart grid and the communication and computations that must be protected from cyber attack. The paper then presents current research efforts aimed at enhancing the smart grid's application and infrastructure security. Finally, current challenges are identified to facilitate future research efforts.

1,012 citations


"Design Techniques and Applications ..." refers background in this paper

  • ...Power system application-level cyber security has been discussed in [235]....

    [...]

Journal ArticleDOI
01 May 1995
TL;DR: Dataflow process networks are shown to be a special case of Kahn process networks, a model of computation where a number of concurrent processes communicate through unidirectional FIFO channels, where writes to the channel are nonblocking, and reads are blocking.
Abstract: We review a model of computation used in industrial practice in signal processing software environments and experimentally and other contexts. We give this model the name "dataflow process networks," and study its formal properties as well as its utility as a basis for programming language design. Variants of this model are used in commercial visual programming systems such as SPW from the Alta Group of Cadence (formerly Comdisco Systems), COSSAP from Synopsys (formerly Cadis), the DSP Station from Mentor Graphics, and Hypersignal from Hyperception. They are also used in research software such as Khoros from the University of New Mexico and Ptolemy from the University of California at Berkeley, among many others. Dataflow process networks are shown to be a special case of Kahn process networks, a model of computation where a number of concurrent processes communicate through unidirectional FIFO channels, where writes to the channel are nonblocking, and reads are blocking. In dataflow process networks, each process consists of repeated "firings" of a dataflow "actor." An actor defines a (often functional) quantum of computation. By dividing processes into actor firings, the considerable overhead of context switching incurred in most implementations of Kahn process networks is avoided. We relate dataflow process networks to other dataflow models, including those used in dataflow machines, such as static dataflow and the tagged-token model. We also relate dataflow process networks to functional languages such as Haskell, and show that modern language concepts such as higher-order functions and polymorphism can be used effectively in dataflow process networks. A number of programming examples using a visual syntax are given. >

976 citations

Journal ArticleDOI
01 Jan 2012
TL;DR: It is argued that the “smart” grid, replacing its incredibly successful and reliable predecessor, poses a series of new security challenges, among others, that require novel approaches to the field of cyber security.
Abstract: It is often appealing to assume that existing solutions can be directly applied to emerging engineering domains. Unfortunately, careful investigation of the unique challenges presented by new domains exposes its idiosyncrasies, thus often requiring new approaches and solutions. In this paper, we argue that the “smart” grid, replacing its incredibly successful and reliable predecessor, poses a series of new security challenges, among others, that require novel approaches to the field of cyber security. We will call this new field cyber-physical security. The tight coupling between information and communication technologies and physical systems introduces new security concerns, requiring a rethinking of the commonly used objectives and methods. Existing security approaches are either inapplicable, not viable, insufficiently scalable, incompatible, or simply inadequate to address the challenges posed by highly complex environments such as the smart grid. A concerted effort by the entire industry, the research community, and the policy makers is required to achieve the vision of a secure smart grid infrastructure.

933 citations