scispace - formally typeset
Search or ask a question

Showing papers on "Cyber-physical system published in 2017"


Journal ArticleDOI
TL;DR: The paper aims at analyzing the definitions of the DT concept in scientific literature, retracing it from the initial conceptualization in the aerospace field, to the most recent interpretations in the manufacturing domain and more specifically in Industry 4.0 and smart manufacturing research.

908 citations


Journal ArticleDOI
TL;DR: The results of this study show that the technologies of cloud and big data can be used to enhance the performance of the healthcare system so that humans can then enjoy various smart healthcare applications and services.
Abstract: The advances in information technology have witnessed great progress on healthcare technologies in various domains nowadays. However, these new technologies have also made healthcare data not only much bigger but also much more difficult to handle and process. Moreover, because the data are created from a variety of devices within a short time span, the characteristics of these data are that they are stored in different formats and created quickly, which can, to a large extent, be regarded as a big data problem. To provide a more convenient service and environment of healthcare, this paper proposes a cyber-physical system for patient-centric healthcare applications and services, called Health-CPS, built on cloud and big data analytics technologies. This system consists of a data collection layer with a unified standard, a data management layer for distributed storage and parallel computing, and a data-oriented service layer. The results of this study show that the technologies of cloud and big data can be used to enhance the performance of the healthcare system so that humans can then enjoy various smart healthcare applications and services.

682 citations


Journal ArticleDOI
TL;DR: In this paper, the authors study and systematize existing research on CPS security under a unified framework, which consists of three orthogonal coordinates: 1) from the security perspective, they follow the well-known taxonomy of threats, vulnerabilities, attacks and controls; 2) from CPS components, they focus on cyber, physical, and cyber-physical components.
Abstract: With the exponential growth of cyber-physical systems (CPSs), new security challenges have emerged. Various vulnerabilities, threats, attacks, and controls have been introduced for the new generation of CPS. However, there lacks a systematic review of the CPS security literature. In particular, the heterogeneity of CPS components and the diversity of CPS systems have made it difficult to study the problem with one generalized model. In this paper, we study and systematize existing research on CPS security under a unified framework. The framework consists of three orthogonal coordinates: 1) from the security perspective, we follow the well-known taxonomy of threats, vulnerabilities, attacks and controls; 2) from the CPS components perspective, we focus on cyber, physical, and cyber-physical components; and 3) from the CPS systems perspective, we explore general CPS features as well as representative systems (e.g., smart grids, medical CPS, and smart cars). The model can be both abstract to show general interactions of components in a CPS application, and specific to capture any details when needed. By doing so, we aim to build a model that is abstract enough to be applicable to various heterogeneous CPS applications; and to gain a modular view of the tightly coupled CPS components. Such abstract decoupling makes it possible to gain a systematic understanding of CPS security, and to highlight the potential sources of attacks and ways of protection. With this intensive literature review, we attempt to summarize the state-of-the-art on CPS security, provide researchers with a comprehensive list of references, and also encourage the audience to further explore this emerging field.

658 citations


Journal ArticleDOI
TL;DR: A concept for the composition of a database is presented and guidelines for the implementation of the Digital Twin in production systems in small and medium-sized enterprises are proposed.

641 citations


Journal ArticleDOI
TL;DR: This paper presents a digital twin architecture reference model for the cloud-based CPS, C2PS, where the model helps in identifying various degrees of basic and hybrid computation-interaction modes in this paradigm.
Abstract: Cyber-physical system (CPS) is a new trend in the Internet-of-Things related research works, where physical systems act as the sensors to collect real-world information and communicate them to the computation modules (i.e. cyber layer), which further analyze and notify the findings to the corresponding physical systems through a feedback loop. Contemporary researchers recommend integrating cloud technologies in the CPS cyber layer to ensure the scalability of storage, computation, and cross domain communication capabilities. Though there exist a few descriptive models of the cloud-based CPS architecture, it is important to analytically describe the key CPS properties: computation, control, and communication. In this paper, we present a digital twin architecture reference model for the cloud-based CPS, C2PS, where we analytically describe the key properties of the C2PS. The model helps in identifying various degrees of basic and hybrid computation-interaction modes in this paradigm. We have designed C2PS smart interaction controller using a Bayesian belief network, so that the system dynamically considers current contexts. The composition of fuzzy rule base with the Bayes network further enables the system with reconfiguration capability. We also describe analytically, how C2PS subsystem communications can generate even more complex system-of-systems. Later, we present a telematics-based prototype driving assistance application for the vehicular domain of C2PS, VCPS, to demonstrate the efficacy of the architecture reference model.

409 citations


Journal ArticleDOI
TL;DR: This survey provides a four step taxonomy based on smart grid domains, research goals, test platforms, and communication infrastructure to provide a taxonomy and insightful guidelines for the development as well as to identify the key features and design decisions while developing future smart grid testbeds.
Abstract: An increasing interest is emerging on the development of smart grid cyber-physical system testbeds. As new communication and information technologies emerge, innovative cyber-physical system testbeds need to leverage realistic and scalable platforms. Indeed, the interdisciplinary structure of the smart grid concept compels heterogeneous testbeds with different capabilities. There is a significant need to evaluate new concepts and vulnerabilities as opposed to counting on solely simulation studies especially using hardware-in-the-loop test platforms. In this paper, we present a comprehensive survey on cyber-physical smart grid testbeds aiming to provide a taxonomy and insightful guidelines for the development as well as to identify the key features and design decisions while developing future smart grid testbeds. First, this survey provides a four step taxonomy based on smart grid domains, research goals, test platforms, and communication infrastructure. Then, we introduce an overview with a detailed discussion and an evaluation on existing testbeds from the literature. Finally, we conclude this paper with a look on future trends and developments in cyber-physical smart grid testbed research.

322 citations


Journal ArticleDOI
TL;DR: Fog computation and MCPS are integrated to build fog computing supported MCPS (FC-MCPS), and an LP-based two-phase heuristic algorithm is proposed that produces near optimal solution and significantly outperforms a greedy algorithm.
Abstract: With the recent development in information and communication technology, more and more smart devices penetrate into people’s daily life to promote the life quality. As a growing healthcare trend, medical cyber-physical systems (MCPSs) enable seamless and intelligent interaction between the computational elements and the medical devices. To support MCPSs, cloud resources are usually explored to process the sensing data from medical devices. However, the high quality-of-service of MCPS challenges the unstable and long-delay links between cloud data center and medical devices. To combat this issue, mobile edge cloud computing, or fog computing, which pushes the computation resources onto the network edge (e.g., cellular base stations), emerges as a promising solution. We are thus motivated to integrate fog computation and MCPS to build fog computing supported MCPS (FC-MCPS). In particular, we jointly investigate base station association, task distribution, and virtual machine placement toward cost-efficient FC-MCPS. We first formulate the problem into a mixed-integer non-linear linear program and then linearize it into a mixed integer linear programming (LP). To address the computation complexity, we further propose an LP-based two-phase heuristic algorithm. Extensive experiment results validate the high-cost efficiency of our algorithm by the fact that it produces near optimal solution and significantly outperforms a greedy algorithm.

309 citations


Journal ArticleDOI
Yang Liu1, Yu Peng1, Bailing Wang1, Sirui Yao1, Zihe Liu1 
TL;DR: The concept and characteristics of CPS are introduced and the present situation of CPS researches are analyzed; the development of CPS is discussed from perspectives of system model, information processing technology and software design.
Abstract: Cyber-physical systems U+0028 CPS U+0029 are complex systems with organic integration and in-depth collaboration of computation, communications and control U+0028 3C U+0029 technology. Subject to the theory and technology of existing network systems and physical systems, the development of CPS is facing enormous challenges. This paper first introduces the concept and characteristics of CPS and analyzes the present situation of CPS researches. Then the development of CPS is discussed from perspectives of system model, information processing technology and software design. At last it analyzes the main obstacles and key researches in developing CPS.

305 citations


Journal ArticleDOI
TL;DR: A learning factory based concept to demonstrate the potentials and advantages of real time data acquisition and subsequent simulation based data processing and an existing learning factory will be upgraded regarding both, multi-modal data acquisition technologies as well as a locally independent optimization environment.

299 citations


Journal ArticleDOI
TL;DR: An analysis of the security issues at the various layers of CPS architecture, risk assessment and techniques for securing CPS is presented and possible solutions are presented.

291 citations


Journal ArticleDOI
TL;DR: An adaptive controller is developed that guarantees uniform ultimate boundedness of the closed-loop dynamical system in the face of adversarial sensor and actuator attacks that are time-varying and partial asymptotic stability when the sensors and actuators attacks areTime-invariant.
Abstract: Recent technological advances in communications and computation have spurred a broad interest in control law architectures involving the monitoring, coordination, integration, and operation of sensing, computing, and communication components that tightly interact with the physical processes that they control. These systems are known as cyber-physical systems and due to their use of open computation and communication platform architectures, controlled cyber-physical systems are vulnerable to adversarial attacks. In this technical note, we propose a novel adaptive control architecture for addressing security and safety in cyber-physical systems. Specifically, we develop an adaptive controller that guarantees uniform ultimate boundedness of the closed-loop dynamical system in the face of adversarial sensor and actuator attacks that are time-varying and partial asymptotic stability when the sensor and actuator attacks are time-invariant. Finally, we provide a numerical example to illustrate the efficacy of the proposed adaptive control architecture.

Journal ArticleDOI
TL;DR: In this paper, the authors introduce the concept of an Industry 4.0 impact matrix on lean production systems and give a useable framework to support the development process of a cyber-physical Just-in-Time delivery.

Journal ArticleDOI
TL;DR: The authors have provided a classification in CPS Domains, Attacks, Defenses, Research-trends, Network-security, Security level implementation, and Computational Strategies which makes this survey a unique and I believe very helpful article.
Abstract: The following is a survey on surveys and may help the interested reader to find a way through the jungle of literature on the security and CPS topics out there already In order to ease the search, the authors have provided a classification in CPS Domains, Attacks, Defenses, Research-trends, Network-security, Security level implementation, and Computational Strategies which makes this survey a unique and I believe very helpful article —Jorg Henkel, Karlsruhe Institute of Technology

Journal ArticleDOI
TL;DR: A tensor-based cloud-edge computing framework that mainly includes the cloud and edge planes is presented that is used to process large-scale, long-term, global data, which can be used to obtain decision making information such as the feature, law, or rule sets.
Abstract: Cyber-physical-social systems (CPSSs) represent an emerging paradigm encompassing the cyber world, physical world and social world. One of the main purposes of CPSSs is to provide high-quality, proactive, and personalized services for humans. For CPSSs to realize this purpose, a novel services framework is needed. In this article, we present a tensor-based cloud-edge computing framework that mainly includes the cloud and edge planes. The cloud plane is used to process large-scale, long-term, global data, which can be used to obtain decision making information such as the feature, law, or rule sets. The edge plane is used to process small-scale, short-term, local data, which is used to present the real-time situation. Also, personalized services will be directly provided for humans by the edge plane according to the obtained feature, law, or rule sets and the local high-quality data obtained in the edge plane. Then a tensor-based services model is proposed to match the requirement of users in the local CPSS. Finally, a case study about CPSS services is proposed to demonstrate the application features of the proposed framework.

Journal ArticleDOI
TL;DR: This paper proposes a cloud-supported cyber–physical localization system for patient monitoring using smartphones to acquire voice and electroencephalogram signals in a scalable, real-time, and efficient manner and uses Gaussian mixture modeling for localization to outperform other similar methods in terms of error estimation.
Abstract: The potential of cloud-supported cyber–physical systems (CCPSs) has drawn a great deal of interest from academia and industry. CCPSs facilitate the seamless integration of devices in the physical world (e.g., sensors, cameras, microphones, speakers, and GPS devices) with cyberspace. This enables a range of emerging applications or systems such as patient or health monitoring, which require patient locations to be tracked. These systems integrate a large number of physical devices such as sensors with localization technologies (e.g., GPS and wireless local area networks) to generate, sense, analyze, and share huge quantities of medical and user-location data for complex processing. However, there are a number of challenges regarding these systems in terms of the positioning of patients, ubiquitous access, large-scale computation, and communication. Hence, there is a need for an infrastructure or system that can provide scalability and ubiquity in terms of huge real-time data processing and communications in the cyber or cloud space. To this end, this paper proposes a cloud-supported cyber–physical localization system for patient monitoring using smartphones to acquire voice and electroencephalogram signals in a scalable, real-time, and efficient manner. The proposed approach uses Gaussian mixture modeling for localization and is shown to outperform other similar methods in terms of error estimation.

Journal ArticleDOI
01 Feb 2017
TL;DR: In this article, the authors address the problem of secure control of networked cyber-physical systems by injecting private excitation into the system, which will reveal malicious tampering with signals.
Abstract: The coming decades may see the large scale deployment of networked cyber–physical systems to address global needs in areas such as energy, water, health care, and transportation. However, as recent events have shown, such systems are vulnerable to cyber attacks. Being safety critical, their disruption or misbehavior can cause economic losses or injuries and loss of life. It is therefore important to secure such networked cyber–physical systems against attacks. In the absence of credible security guarantees, there will be resistance to the proliferation of cyber–physical systems, which are much needed to meet global needs in critical infrastructures and services. This paper addresses the problem of secure control of networked cyber–physical systems. This problem is different from the problem of securing the communication network, since cyber–physical systems at their very essence need sensors and actuators that interface with the physical plant, and malicious agents may tamper with sensors or actuators, as recent attacks have shown. We consider physical plants that are being controlled by multiple actuators and sensors communicating over a network, where some sensors could be “malicious,” meaning that they may not report the measurements that they observe. We address a general technique by which the actuators can detect the actions of malicious sensors in the system and disable closed-loop control based on their information. This technique, called “watermarking,” employs the technique of actuators injecting private excitation into the system, which will reveal malicious tampering with signals. We show how such an active defense can be used to secure networked systems of sensors and actuators.

Journal ArticleDOI
TL;DR: This research provides a feasible method for designing an autonomous factory with exception-handling capabilities and has the adequate flexibility and robustness to configure resources and to deal with disturbances effectively.
Abstract: The increasing demand of customized production results in huge challenges to the traditional manufacturing systems. In order to allocate resources timely according to the production requirements and to reduce disturbances, a framework for the future intelligent shopfloor is proposed in this paper. The framework consists of three primary models, namely the model of smart machine agent, the self-organizing model, and the self-adaptive model. A cyber-physical system for manufacturing shopfloor based on the multiagent technology is developed to realize the above-mentioned function models. Gray relational analysis and the hierarchy conflict resolution methods were applied to achieve the self-organizing and self-adaptive capabilities, thereby improving the reconfigurability and responsiveness of the shopfloor. A prototype system is developed, which has the adequate flexibility and robustness to configure resources and to deal with disturbances effectively. This research provides a feasible method for designing an autonomous factory with exception-handling capabilities.

Journal ArticleDOI
TL;DR: In this article, a sensor data integration and information fusion is used to build "digital-twins" virtual machine tools for cyber-physical manufacturing, which can better reflect the actual status of its physical counterpart in its various applications.

Journal ArticleDOI
01 Sep 2017
TL;DR: Machine learning algorithms increasingly influence our decisions and interact with us in all parts of our daily lives as discussed by the authors, and therefore, just as we consider the safety of power plants, highways, and...
Abstract: Machine learning algorithms increasingly influence our decisions and interact with us in all parts of our daily lives. Therefore, just as we consider the safety of power plants, highways, ...

Journal ArticleDOI
TL;DR: The survey explores the relationship between research into mixed criticality systems and other topics such as hard and soft time constraints, fault tolerant scheduling, hierarchical scheduling, cyber physical systems, probabilistic real-time systems, and industrial safety standards.
Abstract: This survey covers research into mixed criticality systems that has been published since Vestal’s seminal paper in 2007, up until the end of 2016. The survey is organised along the lines of the major research areas within this topic. These include single processor analysis (including fixed priority and Earliest Deadline First (EDF) scheduling, shared resources, and static and synchronous scheduling), multiprocessor analysis, realistic models, and systems issues. The survey also explores the relationship between research into mixed criticality systems and other topics such as hard and soft time constraints, fault tolerant scheduling, hierarchical scheduling, cyber physical systems, probabilistic real-time systems, and industrial safety standards.

Journal ArticleDOI
TL;DR: In this article, the authors describe the rationales and needs for integrated and intelligent manufacturing (i2M) systems and discuss key technological enablers, such as the Internet of Things and Services (IoTS), cyber-physical systems (CPSs), and cloud computing are discussed.

Journal ArticleDOI
TL;DR: In this article, a review of human-robot collaboration research and its classification works is presented focusing on assembly tasks, and a case study is presented to validate the proposed framework.
Abstract: The production industry is moving towards the next generation of assembly, which is conducted based on safe and reliable robots working in the same workplace alongside with humans. Focusing on assembly tasks, this paper presents a review of human-robot collaboration research and its classification works. Aside from defining key terms and relations, the paper also proposes means of describing human-robot collaboration that can be relied on during detailed elaboration of solutions. A human-robot collaborative assembly system is developed with a novel and comprehensive structure, and a case study is presented to validate the proposed framework. © 2017.

Journal ArticleDOI
31 May 2017
TL;DR: An end-to-end attack-resilient cyber–physical security framework for WAMPAC applications encompassing the entire security life cycle including risk assessment, attack prevention, attack detection, attack mitigation, and attack resilience is described.
Abstract: Cybersecurity and resiliency of wide-area monitoring, protection, and control (WAMPAC) applications is critically important to ensure secure, reliable, and economical operation of the bulk power system WAMPAC relies heavily on the security of measurements and control commands transmitted over wide-area communication networks for real-time operational, protection, and control functions The current “N–1” security criterion for grid operation is inadequate to address malicious cyber events; therefore, it is important to fundamentally redesign WAMPAC and to enhance energy management system applications to make them attack resilient In this paper, we present three key contributions to enhance the cybersecurity and resiliency of WAMPAC First, we describe an end-to-end attack-resilient cyber–physical security framework for WAMPAC applications encompassing the entire security life cycle including risk assessment, attack prevention, attack detection, attack mitigation, and attack resilience Second, we describe a defense-in-depth architecture that incorporates attack resilience at both the infrastructure layer and the application layer by leveraging domain-specific security approaches at the WAMPAC application layer in addition to traditional cybersecurity measures at the information technology infrastructure layer Third, we discuss several attack-resilient algorithms for WAMPAC that leverage measurement design and cyber–physical system model-based anomaly detection and mitigation along with illustrative case studies We believe that the research issues and solutions identified in this paper will open up several avenues for research in this area In particular, the proposed framework, architectural concepts, and attack-resilient algorithms would serve as essential building blocks to transform the “fault-resilient” grid of today into an “attack-resilient” grid of the future

Journal ArticleDOI
30 Nov 2017
TL;DR: The aim of this paper is to explore what CPS research topics are related to the emerging IT trends and to investigate how industries have implemented CPS technologies.
Abstract: Recently, there has been an explosive growth in the development and implementation of various Cyber-Physical Systems (CPS). Accordingly, CPS-related research and advancements in CPS technologies have increasingly been part of the emerging trends in IT areas such as Internet of Things (IoT), Big Data, cloud computing, and Industry 4.0. However, there are only a few research efforts that identify the comprehensive CPS research trends relevant to the emerging IT trends. Therefore, the aim of this paper is to explore what CPS research topics are related to the emerging IT trends and to investigate how industries have implemented CPS technologies.


Journal ArticleDOI
TL;DR: This paper investigates CCPAs in smart grid and shows that an adversary can carefully synthesize a false data injection attack vector based on phasor measurement unit (PMU) measurements to neutralize the impact of physical attack vector, such that CCPAs could circumvent bad data detection without being detected.
Abstract: Smart grid, as one of the most critical infrastructures, is vulnerable to a wide variety of cyber and/or physical attacks. Recently, a new category of threats to smart grid, named coordinated cyber-physical attacks (CCPAs), are emerging. A key feature of CCPAs is to leverage cyber attacks to mask physical attacks which can cause power outages and potentially trigger cascading failures. In this paper, we investigate CCPAs in smart grid and show that an adversary can carefully synthesize a false data injection attack vector based on phasor measurement unit (PMU) measurements to neutralize the impact of physical attack vector, such that CCPAs could circumvent bad data detection without being detected. Specifically, we present two potential CCPAs, namely replay and optimized CCPAs, respectively, and analyze the adversary’s required capability to construct them. Based on the analytical results, countermeasures are proposed to detect the two kinds of CCPAs, through known-secure PMU measurement verification (in the cyber space) and online tracking of the power system equivalent impedance (in the physical space), respectively. The implementation of CCPAs in smart grid and the effectiveness of countermeasures are demonstrated by using an illustrative 4-bus power system and the IEEE 9-bus, 14-bus, 30-bus, 118-bus, and 300-bus test power systems.

Journal ArticleDOI
TL;DR: Recommendations are presented for preventing and detecting cyber-physical attacks on AM processes after evaluating the ability of human subjects to detect and diagnose a cyber- physical attack on the STL file of a test specimen.

Journal ArticleDOI
TL;DR: A new architecture design approach for modularised design of CPPS is presented and new capabilities in designing with modular construction kits, simulating functional behaviour and validating with virtual, functional prototype are introduced.

Journal ArticleDOI
01 Jun 2017
TL;DR: STPA-SafeSec is presented, a novel analysis methodology for both safety and security that shows the dependencies between cybersecurity vulnerabilities and system safety and the most effective mitigation strategies can be readily identified.
Abstract: Cyber-physical systems tightly integrate physical processes and information and communication technologies. As today's critical infrastructures, e.g., the power grid or water distribution networks, are complex cyber-physical systems, ensuring their safety and security becomes of paramount importance. Traditional safety analysis methods, such as HAZOP, are ill-suited to assess these systems. Furthermore, cybersecurity vulnerabilities are often not considered critical, because their effects on the physical processes are not fully understood. In this work, we present STPA-SafeSec, a novel analysis methodology for both safety and security. Its results show the dependencies between cybersecurity vulnerabilities and system safety. Using this information, the most effective mitigation strategies to ensure safety and security of the system can be readily identified. We apply STPA-SafeSec to a use case in the power grid domain, and highlight its benefits.

Posted Content
TL;DR: This paper study and systematize existing research on CPS security under a unified framework, aiming to build a model that is abstract enough to be applicable to various heterogeneous CPS applications; and to gain a modular view of the tightly coupled CPS components.
Abstract: With the exponential growth of cyber-physical systems (CPS), new security challenges have emerged. Various vulnerabilities, threats, attacks, and controls have been introduced for the new generation of CPS. However, there lack a systematic study of CPS security issues. In particular, the heterogeneity of CPS components and the diversity of CPS systems have made it very difficult to study the problem with one generalized model. In this paper, we capture and systematize existing research on CPS security under a unified framework. The framework consists of three orthogonal coordinates: (1) from the \emph{security} perspective, we follow the well-known taxonomy of threats, vulnerabilities, attacks and controls; (2)from the \emph{CPS components} perspective, we focus on cyber, physical, and cyber-physical components; and (3) from the \emph{CPS systems} perspective, we explore general CPS features as well as representative systems (e.g., smart grids, medical CPS and smart cars). The model can be both abstract to show general interactions of a CPS application and specific to capture any details when needed. By doing so, we aim to build a model that is abstract enough to be applicable to various heterogeneous CPS applications; and to gain a modular view of the tightly coupled CPS components. Such abstract decoupling makes it possible to gain a systematic understanding of CPS security, and to highlight the potential sources of attacks and ways of protection.