scispace - formally typeset
Search or ask a question
Topic

Cyber-physical system

About: Cyber-physical system is a research topic. Over the lifetime, 11096 publications have been published within this topic receiving 162489 citations. The topic is also known as: CPS.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper proposes a cyber-physical codesign approach to structural health monitoring based on wireless sensor networks that closely integrates flexibility- based damage localization methods that allow a tradeoff between the number of sensors and the resolution of damage localization, and an energy-efficient, multilevel computing architecture specifically designed to leverage the multiresolution feature of the flexibility-based approach.
Abstract: Our deteriorating civil infrastructure faces the critical challenge of long-term structural health monitoring for damage detection and localization. In contrast to existing research that often separates the designs of wireless sensor networks and structural engineering algorithms, this paper proposes a cyber-physical codesign approach to structural health monitoring based on wireless sensor networks. Our approach closely integrates 1) flexibility-based damage localization methods that allow a tradeoff between the number of sensors and the resolution of damage localization, and 2) an energy-efficient, multilevel computing architecture specifically designed to leverage the multiresolution feature of the flexibility-based approach. The proposed approach has been implemented on the Intel Imote2 platform. Experiments on a simulated truss structure and a real full-scale truss structure demonstrate the system's efficacy in damage localization and energy efficiency.

189 citations

Journal ArticleDOI
01 Jun 2018
TL;DR: In this paper, the authors highlight the perspectives that shape the smart factory and suggest approaches and technical support to enable the realization of those perspectives, and suggest a framework to analyze existing research and investigate the elements and features of smart factory systems.
Abstract: With the development of Industry 4.0 and the emergence of the smart factory concept, the traditional philosophy of manufacturing systems will change. The smart factory introduces changes to the factors and elements of traditional manufacturing systems and incorporates the current requirements of smart systems so that it can compete in the future. An increasing amount of research in both academia and industry is dedicated to transitioning the concept of the smart factory from theory to practice. The purpose of the current research is to highlight the perspectives that shape the smart factory and to suggest approaches and technical support to enable the realization of those perspectives. This paper fills this gap by identifying and analyzing research on smart factories. We suggest a framework to analyze existing research and investigate the elements and features of smart factory systems.

187 citations

Journal ArticleDOI
TL;DR: A mathematical model is developed to determine when computation offloading is beneficial given parameters related to the operation of the network and the processing demands of the deep learning model, and the more reliable the network, the greater the reduction in detection latency achieved through offloading.
Abstract: Detection of cyber attacks against vehicles is of growing interest. As vehicles typically afford limited processing resources, proposed solutions are rule-based or lightweight machine learning techniques. We argue that this limitation can be lifted with computational offloading commonly used for resource-constrained mobile devices. The increased processing resources available in this manner allow access to more advanced techniques. Using as case study a small four-wheel robotic land vehicle, we demonstrate the practicality and benefits of offloading the continuous task of intrusion detection that is based on deep learning. This approach achieves high accuracy much more consistently than with standard machine learning techniques and is not limited to a single type of attack or the in-vehicle CAN bus as previous work. As input, it uses data captured in real-time that relate to both cyber and physical processes, which it feeds as time series data to a neural network architecture. We use both a deep multilayer perceptron and recurrent neural network architecture, with the latter benefitting from a long-short term memory hidden layer, which proves very useful for learning the temporal context of different attacks. We employ denial of service, command injection and malware as examples of cyber attacks that are meaningful for a robotic vehicle. The practicality of computation offloading depends on the resources afforded onboard and remotely, and the reliability of the communication means between them. Using detection latency as the criterion, we have developed a mathematical model to determine when computation offloading is beneficial given parameters related to the operation of the network and the processing demands of the deep learning model. The more reliable the network and the greater the processing demands, the greater the reduction in detection latency achieved through offloading.

186 citations

Journal ArticleDOI
TL;DR: In this article, the authors describe the rationales and needs for integrated and intelligent manufacturing (i2M) systems and discuss key technological enablers, such as the Internet of Things and Services (IoTS), cyber-physical systems (CPSs), and cloud computing are discussed.

185 citations

Journal ArticleDOI
TL;DR: The impact of three different possible cyber events on physical power grid have been analyzed using an integrated cyber-power modeling and simulation testbed and man-in-the-middle and denial-of-service attacks have been modeled as specific cases for the IEEE standard test cases.
Abstract: With ongoing smart grid activities, advancements in information and communication technology coupled with development of sensors are utilized for better situational awareness, decision support, and control of the power grid However, it is critical to understand the complex interdependencies between cyber and power domains, and also the potential impacts of cyber events on the power grid In this paper, the impact of three different possible cyber events on physical power grid have been analyzed using an integrated cyber-power modeling and simulation testbed Real-time modeling of end-to-end cyber-power systems have been developed with hardware-in-the-loop capabilities Real-time digital simulator, synchrophasor devices, DeterLab, and network simulator-3 are utilized in this developed testbed with a wide-area control algorithm and associated closed-loop control DeterLab can be used to model real-life cyber events in the developed cyber-physical testbed Man-in-the-middle and denial-of-service attacks have been modeled as specific cases for the IEEE standard test cases Additionally, communication failure impact on the power grid has been analyzed using the testbed

185 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
90% related
Network packet
159.7K papers, 2.2M citations
86% related
Control theory
299.6K papers, 3.1M citations
86% related
Wireless network
122.5K papers, 2.1M citations
85% related
Optimization problem
96.4K papers, 2.1M citations
85% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023831
20221,955
20211,283
20201,586
20191,576
20181,441