With the evolution of the Internet of things and smart cities, a new trend of the Internet of simulation has emerged to utilise the technologies of cloud, edge, fog computing, and high-performance ...computing for design and analysis of complex cyber-physical systems using simulation. These technologies although being applied to the domains of big data and deep learning are not adequate to cope with the scale and complexity of emerging connected, smart, and autonomous systems. This study explores the existing state-of-the-art in automating, augmenting, and integrating systems across the domains of smart cities, autonomous vehicles, energy efficiency, smart manufacturing in Industry 4.0, and healthcare. This is expanded to look at existing computational infrastructure and how it can be used to support these applications. A detailed review is presented of advances in approaches providing and supporting intelligence as a service. Finally, some of the remaining challenges due to the explosion of data streams; issues of safety and security; and others related to big data, a model of reality, augmentation of systems, and computation are examined.
Future industrial systems can be realized using the cyber-physical systems (CPSs) that advocate the coexistence of cyber and physical counterparts in a network structure to perform the system's ...functions in a collaborative manner. Multiagent systems share common ground with CPSs and can empower them with a multitude of capabilities in their efforts to achieve complexity management, decentralization, intelligence, modularity, flexibility, robustness, adaptation, and responsiveness. This work surveys and analyzes the current state of the industrial application of agent technology in CPSs, and provides a vision on the way agents can effectively enable emerging CPS challenges.
With the development of communication and control technology, intelligent transportation systems (ITS) have received increasing attention from both industry and academia. However, plenty of studies ...providing different formulations for ITS depend on Master Control Center and require a high level of hardware configuration. The systematized technologies for distributed architectures are still not explored in detail. In this paper, we proposed a novel distributed cyber-physical system for connected and automated vehicles, and related methodologies are illustrated. Every vehicle in this system is modeled as a double-integrator and supposed to travel along a desired trajectory for maintaining a rigid formation geometry. The desired trajectory is generated by reference leading vehicles using information from multiple sources, while ordinary following vehicles use velocity and position information from their nearest neighbors and sensor information from on-board sensors to correct their own performance. Information graphs are used to illustrate the interaction topology between connected and automated vehicles. Edge computing technology is used to analyze and process information, such that the risk of privacy leaks can be greatly reduced. The performance scaling laws for the network with a one-dimensional information graph are generalized to networks with D -dimensional information graphs, and the results of the experiments show that the performance of the connected and automated vehicles matches very well with analytic predictions. Some design guidelines and open questions are provided for the future study.
Cyber-attacks cyber-physical systems (CPSs) can lead to sensing and actuation misbehavior, severe damages to physical objects, and safety risks. Machine learning algorithms have been proposed for ...hindering cyber-attacks on CPSs, but the absence of labeled data from novel attacks makes their detection quite challenging. In this context, generative adversarial networks (GANs) are a promising unsupervised approach to detect cyber-attacks by implicitly modeling the system. However, the detection of cyber-attacks on CPSs has strict latency requirements, since the attacks need to be stopped before the system is compromised. In this article, we propose FID-GAN, a novel fog-based, unsupervised intrusion detection system (IDS) for CPSs using GANs. The IDS is proposed for a fog architecture, which brings computation resources closer to the end nodes and thus contributes to meeting low-latency requirements. In order to achieve higher detection rates, the proposed architecture computes a reconstruction loss based on the reconstruction of data samples mapped to the latent space. Other works that follow a similar approach struggle with the time required to compute the reconstruction loss, which renders them impractical for latency constrained applications. We address this problem by training an encoder that accelerates the reconstruction loss computation. Experiments show that the proposed solution achieves higher detection rates and is at least 5.5 times faster than a baseline approach in the three studied data sets.
Cyber Physical Systems (CPS) are characterized by their ability to integrate the physical and information or cyber worlds. Their deployment in critical infrastructure have demonstrated a potential to ...transform the world. However, harnessing this potential is limited by their critical nature and the far reaching effects of cyber attacks on human, infrastructure and the environment. An attraction for cyber concerns in CPS rises from the process of sending information from sensors to actuators over the wireless communication medium, thereby widening the attack surface. Traditionally, CPS security has been investigated from the perspective of preventing intruders from gaining access to the system using cryptography and other access control techniques. Most research work have therefore focused on the detection of attacks in CPS. However, in a world of increasing adversaries, it is becoming more difficult to totally prevent CPS from adversarial attacks, hence the need to focus on making CPS resilient. Resilient CPS are designed to withstand disruptions and remain functional despite the operation of adversaries. One of the dominant methodologies explored for building resilient CPS is dependent on machine learning (ML) algorithms. However, rising from recent research in adversarial ML, we posit that ML algorithms for securing CPS must themselves be resilient. This article is therefore aimed at comprehensively surveying the interactions between resilient CPS using ML and resilient ML when applied in CPS. The paper concludes with a number of research trends and promising future research directions. Furthermore, with this article, readers can have a thorough understanding of recent advances on ML-based security and securing ML for CPS and countermeasures, as well as research trends in this active research area.
In this paper we comprehensively survey the concept and strategies for building a resilient and integrated cyber–physical system (CPS). Here resilience refers to a 3S-oriented design, that is, ...stability, security, and systematicness: Stability means the CPS can achieve a stable sensing-actuation close-loop control even though the inputs (sensing data) have noise or attacks; Security means that the system can overcome the cyber–physical interaction attacks; and Systematicness means that the system has a seamless integration of sensors and actuators. We will also explain the CPS modeling issues since they serve as the basics of 3S design. We will use two detailed examples from our achieved projects to explain how to achieve arobust, systematic CPS design: Case study 1 is on the design of a rehabilitation system with cyber (sensors) and physical (robots) integration. Case Study 2 is on the implantable medical device design. It illustrates the nature of CPS security principle. The dominant feature of this survey is that it has both principle discussions and practical cyber–physical coupling design.
•Comprehensive survey on entire CPS design process.•Qualitative and quantitative descriptions on CPS resilience.•From basic concepts to case studies.•Point out the future research trends.
This article investigates the problem of attack detection of false data injection attacks for a class of large-scale smart grid systems in the context of cyber-physical systems. First, by exploiting ...the graph theory to decompose the considered system into multiple interconnected subsystems, a bank of dynamic reduced-order observers are delicately constructed to generate residual signals for the attack detection task. Then, a novel decentralized attack detection scheme is proposed based on the adaptive detection thresholds with prescribed performance. Compared with the existing results, the proposed detection scheme has less conservative thresholds and enhanced robustness against process disturbance and measurement noise, such that the detectability is improved. Finally, the effectiveness and availability of the proposed scheme are verified by two simulation examples and the experimental results from IEEE 30-bus system built in the OPAL-RT real-time simulator.
In this article, a broad overview of the current research trends in power-electronic innovations in cyber-physical systems (CPSs) is presented. The recent advances in semiconductor device ...technologies, control architectures, and communication methodologies have enabled researchers to develop integrated smart CPSs that can cater to the emerging requirements of smart grids, renewable energy, electric vehicles, trains, ships, the Internet of Things (IoT), and so on. The topics presented in this article include novel power-distribution architectures, protection techniques considering large renewable integration in smart grids, wireless charging in electric vehicles, simultaneous power and information transmission, multihop network-based coordination, power technologies for renewable energy and smart transformer, CPS reliability, transactive smart railway grid, and real-time simulation of shipboard power systems. It is anticipated that the research trends presented in this article will provide a timely and useful overview to the power-electronics researchers with broad applications in CPSs.
This technical note studies the impact of side initial state information on the detectability of data deception attacks against cyber-physical systems. We assume the attack detector has access to a ...linear function of the initial system state that cannot be altered by an attacker. First, we provide a necessary and sufficient condition for an attack to be undetectable by any dynamic attack detector under each specific side information pattern. Second, we characterize attacks that can be sustained for arbitrarily long periods without being detected. Third, we define the zero state inducing attack, the only type of attack that remains dynamically undetectable regardless of the side initial state information available to the attack detector. Finally, we design a dynamic attack detector that detects detectable attacks.
In this paper, we provide a decentralized theoretical framework for coordination of connected and automated vehicles (CAVs) at different traffic scenarios. The framework includes: (1) an upper-level ...optimization that yields for each CAV its optimal time trajectory and lane to pass through a given traffic scenario while alleviating congestion; and (2) a low-level optimization that yields for each CAV its optimal control input (acceleration/deceleration). We provide a complete, analytical solution of the low-level optimization problem that includes the rear-end, speed-dependent safety constraint. Furthermore, we provide a problem formulation for the upper-level optimization in which there is no duality gap. The latter implies that the optimal time trajectory for each CAV does not activate any of the state, control, and safety constraints of the low-level optimization, thus allowing for online implementation. Finally, we present a geometric duality framework with hyperplanes to derive the condition under which the optimal solution of the upper-level optimization always exists. We validate the effectiveness of the proposed theoretical framework through simulation.