New software development patterns are emerging aiming at accelerating the process of delivering value. One is Continuous Experimentation, which allows to systematically deploy and run instrumented ...software variants during development phase in order to collect data from the field of application. While currently this practice is used on a daily basis on web-based systems, technical difficulties challenge its adoption in fields where computational resources are constrained, e.g., cyber–physical systems and the automotive industry.
This paper aims at providing an overview of the engagement on the Continuous Experimentation practice in the context of cyber–physical systems.
A systematic literature review has been conducted to investigate the link between the practice and the field of application. Additionally, an industrial multiple case study is reported.
The study presents the current state-of-the-art regarding Continuous Experimentation in the field of cyber–physical systems. The current perspective of Continuous Experimentation in industry is also reported.
The field has not reached maturity yet. More conceptual analyses are found than solution proposals and the state-of-practice is yet to be achieved. However it is expected that in time an increasing number of solutions will be proposed and validated.
•Continuous Experimentation on cyber–physical systems is desirable but challenged.•The state-of-the-art focuses more on the challenges than on solution proposals.•The majority of literature comprises conceptual studies and empirical investigations.•A solid state-of-practice has not been achieved yet.
Applications of Blockchain (BC) technology and Cyber-Physical Systems (CPS) are increasing exponentially. However, framing resilient and correct smart contracts (SCs) for these smart application is a ...quite challenging task because of the complexity associated with them. SC is modernizing the traditional industrial, technical, and business processes. It is self-executable, self-verifiable, and embedded into the BC that eliminates the need for trusted third-party systems, which ultimately saves administration as well as service costs. It also improves system efficiency and reduces the associated security risks. However, SCs are well encouraging the new technological reforms in Industry 4.0, but still, various security and privacy challenges need to be addressed. In this paper, a survey on SC security vulnerabilities in the software code that can be easily hacked by a malicious user or may compromise the entire BC network is presented. As per the literature, the challenges related to SC security and privacy are not explored much by the authors around the world. From the existing proposals, it has been observed that designing a complex SCs cannot mitigate its privacy and security issues. So, this paper investigates various Artificial Intelligence (AI) techniques and tools for SC privacy protection. Then, open issues and challenges for AI-based SC are analyzed. Finally, a case study of retail marketing is presented, which uses AI and SC to preserve its security and privacy.
Cyber-physical systems (CPSs), which are an integration of computation, networking, and physical processes, play an increasingly important role in critical infrastructure, government and everyday ...life. Due to physical constraints, embedded computers and networks may give rise to some additional security vulnerabilities, which results in losses of enormous economy benefits or disorder of social life. As a result, it is of significant to properly investigate the security issue of CPSs to ensure that such systems are operating in a safe manner. This paper, from a control theory perspective, presents an overview of recent advances on security control and attack detection of industrial CPSs. First, the typical system modeling on CPSs is summarized to cater for the requirement of the performance analysis. Then three typical types of cyber-attacks, i.e. denial-of-service attacks, replay attacks, and deception attacks, are disclosed from an engineering perspective. Moreover, robustness, security and resilience as well as stability are discussed to govern the capability of weakening various attacks. The development on attack detection for industrial CPSs is reviewed according to the categories on detection approaches. Furthermore, the security control and state estimation are discussed in detail. Finally, some challenge issues are raised for the future research.
•The most important habilitating technologies for Industry 4.0 and Smart Manufacturing are presented.•Trends are discussed.•Basic concepts are defined to contextualize further discussion.
Industry ...4.0 refers to the integration of a multiplicity of technologies and agents for the common goal of improving the efficiency and responsiveness of a production system. This integration has the potential to revolutionize the manner in which business are planned and conducted. Smart Manufacturing represents the implementation of Industry 4.0 on the manufacturing floor. The Internet of Things, Big Data, Cyber Physical Systems, Machine Learning, Additive Manufacturing, and Robotics are only some of the elements that are associated with this revolution. This article discusses trends in some of the habilitating technologies of Industry 4.0.
An active security control approach is developed in this article for cyber-physical systems (CPSs) under denial-of-service (DoS) attacks, where DoS attacks exist in both the sensor-to-controller ...(S-C) channel and the controller-to-actuator (C-A) channel. Due to the cost constraints of attacks, it is reasonable to consider that the number of maximum continuous DoS attacks in both the S-C and the C-A channels is bounded. Then, to defend the two-channel DoS attacks, an active security control strategy that makes full use of the unattacked intervals is designed to ensure that the control inputs are updated timely in each period. Meanwhile, a security controller that contains both the current and future control inputs is designed. Under the active security control strategy and the security controller, the addressed CPS under two-channel DoS attacks can be asymptotically stable without losing the control performance. Finally, both the simulations and experiments are given to demonstrate the effectiveness of the proposed active security control approach.
Power electronics-intensive dc microgrids use increasingly complex software-based controllers and communication networks. They are evolving into cyber-physical systems (CPS) with sophisticated ...interactions between physical and computational processes, making them vulnerable to cyber attacks. This paper presents a framework to detect possible false-data injection attacks (FDIAs) in cyber-physical dc microgrids. The detection problem is formalized as identifying a change in sets of inferred candidate invariants. Invariants are microgrids properties that do not change over time. Both the physical plant and the software controller of CPS can be described as Simulink/Stateflow (SLSF) diagrams. The dynamic analysis infers the candidate invariants over the input/output variables of SLSF components. The reachability analysis generates the sets of reachable states (reach sets) for the CPS modeled as hybrid automata. The candidate invariants that contain the reach sets are called the actual invariants. The candidate invariants are then compared with the actual invariants, and any mismatch indicates the presence of FDIA. To evaluate the proposed methodology, the hybrid automaton of a dc microgrid, with a distributed cooperative control scheme, is presented. The reachability analysis is performed to obtain the reach sets and, hence, the actual invariants. Moreover, a prototype tool, HYbrid iNvariant GEneratoR, is extended to instrument SLSF models, obtain candidate invariants, and identify FDIA.
A coal mine tunnel usually has a long-strip shape. Traditional single-sink cyber-physical-systems (CPS) cannot ensure that sensor nodes far from the entrance of a coal mine tunnel promptly and ...accurately transmit abnormal data from deep in the tunnel to the ground control center via the sink at the tunnel entrance. At the same time, it causes the “hot spot” problem easily around the Sink and limits the lifetime of the whole network. In order to solve these problems, this paper proposes a Multi-sink distributed power control algorithm (MSDPC-SRMS) suitable for a coal mine tunnel. This algorithm uses the Multiple Sink network structure and the idea of non-uniform cluster, combines the Multi-sink network with the clustering Voronoi scoping routing algorithm. It allocates the optimal transmission range and power for each sink, uses each sink as the cluster head and the network clustering is performed. The network topology is optimized on the basis of a good network coverage rate. Simulation results compared with CNP strategy show that the new algorithm exhibits superior connectivity, power consumption validity, clustering interference, and network performance, can effectively reduce the overall power consumption and prolong the lifetime of the network, thus ensure the monitoring data transmitted to the monitoring center rapidly and quickly.
Modern power systems depend on cyber-physical systems to link physical devices and control technologies. A major concern in the implementation of smart power networks is to minimize the risk of data ...privacy violation (e.g., by adversaries using data poisoning and inference attacks). In this article, we propose a privacy-preserving framework to achieve both privacy and security in smart power networks. The framework includes two main modules: a two-level privacy module and an anomaly detection module. In the two-level privacy module, an enhanced-proof-of-work-technique-based blockchain is designed to verify data integrity and mitigate data poisoning attacks, and a variational autoencoder is simultaneously applied for transforming data into an encoded format for preventing inference attacks. In the anomaly detection module, a long short-term memory deep learning technique is used for training and validating the outputs of the two-level privacy module using two public datasets. The results highlight that the proposed framework can efficiently protect data of smart power networks and discover abnormal behaviors, in comparison to several state-of-the-art techniques.
This paper mainly studies a detection method of dynamic load altering attacks (D‐LAAs) in smart grids. First, communication factors are considered, and a smart grid discrete system model under D‐LAA ...attack is established. Second, for closed‐loop D‐LAAs, an adaptive fading Kalman filter (AFKF) is designed to estimate the states of smart grids with Gaussian noise in real time, and a Euclidean distance ratio detection algorithm based on AFKF is proposed to detect D‐LAAs. Moreover, the proposed detection algorithm can identify D‐LAAs even in the presence of noise in the measurement data, significantly enhancing the speed of attack detection. Finally, take a smart grid with three generators and six buses as an example. Its feasibility and effectiveness of the Euclidean distance ratio detection algorithm are verified by simulations. The simulations are carried out through the real‐time hardware‐in‐the‐loop simulation platform, which is mainly composed of StarSim and multi‐tasking devices.
This paper mainly studies a detection method for dynamic load altering attacks in smart grids. A smart grid discrete system model under dynamic load altering attack is established, and an adaptive fading Kalman filter is designed to estimate the states of smart grids with Gaussian noise in real time.
Wireless sensors and actuators connected by the Internet-of-Things (IoT) are central to the design of advanced cyber-physical systems (CPSs). In such complex, heterogeneous systems, communication ...links must meet stringent requirements on throughput, latency, and range, while adhering to tight energy budget and providing high levels of security. In this paper, we first summarize wireless communication principles from the perspective of the connectivity needs of IoT and CPS. Based on these principles, we then review the most relevant wireless communication standards before focusing on the key security issues and features of such systems. In particular, the gap between the security features in the communication standards used in CPSs and IoT and their actual vulnerabilities are pointed out with practical examples and recent attacks. We emphasize the need for a more in-depth study of the security issues across all the protocol layers, including both logical layer security and physical layer security.