We present a methodology for scalable exploration of cyber-physical system architectures. We propose a mathematical formulation of the architecture exploration problem as an optimized mapping problem ...that includes joint selection of system topologies and components taken from pre-defined libraries. Using a graph-based representation of an architecture, we introduce novel compact encodings of mapping constraints and path constraints that significantly improve the scalability of the formulation. We use the new encodings to instantiate design requirements, such as interconnection, routing, timing, and energy constraints, on the architecture model. We implement our methods in an extensible architecture exploration toolbox, and provide a pattern-based language for formal, yet flexible, requirement specification. Numerical evaluations on a set of design problems from wireless sensor networks, reconfigurable manufacturing systems, and electrical power systems demonstrate the effectiveness of our approach.
In Industrial Cyber-Physical Systems (ICPS), real-time condition monitoring of wear-prone components of steel rolling production equipment is a key scenario for predictive maintenance. Machine ...vision-based crack detection can quickly identify critical damage and prevent unplanned downtime. However, the harsh working environment poses difficulties for data collection, a large amount of noise tends to contaminate surface crack images, and complex surface crack morphology affects the recognition accuracy. The real-time and accuracy performance of traditional crack detection algorithms are hard to meet the requirement of industrial applications. To tackle this challenge, a high-precision surface crack detection architecture for rolling steel production equipment based on image semantic segmentation is proposed. First, a coordinate attention-deep convolution generative adversarial networks (CA-DCGAN) based data augmentation method is proposed to augment the original dataset with high quality. Second, a crack detection model based on multi-scale learning efficient spatial pyramid network (MLESPNetV2) is proposed. It effectively improves detection accuracy to obtain semantic information strongly correlated with crack using multi-scale modeling and attention mechanism. Third, A semi-supervised learning method based on multi-scale learning efficient spatial pyramid-generative adversarial network (MLESP-GAN) is proposed to solve the problem of insufficient labeled data and unstable training process. Finally, extensive experimental results on KolektorSDD and CAS-Crack datasets demonstrate that the proposed MLESPNetV2 significantly improves accuracy and real-time performance compared with the benchmark model. It is therefore suitable for deployment in industrial sites for real-time health monitoring of industrial equipment.
The distributed optimization problem (DOP) of Takagi-Sugeno (T-S) fuzzy cyber-physical systems is studied under the framework of weight-balanced graphs and quasistrongly connected characteristics. ...The objective is to drive the outputs of all agents to the optimal solution of a given global objective function regarded as the desired output, based on the partial information of the local objective functions. To this end, distributed optimal coordinators (DOCs) are used to generate optimal solutions of local objective functions that converge to the desired output, and fuzzy reference-tracking controllers are designed to ensure that all agents can track the optimal solutions. As novel technical results, two Lyapunov-based fuzzy input-to-state stability (ISS) small-gain theorems are proposed for the T-S fuzzy interconnected system. Thus, the overall closed-loop system is an interconnected system involving the modules of optimal coordinators and fuzzy tracking controllers with T-S fuzzy subsystems. The fuzzy ISS cyclic-small-gain theorem is applied to analyze the system stability. The DOP of T-S fuzzy cyber-physical systems is solved using the DOCs and fuzzy reference-tracking controllers through the fuzzy small-gain approach. A numerical example is presented to demonstrate the effectiveness and superiority of the proposed method.
This paper is concerned with the observer-based event-triggered control for a continuous networked linear system subject to denial-of-service (DoS) attacks, where the attacks are launched ...periodically to block the data transmission in control channels. First, a new observer state-based resilient event-triggering scheme is developed in the presence of DoS attacks. Second, a novel event-based switched system model is established by considering the effect of the event-triggering scheme and DoS attacks simultaneously. By virtue of this new model combined with a piecewise Lyapunov-Krasovskii functional method, the sufficient conditions are derived to guarantee exponential stability of the resulting switched system. It is shown that the proposed results can establish a quantitative relationship among the launching/sleeping periods of the attacks, the event-triggering parameters, the sampling period, and the exponential decay rate. Third, criteria for designing a desired observer-based event-triggered controller are provided and expressed in terms of a set of linear matrix inequalities. Finally, an offshore structure model is presented to illustrate the efficiency of the developed control method.
Recently, vast investments have been made worldwide in developing Cyber-Physical Systems (CPS) as solutions to key socio-economic challenges. The Internet-of-Things (IoT) has also enjoyed widespread ...adoption, mostly for its ability to add "sensing" and "actuation" capabilities to existing CPS infrastructures. However, attention must be paid to the impact of IoT protocols on the dependability of CPS infrastructures. We address the issues of CPS dependability by using an epidemic model of the underlying dynamics within the CPS' IoT subsystem (CPS-IoT) and an interference-aware routing reconfiguration. These help to efficiently monitor CPS infrastructure-avoiding routing oscillation, while improving its safety. The contributions of this paper are threefold. Firstly, a CPS orchestration model is proposed that relies upon: (i) Inbound surveillance and outbound actuation to improve dependability and (ii) a novel information diffusion model that uses epidemic states and diffusion sets to produce diffusion patterns across the CPS-IoT. Secondly, the proposed CPS orchestration model is numerically analysed to show its dependability for both sensitive and non-sensitive applications. Finally, a novel interference-aware clustering protocol called "INMP", which enables network reconfiguration through migration of nodes across clusters, is proposed. It is then bench-marked against prominent IoT protocols to assess its impact on the dependability of the CPS.
An actual task is to project industrial purposes cyber and physical systems interaction technologies in the Industry 4.0 smart factories. Three cyber and physical systems interaction options are ...described (mechanical, informative and man and machine) which are applied in the item designing components manufacturing technological process. A scheme of system projection route is proposed for the cyber and physical interaction technologies. A scheme of system projection route is proposed for digital production cloud resources (services and applications) which are applied to realize automatic informative interaction for cyber and physical systems digital twins.
The fourth industrial revolution, i.e., Industry 4.0, is associated with Cyber-Physical Systems (CPS), which are entities integrating hardware (e.g., smart sensors and actuators connected through the ...Industrial Internet of Things) together with control and analytics software used to drive and support decisions at several levels. The latest developments in Artificial Intelligence (AI) and Machine Learning (ML) have enabled increased autonomy and closer human-robot cooperation in the production and manufacturing industry, thus leading to Autonomous Cyber-Physical Production Systems (ACPPS) and paving the way to the fifth industrial revolution (i.e., Industry 5.0). ACPPS are increasingly critical due to the possible consequences of their malfunctions on human co-workers, and therefore, evaluating their trustworthiness is essential. This article reviews research trends, relevant attributes, modeling languages, and tools related to the model-based trustworthiness evaluation of ACPPS. As in many other engineering disciplines and domains, model-based approaches, including stochastic and formal analysis tools, are essential to master the increasing complexity and criticality of ACPPS and to prove relevant attributes such as system safety in the presence of intelligent behaviors and uncertainties.
Display omitted
Now more than ever, traditional healthcare models are being overhauled with digital technologies of Healthcare 4.0 increasingly adopted. Worldwide, digital devices are improving every ...stage of the patient care pathway. For one, sensors are being used to monitor patient metrics 24/7, permitting swift diagnosis and interventions. At the treatment stage, 3D printers are under investigation for the concept of personalised medicine by allowing patients access to on-demand, customisable therapeutics. Robots are also being explored for treatment, by empowering precision surgery, rehabilitation, or targeted drug delivery. Within medical logistics, drones are being leveraged to deliver critical treatments to remote areas, collect samples, and even provide emergency aid. To enable seamless integration within healthcare, the Internet of Things technology is being exploited to form closed-loop systems that remotely communicate with one another. This review outlines the most promising healthcare technologies and devices, their strengths, drawbacks, and opportunities for clinical adoption.
In this brief, an observer-based dynamic event-triggered control for cyber-physical systems (CPSs) with multiple cyber-attacks in dual channels is investigated. Firstly, An observer model is ...introduced to address the issue of state unmeasurability of the system. Secondly, to mitigate the impact of limited network-resources, a dynamic event-triggered protocol is adopted. Thirdly, considering the effect of cyber-attacks in the presence of dual channels, an observer-based feedback control method is proposed. The stability and <inline-formula> <tex-math notation="LaTeX">{H}_ {\infty }/H_{2} </tex-math></inline-formula> performance of CPSs are established by utilizing a new Lyapunov function and LMI method. Finally, an example is simulated to demonstrate effectiveness of the method in this brief.
We propose a novel framework called IDEA that exploits electromagnetic (EM) side-channel signals to detect malicious activity on embedded and cyber-physical systems (CPS). IDEA first records EM ...emanations from an uncompromised reference device to establish a baseline of reference EM patterns. IDEA then monitors the target device's EM emanations. When the observed EM emanations deviate from the reference patterns, IDEA reports this as an anomalous or malicious activity. IDEA does not require any resource or infrastructure on, or any modification to, the monitored system itself. In fact, IDEA is isolated from the target device, and monitors the device without any physical contact. We evaluate IDEA by monitoring the target device while it is executing embedded applications with malicious code injections such as Distributed Denial of Service (DDoS), Ransomware and code modification. We further implement a control-flow hijack attack, an advanced persistent threat, and a firmware modification on three CPSs: an embedded medical device called SyringePump, an industrial Proportional-Integral-Derivative (PID) Controller, and a Robotic Arm, using a popular embedded system, Arduino UNO. The results demonstrate that IDEA can detect different attacks with excellent accuracy (AUC > 99.5%, and 100 percent detection with less than 1 percent false positives) from distances up to 3 m.