5,662 results
Search Results
2. A Hierarchical Design Tool for SystemC AMS
- Author
-
Genius, Daniela, Apvrille, Ludovic, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Domínguez Mayo, Francisco José, editor, Pires, Luís Ferreira, editor, and Seidewitz, Edwin, editor
- Published
- 2024
- Full Text
- View/download PDF
3. Agile Methods and Cyber-Physical Systems Development—A Review with Preliminary Analysis
- Author
-
Ahmad, Muhammad Ovais, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Kotenko, Igor, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Tian, Yuan, editor, Ma, Tinghuai, editor, and Khan, Muhammad Khurram, editor
- Published
- 2020
- Full Text
- View/download PDF
4. Blockchain Secured 'Smart Buildings' as Cyber Physical Systems
- Author
-
Tiwari, Anupam, Batra, Usha, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Kotenko, Igor, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Batra, Usha, editor, Roy, Nihar Ranjan, editor, and Panda, Brajendra, editor
- Published
- 2020
- Full Text
- View/download PDF
5. Attack Path Analysis for Cyber Physical Systems
- Author
-
Kavallieratos, Georgios, Katsikas, Sokratis, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Katsikas, Sokratis, editor, Cuppens, Frédéric, editor, Cuppens, Nora, editor, Lambrinoudakis, Costas, editor, Kalloniatis, Christos, editor, Mylopoulos, John, editor, Antón, Annie, editor, Gritzalis, Stefanos, editor, Meng, Weizhi, editor, and Furnell, Steven, editor
- Published
- 2020
- Full Text
- View/download PDF
6. The ‘‘aftermath’’ of Industry 4.0 in Small and Medium Enterprises
- Author
-
Silva, João, Ferreira, João Carlos, Gonçalves, Frederica, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Abdelnour Nocera, José, editor, Parmaxi, Antigoni, editor, Winckler, Marco, editor, Loizides, Fernando, editor, Ardito, Carmelo, editor, Bhutkar, Ganesh, editor, and Dannenmann, Peter, editor
- Published
- 2020
- Full Text
- View/download PDF
7. Abstract of the papers presented at the First International Congress and Workshop on Industrial Artificial Intelligence 2021 (IAI 2021) .
- Subjects
BALLAST (Railroads) ,ARTIFICIAL intelligence ,DIGITAL communications ,DEEP learning ,CONFERENCES & conventions ,ACOUSTIC reflection ,ARTIFICIAL neural networks ,CYBER physical systems - Published
- 2022
8. Visualization Analysis About Cyber Physical Systems Research Based on CiteSpace
- Author
-
She, Chundong, Liu, Xin, Wang, Jingchao, Liu, Shaohua, Barbosa, Simone Diniz Junqueira, Series Editor, Filipe, Joaquim, Series Editor, Kotenko, Igor, Series Editor, Sivalingam, Krishna M., Series Editor, Washio, Takashi, Series Editor, Yuan, Junsong, Series Editor, Zhou, Lizhu, Series Editor, Ghosh, Ashish, Series Editor, and Yu, Quan, editor
- Published
- 2019
- Full Text
- View/download PDF
9. Sensor Networks: Enlarging the Attack Surface
- Author
-
Cam-Winget, Nancy, Barbosa, Simone Diniz Junqueira, Editorial Board Member, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Kotenko, Igor, Editorial Board Member, Yuan, Junsong, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Benavente-Peces, César, editor, Cam-Winget, Nancy, editor, Fleury, Eric, editor, and Ahrens, Andreas, editor
- Published
- 2019
- Full Text
- View/download PDF
10. EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems Security
- Author
-
Adepu, Sridhar, Kandasamy, Nandha Kumar, Mathur, Aditya, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Katsikas, Sokratis K., editor, Cuppens, Frédéric, editor, Cuppens, Nora, editor, Lambrinoudakis, Costas, editor, Antón, Annie, editor, Gritzalis, Stefanos, editor, Mylopoulos, John, editor, and Kalloniatis, Christos, editor
- Published
- 2019
- Full Text
- View/download PDF
11. A Knowledge Carrying Service-Component Architecture for Smart Cyber Physical Systems : An Example Based on Self-documenting Production Systems
- Author
-
Haubeck, Christopher, Lamersdorf, Winfried, Fay, Alexander, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Weikum, Gerhard, Series Editor, Braubach, Lars, editor, Murillo, Juan M., editor, Kaviani, Nima, editor, Lama, Manuel, editor, Burgueño, Loli, editor, Moha, Naouel, editor, and Oriol, Marc, editor
- Published
- 2018
- Full Text
- View/download PDF
12. A Dataset to Support Research in the Design of Secure Water Treatment Systems
- Author
-
Goh, Jonathan, Adepu, Sridhar, Junejo, Khurum Nazir, Mathur, Aditya, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Havarneanu, Grigore, editor, Setola, Roberto, editor, Nassopoulos, Hypatia, editor, and Wolthusen, Stephen, editor
- Published
- 2017
- Full Text
- View/download PDF
13. Immunity-Empowered Collaboration Security Protection for Mega Smart Cities.
- Author
-
Lan, Kun, Li, Jianhua, Huang, Wenkai, and Li, Gaolei
- Subjects
SMART cities ,CYBER physical systems ,PUBLIC safety ,IMMUNOCOMPUTERS ,ELECTRONIC paper ,SAFETY factor in engineering ,INTERNET security - Abstract
The cyberphysical systems of smart cities are facing increasingly severe attack situations, and traditional separate protection methods are difficult to effectively respond to. It is urgent to coordinate public safety and cybersecurity protection. However, the integration of the two faces many challenges and is a very promising research field. The aim of this study is to investigate technical approaches for the synergy between public safety and cybersecurity. This paper proposes a smart city safety protection model inspired by the human immune mechanism. It was found that through a three-line defense architecture similar to the human immune mechanism, and with the help of certain algorithms and functional middleware modules, public safety and cybersecurity protection components can be dynamically combined to achieve collaboration. This work has verified through experiments a valuable path to effectively resist complicated attack threats intertwined with public safety and cybersecurity factors. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. An Architectural Model for High Performance Pattern Matching in Linked Historical Data
- Author
-
Aleithe, Michael, Hegerl, Ulrich, Ivanova, Galina, van der Aalst, Wil M.P., Series editor, Mylopoulos, John, Series editor, Rosemann, Michael, Series editor, Shaw, Michael J., Series editor, Szyperski, Clemens, Series editor, Abramowicz, Witold, editor, Alt, Rainer, editor, and Franczyk, Bogdan, editor
- Published
- 2017
- Full Text
- View/download PDF
15. Industry 4.0 implementation for multinationals: a case study
- Author
-
Buhulaiga, Eyad and Telukdarie, Arnesh
- Published
- 2024
- Full Text
- View/download PDF
16. Towards high-availability cyber-physical systems using a microservice architecture.
- Author
-
Mena, Manel, Criado, Javier, Iribarne, Luis, Corral, Antonio, Chbeir, Richard, and Manolopoulos, Yannis
- Subjects
- *
ELECTRONIC paper , *CYBER physical systems , *TELECOMMUNICATION , *INTERNET of things - Abstract
In the past few years the use of IoT devices has grown exponentially. When it comes to working with them, we find a series of problems that are not easy to solve. On the one hand, the simple fact of communicating with those devices can be problematic since they can use different types of technologies regarding that communication. On the other hand, these types of devices usually aim to perform their function using the lowest possible energy, meaning they have certain constraints in terms of performance. Trying to work with these devices in high-availability environments becomes difficult because of those restraints. This paper introduces digital dice, a virtual representation of IoT devices and cyber-physical systems based on microservices that uses the standard established by the W3C, the Web of Things, as the underlying framework to declare its possible interactions. The article puts forward the different strategies that Digital Dice uses to mitigate the problems raised. Furthermore, we contrast the performance of Digital Dice with using the devices directly, demonstrating its advantages in a process that requires High Availability. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
17. Measurement in Machine Vision Editorial Paper.
- Author
-
Sergiyenko, Oleg, Flores-Fuentes, Wendy, Rodríguez-Quiñonez, Julio C., Mercorelli, Paolo, Kawabe, Tohru, and Bhateja, Vikrant
- Subjects
- *
COMPUTER vision , *CYBER physical systems , *INTERPOLATION algorithms , *ARTIFICIAL intelligence , *OPTICAL computing , *SENSORY memory , *DISPLACEMENT (Mechanics) - Abstract
Measurement related to different machine vision functions is the base for developing of cyber-physical systems able to see and make decisions. These kinds of systems are emerging in all areas of our daily lives. They can be found in the medical area, in industry, in the agriculture, in all those interconnected cloud computing-based systems related to flying/terrestrial robotics, navigation, automated surgery, smart cities, smart health monitoring, etc. All of them are extremely dependent on the same: adequate coordinates measurement, properly selected data processing and data fusion algorithms, evaluation procedures for performance analysis of measurement within Machine Vision systems, processes and algorithms (both traditional and artificial intelligence), mathematical models for 3D-measurement purposes (measurement of displacements, surface profiles, deformations, data augmentation/interpolation, etc.), and distributed visual measurement systems, as well as distributed memory and sensory part. Cyber-physical systems can be implemented on almost any application, especially on those dotted by robots and automated guided devices (from aerospace applications to domestic cleaners). The success of the measurement process depends on the kind of sensors and their optoelectronics characteristics and intrinsic parameters, as well as their respective operating and processing. The correct approach selection for the application, the data acquisition and collection efficiency, the data processing algorithms, the hardware processors response time, and the intelligent auto adaptability to changing environments or conditions. Recently, the emergence of artificial intelligence algorithms and the internet of things have powerful development of such systems, highlighting the importance and the impact of the measurement accuracy related to machine vision performance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. Industrial Challenges in the Composition of Embedded Systems
- Author
-
Corman, David, Paunicka, James, Kordon, Fabrice, editor, and Sokolsky, Oleg, editor
- Published
- 2008
- Full Text
- View/download PDF
19. Computer security: ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 revised selected papers
- Author
-
Katsikas, Sokratis, Cuppens, Frederic, Cuppens, Nora, Lambrinoudakis, Costas, Kalloniatis, Christos, Mylopoulos, John, Antón, Annie, Gritzalis, Stefanos, Pallas, Frank, Pohle, Jörg, Sasse, Angela, Meng, Weizhi, Furnell, Steven, Garcia‐Alfaro, Joaquin, Open University of Cyprus, Département Systèmes Réseaux, Cybersécurité et Droit du numérique (IMT Atlantique - SRCD), IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT), Lab-STICC_IMTA_CID_IRIS, Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance (Lab-STICC), École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT), University of Piraeus, University of the Aegean, University of Toronto, Georgia Institute of Technology [Atlanta], Technische Universität Berlin (TU), Humboldt-Universität zu Berlin, Ruhr University Bochum (RUB), Technical University of Denmark [Lyngby] (DTU), Plymouth University, Réseaux, Systèmes, Services, Sécurité (R3S-SAMOVAR), Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (SAMOVAR), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP)-Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP), Institut Polytechnique de Paris (IP Paris), Département Réseaux et Services de Télécommunications (RST), and Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP)
- Subjects
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,Incident response ,Digital forensics ,Security governance ,Cyber physical systems ,Industrial control systems ,Requirements engineering ,Industrial Internet of Things (IIoT) ,System security ,Network security ,Cyber security - Abstract
International audience; This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2019, the Third International Workshop on Security and Privacy Requirements Engineering, SECPRE 2019, the First International Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2019, and the Second International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019.
- Published
- 2020
20. Guest Editorial: Operational and structural resilience of power grids with high penetration of renewables.
- Author
-
Lei, Shunbo, Zhang, Yichen, Shahidehpour, Mohammad, Hou, Yunhe, Panteli, Mathaios, Chen, Xia, Aydin, Nazli Yonca, Liang, Liang, Wang, Cheng, Wang, Chong, and She, Buxin
- Subjects
MICROGRIDS ,ELECTRIC power distribution grids ,CYBER physical systems ,MIXED integer linear programming ,DEEP reinforcement learning ,ARTIFICIAL neural networks ,REINFORCEMENT learning ,ELECTRIC power - Published
- 2024
- Full Text
- View/download PDF
21. How CPS and Autonomous Robots are Integrated to other I4.0 Technologies: a systematic literature review.
- Author
-
Venancio Teixeira, Jônatas, da Silva Hounsell, Marcelo, and Wildgrube Bertol, Douglas
- Subjects
TECHNICAL literature ,AUTONOMOUS robots ,CYBER physical systems ,INDUSTRY 4.0 ,SEARCH engines ,INDUSTRIAL revolution - Abstract
Industry 4.0 (I4.0) brings a set of challenges that need to be settled to enable the expected industrial revolution. Cyber-Physical Systems (CPS) and Autonomous Robots are two of mainstream I4.0 technologies and can be combined with other Enabling Technologies to overcome main I4.0 challenges. This Systematic Literature Review (SLR) aimed to understand how these Enabling Technologies were combined with CPS and Autonomous Robots to achieve fully featured I4.0 solutions. The 5C is a CPS architecture which was used as a measurement to CPS compliance. After filtering and processing 15,144 papers from six different academic search engines, it was found that full 5C compliant solutions are rare to find; that not all enabling technologies were integrated; and most of existing research focused in implementing practical solutions, but comparison to conventional approaches is scarce. We conclude that there is a need for further research to accomplish full 5C I4.0. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
22. The implementation of virtual reality in digital factory—a comprehensive review.
- Author
-
Chandra Sekaran, Sivadas, Yap, Hwa Jen, Musa, Siti Nurmaya, Liew, Kan Ern, Tan, Chee Hau, and Aman, Atikah
- Subjects
VIRTUAL reality ,CYBER physical systems ,ELECTRONIC paper ,MANUFACTURING processes ,INDUSTRY 4.0 - Abstract
The global trend in manufacturing has shifted from a manufacturing-centric process toward a user-centric process. This has resulted in a shorter lifespan and a high product replacement rate of any consumer product. Germany has introduced the concept of Industry Revolution 4.0 (IR 4.0) to convert manufacturing processes and mechanisms into cyber-physical systems (CPS). Digital factory, being the first step into CPS and IR4.0, is being targeted as the most important evolution of the manufacturing industry. This paper defines digital factories and their differences between other similar domains such as smart factories, CPS, and virtual factories. The requirements and goals of a digital factory are explained in detail to facilitate future digital factory tool developments. Furthermore, the current challenges faced in the implementation of the digital factory are proposed to be approached by adapting an interoperable virtual reality technology. This paper emphasizes the usage of virtual reality (VR) in simulating a digital factory that aids in the decision-making and efficient operation of a manufacturing facility. Furthermore, recommendations gathered from previous studies for developing VR-based digital factory tools are also explained in detail in this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
23. Digital twin framework for reconfigurable manufacturing systems (RMSs): design and simulation.
- Author
-
Kombaya Touckia, Jesus, Hamani, Nadia, and Kermad, Lyes
- Subjects
DIGITAL twins ,MANUFACTURING processes ,AGILE manufacturing systems ,FLEXIBLE manufacturing systems ,DEMAND forecasting ,ELECTRONIC paper ,CYBER physical systems ,CLOUD computing - Abstract
Faced with the global crisis of COVID-19 and the strong increase in customer demands, competition is becoming more intense between companies, on the one hand, and supply chains on the other. This competition has led to the development of new strategies to manage demand and increase market share. Among these strategies are the growing interest in sustainable manufacturing and the need for customizable products that create an increasingly complex manufacturing environment. Sustainable manufacturing and the need for customizable products create an environment of increased competition and constant change. Indeed, companies are trying to establish more flexible and agile manufacturing systems through several systems of reconfiguration. Reconfiguration contributes to an extension of the manufacturing system's life cycle by modifying its physical, organizational and IT characteristics according to the changing market conditions. Due to the rapid development of new information technology (such as IoT, Big Data analytics, cyber-physical systems, cloud computing and artificial intelligence), digital twins have become intensively used in smart manufacturing. This paper proposes a digital twin design and simulation model for reconfigurable manufacturing systems (RMSs). [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
24. Timing Predictability and Security in Safety-Critical Industrial Cyber-Physical Systems: A Position Paper †.
- Author
-
Mubeen, Saad, Lisova, Elena, and Vulgarakis Feljan, Aneta
- Subjects
INDUSTRIAL security ,CYBER physical systems ,SYSTEMS development ,SECURITY systems - Abstract
Cyber Physical Systems (CPSs) are systems that are developed by seamlessly integrating computational algorithms and physical components, and they are a result of the technological advancement in the embedded systems and distributed systems domains, as well as the availability of sophisticated networking technology. Many industrial CPSs are subject to timing predictability, security and functional safety requirements, due to which the developers of these systems are required to verify these requirements during the their development. This position paper starts by exploring the state of the art with respect to developing timing predictable and secure embedded systems. Thereafter, the paper extends the discussion to time-critical and secure CPSs and highlights the key issues that are faced when verifying the timing predictability requirements during the development of these systems. In this context, the paper takes the position to advocate paramount importance of security as a prerequisite for timing predictability, as well as both security and timing predictability as prerequisites for functional safety. Moreover, the paper identifies the gaps in the existing frameworks and techniques for the development of time- and safety-critical CPSs and describes our viewpoint on ensuring timing predictability and security in these systems. Finally, the paper emphasises the opportunities that artificial intelligence can provide in the development of these systems. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
25. Manufacturing System and Enterprise Management for Industry 4.0.
- Author
-
Putnik, Goran D. and Ávila, Paulo S.
- Subjects
MANUFACTURING processes ,INDUSTRY 4.0 ,RANGE management ,BUSINESS enterprises ,PERSONNEL management ,CYBER physical systems - Published
- 2021
- Full Text
- View/download PDF
26. Blockchain Enabled Reparations in Smart Buildings-Cyber Physical System.
- Author
-
Tiwari, Anupam and Batra, Usha
- Subjects
CYBER physical systems ,BLOCKCHAINS ,ELECTRONIC paper ,POINT cloud ,INTELLIGENT buildings ,BITCOIN - Abstract
Blockchain technology is evolving across the globe and is being looked upon as a definite part of the future. Blockchain is often associated with bitcoin and finance's domain. But over the last decade, this backend technology to bitcoin has spread its association in almost all domains that we can think of. Further to this, smart contracts are making the blockchain ecosystem better. Other evolving technologies like Internet-of-things, Industrial Internet-ofthings, Cyber physical systems are also making their onset on the global platform. Smart buildings link Internet-of-things connectivity, sensors and the cloud to remotely supervise and assure efficient heating-air conditioning, lighting and security systems etc to improve efficiency and overall sustainability. The global buildings sector over the next 40 years is expected to add 230 billion square meters of fresh construction, i.e., adding the equivalent of Paris every week. Thus integrating these technologies right at the onset, before they grow in isolation, is a coveted need today. This paper proposes a prototype to simulate architecture and discusses how blockchain enabled smart buildings can further expedite automation, security and transparency. For an apprehension purpose, the paper focuses on smart contracts enabled repairs and service in smart buildings. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
27. Human machine interactions: from past to future- a systematic literature review.
- Author
-
Jain, Namita, Gupta, Vikas, Temperini, Valerio, Meissner, Dirk, and D'angelo, Eugenio
- Subjects
BIBLIOMETRICS ,SOCIAL interaction ,EMOTIONS ,CYBER physical systems ,SCIENCE databases ,INDUSTRIAL clusters - Abstract
Purpose: This paper aims to provide insight into the evolving relationship between humans and machines, understanding its multifaceted impact on our lifestyle and landscape in the past as well as in the present, with implications for the near future. It uses bibliometric analysis combined with a systematic literature review to identify themes, trace historical developments and offer a direction for future human–machine interactions (HMIs). Design/methodology/approach: To provide thorough coverage of publications from the previous four decades, the first section presents a text-based cluster bibliometric analysis based on 305 articles from 2,293 initial papers in the Scopus and Web of Science databases produced between 1984 and 2022. The authors used VOS viewer software to identify the most prominent themes through cluster identification. This paper presents a systematic literature review of 63 qualified papers using the PRISMA framework. Findings: Next, the systematic literature review and bibliometric analysis revealed four major historical themes and future directions. The results highlight four major research themes for the future: from Taylorism to advanced technologies; machine learning and innovation; Industry 4.0, Society 5.0 and cyber–physical system; and psychology and emotions. Research limitations/implications: There is growing anxiety among humankind that in the future, machines will overtake humans to replace them in various roles. The current study investigates the evolution of HMIs from their historical roots to Society 5.0, which is understood to be a human-centred society. It balances economic advancement with the resolution of social problems through a system that radically integrates cyberspace and physical space. This paper contributes to research and current limited knowledge by identifying relevant themes and offering scope for future research directions. A close look at the analysis posits that humans and machines complement each other in various roles. Machines reduce the mechanical work of human beings, bringing the elements of humanism and compassion to mechanical tasks. However, in the future, smart innovations may yield machines with unmatched dexterity and capability unthinkable today. Originality/value: This paper attempts to explore the ambiguous and dynamic relationships between humans and machines. The present study combines systematic review and bibliometric analysis to identify prominent trends and themes. This provides a more robust and systematic encapsulation of this evolution and interaction, from Taylorism to Society 5.0. The principles of Taylorism are extended and redefined in the context of HMIs, especially advanced technologies. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. Call for Papers.
- Subjects
- *
MACHINE-to-machine communications , *CYBER physical systems , *SMART cities , *TELECOMMUNICATION systems , *TELECOMMUNICATION , *SUSTAINABLE urban development , *ASSISTIVE technology - Abstract
The article presents the discussion on sustainable urban development as populations rise and cities draw ever-larger populations. Topics include industrial Internet and Internet of Vehicles, smart energy systems, building management systems, cyber security; and presenting the technological advancement and challenges of smart cities and smart villages from the system design and implementation point of view.
- Published
- 2022
- Full Text
- View/download PDF
29. DEVELOPMENT OF SMART FACTORY 4.0 USING CYBERPHYSICAL SYSTEM-BASED WORKSHOP IN ROLLING STOCK INDUSTRY TO SUPPORT INDUSTRY 4.0.
- Author
-
Alkharis, Ahmad Fajar and Nadlifatin, Reny
- Subjects
DIGITAL transformation ,ROLLING stock ,CYBER physical systems ,INDUSTRY 4.0 ,MASS customization - Abstract
Driven by the concept of mass customization, manufacturing enterprises are now required to transform their traditional workshops into smart workshops. The integration of cyber-physical systems (CPS), which serves as the core of Industry 4.0, is crucial in achieving smart manufacturing. By implementing CPS, the conventional workshop can transition into a new paradigm characterized by intelligence and flexibility. However, the implementation of CPS in workshops is a complex undertaking that is still in its early stages. Therefore, this research paper aims to provide a comprehensive perspective on CPS-based workshops, with the intention of facilitating their implementation in the industry. Initially, the paper identifies seven key features of CPS-based workshops, namely self-sensing, self-awareness, self-assessment, self-optimization, self-adjustment, self-configuration, and self-control. Subsequently, the paper proposes the architectural framework of CPS-based workshops from a technical standpoint. Furthermore, a conceptual model of CPS-based workshops is developed, which highlights the three fundamental elements and closed-loop mechanism of such workshops. Finally, a case study of a Rolling stock manufacturing company in Indonesia is presented to demonstrate the feasibility of implementing CPS-based workshops in the industry. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Shop floor to cloud connect for live monitoring the production data of CNC machines.
- Author
-
B A, Prathima, P N, Sudha, and P M, Suresh
- Subjects
CYBER physical systems ,DATA envelopment analysis ,MASS production ,ELECTRONIC paper ,FACTORY management ,MACHINE tools - Abstract
Manufacturing industry is at its most exciting times with digital revolution. Man, machine, material and tools have to co-ordinate with each other seamlessly to maximize efficiency in a mass production environment. Various theoretical models are in practice to measure efficiency of equipment, gauging, services, maintenance, etc. While all the theoretical models are quite accurate in their approach to measuring the activities, they lagging behind in the process of data collection. The data collection methods are manual and not accurate. In this paper, a model is arrived at to collect live data of production, rejection and idle time in a machine tool with the help of electronic sensors. Effort is made to enhance operator engagement by compelling the operator to feed data so that the data collection becomes closed loop. As all data are digital in nature, meaningful information is sent to the management through an Internet of Things platform. This paper focuses on the digital data flow from the shop floor to management through the Cyber Physical System, enabling smart manufacturing in a mass production environment. The proposed model has been implemented and validated in a mass production set-up, engaged in manufacturing plug shell components. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
31. Pharma 4.0 Quality Management Challenge: A Literature Review.
- Author
-
Amrih, Pitoyo and Damayanti, Retno Wulan
- Subjects
PHARMACEUTICAL industry ,INDUSTRY 4.0 ,INTERNET of things ,ARTIFICIAL intelligence ,ROBOTICS ,MACHINE learning ,CYBER physical systems - Abstract
This paper aims to review several related papers on Quality Management and Industry 4.0 in the pharmaceutical industry environment to achieve the benefits required future and give a better vision of the extant regulatory and technical barriers for realizing it. Quality Management and industry 4.0 require efforts to better understand a GMP (Good Manufacturing Practices) pharmaceutical industry situation. Product quality in the pharmaceutical industry is a fundamental thing that must be achieved as a fulfillment of regulatory requirements. GMP for the Pharmaceutical Industry is a minimum standard of compliance for the pharmaceutical quality system requirement that must be designed, applied, managed, and maintained properly so that the main objective is achieved where the production process so that medicinal products always have robust quality in fulfilling efficacy and patient safety. Industry 4.0 in the pharmaceutical industry (which is popular with the term Pharma 4.0) is challenging to implement within the GMP 'high-regulated industry' environment. It will have consequences to moving transition into it step by step in a delicate careful slide. The internet of things (IoT), artificial intelligence (AI), robotics, machine learning, cyber-physical system, and advanced computing as a character of industry 4.0 will dramatically change the landscape of manufacturing including the quality system inside. The research results presented in this paper show an increasing trend towards research that focuses on the slices of 'quality management', 'pharmaceutical quality system' and 'industry 4.0'. Further research needs to be done to create a pharma 4.0 quality system implementation model. [ABSTRACT FROM AUTHOR]
- Published
- 2022
32. Introduction to the Special Issue on Runtime Verification.
- Author
-
Deshmukh, Jyotirmoy and Ničković, Dejan
- Subjects
COVID-19 pandemic ,DYNAMICAL systems ,TEST methods ,CONFERENCES & conventions ,CYBER physical systems - Abstract
Runtime verification (RV) refers to methods for formal reasoning about all aspects of the dynamic execution of systems, including hardware, software, and cyber-physical systems. RV includes techniques to assess and enforce correctness of a system against systemic bugs or extrinsic uncertainties. These methods are typically considered lightweight as they may not involve exhaustive verification or proofs, but they provide a higher level of rigor and versatility compared to conventional testing methods. This article introduces the extended versions of selected papers from the peer-reviewed proceedings of the 20th International Conference on Runtime Verification (RV 2020). RV 2020 was supposed to be held in Los Angeles, California, USA in July 2020, but was instead held virtually due to the global Covid-19 pandemic. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
33. Adaptive Network Sustainability and Defense Based on Artificial Bees Colony Optimization Algorithm for Nature Inspired Cyber Security.
- Author
-
Ganguli, Chirag, Shandilya, Shishir Kumar, Gregus, Michal, and Basystiuk, Oleh
- Subjects
BEES algorithm ,MATHEMATICAL optimization ,INTERNET security ,CYBERTERRORISM ,DENIAL of service attacks ,CYBER physical systems ,DATA packeting ,CONFIDENTIAL communication access control - Abstract
Cyber Defense is becoming a major issue for every organization to keep business continuity intact. The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algorithm (ABC) as an Nature Inspired Cyber Security mechanism to achieve adaptive defense. It experiments on the Denial- Of-Service attack scenarios which involves limiting the traffic flow for each node. Businesses today have adapted their service distribution models to include the use of the Internet, allowing them to effectively manage and interact with their customer data. This shift has created an increased reliance on online services to store vast amounts of confidential customer data, meaning any disruption or outage of these services could be disastrous for the business, leaving them without the knowledge to serve their customers. Adversaries can exploit such an event to gain unauthorized access to the confidential data of the customers. The proposed algorithm utilizes an Adaptive Defense approach to continuously select nodes that could present characteristics of a probable malicious entity. For any changes in network parameters, the cluster of nodes is selected in the prepared solution set as a probable malicious node and the traffic rate with the ratio of packet delivery is managed with respect to the properties of normal nodes to deliver a disaster recovery plan for potential businesses. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. Digital Twin Concept and its Applications: A Review.
- Author
-
Ji Tao and Nor, Norzalilah Mohamad
- Subjects
DIGITAL twins ,DIGITAL communications ,HUMAN-computer interaction ,CYBER physical systems ,COST control - Abstract
This article reviews the development of digital twin and summarizes the evolution of the concept of digital twin. The key words and abstracts of 1187 relevant papers in recent 5 years are quantitatively analyzed, and 13 key nodes are obtained. Then it analyzes the content of 9 systematic review articles and summarizes 15 core contents. Then select 115 application examples from the articles. Through the above three steps, nine descriptive general characteristics of digital twin system are summarized: Entity object; Virtual object; Twinning degree; Communication; Data; Functionality; Human-computer interaction; systematicness; and Cost control. This paper will explain these features in detail and summarize the application examples of classifying each feature. This paper aims to summarize the development of digital twin in recent years and propose a description method of system characteristics according to the application scenario of digital twin and the increasingly complex situation of the system. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. Digital twin-based cyber physical production system architectural framework for personalized production.
- Author
-
Park, Kyu Tae, Lee, Jehun, Kim, Hyun-Jung, and Noh, Sang Do
- Subjects
INDUSTRY 4.0 ,CYBER physical systems ,ELECTRONIC paper ,INFORMATION modeling ,CYBERSPACE - Abstract
Personalized production is a manufacturing concept relevant to the fourth industrial revolution, which can satisfy various customer needs inexpensively. There are three main hurdles to the efficient implementation of this concept: access, cost, and performance. This paper proposes a digital twin-based cyber physical production system (CPPS) architectural framework that overcomes the performance hurdle. The proposed architectural framework comprises five services that are solutions to the performance hurdle of personalized production, and it operates on information based on the proposed product, process, plan, plant, and resource (P4R) information model. This information model is manufacturing abstraction for personalized production and is presented on a detailed level with object-orientation and the "type and instance" concept. Whereas previous studies on the digital twin concept considered one or several facilities and focused on the development of independent applications, this study focuses on the digital twin as a core technological element of the entire system and analyzes CPPS design and its operation from the system-of-systems perspective. The application of the digital twin-based CPPS to a micro smart factory (MSF) provides an advanced solution for the personalized production of various products. An average makespan improvement of ~ 26.87% was achieved using the implemented CPPS services in the MSF. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
36. A Cyber-Physical Systems Paper Survey About the Concept, Architecture and Challenges for the Deployment within the Concept of Industry 4.0.
- Author
-
Melicher, Markus, Šišmišová, Dana, Vachálek, Ján, and Belavý, Cyril
- Subjects
INDUSTRY 4.0 ,CYBER physical systems ,ARCHITECTURE ,SYSTEMS development ,CONCEPTS - Abstract
The arrival of Cyber-physical systems provided space for a new emerging field of research oriented on this type of embedded systems. The aim of this paper is to provide a better understanding of this integrative research field focused on the concept, architecture and challenges in deployment of such systems within the concept of Industry 4.0. Cyber-physical systems represent an emerging area of research that attracts the interest of researchers around the world, because, in the field of design and development of future systems, they are expected to play a major role. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
37. Linear System Identification-Oriented Optimal Tampering Attack Strategy and Implementation Based on Information Entropy with Multiple Binary Observations.
- Author
-
Bai, Zhongwei, Yu, Peng, Liu, Yan, and Guo, Jin
- Subjects
STRATEGIC planning ,PARTICLE swarm optimization ,CYBER physical systems ,COMPUTER engineering ,TELECOMMUNICATION ,LINEAR systems ,ENTROPY (Information theory) - Abstract
With the rapid development of computer technology, communication technology, and control technology, cyber-physical systems (CPSs) have been widely used and developed. However, there are massive information interactions in CPSs, which lead to an increase in the amount of data transmitted over the network. The data communication, once attacked by the network, will seriously affect the security and stability of the system. In this paper, for the data tampering attack existing in the linear system with multiple binary observations, in the case where the estimation algorithm of the defender is unknown, the optimization index is constructed based on information entropy from the attacker's point of view, and the problem is modeled. For the problem of the multi-parameter optimization with energy constraints, this paper uses particle swarm optimization (PSO) to obtain the optimal data tampering attack solution set, and gives the estimation method of unknown parameters in the case of unknown parameters. To implement the real-time improvement of online implementation, the BP neural network is designed. Finally, the validity of the conclusions is verified through numerical simulation. This means that the attacker can construct effective metrics based on information entropy without the knowledge of the defense's discrimination algorithm. In addition, the optimal attack strategy implementation based on PSO and BP is also effective. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. Utilization of synthetic system intelligence as a new industrial asset.
- Author
-
Horváth, Imre
- Subjects
CYBER physical systems ,KNOWLEDGE transfer ,PROBLEM solving ,TRANSFER of training - Abstract
System knowledge and reasoning mechanisms are essential means for intellectualization of cyber-physical systems (CPSs). As enablers of system intelligence, they make such systems able to solve application problems and to maintain their efficient operation. Normally, system intelligence has a human-created initial part and a system-produced (extending) part, called synthetic system intelligence (SSI). This position paper claims that SSI can be converted to a new industrial asset and utilized as such. Unfortunately, no overall theory of SSI exists and its conceptual framework, management strategy, and computational methodologies are still in a premature stage. This is the main reason why no significant progress has been achieved in this field, contrary to the latent potentials. This paper intends to contribute to: (i) understanding the nature and fundamentals of SSI, (ii) systematizing the elicitation and transfer of SSI, (iii) exploration of analogical approaches to utilization of SSI, and (iv) road-mapping and scenario development for the exploitation of SSI as an industrial asset. First, the state of the art is surveyed and the major findings are presented. Then, four families of analogical approaches to SSI transfer are analyzed. These are: (i) knowledge transfer based on repositories, (ii) transfer among agents, (iii) transfer of learning resources, and (iv) transfer by emerging approaches. A procedural framework is proposed that identifies the generic functionalities needed for a quasi-autonomous handling of SSI as an industrial asset. The last section casts light on some important open issues and necessary follow-up research and development activities. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. Seeing the Past, Planning the Future: Proudly Celebrating 25 Years of Assisting the Convergence of Process Sciences and Design Science.
- Author
-
Horváth, Imre, Wan, Thomas T.H., Huang, Jingwei, Coatanéa, Eric, Rayz, Julia M., Zeng, Yong, and Kim, Kyoung-Yun
- Subjects
DESIGN science ,CYBER physical systems ,SCIENTIFIC communication ,ENGINEERING education ,ARTIFICIAL intelligence - Abstract
This Extended Editorial has been compiled by the members of the Editorial Board to celebrate the 25th anniversary of the establishment of the Journal of Integrated Design and Process Science, which operates as the Transactions of the Society for Process and Design Science. The paper divides in three parts. The first part provides a detailed overview of the preliminaries, the objectives, and the periods of operation. It also includes a summary of the current application-orientated professional fields of interests, which are: (i) convergence mechanisms of creative scientific disciplines, (ii) convergence of artificial intelligence, team and health science, (iii) convergence concerning next-generation cyber-physical systems, and (iv) convergence in design and engineering education. The second part includes invited papers, which exemplify domains within the four fields of interest, and also represent good examples of science communication. Short synopses of the contents of these representative papers are included. The third part takes the major changes in scientific research and the academic publication arena into consideration, circumscribes the mission and vision as formulated by the current Editorial Board, and elaborates on the planned strategic exploration and utilization domains of interest. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
40. Report on the State of the SoSyM Journal end of 2022.
- Author
-
Challita, Stéphanie, Combemale, Benoit, Ergin, Huseyin, Gray, Jeff, Rumpe, Bernhard, and Schindler, Martin
- Subjects
AGILE software development ,COMPUTER software testing ,CYBER physical systems ,SYSTEMS software - Published
- 2023
- Full Text
- View/download PDF
41. A multi-level modelling and fidelity evaluation method of digital twins for creating smart production equipment in Industry 4.0.
- Author
-
Zhang, Chao, Li, Jingjing, Zhou, Guanghui, Huang, Qian, Zhang, Min, Zhi, Yifan, and Wei, Zhibo
- Subjects
MULTILEVEL models ,DIGITAL twins ,INDUSTRY 4.0 ,EVALUATION methodology ,CYBER physical systems ,MANUFACTURING industries - Abstract
Rapid advances in new-generation information technologies have been the main driving force for the transformation of manufacturing enterprises in Industry 4.0. Digital twin (DT), as a key technology to promote intelligent manufacturing, has shown great potential for manufacturing enterprises to create an industrial intelligence-driven production equipment through in-depth integration of cyber-physical systems. However, the lack of a systematic effective DT modelling method with a supporting evaluation metric is the most important factor restricting the application of DT in manufacturing enterprises. To bridge the gap, this paper proposes a novel multi-level modelling and fidelity evaluation (MLM&FE) method of DT for creating smart production equipment in manufacturing enterprises, which could help enterprises establish an industrial intelligence-driven production environment to quickly respond to changes in the customised global market, thus greatly improving competitiveness of the enterprises. Specifically, this paper firstly designs a reference framework for DT-enhanced smart production equipment, on which an MLM&FE architecture is proposed. Then, key implementation methodologies and tools for MLM&FE are introduced from the perspective of data space modelling, virtual space modelling, knowledge space modelling, model integration and evaluation. Finally, the developed smart production equipment prototype demonstrates the feasibility and effectiveness of DT MLM&FE. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
42. Securing the Internet‐of‐Things: Advances, challenges, future trends.
- Author
-
Liu, Ximeng, Mu, Yi, Ning, Jianting, and Zhang, Qingchen
- Subjects
KEY agreement protocols (Computer network protocols) ,BOTNETS ,FLOW control (Data transmission systems) ,INTERNET access control ,DATA security failures ,CYBER physical systems - Abstract
When machine learning meets the IoT security, it can be divided into two parts: (i) use the machine learning to detect the malicious attacks; (ii) use the privacy-preserving methods to protect the machine learning model and data. Keywords: Internet-of-Things; Privacy; Security EN Internet-of-Things Privacy Security 1 4 4 05/10/21 20210501 NES 210501 INTRODUCTION With billions of Internet-of-Thing (IoT) devices collecting data interoperate within the existing Internet infrastructure technology, IoT techniques have been considered as a necessary part of our daily life, such as wearable IoT devices to monitor personal health status, banking and financial services, life sciences, retail and industrial, and home automation. The paper by Y. Jiang et al, entitled " I A verifiable and privacy-preserving multi-dimensional data aggregation scheme in mobile crowdsensing, i " proposed a verifiable privacy-preserving data aggregation scheme, which is based on data double-masking, Shamir's secret sharing, and bilinear mapping. [Extracted from the article]
- Published
- 2021
- Full Text
- View/download PDF
43. IEEE Computer Society Call for Papers.
- Subjects
- *
COMPUTERS , *DIGITAL Object Identifiers , *ARTIFICIAL implants , *CYBER physical systems - Published
- 2021
- Full Text
- View/download PDF
44. Security risks in cyber physical systems—A systematic mapping study.
- Author
-
Zahid, Maryam, Inayat, Irum, Daneva, Maya, and Mehmood, Zahid
- Subjects
CYBER physical systems ,SMART power grids ,FAULT trees (Reliability engineering) ,INTERNET security ,SCIENTIFIC literature ,CYBERTERRORISM ,INTERNET of things - Abstract
The increased need for constant connectivity and complete automation of existing systems fuels the popularity of Cyber Physical Systems (CPS) worldwide. Increasingly more, these systems are subjected to cyber attacks. In recent years, many major cyber‐attack incidents on CPS have been recorded and, in turn, have been raising concerns in their users' minds. Unlike in traditional IT systems, the complex architecture of CPS consisting of embedded systems integrated with the Internet of Things (IoT) requires rather extensive planning, implementation, and monitoring of security requirements. One crucial step to planning, implementing, and monitoring of these requirements in CPS is the integration of the risk management process in the CPS development life cycle. Existing studies do not clearly portray the extent of damage that the unattended security issues in CPS can cause or have caused, in the incidents recorded. An overview of the possible risk management techniques that could be integrated into the development and maintenance of CPS contributing to improving its security level in its actual environment is missing. In this paper, we are set out to highlight the security requirements and issues specific to CPS that are discussed in scientific literature and to identify the state‐of‐the‐art risk management processes adopted to identify, monitor, and control those security issues in CPS. For that, we conducted a systematic mapping study on the data collected from 312 papers published between 2000 and 2020, focused on the security requirements, challenges, and the risk management processes of CPS. Our work aims to form an overview of the security requirements and risks in CPS today and of those published contributions that have been made until now, towards improving the reliability of CPS. The results of this mapping study reveal (i) integrity authentication and confidentiality as the most targeted security attributes in CPS, (ii) model‐based techniques as the most used risk identification and assessment and management techniques in CPS, (iii) cyber‐security as the most common security risk in CPS, (iv) the notion of "mitigation measures" based on the type of system and the underline internationally recognized standard being the most used risk mitigation technique in CPS, (v) smart grids being the most targeted systems by cyber‐attacks and thus being the most explored domain in CPS literature, and (vi) one of the major limitations, according to the selected literature, concerns the use of the fault trees for fault representation, where there is a possibility of runtime system faults not being accounted for. Finally, the mapping study draws implications for practitioners and researchers based on the findings. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
45. Improving cyber-physical-power system stability through hardware-in-loop co-simulation platform for real-time cyber attack analysis.
- Author
-
Xiaoke Wang, Yan Ji, Zhongwang Sun, Chong Liu, Zhichun Jing, Yuanshi Zhang, Jianfeng Dai, Jintao Han, and Singh, Neeraj Kumar
- Subjects
CYBER physical systems ,MICROGRIDS ,CYBERTERRORISM ,DENIAL of service attacks ,ARTIFICIAL neural networks ,MACHINE learning ,BATTERY storage plants - Abstract
With advancements in communication systems and measurement technologies, smart grids have become more observable and controllable, evolving into cyberphysical-power systems (CPPS). The impact of network security and secondary equipment on power system stability has become more evident. To support the existing grid toward a smart grid scenario, smart metering plays a vital role at the customer end side. Cyber-Physical systems are vulnerable to cyber-attacks and various techniques have been evolved to detect a cyber attack in the smart grid. Weighted trust-based models are suggested as one of the most effective security mechanisms. A hardware-in-loop CPPS co-simulation platform is established to facilitate the theoretical study of CPPS and the formulation of grid operation strategies. This paper examines current co-simulation platform schemes and highlights the necessity for a real-time hard-ware-in-the-loop platform to accurately simulate cyber-attack processes. This consideration takes into account the fundamental differences in modeling between power and communication systems. The architecture of the co-simulation platform based on RT-LAB and OPNET is described, including detailed modeling of the power system, communication system, and security and stability control devices. Additionally, an analysis of the latency of the co-simulation is provided. The paper focuses on modeling and implementing methods for addressing DDOS attacks and man-in-the-middle at-tacks in the communication network. The results from simulating a 7-bus system show the effectiveness and rationality of the co-simulation platform that has been designed. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
46. Cyber–Physical Distributed Intelligent Motor Fault Detection.
- Author
-
Al-Anbuky, Adnan, Altaf, Saud, and Gheitasi, Alireza
- Subjects
ARTIFICIAL neural networks ,FAST Fourier transforms ,SIGNAL processing ,INTERNET of things ,MATHEMATICAL models ,CYBER physical systems - Abstract
This research paper explores the realm of fault detection in distributed motors through the vision of the Internet of electrical drives. This paper aims at employing artificial neural networks supported by the data collected by the Internet of distributed devices. Cross-verification of results offers reliable diagnosis of industrial motor faults. The proposed methodology involves the development of a cyber–physical system architecture and mathematical modeling framework for efficient fault detection. The mathematical model is designed to capture the intricate relationships within the cyber–physical system, incorporating the dynamic interactions between distributed motors and their edge controllers. Fast Fourier transform is employed for signal processing, enabling the extraction of meaningful frequency features that serve as indicators of potential faults. The artificial neural network based fault detection system is integrated with the solution, utilizing its ability to learn complex patterns and adapt to varying motor conditions. The effectiveness of the proposed framework and model is demonstrated through experimental results. The experimental setup involves diverse fault scenarios, and the system's performance is evaluated in terms of accuracy, sensitivity, and false positive rates. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
47. A Bayesian-Attack-Graph-Based Security Assessment Method for Power Systems.
- Author
-
Chen, Lu, Zhang, Tao, Ma, Yuanyuan, Li, Yong, Wang, Chen, He, Chuan, Lv, Zhuo, and Li, Nuannuan
- Subjects
INFORMATION technology ,CYBER physical systems ,INFRASTRUCTURE (Economics) ,TELECOMMUNICATION systems ,BAYESIAN analysis ,TELECOMMUNICATION ,MULTICASTING (Computer networks) - Abstract
In today's highly advanced information technology environment, modern network and communication technologies are widely used in monitoring and controlling power systems. These technologies have evolved significantly. They now form a high-performance digital system known as the cyber–physical power system. However, vulnerabilities in communication networks present growing threats to these systems. This paper seeks to enhance the accurate assessment of the security posture of cyber-physical power systems by inferring attackers' intentions. A threat modeling approach based on Bayesian attack graphs is presented, employing Bayesian networks to define and evaluate potential threats that attackers could pose to different system infrastructures. The paper initially conducts a qualitative analysis of the system's threats, constructing a directed graph structure and establishing conditional probability tables among nodes based on prior knowledge. Subsequently, methods are developed to compute the threat levels at different system nodes using real-time detected attack events. Further analysis methods and security assessment metrics are also developed to identify attack paths and quantify system security. Finally, a Bayesian attack graph is constructed in accordance with the system's structure. In practical scenarios, the attack path analysis method can predict the most vulnerable attack paths, while the absolute values of the security assessment metrics indicate the overall risk level of the system. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. Cybersecurity anatomization and assurance of industrial control systems.
- Author
-
Mohapatra, Anwesh and Ramanathan, Krishnan
- Subjects
INDUSTRIAL controls manufacturing ,INDUSTRIAL robots ,INTERNET security ,DISEASE risk factors ,COMPUTER network protocols ,CYBER physical systems ,INFORMATION technology security - Abstract
Initially, ICS is developed into independent networks that operate on custom network protocols and monitor industrial automation (i.e., using technology) processes. Therefore, cyber-attacks were limited to linked IT platforms and direct physical access for such control systems. Over the years, we have seen numerous emergent business needs that connect IT and OT technologies and incorporate and use Internet-enabled communication. This paper introduces a detailed review of information security challenges for ICS. Special attention has been paid to the SCADA architecture and its parts, and component-sensitive threatening vectors and potential component risks were identified. In addition, we examined the traditional and advanced threats and attacks against ICS and suggested a matrix for risk assessments that highlighted factors such as probability and impact. The average risk score was calculated in which the infrastructure was found to be the most and least vulnerable component. We have also highlighted specific global ICS security standards for organizations' protection and protection of critical assets. In this paper, we want to give an overview of the cybersecurity of the ICS, which could help organizations take preliminary actions on the entire infrastructure to improve the functionality of their equipment without being subjected to cyber-attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
49. Machine vision theory and applications for cyber-physical systems.
- Author
-
Khare, Manish, Khare, Ashish, Jeon, Moongu, and Sethi, Ishwar K.
- Subjects
COMPUTER vision ,CYBER physical systems ,MACHINE theory ,HUMAN activity recognition ,MULTI-factor authentication ,SMART cities ,ARTIFICIAL neural networks ,CHINESE remainder theorem - Abstract
More advanced machine vision algorithms in CPS have solved many challenges in real-time interaction between physical systems and dynamic environments, the efficiency issues in smart homes, buildings, communities, connected vehicle systems, and their reliability. This work segmented whole-brain structural magnetic resonance imaging (MRI) into 116 regions using atlas-based segmentation. Different types of Cyber-Physical Systems will affect every aspect of our life soon. Machine vision Technologies in Cyber-Physical Systems aim to achieve a close integration of cyber systems and physical systems and detect and control physical systems in a real-time, secure, reliable, efficient, and adaptive manner with the help of different machine vision technologies. [Extracted from the article]
- Published
- 2022
- Full Text
- View/download PDF
50. Modelling the propagation of properties across services in cyber-physical energy systems.
- Author
-
Narayan, Anand, Brand, Michael, Huxoll, Nils, Hassan, Batoul Hage, and Lehnhoff, Sebastian
- Subjects
CYBER physical systems ,INFORMATION & communication technologies ,ELECTRIC power distribution grids ,VOLTAGE control - Abstract
Modern power systems, referred to as cyber-physical energy systems (CPESs), are complex systems with strong interdependencies between power and information and communication technology (ICT) systems. CPESs also have dependencies between the essential grid services. For instance, coordinated voltage control depends on state estimation, which depends on measurement acquisition. Since the operation of CPESs is largely influenced by these grid services, assessing their performance is crucial for assessing the performance of a CPES. Most of these grid services are enabled by the ICT system, i.e., they rely to a high degree on ICT. Hence, properties such as availability, correctness and timeliness, which depend on the involved software, hardware and data of the ICT system, must be considered for assessing the performance of an ICT-enabled grid service. Disturbances and repairs in CPESs impact these properties, which can then propagate and affect the performance of a grid service as well as other dependent grid services. There is, therefore, a need to model the influence of the properties of software, hardware and data on ICT-enabled grid services for single services as well as across several services, resulting in a propagation of these parameters. Current literature lacks such a model, which can used not only to investigate but also to visualise the impact of these properties on the overall perfromance of a grid service as well as other dependent grid services. This paper proposes a meta model for assessing the performance of ICT-enabled grid services, which can be instantiated for different grid services considering their dependencies. A multi-dimensional operational state space, which serves as a visualisation of the performance of grid services in terms of their state trajectory, is also proposed in this paper. The contributions are then demonstrated by a case study with a state estimation service and the widely-used CIGRE medium voltage benchmark power grid augmented with an ICT system. Three scenarios with disturbances are presented to show the benefits of the contributions. Specifically, the performance of the state estimation service considering the disturbances is investigated using the meta model, and the change in performance is visualised as trajectories using the operational state space. These contributions enable new possibilities for planning and vulnerability analyses: property changes in parts of the ICT system can be simulated to investigate their consequences throughout the ICT-enabled grid services. A trajectory representing their performance can then be visualized in the state space based on which measures could be implemented to potentially improve the resilience of the service against the considered disturbances. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.