scholarly journals Graphical modeling notation for data collection and analysis architectures in cyber-physical systems of systems

2020 ◽  
Vol 19 ◽  
pp. 100155
Author(s):  
Emanuel Trunzer ◽  
Anne Wullenweber ◽  
Birgit Vogel-Heuser
Author(s):  
Hermann Kopetz ◽  
Andrea Bondavalli ◽  
Francesco Brancati ◽  
Bernhard Frömel ◽  
Oliver Höftberger ◽  
...  

2018 ◽  
Vol 2018 ◽  
pp. 1-13 ◽  
Author(s):  
Liang He ◽  
Linghe Kong ◽  
Jun Tao ◽  
Jingdong Xu ◽  
Jianping Pan

The collection of sensory data is crucial for cyber-physical systems. Employing mobile agents (MAs) to collect data from sensors offers a new dimension to reduce and balance their energy consumption but leads to large data collection latency due to MAs’ limited velocity. Most existing research effort focuses on the offline mobile data collection (MDC), where the MAs collect data from sensors based on preoptimized tours. However, the efficiency of these offline MDC solutions degrades when the data generation of sensors varies. In this paper, we investigate the on-demand MDC; that is, MAs collect data based on the real-time data collection requests from sensors. Specifically, we construct queuing models to describe the First-Come-First-Serve-based MDC with a single MA and multiple MAs, respectively, laying a theoretical foundation. We also use three examples to show how such analysis guides online MDC in practice.


Author(s):  
Duncan Unwin ◽  
Louis Sanzogni

Cybersecurity threats to railways are increasing, both due to improvements in the techniques of hackers and the increasing merger of cyber and physical spheres. Accepted approaches to safety can be extended to consider the risks from cyber, however the nature of railways as complex cyber-physical systems of systems may require a broader approach beyond functional safety. This paper explores some of the cybersecurity hazards using a war gaming approach. The authors find that, while standard engineering approaches are effective in building new rail control system components, a broader and more creative consideration of attacks has benefits. In particular they identify the ability to cause mass disruption by targeting the fail-safes designed to ensure safety or auxiliary systems that are not directly classified within the scope of the ICS.


Sign in / Sign up

Export Citation Format

Share Document