Smart cities, IOT, Industrie 4.0/Industrial Internet, cyber-physical systems: concepts, burdens and business models

2020 ◽  
Vol 68 (9) ◽  
pp. 711-719
Author(s):  
Mathias Uslar

ZusammenfassungIn diesem Beitrag wird die Notwendigkeit einer sinnvollen Definition und Klarstellung der Disziplin Energieinformatik aufgezeigt. Der Beitrag diskutiert verschiedene bestehende Definitionen und stellt sie in den Kontext des Anforderungsmanagements und der Lösungsfindung. Er motiviert die Notwendigkeit eines strukturierten disziplinären Ansatzes in der Energieinformatik auf der Grundlage bestehender Probleme und skizziert den aktuellen Stand des Stands der Wissenschaft und Technik, der hauptsächlich den systemtechnischen Anwendungsbereich für Smart Grids umfasst. Synergien mit anderen aktuellen Schwerpunktthemen wie Internet der Dinge (IoT), Industrie 4.0 (Digitalisierung der Produktion) und Cyber-Physical Systems (CPS) werden aus Anforderungssicht motiviert. Auf der Grundlage der aufgeworfenen Fragen und Herausforderungen werden neue sinnvolle Forschungsthemen für ein durchgängiges Anforderungsmanagement im Kontext Smart Grid diskutiert.


2021 ◽  
Vol 58 ◽  
pp. 176-192
Author(s):  
Diego G.S. Pivoto ◽  
Luiz F.F. de Almeida ◽  
Rodrigo da Rosa Righi ◽  
Joel J.P.C. Rodrigues ◽  
Alexandre Baratella Lugli ◽  
...  

Author(s):  
Ismail Butun ◽  
Patrik Österberg

Interfacing the smart cities with cyber-physical systems (CPSs) improves cyber infrastructures while introducing security vulnerabilities that may lead to severe problems such as system failure, privacy violation, and/or issues related to data integrity if security and privacy are not addressed properly. In order for the CPSs of smart cities to be designed with proactive intelligence against such vulnerabilities, anomaly detection approaches need to be employed. This chapter will provide a brief overview of the security vulnerabilities in CPSs of smart cities. Following a thorough discussion on the applicability of conventional anomaly detection schemes in CPSs of smart cities, possible adoption of distributed anomaly detection systems by CPSs of smart cities will be discussed along with a comprehensive survey of the state of the art. The chapter will discuss challenges in tailoring appropriate anomaly detection schemes for CPSs of smart cities and provide insights into future directions for the researchers working in this field.


Author(s):  
Vijey Thayananthan ◽  
Javad Yazdani

The main aim of this strategic research proposal is to develop a model of secure transportation system using efficient CPS which not only reduce the unnecessary accident rates but also increase safety system that enhances the livability of smart cities and Industry 4.0. Although the main focus is efficient security solutions, dynamic and intelligent approaches of the future security solutions will be able to detect the evolving threats and cyberattacks during the data or signal transmission between the users and service providers.


2022 ◽  
pp. 226-239
Author(s):  
Onur Ugurlu ◽  
Nusin Akram ◽  
Vahid Khalilpour Akram

The new generation of fast, small, and energy-efficient devices that can connect to the internet are already used for different purposes in healthcare, smart homes, smart cities, industrial automation, and entertainment. One of the main requirements in all kinds of cyber-physical systems is a reliable communication platform. In a wired or wireless network, losing some special nodes may disconnect the communication paths between other nodes. Generally, these nodes, which are called critical nodes, have many undesired effects on the network. The authors focus on three different problems. The first problem is finding the nodes whose removal minimizes the pairwise connectivity in the residual network. The second problem is finding the nodes whose removal maximizes the number of connected components. Finally, the third problem is finding the nodes whose removal minimizes the size of the largest connected component. All three problems are NP-Complete, and the authors provide a brief survey about the existing approximated algorithms for these problems.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 78238-78259 ◽  
Author(s):  
Hansong Xu ◽  
Wei Yu ◽  
David Griffith ◽  
Nada Golmie

Author(s):  
Dmitry Namiot ◽  
Manfred Sneps-Sneppe

This chapter describes proposals for organizing university programs on the internet of things (IoT) and cyber-physical systems. The final goal is to provide a structure for a basic educational course for the internet of things and related areas. This base (template) could be used both for direct training and for building other courses, including those that are more deeply specialized in selected areas. For related areas, the authors see, for example, machine-to-machine communications and data-driven cities (smart cities) development. Obviously, the internet of things skills are in high demand nowadays, and, of course, IoT models, architectures, as well as appropriate data proceedings elements should be presented in the university courses. The purpose of the described educational course is to cover information and communication technologies used in the internet of things systems and related areas. Also, the authors discuss big data and AI issues for IoT courses and highlight the importance of data engineering.


Electronics ◽  
2019 ◽  
Vol 8 (11) ◽  
pp. 1220 ◽  
Author(s):  
Xiaogang Zhu ◽  
Gautam Srivastava ◽  
Reza M. Parizi

The new developments in smart cyber-physical systems can be shown to include smart cities, Internet of things (IoT), and for the most part smart anything. To improve the security of sensitive personal information (SPI) in cyber-physical systems, we present some novel ideas related to the encryption of SPI. Currently, there are issues in traditional encryption methods, such as low speed of information acquisition, low recognition rate, low utilization rate of effective information resources, and high delay of information query. To address these issues, we propose a novel efficient encryption algorithm for the security of incremental SPI. First, our proposed method analyzes user information resources and determines valid data to be encrypted. Next, it uses adaptive acquisition methods to collect information, and uses our encryption method to complete secure encryption of SPI according to the acquisition results. Our experimental analysis clearly shows that the algorithm effectively improves the speed of information acquisition as well as effective information recognition rate, thus enhancing the security of SPI. The encryption model in turn can provide a strong guarantee for user information security.


Sign in / Sign up

Export Citation Format

Share Document