Cyber-Physical Systems - A New Approach For Keyless Entry Systems

Author(s):  
Beatrix-May Balaban ◽  
Ioan Stefan Sacala ◽  
Alina Claudia Petrescu-Nita ◽  
Florin Pop
Author(s):  
Jiayi Su ◽  
Yuqin Weng ◽  
Susan C. Schneider ◽  
Edwin E. Yaz

Abstract In this work, a new approach to detect sensor and actuator intrusion for Cyber-Physical Systems using a bank of Kalman filters is presented. The case where the unknown type of the intrusion signal is considered first, using two Kalman filters in a bank to provide the conditional state estimates, then the unknown type of intrusion signal can be detected properly via the adaptive estimation algorithm. The case where the target (either sensor or actuator) of the intrusion signal is unknown is also considered, using four Kalman filters in a bank designed to detect if the intrusion signal is about to affect healthy sensor or actuator signal. To test these methods, a DC motor speed control system subject to attack by different types of sensor and actuator signals is simulated. Simulations show that different types of sensor and actuator intrusion signals can be detected properly without the knowledge of the nature and the type of these signals.


2017 ◽  
Vol 2017 ◽  
pp. 1-10 ◽  
Author(s):  
Long Zhang ◽  
Wenyan Hu ◽  
Wanxia Qu ◽  
Yang Guo ◽  
Sikun Li

Mobile cyber-physical systems (CPSs) are very hard to verify, because of asynchronous communication and the arbitrary number of components. Verification via model checking typically becomes impracticable due to the state space explosion caused by the system parameters and concurrency. In this paper, we propose a formal approach to verify the safety properties of parameterized protocols in mobile CPS. By using counter abstraction, the protocol is modeled as a Petri net. Then, a novel algorithm, which uses IC3 (the state-of-the-art model checking algorithm) as the back-end engine, is presented to verify the Petri net model. The experimental results show that our new approach can greatly scale the verification capabilities compared favorably against several recently published approaches. In addition to solving the instances fast, our method is significant for its lower memory consumption.


Author(s):  
Okolie S.O. ◽  
Kuyoro S.O. ◽  
Ohwo O. B

Cyber-Physical Systems (CPS) will revolutionize how humans relate with the physical world around us. Many grand challenges await the economically vital domains of transportation, health-care, manufacturing, agriculture, energy, defence, aerospace and buildings. Exploration of these potentialities around space and time would create applications which would affect societal and economic benefit. This paper looks into the concept of emerging Cyber-Physical system, applications and security issues in sustaining development in various economic sectors; outlining a set of strategic Research and Development opportunities that should be accosted, so as to allow upgraded CPS to attain their potential and provide a wide range of societal advantages in the future.


Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


Sign in / Sign up

Export Citation Format

Share Document