- Quality-Guaranteed Data Streaming in Resource-Constrained Cyber-Physical Systems

2015 ◽  
pp. 246-275
2020 ◽  
Vol 14 (3) ◽  
pp. 391-403
Author(s):  
Dimitris Palyvos-Giannas ◽  
Bastian Havers ◽  
Marina Papatriantafilou ◽  
Vincenzo Gulisano

Data streaming enables online monitoring of large and continuous event streams in Cyber-Physical Systems (CPSs). In such scenarios, fine-grained backward provenance tools can connect streaming query results to the source data producing them, allowing analysts to study the dependency/causality of CPS events. While CPS monitoring commonly produces many events, backward provenance does not help prioritize event inspection since it does not specify if an event's provenance could still contribute to future results. To cover this gap, we introduce Ananke , a framework to extend any fine-grained backward provenance tool and deliver a live bipartite graph of fine-grained forward provenance. With Ananke , analysts can prioritize the analysis of provenance data based on whether such data is still potentially being processed by the monitoring queries. We prove our solution is correct, discuss multiple implementations, including one leveraging streaming APIs for parallel analysis, and show Ananke results in small overheads, close to those of existing tools for fine-grained backward provenance.


2019 ◽  
Vol 89 ◽  
pp. 102552
Author(s):  
Dimitris Palyvos-Giannas ◽  
Vincenzo Gulisano ◽  
Marina Papatriantafilou

2020 ◽  
Vol 4 (3) ◽  
pp. 1-27
Author(s):  
Vuk Lesi ◽  
Ilija Jovanov ◽  
Miroslav Pajic

Author(s):  
Márton Búr ◽  
Gábor Szilágyi ◽  
András Vörös ◽  
Dániel Varró

Abstract Smart cyber-physical systems (CPSs) have complex interaction with their environment which is rarely known in advance, and they heavily depend on intelligent data processing carried out over a heterogeneous and distributed computation platform with resource-constrained devices to monitor, manage and control autonomous behavior. First, we propose a distributed runtime model to capture the operational state and the context information of a smart CPS using directed, typed and attributed graphs as high-level knowledge representation. The runtime model is distributed among the participating nodes, and it is consistently kept up to date in a continuously evolving environment by a time-triggered model management protocol. Our runtime models offer a (domain-specific) model query and manipulation interface over the reliable communication middleware of the Data Distribution Service (DDS) standard widely used in the CPS domain. Then, we propose to carry out distributed runtime monitoring by capturing critical properties of interest in the form of graph queries, and design a distributed graph query evaluation algorithm for evaluating such graph queries over the distributed runtime model. As the key innovation, our (1) distributed runtime model extends existing publish–subscribe middleware (like DDS) used in real-time CPS applications by enabling the dynamic creation and deletion of graph nodes (without compile time limits). Moreover, (2) our distributed query evaluation extends existing graph query techniques by enabling query evaluation in a real-time, resource-constrained environment while still providing scalable performance. Our approach is illustrated, and an initial scalability evaluation is carried out on the MoDeS3 CPS demonstrator and the open Train Benchmark for graph queries.


2021 ◽  
pp. 1-1
Author(s):  
Ehsan Hadizadeh Hafshejani ◽  
Nima TaheriNejad ◽  
Rozhan Rabbani ◽  
Zohreh Azizi ◽  
Shahabeddin Mohin ◽  
...  

Sensors ◽  
2019 ◽  
Vol 19 (8) ◽  
pp. 1935 ◽  
Author(s):  
Shancang Li ◽  
Houbing Song ◽  
Muddesar Iqbal

With the exponential growth of the Internet of Things (IoT) and cyber-physical systems (CPS), a wide range of IoT applications have been developed and deployed in recent years. To match the heterogeneous application requirements in IoT and CPS systems, many resource-constrained IoT devices are deployed, in which privacy and security have emerged as difficult challenges because the devices have not been designed to have effective security features.


Sign in / Sign up

Export Citation Format

Share Document