scholarly journals Electric heater mathematical model for cyber-physical systems

Author(s):  
Nataliya Pankratova ◽  
Igor Golinko

The article discusses the heat and mass transfer dynamic model for an electric heater with lumped parameters, which allows transient processes simulation for the main influences. The proposed model is recommended to be used in cyber-physical systems for forecasting and evaluating the effectiveness of control systems integrated into a single information management system. The developed model can be used by specialists for the analysis and synthesis of control systems for balanced ventilation systems or industrial air conditioners. As an example, a numerical simulation of transient processes along the action main channels for an electric heater HE 36/2 manufactured by VTS CLIMA was carried out. The significant advantage of the proposed model is the possibility for using it for the synthesis and analysis of multidimensional control systems.

Information security can be efficiently provided by the sound structured information and a set of specialized experts in the field of IT and CPS. The interconnection among the systems in the CPS imposes a new challenge in providing security to CPS. A concise study of CPS security is given in this chapter. The problem of secure control systems is also indentified and defined. The way the information security and control theory guards the system is explored. The security of CPSs can be enhanced using a particular set of challenges, which are also described later in this chapter. The resistance to malicious events is strengthening as cyber physical systems are part of critical structures. The CPSs are time sensitive in nature, unlike the distributed system where a little amount of delay is acceptable.


Author(s):  
Marco A. Gamarra ◽  
Sachin Shetty ◽  
Oscar R. Gonzalez ◽  
Laurent Njilla ◽  
Marcus Pendleton ◽  
...  

2020 ◽  
Vol 175 ◽  
pp. 05038
Author(s):  
Marina Ganzhur ◽  
Nikita Dyachenko ◽  
Andrey Gazizov ◽  
Arthur Otakulov ◽  
Dmitry Romanov

Cyber-physical systems are actively explored in the global and domestic scientific community. It is expected that cyber-physical systems will minimize human participation in the production process, as well as in many other areas of society. At the same time, the information security aspect of the interaction of elements remains insufficiently studied. The classical approach to ensuring security is aimed at counteracting a clear destructive information impact - when information security breaches have obvious signs. The risk of failure of one object of the system can lead to critical conditions. Safety modeling of managerial structures is reduced to considering the operability of the functions of the intermediate link and the interaction between objects that make decisions on the management and generating teams. By analyzing these transitions in limiting cases, it allows the use of analysis and synthesis approaches based on structural schemes and logical relationships.


2019 ◽  
Vol 5 (4) ◽  
pp. 114-123
Author(s):  
D. Levshun ◽  
A. Chechulin ◽  
I. Kotenko

In this paper a combined model of secure cyber-physical systems for their design and verification is proposed. Within the framework of this model, a cyber-physical system is represented as a set of blocks with various properties and relationships between them. The main challenge in such model construction is to combine various approaches to the modeling of cyber-physical systems (or their elements) within a single approach. The main goal of the proposed modeling approach is to provide the ability to convert various models into each other without losing significant data about the elements of the system, as well as taking into account the emergent properties that arise in the process of their interaction. The correctness of the proposed model is validated by the example of its use for design and verification of access control system.


2021 ◽  
Vol 4 ◽  
pp. 60-65
Author(s):  
V.O. Popov ◽  
◽  
A.A. Chechulin

In this part of the article, the application of the approach to the classification proposed in the first part is presented. As a result of the application of the proposed classification using the generalized model, it is supposed to determine the attack vector within the framework of the proposed model and draw conclusions on the main areas of cyber-physical systems that are vulnerable to attacks by malefactors.


Sign in / Sign up

Export Citation Format

Share Document