scholarly journals FPGA-Based High-Performance Embedded Systems for Adaptive Edge Computing in Cyber-Physical Systems: The ARTICo3 Framework

Sensors ◽  
2018 ◽  
Vol 18 (6) ◽  
pp. 1877 ◽  
Author(s):  
Alfonso Rodríguez ◽  
Juan Valverde ◽  
Jorge Portilla ◽  
Andrés Otero ◽  
Teresa Riesgo ◽  
...  
Author(s):  
Rajit Nair ◽  
Preeti Nair ◽  
Vidya Kant Dwivedi

Today, in cyber-physical systems, there is a transformation in which processing has been done on distributed mode rather than performing on centralized manner. Usually this type of approach is known as Edge computing, which demands hardware time to time when requirements in computing performance get increased. Considering this situation, we must remain energy efficient and adaptable. So, to meet the above requirements, SRAM-based FPGAs and their inherent run-time reconfigurability are integrated with smart power management strategies. Sometimes this approach fails in the case of user accessibility and easy development. This chapter presents an integrated framework to develop FPGA-based high-performance embedded systems for Edge computing in cyber-physical systems. The processing architecture will be based on hardware that helps us to manage reconfigurable systems from high level systems without any human intervention.


2020 ◽  
Vol 10 (9) ◽  
pp. 3125
Author(s):  
Saad Mubeen ◽  
Elena Lisova ◽  
Aneta Vulgarakis Feljan

Cyber Physical Systems (CPSs) are systems that are developed by seamlessly integrating computational algorithms and physical components, and they are a result of the technological advancement in the embedded systems and distributed systems domains, as well as the availability of sophisticated networking technology. Many industrial CPSs are subject to timing predictability, security and functional safety requirements, due to which the developers of these systems are required to verify these requirements during the their development. This position paper starts by exploring the state of the art with respect to developing timing predictable and secure embedded systems. Thereafter, the paper extends the discussion to time-critical and secure CPSs and highlights the key issues that are faced when verifying the timing predictability requirements during the development of these systems. In this context, the paper takes the position to advocate paramount importance of security as a prerequisite for timing predictability, as well as both security and timing predictability as prerequisites for functional safety. Moreover, the paper identifies the gaps in the existing frameworks and techniques for the development of time- and safety-critical CPSs and describes our viewpoint on ensuring timing predictability and security in these systems. Finally, the paper emphasises the opportunities that artificial intelligence can provide in the development of these systems.


2021 ◽  
Author(s):  
Yu Zheng ◽  
Ali Sayghe ◽  
Olugbenga Anubi

<div>This paper presents a suite of algorithms for detecting and localizing attacks in cyber-physical systems, and performing improved resilient state estimation through a pruning algorithm. High performance rates for the underlying detection and localization algorithms are achieved by generating training data that cover large region of the attack space. An unsupervised generative model trained by physics-based discriminators is designed to generate successful false data injection attacks. Then the generated adversarial examples are used to train a multi-class deep neural network which detects and localizes the attacks on measurements. Next, a pruning algorithm is included to improve the precision of localization result and provide performance guarantees for the resulting resilient observer. The performance of the proposed method is validated using the numerical simulation of a water distribution cyber-physical system.</div>


2021 ◽  
Author(s):  
Yu Zheng ◽  
Ali Sayghe ◽  
Olugbenga Anubi

<div>This paper presents a suite of algorithms for detecting and localizing attacks in cyber-physical systems, and performing improved resilient state estimation through a pruning algorithm. High performance rates for the underlying detection and localization algorithms are achieved by generating training data that cover large region of the attack space. An unsupervised generative model trained by physics-based discriminators is designed to generate successful false data injection attacks. Then the generated adversarial examples are used to train a multi-class deep neural network which detects and localizes the attacks on measurements. Next, a pruning algorithm is included to improve the precision of localization result and provide performance guarantees for the resulting resilient observer. The performance of the proposed method is validated using the numerical simulation of a water distribution cyber-physical system.</div>


IEEE Network ◽  
2020 ◽  
Vol 34 (3) ◽  
pp. 16-22 ◽  
Author(s):  
Tian Wang ◽  
Yuzhu Liang ◽  
Yi Yang ◽  
Guangquan Xu ◽  
Hao Peng ◽  
...  

Author(s):  
Lydia Ray

Pervasive computing has progressed significantly with a growth of embedded systems as a result of recent advances in digital electronics, wireless networking, sensors and RFID technology. These embedded systems are capable of producing enormous amount of data that cannot be handled by human brains. At the same time, there is a growing need for integrating these embedded devices into physical environment in order to achieve a far better capability, scalability, resiliency, safety, security and usability in important sectors such as healthcare, manufacturing, transportation, energy, agriculture, architecture and many more. The confluence of all these recent trends is the vision of distributed cyber-physical systems that will far exceed the performance of traditional embedded systems. Cyber-physical systems are emerging technology that require significant research in design and implementation with a few important challenges to overcome. The goal of this chapter is to present an overview of basic design and architecture of a cyber-physical system along with some specific applications and a brief description of the design process for developers. This chapter also presents a brief discussion of security and privacy issues, the most important challenge of cyber-physical systems.


Sign in / Sign up

Export Citation Format

Share Document