A Study on Design of Communication Protocol for CPS Simulation

2012 ◽  
Vol 488-489 ◽  
pp. 881-885
Author(s):  
Ji Yeon Kim ◽  
Hyung Jong Kim ◽  
Jin Myoung Kim ◽  
Won Tae Kim

The term “cyber-physical system (CPS)” refers to a computing system that integrates physical processes and computational devices via a network. There are many physical and computational devices in a CPS, which can function automatically through inter-device interactions. Because a CPS is usually used for large-scale complex systems, to ensure reliable CPS operation, its design and execution should be verified through simulations. For CPS simulation, a communication protocol should be established for data transmission between physical systems and the corresponding simulation models during the simulation, including control algorithms for regulating differences between the two systems. First, because physical systems and simulation models are advanced in real time and logical time, respectively, time regulation methods should be included in the control algorithm. Second, to simulate various types of physical systems, a flexible simulation environment, independent of the operating environment such as the type of communication middleware, is required. In this paper, we propose a communication protocol for data transmission between physical systems and simulation models via a middle layer that contains the policies for handling the two different clocks of each system: virtual and real. The proposed communication protocol can be used not only for communication between the two systems but also for overcoming the problems caused by the differences in their operating environments. The contribution of this work is in that it defines a communication protocol and proposes methods for controlling different types of systems.

2021 ◽  
Vol 11 (12) ◽  
pp. 5458
Author(s):  
Sangjun Kim ◽  
Kyung-Joon Park

A cyber-physical system (CPS) is the integration of a physical system into the real world and control applications in a computing system, interacting through a communications network. Network technology connecting physical systems and computing systems enables the simultaneous control of many physical systems and provides intelligent applications for them. However, enhancing connectivity leads to extended attack vectors in which attackers can trespass on the network and launch cyber-physical attacks, remotely disrupting the CPS. Therefore, extensive studies into cyber-physical security are being conducted in various domains, such as physical, network, and computing systems. Moreover, large-scale and complex CPSs make it difficult to analyze and detect cyber-physical attacks, and thus, machine learning (ML) techniques have recently been adopted for cyber-physical security. In this survey, we provide an extensive review of the threats and ML-based security designs for CPSs. First, we present a CPS structure that classifies the functions of the CPS into three layers: the physical system, the network, and software applications. Then, we discuss the taxonomy of cyber-physical attacks on each layer, and in particular, we analyze attacks based on the dynamics of the physical system. We review existing studies on detecting cyber-physical attacks with various ML techniques from the perspectives of the physical system, the network, and the computing system. Furthermore, we discuss future research directions for ML-based cyber-physical security research in the context of real-time constraints, resiliency, and dataset generation to learn about the possible attacks.


2003 ◽  
Vol 79 (1) ◽  
pp. 132-146 ◽  
Author(s):  
Dennis Yemshanov ◽  
Ajith H Perera

We reviewed the published knowledge on forest succession in the North American boreal biome for its applicability in modelling forest cover change over large extents. At broader scales, forest succession can be viewed as forest cover change over time. Quantitative case studies of forest succession in peer-reviewed literature are reliable sources of information about changes in forest canopy composition. We reviewed the following aspects of forest succession in literature: disturbances; pathways of post-disturbance forest cover change; timing of successional steps; probabilities of post-disturbance forest cover change, and effects of geographic location and ecological site conditions on forest cover change. The results from studies in the literature, which were mostly based on sample plot observations, appeared to be sufficient to describe boreal forest cover change as a generalized discrete-state transition process, with the discrete states denoted by tree species dominance. In this paper, we outline an approach for incorporating published knowledge on forest succession into stochastic simulation models of boreal forest cover change in a standardized manner. We found that the lack of details in the literature on long-term forest succession, particularly on the influence of pre-disturbance forest cover composition, may be limiting factors in parameterizing simulation models. We suggest that the simulation models based on published information can provide a good foundation as null models, which can be further calibrated as detailed quantitative information on forest cover change becomes available. Key words: probabilistic model, transition matrix, boreal biome, landscape ecology


2013 ◽  
Vol 427-429 ◽  
pp. 1268-1271
Author(s):  
Xue Wen He ◽  
Ying Fei Sheng ◽  
Kuan Gang Fan ◽  
Le Ping Zheng ◽  
Qing Mei Cao

In view of the existing flaws of traditional manual observations, a new type of tailing reservoir safety monitoring and warning system based on ZigBee and LabVIEW was designed. The system chose SoC chip CC2530 as the RF transceiver and designed the low-power wireless sensor networks nodes to collect and process the data of tailing reservoir. It chose ZigBee 2007 as the network communication protocol, and uploaded the data to PC by RS232 serial port. The monitoring and warning interface of PC was completed with LabVIEW. The testing results show that the data transmission of the network is stable and the system is suitable for real-time monitoring and warning of the tungsten tailing reservoir.


1977 ◽  
Vol 3 (1/2) ◽  
pp. 126
Author(s):  
W. Brian Arthur ◽  
Geoffrey McNicoll

Author(s):  
Neil Kelley ◽  
Maureen Hand ◽  
Scott Larwood ◽  
Ed McKenna

The accurate numerical dynamic simulation of new large-scale wind turbine designs operating over a wide range of inflow environments is critical because it is usually impractical to test prototypes in a variety of locations. Large turbines operate in a region of the atmospheric boundary layer that currently may not be adequately simulated by present turbulence codes. In this paper, we discuss the development and use of a 42-m (137-ft) planar array of five, high-resolution sonic anemometers upwind of a 600-kW wind turbine at the National Wind Technology Center (NWTC). The objective of this experiment is to obtain simultaneously collected turbulence information from the inflow array and the corresponding structural response of the turbine. The turbulence information will be used for comparison with that predicted by currently available codes and establish any systematic differences. These results will be used to improve the performance of the turbulence simulations. The sensitivities of key elements of the turbine aeroelastic and structural response to a range of turbulence-scaling parameters will be established for comparisons with other turbines and operating environments. In this paper, we present an overview of the experiment, and offer examples of two observed cases of inflow characteristics and turbine response collected under daytime and nighttime conditions, and compare their turbulence properties with predictions.


2014 ◽  
Vol 565 ◽  
pp. 179-182 ◽  
Author(s):  
Yue Tao Ge ◽  
Xiao Ming Liu ◽  
Xiao Tong Yin

In order to realize wireless remoter not only securely but also quickly data transmission in the public communication network, the Tiny Encryption Algorithm (TEA) encryption and decryption algorithm is studied in this paper and the properties of TEA are analyzed. According to communication protocol of remoter, encryption and decryption program process are designed. Because of TEA encryption, remoter transmitter and receiver can communicate strongly in the public communication network.


Sign in / Sign up

Export Citation Format

Share Document