Challenges, Opportunities, and Dimensions of Cyber-Physical Systems - Advances in Systems Analysis, Software Engineering, and High Performance Computing
Latest Publications


TOTAL DOCUMENTS

15
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By IGI Global

9781466673120, 9781466673137

The focus of algorithmic design is to solve composite problems. Intelligent systems use intellectual concepts like evolutionary computation, artificial neural networks, fuzzy systems, and swarm intelligence to process natural intelligence models. Artificial intelligence is used as a part of intelligent systems to perform logic- and case-based reasoning. Systems like mechanical and electrical support systems are operated by utilizing Supervisory Control and Data Acquisition (SCADA) systems. These systems cannot accomplish their purpose, provided the control system deals with the reliability of it. In CPSs, dimensions of physical processes are taken by sensors and are processed in cyber subsystems to drive the actuators that affect the physical processors. CPSs are closed-loop systems. The adaptation and the prediction are the properties to be followed by the control strategies that are implemented in cyber subsystems. This chapter explores cyber physical control systems.


Along with the heterogeneous devices, Web-based content increases the necessity for computational services. However, recent trends make it difficult to execute such computations at the terminal side, whereas service providers often allow computations during different load operations. Many computational services are using conventional distributed systems, which provide successful packet transmission in IP networks. In this chapter, proxy architecture and its related tasks are discussed. Some of the necessary requirements, such as incremental scalability, 24x7 availability, and cost-effectiveness, are recognized for scalable network services. To administrate a large cluster and to construct a cluster-based scalable network services, a layered architecture is recommended. This architecture captures the scalable network service requirements and utilizes service-programming models to perform Transformation, Aggregation, Caching, and Customization (TACC) of Internet substance. For better performance, the architecture with the TACC programming model uses data semantics to create novel network services.


To make a network survivable it must be heterogeneous. The functionality of this network is defined by a set of protocols and its operations. In heterogeneous networks, if a protocol is weakened by any attack, it will not affect the entire network. Applying this heterogeneity concept, a new survivability paradigm is described in this chapter. This network architecture improves the network's heterogeneity without losing its interoperability. Several issues discovered in security and survivability applications can be converted into scheduling problems. To overcome this, a new model is described to support design and analysis with security and survivability concerns. A five-step model is introduced to transmute applications into model abstraction and representations with solutions resulting from scheduling algorithms. A reverse transformation converts the solutions back to the application domain.


Information security can be efficiently provided by the sound structured information and a set of specialized experts in the field of IT and CPS. The interconnection among the systems in the CPS imposes a new challenge in providing security to CPS. A concise study of CPS security is given in this chapter. The problem of secure control systems is also indentified and defined. The way the information security and control theory guards the system is explored. The security of CPSs can be enhanced using a particular set of challenges, which are also described later in this chapter. The resistance to malicious events is strengthening as cyber physical systems are part of critical structures. The CPSs are time sensitive in nature, unlike the distributed system where a little amount of delay is acceptable.


Cyber physical systems involve multi-domain models during the development process of the design. This chapter focuses on integrated design methodology that provides reliable relationships between various system models of heterogeneous types. Each model is linked with the base architecture over the abstraction of an architectural view framework. From quadrotor perspective, this framework compares system models from different domains. Present methods lack in modeling, analysis, and design of CPSs due to nonexistence of an integrated framework. To overcome these difficulties, an architectural level system model is defined to capture the structural interdependencies. A base architecture for the complete system is described in this chapter to confirm the structural reliability the model elements and components present in it. The usefulness of this process is exemplified in the quadrotor air vehicle.


As cyber physical system security is not satisfactory, the security of a particular infrastructure depends on both internal and other related vulnerabilities. Communications between components in the cyber and physical realms lead to unintentional information flow. This chapter describes the difficult communications that occurs between the cyber and physical domains and their impact on security. Assailants may be competent to initiate exclusive attacks to cyber physical systems. There are several types of attacks that affect the interactions between the cyber and physical devices, which might be in a passive way or in an active method. Even though the communication provides authenticity and confidentiality, a few attacks form some threats against ad hoc routing protocols as well as location-based security systems. It has been said that many attacks modify the activities of the targeted control system.


This chapter shows the interconnection issues in different wireless networks such as ad hoc networks and sensor networks. It also specifies the need for multicast routing protocols in mobile networks, because these wireless networks are suitable for multicast communication due to its inherent transmission ability. Based on the area to be covered, mechanism used for sensor deployment, and various properties of sensor network properties, different coverage formulations have been suggested. In addition, several constructions reachable areas and their expectations along with an outline of the explanations are described. Though 802.11 planned for organization-based systems, the Distributed Coordination Function (DCF) offered in 802.11 permits mobile networks to communicate with the channel exclusive of the base location. Several performance issues related to IEEE 802.11 are revealed. This chapter identifies the main reasons for performance losses and provides solutions for the scenarios that are specific to certain issues related to CPS.


This chapter deals with the CPS architectural style, which can be used to provide support to the plan and assessment of other structural designs for cyber physical systems. It also shows the interconnections between physical and cyber components. In this prototype architecture, the important attributes of this architecture for CPS, which helps to identify many research challenges, are described and explained. The authors also discuss the open information service structural design to deal with the issues related to management of data in CPS. Along with the single-layer and multi-layer survivability of architecture, a portable CPS structure, which is known as multi-layer widespread structure, is discussed. This system uses unlicensed and licensed networks with various spectrums to connect CPS through different gateways. A research-related wireless access network project is described.


The fast development of mobile computing has produced a wide variety of technologies that affect systems in the mobile computing realm. Even though mobile computing focuses the importance of interrelated systems, the qualifying of interoperability remains an important constraint. In this chapter, several techniques are explained to manage various heterogeneity characteristics along with the key concepts related to these systems. A general approach is described to manage the heterogeneity. It has been seen that to have a better performance in overlapping networks, it is necessary to switch between the networks due to mobility and congestion. This problem is overcome by overlay networks that identify the existing network and then select the best network and allow transmission from one node to another node in the same network or create a novel network. In this way, this architecture provides a way to transmit packets to the mobile host using the available network.


This chapter explores the concept of the Cyber Physical Internet (CPI) and discusses the design necessities of it. In addition, it provides the restrictions of the present networking concepts to satisfy these necessities. The structural design of protocol stack for CPI has an extra layer Cyber-Physical Layer (CY-PHY Layer) to offer a conceptual description of the properties and type of cyber physical information. To enable standard communication between heterogeneous systems, Cyber Physical System-Interconnection Protocol is used. This protocol is mainly designed for special CPSs, which require overall instruction and performance guarantee for cyber physical interaction. The main objective of this protocol is to offer CPSs heterogeneity at three different levels: function interoperability, policy regulation, and performance guarantee.


Sign in / Sign up

Export Citation Format

Share Document