Cyber-Physical Systems for Next-Generation Networks - Advances in Computer and Electrical Engineering
Latest Publications


TOTAL DOCUMENTS

11
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By IGI Global

9781522555100, 9781522555117

Author(s):  
Basman M. Alhafidh ◽  
William H. Allen

The process used to build an autonomous smart home system based on cyber-physical systems (CPS) principles has recently received increased attention from researchers and developers. However, there are many challenges to be resolved before designing and implementing such a system. In this chapter, the authors present a high-level design approach that simulates a smart home system by implementing three levels of the 5C architecture used in CPS modeling and uses well-known machine learning algorithms to predict future user actions. The simulation demonstrates how users will interact with the smart home system to make more efficient use of resources. The authors also present results from analyzing real-world user data to validate the accuracy of prediction of user actions. This research illustrates the benefits of considering CPS principles when designing a home autonomous system that reliably predicts a user's needs.


Author(s):  
Uttam Ghosh ◽  
Pushpita Chatterjee ◽  
Sachin Shetty

Software-defined networking (SDN) provides flexibility in controlling, managing, and dynamically reconfiguring the distributed heterogeneous smart grid networks. Considerably less attention has been received to provide security in SDN-enabled smart grids. Centralized SDN controller protects smart grid networks against outside attacks only. Furthermore, centralized SDN controller suffers from a single point of compromise and failure which is detrimental to security and reliability. This chapter presents a framework with multiple SDN controllers and security controllers that provides a secure and robust smart grid architecture. The proposed framework deploys a local IDS to provide security in a substation. Whereas a global IDS is deployed to provide security in control center and overall smart grid network, it further verifies the consequences of control-commands issued by SDN controller and SCADA master. Performance comparison and simulation result show that the proposed framework is efficient as compared to existing security frameworks for SDN-enabled smart grids.


Author(s):  
Guru Prasad Bhandari ◽  
Ratneshwer Gupta

Cyber-physical systems (CPSs) are co-engineered integrating with physical and computational components networks. Additionally, a CPS is a mechanism controlled or monitored by computer-based algorithms, tightly interacting with the internet and its users. This chapter presents the definitions relating to dependability, safety-critical and fault-tolerance of CPSs. These definitions are supplemented by other definitions like reliability, availability, safety, maintainability, integrity. Threats to dependability and security like faults, errors, failures are also discussed. Taxonomy of different faults and attacks in CPSs are also presented in this chapter. The main objective of this chapter is to give the general information about secure CPS to the learners for the further enhancement in the field of CPSs.


Author(s):  
Jiwa Abdullah ◽  
Nayef Abdulwahab Alduais

Within the last 20 years, wireless communication and network has been one of the fastest-growing research areas. Significant progress has been made in the fields of mobile ad hoc network (MANET) and wireless sensor networks (WSN). Very recently, the cyber-physical system (CPS) has emerged as a promising direction to enrich human-to-human, human to-object, and object-to-object interactions in the physical world as well as in the virtual world. The possibilities are enormous, such that CPS would adopt, and even nurture, the areas of MANET and WSN because more sensor inputs and richer network connectivity are required. The chapter reviews what has been developed in these fields, outlines the projection of what may happen in the field of CPS, and identifies further works. The authors identify the unique features of WSN, raising some CPS critical examples, and then directing the future challenges of CPS. In order to fully comprehend the connection of WSN to CPS, the authors provide some preliminaries of WSN and establish their necessary connections.


Author(s):  
Ali Ahmadinia ◽  
Ahmed Saeed

As computing devices have become an almost integral part of our lives, security of systems and protection of the sensitive data are emerging as very important issues. This is particularly evident for embedded systems which are often deployed in unprotected environments and at the same time being constrained by limited resources. Security and trust have also become important considerations in the design of virtually all modern embedded systems as they are utilized in critical and sensitive applications such as in transportation, national infrastructure, military equipment, banking systems, and medical devices. The increase in software content and network connectivity has made them vulnerable to fast spreading software-based attacks such as viruses and worms, which were hitherto primarily the concern of personal computers, servers, and the internet. This chapter discusses the basic concepts, security attacks types, and existing preventive measures in the field of embedded systems and multi-core systems.


Author(s):  
Antonio Marcos Alberti

Smart cities encompass a complex, diverse, and rich ecosystem with the potential to address humanity's biggest challenges. To fully support society demands, many emerging technologies should be gracefully integrated. Current architectures and platforms frequently address specific topics, requiring intricate coordination of partial solutions. In this context, interoperability of technological solutions is mandatory. Examples include interoperability of IETF standards (e.g., 6LowPAN, RPL, CoAP to other IEEE standards, such as 802.15.4, and Bluetooth). Designs based on these protocols are being largely employed worldwide. However, they have some limitations that deserve our attention. Recent examples, such as ramsomware and DDoS attacks, are concerning many people on the suitability of our current stacks. NovaGenesis (NG) is an alternative architecture for TCP/IP that has been already proofed. In this chapter, the NG model for smart cities is explored, presenting its benefits. Recent results in NG are summarized and discussed on the proposed scope.


Author(s):  
Valentina Franzoni

The robot gAItano is an intelligent hexapod robot, able to move in an environment of unknown size and perform some autonomous actions. It uses the RoboRealm software in order to filter and recognize color blobs in its artificial vision stream, activate a script (VBScript in our case, or C or Python scripts) to compute decisions based on perception, and send the output to actuators using the PIP protocol. gAItano is thus a rational computerized agent: autonomous, or semi-autonomous when remote controlled; reactive; based on model (e.g., the line). gAItano moves in an environment which is partially observable, stochastic, semi-episodic, static, or semi-dynamic in case of human intervention, continuous both on perceptions and actions, multi-agent, because of human intervention that can have collaborative nature (e.g., when the human moves a block or the robot to increase his performance), or competitive (e.g., when the human moves a block or the robot to inhibit his performance).


Author(s):  
Shakila Mahjabin Tonni ◽  
Sazia Parvin ◽  
Amjad Gawanmeh ◽  
Joanna Jackson

Secured cyber-physical systems (CPS) requires reliable handling of a high volume of sensitive data, which is in many cases integrated from several distributed sources. This data can usually be interconnected with physical applications, such as power grids or SCADA systems. As most of these datasets store records using numerical values, many of the microaggregation techniques are developed and tested on numerical data. These algorithms are not suitable when the data is stored as it is containing both numerical and categorical data are stored. In this chapter, the available microaggregation techniques are explored and assessed with a new microaggregation technique which can provide data anonymity regardless of its type. In this method, records are clustered into several groups using an evolutionary attribute grouping algorithm and groups are aggregated using a new operator.


Author(s):  
Sa'ed Abed ◽  
Areej Abdelaal ◽  
Amjad Gawanmeh

Energy demand has increased significantly in the recent years due to the emerging of new technologies and industries, in particular in the developing countries. This increase requires much more developed power grid system than the existing traditional ones. Smart grid (SG) offers a potential solution to this problem. Being one of the most needed and complex cyber-physical systems (CPS), SG has been addressed exhaustively by researchers, from different views and aspects. However, energy optimization yet needs much more studying and examination. Therefore, this chapter presents a comprehensive investigation and analysis of the state-of-the-art developments in SG as a CPS with emphasis on energy optimization techniques and challenges. It also surveys the main challenges facing the SG considering CPS factors and the remarkable accomplishments and techniques in addressing these challenges. In addition, the document contrasts between different techniques according to their efficiency, usage, and feasibility. Moreover, this work explores the most effective applications of the SG as a CPS.


Author(s):  
Yuri P. Pavlov ◽  
Evgeniy Ivanov Marinov

Modeling of complex processes with human participations causes difficulties due to the lack of precise measurement coming from the qualitative nature of the human notions. This provokes the need of utilization of empirical knowledge expressed cardinally. An approach for solution of these problems is utility theory. As cyber-physical systems are integrations of computation, networking, and physical processes in interaction with the user is needed feedback loops, the aim of the chapter is to demonstrate the possibility to describe quantitatively complex processes with human participation. This approach permits analytical representations of the users' preferences as objective utility functions and modeling of the complex system “human-process.” The mathematical technique allows CPS users dialog and is demonstrated by two case studies, portfolio allocation, and modeling of a competitive trade by a finite game and utility preference representation of the trader. The presented formulations could serve as foundation of development of decision support tools and decision control.


Sign in / Sign up

Export Citation Format

Share Document