Advances in Systems Analysis, Software Engineering, and High Performance Computing - Solutions for Cyber-Physical Systems Ubiquity
Latest Publications


TOTAL DOCUMENTS

15
(FIVE YEARS 0)

H-INDEX

2
(FIVE YEARS 0)

Published By IGI Global

9781522528456, 9781522528463

Author(s):  
Georg Macher ◽  
Eric Armengaud ◽  
Christian Kreiner ◽  
Eugen Brenner ◽  
Christoph Schmittner ◽  
...  

The exciting new features, such as advanced driver assistance systems, fleet management systems, and autonomous driving, drive the need for built-in security solutions and architectural designs to mitigate emerging security threats. Thus, cybersecurity joins reliability and safety as a cornerstone for success in the automotive industry. As vehicle providers gear up for cybersecurity challenges, they can capitalize on experiences from many other domains, but nevertheless must face several unique challenges. Therefore, this article focuses on the enhancement of state-of-the-art development lifecycle for automotive cyber-physical systems toward the integration of security, safety and reliability engineering methods. Especially, four engineering approaches (HARA at concept level, FMEA and FTA at design level and HSI at implementation level) are extended to integrate security considerations into the development lifecycle.


Author(s):  
Haris Isakovic ◽  
Radu Grosu

A Cyber-Physical System (CPS) describes a system or a system-of-systems closely and actively coupled with environment. It comprises the digital intelligence system, a co-dependent physical system (i.e., electrical, mechanical) and the system environment. Since the beginning of modern computer systems integration was ever present challenge, from the huge single room computers to the IoT. Today applications interleave and build larger systems with different system requirements and properties. Implementation of safety critical applications together with non-critical applications within the same platform is almost inevitable in modern industrial systems. This article provides a retrospective overview of the major integration challenges and the current problems in mixed-criticality environments. Finally, it provides an insight in a hardware solution which creates deterministic platform for mixed-criticality applications.


Author(s):  
Stephanie Grubmüller ◽  
Georg Stettinger ◽  
Martin Benedikt ◽  
Daniel Watzenig

A cyber-physical system (CPS) is a composition of an embedded computer, a network and a physical process. Usually, the plant, which represents the physical part, is controlled by an embedded system, which consists of computation, communication and control elements, via the global network. This contribution focuses on networked control systems (NCSs) which represents a specific class of CPS. As the problems of CPSs and NCSs are quite similar the goal is to transfer well developed techniques of NCSs to CPSs for analysis purposes. NCSs deal with the analysis of the interaction between the physical system and the cyber system. A main challenge of a control engineer is the development of stable and robust controllers for a NCS. The same goal is present in the design of CPS. To ensure this goal the analysis of such a feedback system has to be performed which is not straight forward and limited by the used modeling approach. This work compares different state-of-the-art modeling approaches for NCSs and stability analysis methods therefore.


Author(s):  
Andreas Zankl ◽  
Hermann Seuschek ◽  
Gorka Irazoqui ◽  
Berk Gulmezoglu

The Internet of Things (IoT) rapidly closes the gap between the virtual and the physical world. As more and more information is processed through this expanding network, the security of IoT devices and backend services is increasingly important. Yet, side-channel attacks pose a significant threat to systems in practice, as the microarchitectures of processors, their power consumption, and electromagnetic emanation reveal sensitive information to adversaries. This chapter provides an extensive overview of previous attack literature. It illustrates that microarchitectural attacks can compromise the entire IoT ecosystem: from devices in the field to servers in the backend. A subsequent discussion illustrates that many of today's security mechanisms integrated in modern processors are in fact vulnerable to the previously outlined attacks. In conclusion to these observations, new countermeasures are needed that effectively defend against both microarchitectural and power/EM based side-channel attacks.


Author(s):  
Johannes Iber ◽  
Tobias Rauter ◽  
Christian Kreiner

The advancement and interlinking of cyber-physical systems offer vast new opportunities for industry. The fundamental threat to this progress is the inherent increase of complexity through heterogeneous systems, software, and hardware that leads to fragility and unreliability. Systems cannot only become more unreliable, modern industrial control systems also have to face hostile security attacks that take advantage of unintended vulnerabilities overseen during development and deployment. Self-adaptive software systems offer means of dealing with complexity by observing systems externally. In this chapter the authors present their ongoing research on an approach that applies a self-adaptive software system in order to increase the reliability and security of control devices for hydro-power plant units. The applicability of the approach is demonstrated by two use cases. Further, the chapter gives an introduction to the field of self-adaptive software systems and raises research challenges in the context of cyber-physical systems.


Author(s):  
Elias Yaacoub

Wireless sensor networks consisting of several sensors deployed in a given area, under an internet of things (IoT) paradigm, are considered. Sensor nodes may or may not be close enough to communicate with each other in order to perform collaborative transmissions. A communication protocol based on random access and orthogonal frequency division multiple access (OFDMA) is proposed in order to allow the sensors to operate autonomously by transmitting their measured data to a central processing system, where it is processed and analyzed. Whenever it has data to transmit, each sensor independently accesses a time-frequency slot in a probabilistic manner to avoid collisions. A controlling entity, e.g., a central base station (BS) covering a certain sensor deployment area receives the sensor transmissions and provides synchronization information by periodically transmitting a pilot signal over the available OFDMA subcarriers. Sensors use this signal for channel quality estimation. Results show that this approach performs well in terms of transmission data rates and collision probability.


Author(s):  
Laszlo Z. Varga

Ubiquitous IoT systems open new ground in the automotive domain. With the advent of autonomous vehicles, there will be several actors that adapt to changes in traffic, and decentralized adaptation will be a new type of issue that needs to be studied. This chapter investigates the effects of adaptive route planning when real-time online traffic information is exploited. Simulation results show that if the agents selfishly optimize their actions, then in some situations the ubiquitous IoT system may fluctuate and the agents may be worse off with real-time data than without real-time data. The proposed solution to this problem is to use anticipatory techniques, where the future state of the environment is predicted from the intentions of the agents. This chapter concludes with this conjecture: if simultaneous decision making is prevented, then intention-propagation-based prediction can limit the fluctuation and help the ubiquitous IoT system converge to the Nash equilibrium.


Author(s):  
Hannes Plank ◽  
Josef Steinbaeck ◽  
Norbert Druml ◽  
Christian Steger ◽  
Gerald Holweg

In recent years, consumer electronics became increasingly location and context-aware. Novel applications, such as augmented and virtual reality have high demands in precision, latency and update rate in their tracking solutions. 3D imaging systems have seen a rapid development in the past years. By enabling a manifold of systems to become location and context-aware, 3D imaging has the potential to become a part of everyone's daily life. In this chapter, we discuss 3D imaging technologies and their applications in localization, tracking and 3D context determination. Current technologies and key concepts are depicted and open issues are investigated. The novel concept of location-aware optical communication based on Time-of-Flight depth sensors is introduced. This communication method might close the gap between high performance tracking and localization. The chapter finally provides an outlook on future concepts and work-in progress technologies, which might introduce a new set of paradigms for location-aware cyber-physical systems in the Internet of Things.


Author(s):  
Tobias Rauter ◽  
Johannes Iber ◽  
Christian Kreiner

Due to the need of increased cooperation and connectivity, security is getting a vital property of industrial control systems. Besides system hardening, the detection of security breaches in different subsystems has been becoming a research-focus recently. This chapter summarizes the work concerning anomaly detection at different system levels. The, a system that maintains availability and integrity of distributed control systems through automated reconfiguration in case of integrity violations is proposed. We aim to detect such integrity violations through integrity reporting. This is a well-known technology, albeit not widely used in real system because of scalability problems. In this chapter, three different remote attestation methods (binary, privilege and signature-based) are integrated into a remote terminal unit to analyze and discuss the benefits and drawbacks of each method. Depending on the actual RTU architecture and already in-place development and deployment processes, the integration of remote attestation may be feasible for industrial control systems.


Author(s):  
George Kornaros ◽  
Ernest Wozniak ◽  
Oliver Horst ◽  
Nora Koch ◽  
Christian Prehofer ◽  
...  

Cyber-physical systems (CPS) are devices with sensors and actuators which link the physical with the virtual world. There is a strong trend towards open systems, which can be extended during operation by instantly adding functionalities on demand. We discuss this trend in the context of automotive, medical and industrial automation systems. The goal of this chapter is to elaborate the research challenges of ensuring security in these new platforms for such open systems. A main problem is that such CPS apps shall be able to access and modify safety critical device internals. Cyber-physical attacks can affect the integrity, availability and confidentiality in CPS. Examples range from deception based attacks such as false-data-injection, sensor and actuator attacks, replay attacks, and also denial-of-service attacks. Hence, new methods are required to develop an end-to-end solution for development and deployment of trusted apps. This chapter presents the architecture approach and its key components, and methods for open CPS apps, including tool chain and development support.


Sign in / Sign up

Export Citation Format

Share Document