This paper studies a finite-time adaptive fractionalorder fault-tolerant control(FTC)scheme for the slave position tracking of the teleoperating cyber physical system(TCPS)with external disturbances and actuator fault...This paper studies a finite-time adaptive fractionalorder fault-tolerant control(FTC)scheme for the slave position tracking of the teleoperating cyber physical system(TCPS)with external disturbances and actuator faults.Based on the fractional Lyapunov stability theory and the finite-time stability theory,a fractional-order nonsingular fast terminal sliding mode(FONFTSM)control law is proposed to promote the tracking and fault tolerance performance of the considered system.Meanwhile,the adaptive fractional-order update laws are designed to cope with the unknown upper bounds of the unknown actuator faults and external disturbances.Furthermore,the finite-time stability of the closed-loop system is proved.Finally,comparison simulation results are also provided to show the validity and the advantages of the proposed techniques.展开更多
A cyber physical system(CPS)is a complex system that integrates sensing,computation,control and networking into physical processes and objects over Internet.It plays a key role in modern industry since it connects phy...A cyber physical system(CPS)is a complex system that integrates sensing,computation,control and networking into physical processes and objects over Internet.It plays a key role in modern industry since it connects physical and cyber worlds.In order to meet ever-changing industrial requirements,its structures and functions are constantly improved.Meanwhile,new security issues have arisen.A ubiquitous problem is the fact that cyber attacks can cause significant damage to industrial systems,and thus has gained increasing attention from researchers and practitioners.This paper presents a survey of state-of-the-art results of cyber attacks on cyber physical systems.First,as typical system models are employed to study these systems,time-driven and event-driven systems are reviewed.Then,recent advances on three types of attacks,i.e.,those on availability,integrity,and confidentiality are discussed.In particular,the detailed studies on availability and integrity attacks are introduced from the perspective of attackers and defenders.Namely,both attack and defense strategies are discussed based on different system models.Some challenges and open issues are indicated to guide future research and inspire the further exploration of this increasingly important area.展开更多
Cyber physical system(CPS)provides more powerful service by cyber and physical features through the wireless communication.As a kind of social organized network system,a fundamental question of CPS is to achieve servi...Cyber physical system(CPS)provides more powerful service by cyber and physical features through the wireless communication.As a kind of social organized network system,a fundamental question of CPS is to achieve service self-organization with its nodes autonomously working in both physical and cyber environments.To solve the problem,the social nature of nodes in CPS is firstly addressed,and then a formal social semantic descriptions is presented for physical environment,node service and task in order to make the nodes communicate automatically and physical environment sensibly.Further,the Horn clause is introduced to represent the reasoning rules of service organizing.Based on the match function,which is defined for measurement between semantics,the semantic aware measurement is presented to evaluate whether environment around a node can satisfy the task requirement or not.Moreover,the service capacity evaluation method for nodes is addressed to find out the competent service from both cyber and physical features of nodes.According to aforementioned two measurements,the task semantic decomposition algorithm and the organizing matrix are defined and the service self-organizing mechanism for CPS is proposed.Finally,examinations are given to further verify the efficiency and feasibility of the proposed mechanism.展开更多
State-of-the-art technologies such as the Internet of Things(IoT),cloud computing(CC),big data analytics(BDA),and artificial intelligence(AI)have greatly stimulated the development of smart manufacturing.An important ...State-of-the-art technologies such as the Internet of Things(IoT),cloud computing(CC),big data analytics(BDA),and artificial intelligence(AI)have greatly stimulated the development of smart manufacturing.An important prerequisite for smart manufacturing is cyber-physical integration,which is increasingly being embraced by manufacturers.As the preferred means of such integration,cyber-physical systems(CPS)and digital twins(DTs)have gained extensive attention from researchers and practitioners in industry.With feedback loops in which physical processes affect cyber parts and vice versa,CPS and DTs can endow manufacturing systems with greater efficiency,resilience,and intelligence.CPS and DTs share the same essential concepts of an intensive cyber-physical connection,real-time interaction,organization integration,and in-depth collaboration.However,CPS and DTs are not identical from many perspectives,including their origin,development,engineering practices,cyber-physical mapping,and core elements.In order to highlight the differences and correlation between them,this paper reviews and analyzes CPS and DTs from multiple perspectives.展开更多
This article addresses the secure finite-time tracking problem via event-triggered command-filtered control for nonlinear time-delay cyber physical systems(CPSs)subject to cyber attacks.Under the attack circumstance,t...This article addresses the secure finite-time tracking problem via event-triggered command-filtered control for nonlinear time-delay cyber physical systems(CPSs)subject to cyber attacks.Under the attack circumstance,the output and state information of CPSs is unavailable for the feedback design,and the classical coordinate conversion of the iterative process is incompetent in relation to the tracking task.To solve this,a new coordinate conversion is proposed by considering the attack gains and the reference signal simultaneously.By employing the transformed variables,a modified fractional-order command-filtered signal is incorporated to overcome the complexity explosion issue,and the Nussbaum function is used to tackle the varying attack gains.By systematically constructing the Lyapunov-Krasovskii functional,an adaptive event-triggered mechanism is presented in detail,with which the communication resources are greatly saved,and the finite-time tracking of CPSs under cyber attacks is guaranteed.Finally,an example demonstrates the effectiveness.展开更多
Recently,with the growth of cyber physical systems(CPS),several applications have begun to deploy in the CPS for connecting the cyber space with the physical scale effectively.Besides,the cloud computing(CC)enabled CP...Recently,with the growth of cyber physical systems(CPS),several applications have begun to deploy in the CPS for connecting the cyber space with the physical scale effectively.Besides,the cloud computing(CC)enabled CPS offers huge processing and storage resources for CPS thatfinds helpful for a range of application areas.At the same time,with the massive development of applica-tions that exist in the CPS environment,the energy utilization of the cloud enabled CPS has gained significant interest.For improving the energy effective-ness of the CC platform,virtualization technologies have been employed for resource management and the applications are executed via virtual machines(VMs).Since effective scheduling of resources acts as an important role in the design of cloud enabled CPS,this paper focuses on the design of chaotic sandpi-per optimization based VM scheduling(CSPO-VMS)technique for energy effi-cient CPS.The CSPO-VMS technique is utilized for searching for the optimum VM migration solution and it helps to choose an effective scheduling strategy.The CSPO algorithm integrates the concepts of traditional SPO algorithm with the chaos theory,which substitutes the main parameter and combines it with the chaos.In order to improve the process of determining the global optimum solutions and convergence rate of the SPO algorithm,the chaotic concept is included in the SPO algorithm.The CSPO-VMS technique also derives afitness function to choose optimal scheduling strategy in the CPS environment.In order to demonstrate the enhanced performance of the CSPO-VMS technique,a wide range of simulations were carried out and the results are examined under varying aspects.The simulation results ensured the improved performance of the CSPO-VMS technique over the recent methods interms of different measures.展开更多
A cyber physical energy system(CPES)involves a combination of pro-cessing,network,and physical processes.The smart grid plays a vital role in the CPES model where information technology(IT)can be related to the physic...A cyber physical energy system(CPES)involves a combination of pro-cessing,network,and physical processes.The smart grid plays a vital role in the CPES model where information technology(IT)can be related to the physical system.At the same time,the machine learning(ML)modelsfind useful for the smart grids integrated into the CPES for effective decision making.Also,the smart grids using ML and deep learning(DL)models are anticipated to lessen the requirement of placing many power plants for electricity utilization.In this aspect,this study designs optimal multi-head attention based bidirectional long short term memory(OMHA-MBLSTM)technique for smart grid stability predic-tion in CPES.The proposed OMHA-MBLSTM technique involves three subpro-cesses such as pre-processing,prediction,and hyperparameter optimization.The OMHA-MBLSTM technique employs min-max normalization as a pre-proces-sing step.Besides,the MBLSTM model is applied for the prediction of stability level of the smart grids in CPES.At the same time,the moth swarm algorithm(MHA)is utilized for optimally modifying the hyperparameters involved in the MBLSTM model.To ensure the enhanced outcomes of the OMHA-MBLSTM technique,a series of simulations were carried out and the results are inspected under several aspects.The experimental results pointed out the better outcomes of the OMHA-MBLSTM technique over the recent models.展开更多
Cyber physical systems (CPSs) can be found nowadays in various fields of activity. The increased interest for these systems as evidenced by the large number of applications led to complex research regarding the most s...Cyber physical systems (CPSs) can be found nowadays in various fields of activity. The increased interest for these systems as evidenced by the large number of applications led to complex research regarding the most suitable methods for design and development. A promising solution for specification, visualization, and documentation of CPSs uses the Object Management Group (OMG) unified modeling language (UML). UML models allow an intuitive approach for embedded systems design, helping end-users to specify the requirements. However, the UML models are represented in an informal language. Therefore, it is difficult to verify the correctness and completeness of a system design. The object constraint language (OCL) was defined to add constraints to UML, but it is deficient in strict notations of mathematics and logic that permits rigorous analysis and reasoning about the specifications. In this paper, we investigated how CPS applications modeled using UML deployment diagrams could be formally expressed and verified. We used Z language constructs and prototype verification system (PVS) as formal verification tools. Considering some relevant case studies presented in the literature, we investigated the opportunity of using this approach for validation of static properties in CPS UML models.展开更多
Cyber physical systems(CPSs) incorporate computation, communication, and physical processes. The deep coupling and continuous interaction between such processes lead to a significant increase in complexity in the desi...Cyber physical systems(CPSs) incorporate computation, communication, and physical processes. The deep coupling and continuous interaction between such processes lead to a significant increase in complexity in the design and implementation of CPSs. Consequently, whereas developing CPSs from scratch is inefficient, developing them with the aid of CPS run-time supporting platforms can be efficient. In recent years, much research has been actively conducted on CPS run-time supporting platforms. However, few surveys have been conducted on these platforms. In this paper, we analyze and evaluate existing CPS run-time supporting platforms by first classifying them into three categories from the viewpoint of software architecture: component-based platforms, service-based platforms, and agent-based platforms. Then, for each type, we detail its design philosophy, key technical problems, and corresponding solutions with specific use cases. Subsequently, we compare existing platforms from two aspects: construction approaches for CPS tasks and support for non-functional properties. Finally, we outline several important future research issues.展开更多
This paper introduces a CPS application for intelligent aeroplane assembly.At first,the CPS structure is presented,which acquires the characteristics of general CPS and enables“simulation-based planning and control”...This paper introduces a CPS application for intelligent aeroplane assembly.At first,the CPS structure is presented,which acquires the characteristics of general CPS and enables“simulation-based planning and control”to achieve high level intelligent assembly.Then the paper puts forward data fusion estimation algorithm under synchronous and asynchronous sampling,respectively.The experiment shows that global optimal distributed fusion estimation under synchronized sampling proves to be closer to the actual value compared with ordinary weighted estimation,and multi-scale distributed fusion estimation algorithm of wavelet under asynchronous sampling does not need time registration,it can also directly link to data,and the error is smaller.This paper presents hybrid control strategy under the circumstance of joint action of the inner and outer loop to address the problems caused by the less controllable feature of the parallel mechanism when undertaking online process simulation and control.A robust adaptive sliding mode controller is designed based on disturbance observer to restrain inner interference and maintain robustness.At the same time,an outer collaborative trajectory planning is also designed.All the experiment results show the feasibility of above proposed methods.展开更多
Automotive cyber physical systems(CPSs)are ever more utilizing wireless technology for V2X communication as a potential way out for challenges regarding collision detection,wire strap up troubles and collision avoidan...Automotive cyber physical systems(CPSs)are ever more utilizing wireless technology for V2X communication as a potential way out for challenges regarding collision detection,wire strap up troubles and collision avoidance.However,security is constrained as a result of the energy and performance limitations of modem wireless systems.Accordingly,the need for efficient secret key generation and management mechanism for secured communication among computationally weak wireless devices has motivated the introduction of new authentication protocols.Recently,there has been a great interest in physical layer based secret key generation schemes by utilizing channel reciprocity.Consequently,it is observed that the sequence generated by two communicating parties contain mismatched bits which need to be reconciled by exchanging information over a public channel.This can be an immense security threat as it may let an adversary attain and recover segments of the key in known channel conditions.We proposed Hopper-Blum based physical layer(HB-PL)authentication scheme in which an enhanced physical layer key generation method integrates the Hopper-Blum(HB)authentication protocol.The information collected from the shared channel is used as secret keys for the HB protocol and the mismatched bits are used as the induced noise for learning parity with noise(LPN)problem.The proposed scheme aims to provide a way out for bit reconciliation process without leakage of information over a public channel.Moreover,HB protocol is computationally efficient and simple which helps to reduce the number of exchange messages during the authentication process.We have performed several experiments which show that our proposed design can generate secret keys with improved security strength and high performance in comparison to the current authentication techniques.Our scheme requires less than 55 exchange messages to achieve more than 95%of correct authentication.展开更多
This paper focuses on the energy optimal operation problem of microgrids(MGs) under stochastic environment.The deterministic method of MGs operation is often uneconomical because it fails to consider the high randomne...This paper focuses on the energy optimal operation problem of microgrids(MGs) under stochastic environment.The deterministic method of MGs operation is often uneconomical because it fails to consider the high randomness of unconventional energy resources.Therefore,it is necessary to develop a novel operation approach combining the uncertainty in the physical world with modeling strategy in the cyber system.This paper proposes an energy scheduling optimization strategy based on stochastic programming model by considering the uncertainty in MGs.The goal is to minimize the expected operation cost of MGs.The uncertainties are modeled based on autoregressive moving average(ARMA) model to expose the effects of physical world on cyber world.Through the comparison of the simulation results with deterministic method,it is shown that the effectiveness and robustness of proposed stochastic energy scheduling optimization strategy for MGs are valid.展开更多
Risk assessment is essential for the safe and reliable operation of cyber physical power system. Traditional security risk assessment methods do not take integration of cyber system and physical system of power grid i...Risk assessment is essential for the safe and reliable operation of cyber physical power system. Traditional security risk assessment methods do not take integration of cyber system and physical system of power grid into account. In order to solve this problem, security risk assessment algorithm of cyber physical power system based on rough set and gene expression programming is proposed. Firstly, fast attribution reduction based on binary search algorithm is presented. Secondly, security risk assessment function for cyber physical power system is mined based on gene expression programming. Lastly, security risk levels of cyber physical power system are predicted and analyzed by the above function model. Experimental results show that security risk assessment function model based on the proposed algorithm has high efficiency of function mining, accuracy of security risk level prediction and strong practicality.展开更多
Recently,cyber physical system(CPS)has gained significant attention which mainly depends upon an effective collaboration with computation and physical components.The greatly interrelated and united characteristics of ...Recently,cyber physical system(CPS)has gained significant attention which mainly depends upon an effective collaboration with computation and physical components.The greatly interrelated and united characteristics of CPS resulting in the development of cyber physical energy systems(CPES).At the same time,the rising ubiquity of wireless sensor networks(WSN)in several application areas makes it a vital part of the design of CPES.Since security and energy efficiency are the major challenging issues in CPES,this study offers an energy aware secure cyber physical systems with clustered wireless sensor networks using metaheuristic algorithms(EASCPSMA).The presented EASCPS-MA technique intends to attain lower energy utilization via clustering and security using intrusion detection.The EASCPSMA technique encompasses two main stages namely improved fruit fly optimization algorithm(IFFOA)based clustering and optimal deep stacked autoencoder(OSAE)based intrusion detection.Besides,the optimal selection of stacked autoencoder(SAE)parameters takes place using root mean square propagation(RMSProp)model.The extensive performance validation of the EASCPS-MA technique takes place and the results are inspected under varying aspects.The simulation results reported the improved effectiveness of the EASCPS-MA technique over other recent approaches interms of several measures.展开更多
The distributed hierarchical control based on multi-agent system(MAS) is the main control method of micro-grids.By allowing more flexible interactions between computing components and their physical environments,cyber...The distributed hierarchical control based on multi-agent system(MAS) is the main control method of micro-grids.By allowing more flexible interactions between computing components and their physical environments,cyber physical system(CPS) presents a new approach for the distributed hierarchical engineering system,with micro-grids included.The object of this paper is to integrate the CPS concept with MAS technology and propose a new control framework for micro-grids.With the analysis of the operating mode and control method of micro-grids,the cyber physical control concepts of ontologybased semantic agent are discussed.Then an MAS-based architecture of cyber physical micro-grid system and an intelligent electronic device(IED) function structure are proposed.Finally,in order to operate and test the cyber physical micro-grid concept,an integrated simulation model is presented.展开更多
As cyber physical systems,microgrids(MGs),with distributed generations and energy management systems,can improve the reliability of power supply for customers in MGs.To quantify the reliability of isolated MGs,a cyber...As cyber physical systems,microgrids(MGs),with distributed generations and energy management systems,can improve the reliability of power supply for customers in MGs.To quantify the reliability of isolated MGs,a cyber-physical assessment model is proposed.In this model,the circuit breakers and distributed energy resources are treated as the coupling elements between the cyber system and physical system,where the circuit breakers are uniquely modelled by using the Markov process theory based on the indirect interdependencies between cyber physical elements.For the cyber system,the reliability model of communication networks is formulated based on the link connectivity evaluation method.For the physical system,a system state generating method is presented to account for the optimal operation strategy,which considers the influence of the optimization strategy on the failure consequence analysis.With the proposed cyber and physical reliability models,the sequential Monte Carlo(SMC)simulation method is adopted to assess the reliability of islanded MGs.Simulations are carried out on a test system,and results verify the feasibility and effectiveness of proposed assessment method.Furthermore,one application of the proposed method is on the parameter setting of the cyber system,in terms of enhancing MGs reliability.展开更多
Smart manufacturing refers to optimization techniques that are implemented in production operations by utilizing advanced analytics approaches. With the widespread increase in deploying industrial internet of things(I...Smart manufacturing refers to optimization techniques that are implemented in production operations by utilizing advanced analytics approaches. With the widespread increase in deploying industrial internet of things(IIOT) sensors in manufacturing processes, there is a progressive need for optimal and effective approaches to data management.Embracing machine learning and artificial intelligence to take advantage of manufacturing data can lead to efficient and intelligent automation. In this paper, we conduct a comprehensive analysis based on evolutionary computing and neural network algorithms toward making semiconductor manufacturing smart.We propose a dynamic algorithm for gaining useful insights about semiconductor manufacturing processes and to address various challenges. We elaborate on the utilization of a genetic algorithm and neural network to propose an intelligent feature selection algorithm. Our objective is to provide an advanced solution for controlling manufacturing processes and to gain perspective on various dimensions that enable manufacturers to access effective predictive technologies.展开更多
This note addresses diagnosis and performance degradation detection issues from an integrated viewpoint of functionality maintenance and cyber security of automatic control systems.It calls for more research attention...This note addresses diagnosis and performance degradation detection issues from an integrated viewpoint of functionality maintenance and cyber security of automatic control systems.It calls for more research attention on three aspects:(i)application of control and detection uni ed framework to enhancing the diagnosis capability of feedback control systems,(ii)projection-based fault detection,and complementary and explainable applications of projection-and machine learning-based techniques,and(iii)system performance degradation detection that is of elemental importance for today's automatic control systems.Some ideas and conceptual schemes are presented and illustrated by means of examples,serving as convincing arguments for research e orts in these aspects.They would contribute to the future development of capable diagnosis systems for functionality safe and cyber secure automatic control systems.展开更多
Cyber-Physical System(CPS)involves the combination of physical processes with computation and communication systems.The recent advancementsmade in cloud computing,Wireless Sensor Network(WSN),healthcare sensors,etc.te...Cyber-Physical System(CPS)involves the combination of physical processes with computation and communication systems.The recent advancementsmade in cloud computing,Wireless Sensor Network(WSN),healthcare sensors,etc.tend to develop CPS as a proficient model for healthcare applications especially,home patient care.Though several techniques have been proposed earlier related to CPS structures,only a handful of studies has focused on the design of CPS models for health care sector.So,the proposal for a dedicated CPS model for healthcare sector necessitates a significant interest to ensure data privacy.To overcome the challenges,the current research paper designs a Deep Learning-based Intrusion Detection and Image Classification for Secure CPS(DLIDIC-SCPS)model for healthcare sector.The aim of the proposed DLIDIC-SCPS model is to achieve secure image transmission and image classification process for CPS in healthcare sector.Primarily,data acquisition takes place with the help of sensors and detection of intrusions is performed using Fuzzy Deep Neural Network(FDNN)technique.Besides,Multiple Share Creation(MSC)approach is used to create several shares of medical image so as to accomplish security.Also,blockchain is employed as a distributed data storage entity to create a ledger that provides access to the client.For image classification,Inception v3 with Fuzzy Wavelet Neural Network(FWNN)is utilized that diagnose the disease from the applied medical image.Finally,Salp Swarm Algorithm(SSA)is utilized to fine tune the parameters involved in WNN model,thereby boosting its classification performance.A wide range of simulations was carried out to highlight the superiority of the proposed DLIDIC-SCPS technique.The simulation outcomes confirm that DLIDIC-SCPS approach demonstrates promising results in terms of security,privacy,and image classification outcomes over recent state-of-the-art techniques.展开更多
Snow cover is an important parameter in the fields of computer modeling,engineering technology and energy development.With the extensive growth of novel hardware and software compositions creating smart,cyber physical...Snow cover is an important parameter in the fields of computer modeling,engineering technology and energy development.With the extensive growth of novel hardware and software compositions creating smart,cyber physical systems’(CPS)efficient end-to-end workflows.In order to provide accurate snow detection results for the CPS’s terminal,this paper proposed a snow cover detection algorithm based on the unsupervised Gaussian mixture model(GMM)for the FY-4A satellite data.At present,most snow cover detection algorithms mainly utilize the characteristics of the optical spectrum,which is based on the normalized difference snow index(NDSI)with thresholds in different wavebands.These algorithms require a large amount of manually labeled data for statistical analysis to obtain the appropriate thresholds for the study area.Consideration must be given to both the high and low elevations in the study area.It is difficult to extract all snow by a fixed threshold in mountainous and rugged terrains.In this research,we avoid relying on a manual analysis for different elevations.Therefore,an algorithm based on the GMM is proposed,integrating the threshold-based algorithm and the GMM.First,the threshold-based algorithm with transferred thresholds from other satellites’analysis results are used to coarsely classify the surface objects.These results are then used to initialize the parameters of the GMM.Finally,the parameters of that model are updated by an expectation-maximum(EM)iteration algorithm,and the final results are outputted when the iterative conditions end.The results show that this algorithm can adjust itself to mountainous terrain with different elevations,and exhibits a better performance than the threshold-based algorithm.Compared with orbit satellites’snow products,the accuracy of the algorithm used for FY-4A is improved by nearly 2%,and the snow detection rate is increased by nearly 6%.Moreover,compared with microwave sensors’snow products,the accuracy is increased by nearly 3%.The validation results show that the proposed algorithm can be adapted to a complex terrain environment in mountainous areas and exhibits good performance under a transferred threshold without manually assigned labels.展开更多
基金supported by the National Natural Science Foundation of China(61973331,61973257)the National Key Research and Development Plan Programs of China(2018YFB0106101).
文摘This paper studies a finite-time adaptive fractionalorder fault-tolerant control(FTC)scheme for the slave position tracking of the teleoperating cyber physical system(TCPS)with external disturbances and actuator faults.Based on the fractional Lyapunov stability theory and the finite-time stability theory,a fractional-order nonsingular fast terminal sliding mode(FONFTSM)control law is proposed to promote the tracking and fault tolerance performance of the considered system.Meanwhile,the adaptive fractional-order update laws are designed to cope with the unknown upper bounds of the unknown actuator faults and external disturbances.Furthermore,the finite-time stability of the closed-loop system is proved.Finally,comparison simulation results are also provided to show the validity and the advantages of the proposed techniques.
基金supported by Institutional Fund Projects(IFPNC-001-135-2020)technical and financial support from the Ministry of Education and King Abdulaziz University,DSR,Jeddah,Saudi Arabia。
文摘A cyber physical system(CPS)is a complex system that integrates sensing,computation,control and networking into physical processes and objects over Internet.It plays a key role in modern industry since it connects physical and cyber worlds.In order to meet ever-changing industrial requirements,its structures and functions are constantly improved.Meanwhile,new security issues have arisen.A ubiquitous problem is the fact that cyber attacks can cause significant damage to industrial systems,and thus has gained increasing attention from researchers and practitioners.This paper presents a survey of state-of-the-art results of cyber attacks on cyber physical systems.First,as typical system models are employed to study these systems,time-driven and event-driven systems are reviewed.Then,recent advances on three types of attacks,i.e.,those on availability,integrity,and confidentiality are discussed.In particular,the detailed studies on availability and integrity attacks are introduced from the perspective of attackers and defenders.Namely,both attack and defense strategies are discussed based on different system models.Some challenges and open issues are indicated to guide future research and inspire the further exploration of this increasingly important area.
基金Supported by the National Natural Science Foundation of China(61103069,71171148)the National High-Tech Research and Development Plan of China(″863″ Plan)(2012BAD35B01)+2 种基金the Innovation Program of Shanghai Municipal Education Commission(13YZ052)the Shanghai Committee of Science and Technology(11DZ1501703,11dz12106001)the Program of Shanghai Normal University(DXL125,DCL201302)
文摘Cyber physical system(CPS)provides more powerful service by cyber and physical features through the wireless communication.As a kind of social organized network system,a fundamental question of CPS is to achieve service self-organization with its nodes autonomously working in both physical and cyber environments.To solve the problem,the social nature of nodes in CPS is firstly addressed,and then a formal social semantic descriptions is presented for physical environment,node service and task in order to make the nodes communicate automatically and physical environment sensibly.Further,the Horn clause is introduced to represent the reasoning rules of service organizing.Based on the match function,which is defined for measurement between semantics,the semantic aware measurement is presented to evaluate whether environment around a node can satisfy the task requirement or not.Moreover,the service capacity evaluation method for nodes is addressed to find out the competent service from both cyber and physical features of nodes.According to aforementioned two measurements,the task semantic decomposition algorithm and the organizing matrix are defined and the service self-organizing mechanism for CPS is proposed.Finally,examinations are given to further verify the efficiency and feasibility of the proposed mechanism.
基金This work is financially supported by the National Key Research and Development Program of China(2016YFB1101700)the National Natural Science Foundation of China(51875030)the Academic Excellence Foundation of BUAA for PhD Students.
文摘State-of-the-art technologies such as the Internet of Things(IoT),cloud computing(CC),big data analytics(BDA),and artificial intelligence(AI)have greatly stimulated the development of smart manufacturing.An important prerequisite for smart manufacturing is cyber-physical integration,which is increasingly being embraced by manufacturers.As the preferred means of such integration,cyber-physical systems(CPS)and digital twins(DTs)have gained extensive attention from researchers and practitioners in industry.With feedback loops in which physical processes affect cyber parts and vice versa,CPS and DTs can endow manufacturing systems with greater efficiency,resilience,and intelligence.CPS and DTs share the same essential concepts of an intensive cyber-physical connection,real-time interaction,organization integration,and in-depth collaboration.However,CPS and DTs are not identical from many perspectives,including their origin,development,engineering practices,cyber-physical mapping,and core elements.In order to highlight the differences and correlation between them,this paper reviews and analyzes CPS and DTs from multiple perspectives.
基金Project supported by the National Natural Science Foundation of China(Nos.62103199 and 62103201)the Natural Science Foundation of Jiangsu Province,China(No.BK20210590)the China Postdoctoral Science Foundation(Nos.2022M711690 and 2023T160333)。
文摘This article addresses the secure finite-time tracking problem via event-triggered command-filtered control for nonlinear time-delay cyber physical systems(CPSs)subject to cyber attacks.Under the attack circumstance,the output and state information of CPSs is unavailable for the feedback design,and the classical coordinate conversion of the iterative process is incompetent in relation to the tracking task.To solve this,a new coordinate conversion is proposed by considering the attack gains and the reference signal simultaneously.By employing the transformed variables,a modified fractional-order command-filtered signal is incorporated to overcome the complexity explosion issue,and the Nussbaum function is used to tackle the varying attack gains.By systematically constructing the Lyapunov-Krasovskii functional,an adaptive event-triggered mechanism is presented in detail,with which the communication resources are greatly saved,and the finite-time tracking of CPSs under cyber attacks is guaranteed.Finally,an example demonstrates the effectiveness.
文摘Recently,with the growth of cyber physical systems(CPS),several applications have begun to deploy in the CPS for connecting the cyber space with the physical scale effectively.Besides,the cloud computing(CC)enabled CPS offers huge processing and storage resources for CPS thatfinds helpful for a range of application areas.At the same time,with the massive development of applica-tions that exist in the CPS environment,the energy utilization of the cloud enabled CPS has gained significant interest.For improving the energy effective-ness of the CC platform,virtualization technologies have been employed for resource management and the applications are executed via virtual machines(VMs).Since effective scheduling of resources acts as an important role in the design of cloud enabled CPS,this paper focuses on the design of chaotic sandpi-per optimization based VM scheduling(CSPO-VMS)technique for energy effi-cient CPS.The CSPO-VMS technique is utilized for searching for the optimum VM migration solution and it helps to choose an effective scheduling strategy.The CSPO algorithm integrates the concepts of traditional SPO algorithm with the chaos theory,which substitutes the main parameter and combines it with the chaos.In order to improve the process of determining the global optimum solutions and convergence rate of the SPO algorithm,the chaotic concept is included in the SPO algorithm.The CSPO-VMS technique also derives afitness function to choose optimal scheduling strategy in the CPS environment.In order to demonstrate the enhanced performance of the CSPO-VMS technique,a wide range of simulations were carried out and the results are examined under varying aspects.The simulation results ensured the improved performance of the CSPO-VMS technique over the recent methods interms of different measures.
基金supported by the Researchers Supporting Program(TUMA-Project-2021-27)Almaarefa University,Riyadh,Saudi ArabiaTaif University Researchers Supporting Project number(TURSP-2020/161),Taif University,Taif,Saudi Arabia。
文摘A cyber physical energy system(CPES)involves a combination of pro-cessing,network,and physical processes.The smart grid plays a vital role in the CPES model where information technology(IT)can be related to the physical system.At the same time,the machine learning(ML)modelsfind useful for the smart grids integrated into the CPES for effective decision making.Also,the smart grids using ML and deep learning(DL)models are anticipated to lessen the requirement of placing many power plants for electricity utilization.In this aspect,this study designs optimal multi-head attention based bidirectional long short term memory(OMHA-MBLSTM)technique for smart grid stability predic-tion in CPES.The proposed OMHA-MBLSTM technique involves three subpro-cesses such as pre-processing,prediction,and hyperparameter optimization.The OMHA-MBLSTM technique employs min-max normalization as a pre-proces-sing step.Besides,the MBLSTM model is applied for the prediction of stability level of the smart grids in CPES.At the same time,the moth swarm algorithm(MHA)is utilized for optimally modifying the hyperparameters involved in the MBLSTM model.To ensure the enhanced outcomes of the OMHA-MBLSTM technique,a series of simulations were carried out and the results are inspected under several aspects.The experimental results pointed out the better outcomes of the OMHA-MBLSTM technique over the recent models.
基金Project partially supported by the Strategic Grants POSDRU/88/1.5/S/50783 Project (No.50783,2009),POSDRU/107/1.5/S/77265 Project (No.77265,2010),Romaniathe European Social Fund for Investing in People, within the Sectoral Operational Programme Human Resources Development 2007-2013
文摘Cyber physical systems (CPSs) can be found nowadays in various fields of activity. The increased interest for these systems as evidenced by the large number of applications led to complex research regarding the most suitable methods for design and development. A promising solution for specification, visualization, and documentation of CPSs uses the Object Management Group (OMG) unified modeling language (UML). UML models allow an intuitive approach for embedded systems design, helping end-users to specify the requirements. However, the UML models are represented in an informal language. Therefore, it is difficult to verify the correctness and completeness of a system design. The object constraint language (OCL) was defined to add constraints to UML, but it is deficient in strict notations of mathematics and logic that permits rigorous analysis and reasoning about the specifications. In this paper, we investigated how CPS applications modeled using UML deployment diagrams could be formally expressed and verified. We used Z language constructs and prototype verification system (PVS) as formal verification tools. Considering some relevant case studies presented in the literature, we investigated the opportunity of using this approach for validation of static properties in CPS UML models.
基金supported by the Integrated Science-Technology Innovation Plan of Shaanxi Province,China(No.2015KTZDGY06-03)
文摘Cyber physical systems(CPSs) incorporate computation, communication, and physical processes. The deep coupling and continuous interaction between such processes lead to a significant increase in complexity in the design and implementation of CPSs. Consequently, whereas developing CPSs from scratch is inefficient, developing them with the aid of CPS run-time supporting platforms can be efficient. In recent years, much research has been actively conducted on CPS run-time supporting platforms. However, few surveys have been conducted on these platforms. In this paper, we analyze and evaluate existing CPS run-time supporting platforms by first classifying them into three categories from the viewpoint of software architecture: component-based platforms, service-based platforms, and agent-based platforms. Then, for each type, we detail its design philosophy, key technical problems, and corresponding solutions with specific use cases. Subsequently, we compare existing platforms from two aspects: construction approaches for CPS tasks and support for non-functional properties. Finally, we outline several important future research issues.
基金The work was supported by the project:2013BAF02B00.
文摘This paper introduces a CPS application for intelligent aeroplane assembly.At first,the CPS structure is presented,which acquires the characteristics of general CPS and enables“simulation-based planning and control”to achieve high level intelligent assembly.Then the paper puts forward data fusion estimation algorithm under synchronous and asynchronous sampling,respectively.The experiment shows that global optimal distributed fusion estimation under synchronized sampling proves to be closer to the actual value compared with ordinary weighted estimation,and multi-scale distributed fusion estimation algorithm of wavelet under asynchronous sampling does not need time registration,it can also directly link to data,and the error is smaller.This paper presents hybrid control strategy under the circumstance of joint action of the inner and outer loop to address the problems caused by the less controllable feature of the parallel mechanism when undertaking online process simulation and control.A robust adaptive sliding mode controller is designed based on disturbance observer to restrain inner interference and maintain robustness.At the same time,an outer collaborative trajectory planning is also designed.All the experiment results show the feasibility of above proposed methods.
基金supported by the Shandong Provincial Key Research and Development Program of China(2018CXGC0701)the National Natural Science Foundation of China(NSFC)(Grant No.61972050)the foundation of State Key Laboratory of Network and Switching Technology,Beijing University of Posts and Telecommunications(SKLNST-2018-1-11)。
文摘Automotive cyber physical systems(CPSs)are ever more utilizing wireless technology for V2X communication as a potential way out for challenges regarding collision detection,wire strap up troubles and collision avoidance.However,security is constrained as a result of the energy and performance limitations of modem wireless systems.Accordingly,the need for efficient secret key generation and management mechanism for secured communication among computationally weak wireless devices has motivated the introduction of new authentication protocols.Recently,there has been a great interest in physical layer based secret key generation schemes by utilizing channel reciprocity.Consequently,it is observed that the sequence generated by two communicating parties contain mismatched bits which need to be reconciled by exchanging information over a public channel.This can be an immense security threat as it may let an adversary attain and recover segments of the key in known channel conditions.We proposed Hopper-Blum based physical layer(HB-PL)authentication scheme in which an enhanced physical layer key generation method integrates the Hopper-Blum(HB)authentication protocol.The information collected from the shared channel is used as secret keys for the HB protocol and the mismatched bits are used as the induced noise for learning parity with noise(LPN)problem.The proposed scheme aims to provide a way out for bit reconciliation process without leakage of information over a public channel.Moreover,HB protocol is computationally efficient and simple which helps to reduce the number of exchange messages during the authentication process.We have performed several experiments which show that our proposed design can generate secret keys with improved security strength and high performance in comparison to the current authentication techniques.Our scheme requires less than 55 exchange messages to achieve more than 95%of correct authentication.
基金supported by National Natural Science Foundation of China(61100159,61233007)National High Technology Research and Development Program of China(863 Program)(2011AA040103)+2 种基金Foundation of Chinese Academy of Sciences(KGCX2-EW-104)Financial Support of the Strategic Priority Research Program of Chinese Academy of Sciences(XDA06021100)the Cross-disciplinary Collaborative Teams Program for Science,Technology and Innovation,of Chinese Academy of Sciences-Network and System Technologies for Security Monitoring and Information Interaction in Smart Grid Energy Management System for Micro-smart Grid
文摘This paper focuses on the energy optimal operation problem of microgrids(MGs) under stochastic environment.The deterministic method of MGs operation is often uneconomical because it fails to consider the high randomness of unconventional energy resources.Therefore,it is necessary to develop a novel operation approach combining the uncertainty in the physical world with modeling strategy in the cyber system.This paper proposes an energy scheduling optimization strategy based on stochastic programming model by considering the uncertainty in MGs.The goal is to minimize the expected operation cost of MGs.The uncertainties are modeled based on autoregressive moving average(ARMA) model to expose the effects of physical world on cyber world.Through the comparison of the simulation results with deterministic method,it is shown that the effectiveness and robustness of proposed stochastic energy scheduling optimization strategy for MGs are valid.
基金support by National Natural Science Foundation of China(61202354,51507084)Nanjing University of Post and Telecommunications Science Foundation(NUPTSF)(NT214203)
文摘Risk assessment is essential for the safe and reliable operation of cyber physical power system. Traditional security risk assessment methods do not take integration of cyber system and physical system of power grid into account. In order to solve this problem, security risk assessment algorithm of cyber physical power system based on rough set and gene expression programming is proposed. Firstly, fast attribution reduction based on binary search algorithm is presented. Secondly, security risk assessment function for cyber physical power system is mined based on gene expression programming. Lastly, security risk levels of cyber physical power system are predicted and analyzed by the above function model. Experimental results show that security risk assessment function model based on the proposed algorithm has high efficiency of function mining, accuracy of security risk level prediction and strong practicality.
基金This study was funded by the Deanship of Scientific Research,Taif University Researchers Supporting project number(TURSP-2020/195)Taif University,Taif,Saudi Arabia.The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number(RGP 2/25/43)+1 种基金The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4310373DSR02)The authors would like to acknowledge the support of Prince Sultan University for paying the Article Processing Charges(APC)of this publication.
文摘Recently,cyber physical system(CPS)has gained significant attention which mainly depends upon an effective collaboration with computation and physical components.The greatly interrelated and united characteristics of CPS resulting in the development of cyber physical energy systems(CPES).At the same time,the rising ubiquity of wireless sensor networks(WSN)in several application areas makes it a vital part of the design of CPES.Since security and energy efficiency are the major challenging issues in CPES,this study offers an energy aware secure cyber physical systems with clustered wireless sensor networks using metaheuristic algorithms(EASCPSMA).The presented EASCPS-MA technique intends to attain lower energy utilization via clustering and security using intrusion detection.The EASCPSMA technique encompasses two main stages namely improved fruit fly optimization algorithm(IFFOA)based clustering and optimal deep stacked autoencoder(OSAE)based intrusion detection.Besides,the optimal selection of stacked autoencoder(SAE)parameters takes place using root mean square propagation(RMSProp)model.The extensive performance validation of the EASCPS-MA technique takes place and the results are inspected under varying aspects.The simulation results reported the improved effectiveness of the EASCPS-MA technique over other recent approaches interms of several measures.
基金National Natural Science Foundation of China(No.51477097)the State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources,China(No.LAPS13009)National High-Technology Research and Development Program of China(863 Program)(No.2013BAA01B04)
文摘The distributed hierarchical control based on multi-agent system(MAS) is the main control method of micro-grids.By allowing more flexible interactions between computing components and their physical environments,cyber physical system(CPS) presents a new approach for the distributed hierarchical engineering system,with micro-grids included.The object of this paper is to integrate the CPS concept with MAS technology and propose a new control framework for micro-grids.With the analysis of the operating mode and control method of micro-grids,the cyber physical control concepts of ontologybased semantic agent are discussed.Then an MAS-based architecture of cyber physical micro-grid system and an intelligent electronic device(IED) function structure are proposed.Finally,in order to operate and test the cyber physical micro-grid concept,an integrated simulation model is presented.
基金This work was supported in part by the National Key R&D Program of China(No.2017YFB0903100)the Science and Technology Project of State Grid Corporation of China(No.521104170043).
文摘As cyber physical systems,microgrids(MGs),with distributed generations and energy management systems,can improve the reliability of power supply for customers in MGs.To quantify the reliability of isolated MGs,a cyber-physical assessment model is proposed.In this model,the circuit breakers and distributed energy resources are treated as the coupling elements between the cyber system and physical system,where the circuit breakers are uniquely modelled by using the Markov process theory based on the indirect interdependencies between cyber physical elements.For the cyber system,the reliability model of communication networks is formulated based on the link connectivity evaluation method.For the physical system,a system state generating method is presented to account for the optimal operation strategy,which considers the influence of the optimization strategy on the failure consequence analysis.With the proposed cyber and physical reliability models,the sequential Monte Carlo(SMC)simulation method is adopted to assess the reliability of islanded MGs.Simulations are carried out on a test system,and results verify the feasibility and effectiveness of proposed assessment method.Furthermore,one application of the proposed method is on the parameter setting of the cyber system,in terms of enhancing MGs reliability.
基金supported in part by the Science and Technology development fund(FDCT)of Macao(011/2017/A)the National Natural Science Foundation of China(61803397)。
文摘Smart manufacturing refers to optimization techniques that are implemented in production operations by utilizing advanced analytics approaches. With the widespread increase in deploying industrial internet of things(IIOT) sensors in manufacturing processes, there is a progressive need for optimal and effective approaches to data management.Embracing machine learning and artificial intelligence to take advantage of manufacturing data can lead to efficient and intelligent automation. In this paper, we conduct a comprehensive analysis based on evolutionary computing and neural network algorithms toward making semiconductor manufacturing smart.We propose a dynamic algorithm for gaining useful insights about semiconductor manufacturing processes and to address various challenges. We elaborate on the utilization of a genetic algorithm and neural network to propose an intelligent feature selection algorithm. Our objective is to provide an advanced solution for controlling manufacturing processes and to gain perspective on various dimensions that enable manufacturers to access effective predictive technologies.
文摘This note addresses diagnosis and performance degradation detection issues from an integrated viewpoint of functionality maintenance and cyber security of automatic control systems.It calls for more research attention on three aspects:(i)application of control and detection uni ed framework to enhancing the diagnosis capability of feedback control systems,(ii)projection-based fault detection,and complementary and explainable applications of projection-and machine learning-based techniques,and(iii)system performance degradation detection that is of elemental importance for today's automatic control systems.Some ideas and conceptual schemes are presented and illustrated by means of examples,serving as convincing arguments for research e orts in these aspects.They would contribute to the future development of capable diagnosis systems for functionality safe and cyber secure automatic control systems.
文摘Cyber-Physical System(CPS)involves the combination of physical processes with computation and communication systems.The recent advancementsmade in cloud computing,Wireless Sensor Network(WSN),healthcare sensors,etc.tend to develop CPS as a proficient model for healthcare applications especially,home patient care.Though several techniques have been proposed earlier related to CPS structures,only a handful of studies has focused on the design of CPS models for health care sector.So,the proposal for a dedicated CPS model for healthcare sector necessitates a significant interest to ensure data privacy.To overcome the challenges,the current research paper designs a Deep Learning-based Intrusion Detection and Image Classification for Secure CPS(DLIDIC-SCPS)model for healthcare sector.The aim of the proposed DLIDIC-SCPS model is to achieve secure image transmission and image classification process for CPS in healthcare sector.Primarily,data acquisition takes place with the help of sensors and detection of intrusions is performed using Fuzzy Deep Neural Network(FDNN)technique.Besides,Multiple Share Creation(MSC)approach is used to create several shares of medical image so as to accomplish security.Also,blockchain is employed as a distributed data storage entity to create a ledger that provides access to the client.For image classification,Inception v3 with Fuzzy Wavelet Neural Network(FWNN)is utilized that diagnose the disease from the applied medical image.Finally,Salp Swarm Algorithm(SSA)is utilized to fine tune the parameters involved in WNN model,thereby boosting its classification performance.A wide range of simulations was carried out to highlight the superiority of the proposed DLIDIC-SCPS technique.The simulation outcomes confirm that DLIDIC-SCPS approach demonstrates promising results in terms of security,privacy,and image classification outcomes over recent state-of-the-art techniques.
基金This study was jointly supported by National Science Foundation of China(41661144039,41875027 and 41871238).
文摘Snow cover is an important parameter in the fields of computer modeling,engineering technology and energy development.With the extensive growth of novel hardware and software compositions creating smart,cyber physical systems’(CPS)efficient end-to-end workflows.In order to provide accurate snow detection results for the CPS’s terminal,this paper proposed a snow cover detection algorithm based on the unsupervised Gaussian mixture model(GMM)for the FY-4A satellite data.At present,most snow cover detection algorithms mainly utilize the characteristics of the optical spectrum,which is based on the normalized difference snow index(NDSI)with thresholds in different wavebands.These algorithms require a large amount of manually labeled data for statistical analysis to obtain the appropriate thresholds for the study area.Consideration must be given to both the high and low elevations in the study area.It is difficult to extract all snow by a fixed threshold in mountainous and rugged terrains.In this research,we avoid relying on a manual analysis for different elevations.Therefore,an algorithm based on the GMM is proposed,integrating the threshold-based algorithm and the GMM.First,the threshold-based algorithm with transferred thresholds from other satellites’analysis results are used to coarsely classify the surface objects.These results are then used to initialize the parameters of the GMM.Finally,the parameters of that model are updated by an expectation-maximum(EM)iteration algorithm,and the final results are outputted when the iterative conditions end.The results show that this algorithm can adjust itself to mountainous terrain with different elevations,and exhibits a better performance than the threshold-based algorithm.Compared with orbit satellites’snow products,the accuracy of the algorithm used for FY-4A is improved by nearly 2%,and the snow detection rate is increased by nearly 6%.Moreover,compared with microwave sensors’snow products,the accuracy is increased by nearly 3%.The validation results show that the proposed algorithm can be adapted to a complex terrain environment in mountainous areas and exhibits good performance under a transferred threshold without manually assigned labels.