An intelligent manufacturing system is a composite intelligent system comprising humans,cyber systems,and physical systems with the aim of achieving specific manufacturing goals at an optimized level.This kind of inte...An intelligent manufacturing system is a composite intelligent system comprising humans,cyber systems,and physical systems with the aim of achieving specific manufacturing goals at an optimized level.This kind of intelligent system is called a human-cyber-physical system(HCPS).In terms of technology,HCPSs can both reveal technological principles and form the technological architecture for intelligent manufacturing.It can be concluded that the essence of intelligent manufacturing is to design,construct,and apply HCPSs in various cases and at different levels.With advances in information technology,intelligent manufacturing has passed through the stages of digital manufacturing and digital-networked manufacturing,and is evolving toward new-generation intelligent manufacturing(NGIM).NGIM is characterized by the in-depth integration of new-generation artificial intelligence(AI)technology(i.e.,enabling technology)with advanced manufacturing technology(i.e.,root technology);it is the core driving force of the new industrial revolution.In this study,the evolutionary footprint of intelligent manufacturing is reviewed from the perspective of HCPSs,and the implications,characteristics,technical frame,and key technologies of HCPSs for NGIM are then discussed in depth.Finally,an outlook of the major challenges of HCPSs for NGIM is proposed.展开更多
State-of-the-art technologies such as the Internet of Things(IoT),cloud computing(CC),big data analytics(BDA),and artificial intelligence(AI)have greatly stimulated the development of smart manufacturing.An important ...State-of-the-art technologies such as the Internet of Things(IoT),cloud computing(CC),big data analytics(BDA),and artificial intelligence(AI)have greatly stimulated the development of smart manufacturing.An important prerequisite for smart manufacturing is cyber-physical integration,which is increasingly being embraced by manufacturers.As the preferred means of such integration,cyber-physical systems(CPS)and digital twins(DTs)have gained extensive attention from researchers and practitioners in industry.With feedback loops in which physical processes affect cyber parts and vice versa,CPS and DTs can endow manufacturing systems with greater efficiency,resilience,and intelligence.CPS and DTs share the same essential concepts of an intensive cyber-physical connection,real-time interaction,organization integration,and in-depth collaboration.However,CPS and DTs are not identical from many perspectives,including their origin,development,engineering practices,cyber-physical mapping,and core elements.In order to highlight the differences and correlation between them,this paper reviews and analyzes CPS and DTs from multiple perspectives.展开更多
A cyber physical system(CPS)is a complex system that integrates sensing,computation,control and networking into physical processes and objects over Internet.It plays a key role in modern industry since it connects phy...A cyber physical system(CPS)is a complex system that integrates sensing,computation,control and networking into physical processes and objects over Internet.It plays a key role in modern industry since it connects physical and cyber worlds.In order to meet ever-changing industrial requirements,its structures and functions are constantly improved.Meanwhile,new security issues have arisen.A ubiquitous problem is the fact that cyber attacks can cause significant damage to industrial systems,and thus has gained increasing attention from researchers and practitioners.This paper presents a survey of state-of-the-art results of cyber attacks on cyber physical systems.First,as typical system models are employed to study these systems,time-driven and event-driven systems are reviewed.Then,recent advances on three types of attacks,i.e.,those on availability,integrity,and confidentiality are discussed.In particular,the detailed studies on availability and integrity attacks are introduced from the perspective of attackers and defenders.Namely,both attack and defense strategies are discussed based on different system models.Some challenges and open issues are indicated to guide future research and inspire the further exploration of this increasingly important area.展开更多
Cyber physical systems(CPS) recently emerge as a new technology which can provide promising approaches to demand side management(DSM), an important capability in industrial power systems. Meanwhile, the manufactur...Cyber physical systems(CPS) recently emerge as a new technology which can provide promising approaches to demand side management(DSM), an important capability in industrial power systems. Meanwhile, the manufacturing center is a typical industrial power subsystem with dozens of high energy consumption devices which have complex physical dynamics. DSM, integrated with CPS, is an effective methodology for solving energy optimization problems in manufacturing center. This paper presents a prediction-based manufacturing center self-adaptive energy optimization method for demand side management in cyber physical systems. To gain prior knowledge of DSM operating results, a sparse Bayesian learning based componential forecasting method is introduced to predict 24-hour electric load levels for specific industrial areas in China. From this data, a pricing strategy is designed based on short-term load forecasting results. To minimize total energy costs while guaranteeing manufacturing center service quality, an adaptive demand side energy optimization algorithm is presented. The proposed scheme is tested in a machining center energy optimization experiment. An AMI sensing system is then used to measure the demand side energy consumption of the manufacturing center. Based on the data collected from the sensing system, the load prediction-based energy optimization scheme is implemented. By employing both the PSO and the CPSO method, the problem of DSM in the manufac^ring center is solved. The results of the experiment show the self-adaptive CPSO energy optimization method enhances optimization by 5% compared with the traditional PSO optimization method.展开更多
As the Internet of Things (IoT) is emerging as an attractive paradigm, a typical IoT architecture that U2IoT (Unit IoT and Ubiquitous IoT) model has been presented for the future IoT. Based on the U2IoT model, this pa...As the Internet of Things (IoT) is emerging as an attractive paradigm, a typical IoT architecture that U2IoT (Unit IoT and Ubiquitous IoT) model has been presented for the future IoT. Based on the U2IoT model, this paper proposes a cyber-physical-social based security architecture (IPM) to deal with Information, Physical, and Management security perspectives, and presents how the architectural abstractions support U2IoT model. In particular, 1) an information security model is established to describe the mapping relations among U2IoT, security layer, and security requirement, in which social layer and additional intelligence and compatibility properties are infused into IPM;2) physical security referring to the external context and inherent infrastructure are inspired by artificial immune algorithms;3) recommended security strategies are suggested for social management control. The proposed IPM combining the cyber world, physical world and human social provides constructive proposal towards the future IoT security and privacy protection.展开更多
To ensure flight safety,the complex network method is used to study the influence and invulnerability of air traffic cyber physical system(CPS)nodes.According to the rules of air traffic management,the logical couplin...To ensure flight safety,the complex network method is used to study the influence and invulnerability of air traffic cyber physical system(CPS)nodes.According to the rules of air traffic management,the logical coupling relationship between routes and sectors is analyzed,an air traffic CPS network model is constructed,and the indicators of node influence and invulnerability are established.The K-shell algorithm is improved to identify node influence,and the invulnerability is analyzed under random and selective attacks.Taking Airspace in Eastern China as an example,its influential nodes are sorted by degree,namely,K-shell,the improved K-shell(IKS)and betweenness centrality.The invulnerability of air traffic CPS under different attacks is analyzed.Results show that IKS can effectively identify the influential nodes in the air traffic CPS network,and IKS and betweenness centrality are the two key indicators that affect the invulnerability of air traffic CPS.展开更多
Cyber physical system(CPS)provides more powerful service by cyber and physical features through the wireless communication.As a kind of social organized network system,a fundamental question of CPS is to achieve servi...Cyber physical system(CPS)provides more powerful service by cyber and physical features through the wireless communication.As a kind of social organized network system,a fundamental question of CPS is to achieve service self-organization with its nodes autonomously working in both physical and cyber environments.To solve the problem,the social nature of nodes in CPS is firstly addressed,and then a formal social semantic descriptions is presented for physical environment,node service and task in order to make the nodes communicate automatically and physical environment sensibly.Further,the Horn clause is introduced to represent the reasoning rules of service organizing.Based on the match function,which is defined for measurement between semantics,the semantic aware measurement is presented to evaluate whether environment around a node can satisfy the task requirement or not.Moreover,the service capacity evaluation method for nodes is addressed to find out the competent service from both cyber and physical features of nodes.According to aforementioned two measurements,the task semantic decomposition algorithm and the organizing matrix are defined and the service self-organizing mechanism for CPS is proposed.Finally,examinations are given to further verify the efficiency and feasibility of the proposed mechanism.展开更多
Conventional power systems are being developed into grid cyber physical systems(GCPS) with widespread application of communication, computer, and control technologies. In this article, we propose a quantitative analys...Conventional power systems are being developed into grid cyber physical systems(GCPS) with widespread application of communication, computer, and control technologies. In this article, we propose a quantitative analysis method for a GCPS. Based on this, we discuss the relationship between cyberspace and physical space, especially the computational similarity within the GCPS both in undirected and directed bipartite networks. We then propose a model for evaluating the fusion of the three most important factors: information, communication, and security. We then present the concept of the fusion evaluation cubic for the GCPS quantitative analysis model. Through these models, we can determine whether a more realistic state of the GCPS can be found by enhancing the fusion between cyberspace and physical space. Finally, we conclude that the degree of fusion between the two spaces is very important, not only considering the performance of the whole business process, but also considering security.展开更多
文摘An intelligent manufacturing system is a composite intelligent system comprising humans,cyber systems,and physical systems with the aim of achieving specific manufacturing goals at an optimized level.This kind of intelligent system is called a human-cyber-physical system(HCPS).In terms of technology,HCPSs can both reveal technological principles and form the technological architecture for intelligent manufacturing.It can be concluded that the essence of intelligent manufacturing is to design,construct,and apply HCPSs in various cases and at different levels.With advances in information technology,intelligent manufacturing has passed through the stages of digital manufacturing and digital-networked manufacturing,and is evolving toward new-generation intelligent manufacturing(NGIM).NGIM is characterized by the in-depth integration of new-generation artificial intelligence(AI)technology(i.e.,enabling technology)with advanced manufacturing technology(i.e.,root technology);it is the core driving force of the new industrial revolution.In this study,the evolutionary footprint of intelligent manufacturing is reviewed from the perspective of HCPSs,and the implications,characteristics,technical frame,and key technologies of HCPSs for NGIM are then discussed in depth.Finally,an outlook of the major challenges of HCPSs for NGIM is proposed.
基金This work is financially supported by the National Key Research and Development Program of China(2016YFB1101700)the National Natural Science Foundation of China(51875030)the Academic Excellence Foundation of BUAA for PhD Students.
文摘State-of-the-art technologies such as the Internet of Things(IoT),cloud computing(CC),big data analytics(BDA),and artificial intelligence(AI)have greatly stimulated the development of smart manufacturing.An important prerequisite for smart manufacturing is cyber-physical integration,which is increasingly being embraced by manufacturers.As the preferred means of such integration,cyber-physical systems(CPS)and digital twins(DTs)have gained extensive attention from researchers and practitioners in industry.With feedback loops in which physical processes affect cyber parts and vice versa,CPS and DTs can endow manufacturing systems with greater efficiency,resilience,and intelligence.CPS and DTs share the same essential concepts of an intensive cyber-physical connection,real-time interaction,organization integration,and in-depth collaboration.However,CPS and DTs are not identical from many perspectives,including their origin,development,engineering practices,cyber-physical mapping,and core elements.In order to highlight the differences and correlation between them,this paper reviews and analyzes CPS and DTs from multiple perspectives.
基金supported by Institutional Fund Projects(IFPNC-001-135-2020)technical and financial support from the Ministry of Education and King Abdulaziz University,DSR,Jeddah,Saudi Arabia。
文摘A cyber physical system(CPS)is a complex system that integrates sensing,computation,control and networking into physical processes and objects over Internet.It plays a key role in modern industry since it connects physical and cyber worlds.In order to meet ever-changing industrial requirements,its structures and functions are constantly improved.Meanwhile,new security issues have arisen.A ubiquitous problem is the fact that cyber attacks can cause significant damage to industrial systems,and thus has gained increasing attention from researchers and practitioners.This paper presents a survey of state-of-the-art results of cyber attacks on cyber physical systems.First,as typical system models are employed to study these systems,time-driven and event-driven systems are reviewed.Then,recent advances on three types of attacks,i.e.,those on availability,integrity,and confidentiality are discussed.In particular,the detailed studies on availability and integrity attacks are introduced from the perspective of attackers and defenders.Namely,both attack and defense strategies are discussed based on different system models.Some challenges and open issues are indicated to guide future research and inspire the further exploration of this increasingly important area.
基金Supported by National Natural Science Foundation of China(Grant No.61272428)PhD Programs Foundation of Ministry of Education of China(Grant No.20120002110067)
文摘Cyber physical systems(CPS) recently emerge as a new technology which can provide promising approaches to demand side management(DSM), an important capability in industrial power systems. Meanwhile, the manufacturing center is a typical industrial power subsystem with dozens of high energy consumption devices which have complex physical dynamics. DSM, integrated with CPS, is an effective methodology for solving energy optimization problems in manufacturing center. This paper presents a prediction-based manufacturing center self-adaptive energy optimization method for demand side management in cyber physical systems. To gain prior knowledge of DSM operating results, a sparse Bayesian learning based componential forecasting method is introduced to predict 24-hour electric load levels for specific industrial areas in China. From this data, a pricing strategy is designed based on short-term load forecasting results. To minimize total energy costs while guaranteeing manufacturing center service quality, an adaptive demand side energy optimization algorithm is presented. The proposed scheme is tested in a machining center energy optimization experiment. An AMI sensing system is then used to measure the demand side energy consumption of the manufacturing center. Based on the data collected from the sensing system, the load prediction-based energy optimization scheme is implemented. By employing both the PSO and the CPSO method, the problem of DSM in the manufac^ring center is solved. The results of the experiment show the self-adaptive CPSO energy optimization method enhances optimization by 5% compared with the traditional PSO optimization method.
基金supported by National Natural Science Foundation of China(61221003,61174127,61573245,61273181,61503247,61301223)Shanghai Municipal Science and Technology Commission(15QA1402300,14511107903)
文摘As the Internet of Things (IoT) is emerging as an attractive paradigm, a typical IoT architecture that U2IoT (Unit IoT and Ubiquitous IoT) model has been presented for the future IoT. Based on the U2IoT model, this paper proposes a cyber-physical-social based security architecture (IPM) to deal with Information, Physical, and Management security perspectives, and presents how the architectural abstractions support U2IoT model. In particular, 1) an information security model is established to describe the mapping relations among U2IoT, security layer, and security requirement, in which social layer and additional intelligence and compatibility properties are infused into IPM;2) physical security referring to the external context and inherent infrastructure are inspired by artificial immune algorithms;3) recommended security strategies are suggested for social management control. The proposed IPM combining the cyber world, physical world and human social provides constructive proposal towards the future IoT security and privacy protection.
基金This work was supported by the Fundamental Research Funds for the Central Universities(No.3122019191).
文摘To ensure flight safety,the complex network method is used to study the influence and invulnerability of air traffic cyber physical system(CPS)nodes.According to the rules of air traffic management,the logical coupling relationship between routes and sectors is analyzed,an air traffic CPS network model is constructed,and the indicators of node influence and invulnerability are established.The K-shell algorithm is improved to identify node influence,and the invulnerability is analyzed under random and selective attacks.Taking Airspace in Eastern China as an example,its influential nodes are sorted by degree,namely,K-shell,the improved K-shell(IKS)and betweenness centrality.The invulnerability of air traffic CPS under different attacks is analyzed.Results show that IKS can effectively identify the influential nodes in the air traffic CPS network,and IKS and betweenness centrality are the two key indicators that affect the invulnerability of air traffic CPS.
基金supported by National Natural Science Foundation of China(61233004,61221003,61374109,61104091,61304078,61473184)National Basic Research Program of China(973 Program)(2013CB035500)+2 种基金the International Cooperation Program of Shanghai Science and Technology Commission(12230709600)the Higher Education Research Fund for the Doctoral Program of China(20120073130006,20110073110018)the China Postdoctoral Science Foundation(2013M540364)
基金Supported by the National Natural Science Foundation of China(61103069,71171148)the National High-Tech Research and Development Plan of China(″863″ Plan)(2012BAD35B01)+2 种基金the Innovation Program of Shanghai Municipal Education Commission(13YZ052)the Shanghai Committee of Science and Technology(11DZ1501703,11dz12106001)the Program of Shanghai Normal University(DXL125,DCL201302)
文摘Cyber physical system(CPS)provides more powerful service by cyber and physical features through the wireless communication.As a kind of social organized network system,a fundamental question of CPS is to achieve service self-organization with its nodes autonomously working in both physical and cyber environments.To solve the problem,the social nature of nodes in CPS is firstly addressed,and then a formal social semantic descriptions is presented for physical environment,node service and task in order to make the nodes communicate automatically and physical environment sensibly.Further,the Horn clause is introduced to represent the reasoning rules of service organizing.Based on the match function,which is defined for measurement between semantics,the semantic aware measurement is presented to evaluate whether environment around a node can satisfy the task requirement or not.Moreover,the service capacity evaluation method for nodes is addressed to find out the competent service from both cyber and physical features of nodes.According to aforementioned two measurements,the task semantic decomposition algorithm and the organizing matrix are defined and the service self-organizing mechanism for CPS is proposed.Finally,examinations are given to further verify the efficiency and feasibility of the proposed mechanism.
基金supported by The National Key Research and Development Program of China (Title: Basic Theories and Methods of Analysis and Control of the Cyber Physical Systems for Power Grid (Basic Research Class 2017YFB0903000))the State Grid Science and Technology Project (Title: Research on Architecture and Several Key Technologies for Grid Cyber Physical System,No.SGRIXTKJ[2016]454)
文摘Conventional power systems are being developed into grid cyber physical systems(GCPS) with widespread application of communication, computer, and control technologies. In this article, we propose a quantitative analysis method for a GCPS. Based on this, we discuss the relationship between cyberspace and physical space, especially the computational similarity within the GCPS both in undirected and directed bipartite networks. We then propose a model for evaluating the fusion of the three most important factors: information, communication, and security. We then present the concept of the fusion evaluation cubic for the GCPS quantitative analysis model. Through these models, we can determine whether a more realistic state of the GCPS can be found by enhancing the fusion between cyberspace and physical space. Finally, we conclude that the degree of fusion between the two spaces is very important, not only considering the performance of the whole business process, but also considering security.