期刊文献+
共找到11,657篇文章
< 1 2 250 >
每页显示 20 50 100
A Review on Security and Privacy Issues Pertaining to Cyber-Physical Systems in the Industry 5.0 Era
1
作者 Abdullah Alabdulatif Navod Neranjan Thilakarathne Zaharaddeen Karami Lawal 《Computers, Materials & Continua》 SCIE EI 2024年第9期3917-3943,共27页
The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnect... The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnected and reliant on smart digital technologies,the intersection of physical and cyber domains introduces novel security considerations,endangering the entire industrial ecosystem.The transition towards a more cooperative setting,including humans and machines in Industry 5.0,together with the growing intricacy and interconnection of CPSs,presents distinct and diverse security and privacy challenges.In this regard,this study provides a comprehensive review of security and privacy concerns pertaining to CPSs in the context of Industry 5.0.The review commences by providing an outline of the role of CPSs in Industry 5.0 and then proceeds to conduct a thorough review of the different security risks associated with CPSs in the context of Industry 5.0.Afterward,the study also presents the privacy implications inherent in these systems,particularly in light of the massive data collection and processing required.In addition,the paper delineates potential avenues for future research and provides countermeasures to surmount these challenges.Overall,the study underscores the imperative of adopting comprehensive security and privacy strategies within the context of Industry 5.0. 展开更多
关键词 cyber-physical systems CPS Industry 5.0 security data privacy human-machine collaboration data protection
下载PDF
On Zero Dynamics and Controllable Cyber-Attacks in Cyber-Physical Systems and Dynamic Coding Schemes as Their Countermeasures
2
作者 Mahdi Taheri Khashayar Khorasani Nader Meskin 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第11期2191-2203,共13页
In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose condition... In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose conditions under which one can execute zero dynamics and controllable attacks in the CPS. The above conditions are derived based on the Markov parameters of the CPS and elements of the system observability matrix. Consequently, in addition to outlining the number of required actuators to be attacked, these conditions provide one with the minimum system knowledge needed to perform zero dynamics and controllable cyber-attacks. As a countermeasure against the above stealthy cyber-attacks, we develop a dynamic coding scheme that increases the minimum number of the CPS required actuators to carry out zero dynamics and controllable cyber-attacks to its maximum possible value. It is shown that if at least one secure input channel exists, the proposed dynamic coding scheme can prevent adversaries from executing the zero dynamics and controllable attacks even if they have complete knowledge of the coding system. Finally, two illustrative numerical case studies are provided to demonstrate the effectiveness and capabilities of our derived conditions and proposed methodologies. 展开更多
关键词 Controllable attacks cyber-physical systems(CPS) dynamic coding zero dynamics attacks stealthy cyber-attacks
下载PDF
Transportation-cyber-physical-systems-oriented engine cylinder pressure estimation using high gain observer
3
作者 李永福 寇晓培 +1 位作者 郑太雄 李银国 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第5期621-626,共6页
In transportation cyber-physical-systems (T-CPS), vehicle-to-vehicle (V2V) communications play an important role in the coordination between individual vehicles as well as between vehicles and the roadside infrast... In transportation cyber-physical-systems (T-CPS), vehicle-to-vehicle (V2V) communications play an important role in the coordination between individual vehicles as well as between vehicles and the roadside infrastructures, and engine cylinder pressure is significant for engine diagnosis on-line and torque control within the information exchange process under V2V communications. However, the parametric uncertainties caused from measurement noise in T-CPS lead to the dynamic performance deterioration of the engine cylinder pressure estimation. Considering the high accuracy requirement under V2V communications, a high gain observer based on the engine dynamic model is designed to improve the accuracy of pressure estimation. Then, the analyses about convergence, converge speed and stability of the corresponding error model are conducted using the Laplace and Lyapunov method. Finally, results from combination of Simulink with GT- Power based numerical experiments and comparisons demonstrate the effectiveness of the proposed approach with respect to robustness and accuracy. 展开更多
关键词 transportation cyber-physical-systems high gain observer cylinder pressure estimation vehicle- to-vehicle communications
下载PDF
Building trust for traffic flow forecasting components in intelligent transportation systems via interpretable ensemble learning
4
作者 Jishun Ou Jingyuan Li +2 位作者 Chen Wang Yun Wang Qinghui Nie 《Digital Transportation and Safety》 2024年第3期126-143,I0001,I0002,共20页
Traffic flow forecasting constitutes a crucial component of intelligent transportation systems(ITSs).Numerous studies have been conducted for traffic flow forecasting during the past decades.However,most existing stud... Traffic flow forecasting constitutes a crucial component of intelligent transportation systems(ITSs).Numerous studies have been conducted for traffic flow forecasting during the past decades.However,most existing studies have concentrated on developing advanced algorithms or models to attain state-of-the-art forecasting accuracy.For real-world ITS applications,the interpretability of the developed models is extremely important but has largely been ignored.This study presents an interpretable traffic flow forecasting framework based on popular tree-ensemble algorithms.The framework comprises multiple key components integrated into a highly flexible and customizable multi-stage pipeline,enabling the seamless incorporation of various algorithms and tools.To evaluate the effectiveness of the framework,the developed tree-ensemble models and another three typical categories of baseline models,including statistical time series,shallow learning,and deep learning,were compared on three datasets collected from different types of roads(i.e.,arterial,expressway,and freeway).Further,the study delves into an in-depth interpretability analysis of the most competitive tree-ensemble models using six categories of interpretable machine learning methods.Experimental results highlight the potential of the proposed framework.The tree-ensemble models developed within this framework achieve competitive accuracy while maintaining high inference efficiency similar to statistical time series and shallow learning models.Meanwhile,these tree-ensemble models offer interpretability from multiple perspectives via interpretable machine-learning techniques.The proposed framework is anticipated to provide reliable and trustworthy decision support across various ITS applications. 展开更多
关键词 Traffic flow forecasting Interpretable machine learning INTERPRETABILITY Ensemble trees Intelligent transportation systems
下载PDF
Cyber-physical-social System in Intelligent Transportation 被引量:14
5
作者 Gang Xiong Fenghua Zhu +4 位作者 Xiwei Liu Xisong Dong Wuling Huang Songhang Chen Kai Zhao 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2015年第3期320-333,共14页
A cyber-physical system (CPS) is composed of a physical system and its corresponding cyber systems that are tightly fused at all scales and levels. CPS is helpful to improve the controllability, efficiency and reliabi... A cyber-physical system (CPS) is composed of a physical system and its corresponding cyber systems that are tightly fused at all scales and levels. CPS is helpful to improve the controllability, efficiency and reliability of a physical system, such as vehicle collision avoidance and zero-net energy buildings systems. It has become a hot R&D and practical area from US to EU and other countries. In fact, most of physical systems and their cyber systems are designed, built and used by human beings in the social and natural environments. So, social systems must be of the same importance as their CPSs. The indivisible cyber, physical and social parts constitute the cyber-physical-social system (CPSS), a typical complex system and it's a challengeable problem to control and manage it under traditional theories and methods. An artificial systems, computational experiments and parallel execution (ACP) methodology is introduced based on which data-driven models are applied to social system. Artificial systems, i.e., cyber systems, are applied for the equivalent description of physical-social system (PSS). Computational experiments are applied for control plan validation. And parallel execution finally realizes the stepwise control and management of CPSS. Finally, a CPSS-based intelligent transportation system (ITS) is discussed as a case study, and its architecture, three parts, and application are described in detail. © 2014 Chinese Association of Automation. 展开更多
关键词 Amphibious vehicles Complex networks Embedded systems Intelligent systems transportation
下载PDF
Analysis and Modeling of Mobile Phone Activity Data Using Interactive Cyber-Physical Social System
6
作者 Farhan Amin Gyu Sang Choi 《Computers, Materials & Continua》 SCIE EI 2024年第9期3507-3521,共15页
Mobile networks possess significant information and thus are considered a gold mine for the researcher’s community.The call detail records(CDR)of a mobile network are used to identify the network’s efficacy and the ... Mobile networks possess significant information and thus are considered a gold mine for the researcher’s community.The call detail records(CDR)of a mobile network are used to identify the network’s efficacy and the mobile user’s behavior.It is evident from the recent literature that cyber-physical systems(CPS)were used in the analytics and modeling of telecom data.In addition,CPS is used to provide valuable services in smart cities.In general,a typical telecom company hasmillions of subscribers and thus generatesmassive amounts of data.From this aspect,data storage,analysis,and processing are the key concerns.To solve these issues,herein we propose a multilevel cyber-physical social system(CPSS)for the analysis and modeling of large internet data.Our proposed multilevel system has three levels and each level has a specific functionality.Initially,raw Call Detail Data(CDR)was collected at the first level.Herein,the data preprocessing,cleaning,and error removal operations were performed.In the second level,data processing,cleaning,reduction,integration,processing,and storage were performed.Herein,suggested internet activity record measures were applied.Our proposed system initially constructs a graph and then performs network analysis.Thus proposed CPSS system accurately identifies different areas of internet peak usage in a city(Milan city).Our research is helpful for the network operators to plan effective network configuration,management,and optimization of resources. 展开更多
关键词 cyber-physical social systems big data cyber-physical systems pervasive computing smart city big data management techniques
下载PDF
A Study on Optimizing the Double-Spine Type Flow Path Design for the Overhead Transportation System Using Tabu Search Algorithm
7
作者 Nguyen Huu Loc Khuu Thuy Duy Truong +3 位作者 Quoc Dien Le Tran Thanh Cong Vu Hoa Binh Tran Tuong Quan Vo 《Intelligent Automation & Soft Computing》 2024年第2期255-279,共25页
Optimizing Flow Path Design(FPD)is a popular research area in transportation system design,but its application to Overhead Transportation Systems(OTSs)has been limited.This study focuses on optimizing a double-spine f... Optimizing Flow Path Design(FPD)is a popular research area in transportation system design,but its application to Overhead Transportation Systems(OTSs)has been limited.This study focuses on optimizing a double-spine flow path design for OTSs with 10 stations by minimizing the total travel distance for both loaded and empty flows.We employ transportation methods,specifically the North-West Corner and Stepping-Stone methods,to determine empty vehicle travel flows.Additionally,the Tabu Search(TS)algorithm is applied to branch the 10 stations into two main layout branches.The results obtained from our proposed method demonstrate a reduction in the objective function value compared to the initial feasible solution.Furthermore,we explore howchanges in the parameters of the TS algorithm affect the optimal result.We validate the feasibility of our approach by comparing it with relevant literature and conducting additional tests on layouts with 20 and 30 stations. 展开更多
关键词 Overhead transportation systems tabu search double-spine layout transportationmethod empty travel flow path design
下载PDF
Cyber-Physical Production Systems for Data-Driven,Decentralized,and Secure Manufacturing-A Perspective 被引量:5
8
作者 Manu Suvarna Ken Shaun Yap +3 位作者 Wentao Yang Jun Li Yen Ting Ng Xiaonan Wang 《Engineering》 SCIE EI 2021年第9期1212-1223,共12页
With the concepts of Industry 4.0 and smart manufacturing gaining popularity,there is a growing notion that conventional manufacturing will witness a transition toward a new paradigm,targeting innovation,automation,be... With the concepts of Industry 4.0 and smart manufacturing gaining popularity,there is a growing notion that conventional manufacturing will witness a transition toward a new paradigm,targeting innovation,automation,better response to customer needs,and intelligent systems.Within this context,this review focuses on the concept of cyber–physical production system(CPPS)and presents a holistic perspective on the role of the CPPS in three key and essential drivers of this transformation:data-driven manufacturing,decentralized manufacturing,and integrated blockchains for data security.The paper aims to connect these three aspects of smart manufacturing and proposes that through the application of data-driven modeling,CPPS will aid in transforming manufacturing to become more intuitive and automated.In turn,automated manufacturing will pave the way for the decentralization of manufacturing.Layering blockchain technologies on top of CPPS will ensure the reliability and security of data sharing and integration across decentralized systems.Each of these claims is supported by relevant case studies recently published in the literature and from the industry;a brief on existing challenges and the way forward is also provided. 展开更多
关键词 Smart manufacturing cyber-physical production systems Industrial Internet of Things Data analytics Decentralized system Blockchain
下载PDF
Simulation of Cyber-Physical Systems of Systems: Some Research Areas-Computational Understanding, Awareness, and Wisdom 被引量:2
9
作者 Tuncer Oren 《系统仿真学报》 CAS CSCD 北大核心 2018年第2期363-385,共23页
After a brief emphasis about the interconnected world, including Cyber-Physical Systems of Systems, the increasing importance of the decision-making by autonomous, quasi-autonomous, and autonomic systems is emphasised... After a brief emphasis about the interconnected world, including Cyber-Physical Systems of Systems, the increasing importance of the decision-making by autonomous, quasi-autonomous, and autonomic systems is emphasised. Promising roles of computational understanding, computational awareness, and computational wisdom for better autonomous decision-making are outlined. The contributions of simulation-based approaches are listed. 展开更多
关键词 cyber-physical systems of systems decision-making by autonomous andautonomic systems COMPUTATIONAL UNDERSTANDING COMPUTATIONAL AWARENESS COMPUTATIONAL WISDOM simulation-based knowledge processing
下载PDF
Analysis of cascading failures of power cyber-physical systems considering false data injection attacks 被引量:5
10
作者 Jian Li Chaowei Sun Qingyu Su 《Global Energy Interconnection》 CAS CSCD 2021年第2期204-213,共10页
This study considers the performance impacts of false data injection attacks on the cascading failures of a power cyber-physical system,and identifies vulnerable nodes.First,considering the monitoring and control func... This study considers the performance impacts of false data injection attacks on the cascading failures of a power cyber-physical system,and identifies vulnerable nodes.First,considering the monitoring and control functions of a cyber network and power flow characteristics of a power network,a power cyber-physical system model is established.Then,the influences of a false data attack on the decision-making and control processes of the cyber network communication processes are studied,and a cascading failure analysis process is proposed for the cyber-attack environment.In addition,a vulnerability evaluation index is defined from two perspectives,i.e.,the topology integrity and power network operation characteristics.Moreover,the effectiveness of a power flow betweenness assessment for vulnerable nodes in the cyberphysical environment is verified based on comparing the node power flow betweenness and vulnerability assessment index.Finally,an IEEE14-bus power network is selected for constructing a power cyber-physical system.Simulations show that both the uplink communication channel and downlink communication channel suffer from false data attacks,which affect the ability of the cyber network to suppress the propagation of cascading failures,and expand the scale of the cascading failures.The vulnerability evaluation index is calculated for each node,so as to verify the effectiveness of identifying vulnerable nodes based on the power flow betweenness. 展开更多
关键词 Power cyber-physical systems False date injection attack Cascading failure VULNERABILITY Power flow betweenness.
下载PDF
Passivity-Based Robust Control Against Quantified False Data Injection Attacks in Cyber-Physical Systems 被引量:2
11
作者 Yue Zhao Ze Chen +2 位作者 Chunjie Zhou Yu-Chu Tian Yuanqing Qin 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第8期1440-1450,共11页
Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false d... Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false data such as sensor measurements and control signals.For quantified false data injection attacks,this paper establishes an effective defense framework from the energy conversion perspective.Then,we design an energy controller to dynamically adjust the system energy changes caused by unknown attacks.The designed energy controller stabilizes the attacked CPSs and ensures the dynamic performance of the system by adjusting the amount of damping injection.Moreover,with the disturbance attenuation technique,the burden of control system design is simplified because there is no need to design an attack observer.In addition,this secure control method is simple to implement because it avoids complicated mathematical operations.The effectiveness of our control method is demonstrated through an industrial CPS that controls a permanent magnet synchronous motor. 展开更多
关键词 cyber-physical systems energy controller energy conversion false data injection attacks L2 disturbance attenuation technology
下载PDF
A Security Enhancement Model Based on Switching Edge Strategy in Interdependent Heterogeneous Cyber-Physical Systems 被引量:1
12
作者 Dandan Zhao Can Liu +4 位作者 Guangquan Xu Zhiguo Ding Hao Peng Juan Yu Jianmin Han 《China Communications》 SCIE CSCD 2022年第2期158-173,共16页
With the advent of cross-domain interconnection,large-scale sensor network systems such as smart grids,smart homes,and intelligent transportation have emerged.These complex network systems often have a CPS(Cyber-Physi... With the advent of cross-domain interconnection,large-scale sensor network systems such as smart grids,smart homes,and intelligent transportation have emerged.These complex network systems often have a CPS(Cyber-Physical System)architecture and are usually composed of multiple interdependent systems.Minimal faults between interdependent networks may cause serious cascading failures between the entire system.Therefore,in this paper,we will explore the robustness detection schemes for interdependent networks.Firstly,by calculating the largest giant connected component in the entire system,the security of interdependent network systems under different attack models is analyzed.Secondly,a comparative analysis of the cascade failure mechanism between interdependent networks under the edge enhancement strategy is carried out.Finally,the simulation results verify the impact of system reliability under different handover edge strategies and show how to choose a better handover strategy to enhance its robustness.The further research work in this paper can also help design how to reduce the interdependence between systems,thereby further optimizing the interdependent network system’s structure to provide practical support for reducing the cascading failures.In the later work,we hope to explore our proposed strategies in the network model of real-world or close to real networks. 展开更多
关键词 security enhancement switching edge strategy interdependent systems cyber-physical systems
下载PDF
Decentralized Resilient H_∞Load Frequency Control for Cyber-Physical Power Systems Under DoS Attacks 被引量:2
13
作者 Xin Zhao Suli Zou Zhongjing Ma 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第11期1737-1751,共15页
This paper designs a decentralized resilient H_(∞)load frequency control(LFC)scheme for multi-area cyber-physical power systems(CPPSs).Under the network-based control framework,the sampled measurements are transmitte... This paper designs a decentralized resilient H_(∞)load frequency control(LFC)scheme for multi-area cyber-physical power systems(CPPSs).Under the network-based control framework,the sampled measurements are transmitted through the communication networks,which may be attacked by energylimited denial-of-service(DoS)attacks with a characterization of the maximum count of continuous data losses(resilience index).Each area is controlled in a decentralized mode,and the impacts on one area from other areas via their interconnections are regarded as the additional load disturbance of this area.Then,the closed-loop LFC system of each area under DoS attacks is modeled as an aperiodic sampled-data control system with external disturbances.Under this modeling,a decentralized resilient H_(∞)scheme is presented to design the state-feedback controllers with guaranteed H∞performance and resilience index based on a novel transmission interval-dependent loop functional method.When given the controllers,the proposed scheme can obtain a less conservative H_(∞)performance and resilience index that the LFC system can tolerate.The effectiveness of the proposed LFC scheme is evaluated on a one-area CPPS and two three-area CPPSs under DoS attacks. 展开更多
关键词 cyber-physical power systems(CPPSs) denial-of-service(DoS)attacks load frequency control(LFC) sampled-data control
下载PDF
A Systems-Theoretic Security Model for Large Scale, Complex Systems Applied to the US Air Transportation System 被引量:1
14
作者 Joseph R. Laracy 《International Journal of Communications, Network and System Sciences》 2017年第5期75-105,共31页
Classical risk-based or game-theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable to security threats. Additionally, these models suffer fro... Classical risk-based or game-theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable to security threats. Additionally, these models suffer from serious deficiencies when they are applied to software-intensive, socio-technical systems. A new approach is proposed in this paper that applies principles from control theory to enforce constraints on security threats thereby extending techniques used in system safety engineering. It is applied to identify and mitigate the threats that could emerge in critical infrastructures such as the air transportation system. Insights are provided to assist systems engineers and policy makers in securely transitioning to the Next Generation Air Transportation System (NGATS). 展开更多
关键词 Air transportation Security systems Engineering Control Theory system Dynamics
下载PDF
Journal of Transportation Systems Engineering and Information Technology Subject Index 被引量:3
15
《交通运输系统工程与信息》 EI CSCD 2007年第6期129-135,共7页
关键词 Journal of transportation systems Engineering and Information Technology Subject Index MODE
下载PDF
Internet of Things Based Solutions for Transport Network Vulnerability Assessment in Intelligent Transportation Systems 被引量:1
16
作者 Weiwei Liu Yang Tang +3 位作者 Fei Yang Chennan Zhang Dun Cao Gwang-jun Kim 《Computers, Materials & Continua》 SCIE EI 2020年第12期2511-2527,共17页
Intelligent Transportation System(ITS)is essential for effective identification of vulnerable units in the transport network and its stable operation.Also,it is necessary to establish an urban transport network vulner... Intelligent Transportation System(ITS)is essential for effective identification of vulnerable units in the transport network and its stable operation.Also,it is necessary to establish an urban transport network vulnerability assessment model with solutions based on Internet of Things(IoT).Previous research on vulnerability has no congestion effect on the peak time of urban road network.The cascading failure of links or nodes is presented by IoT monitoring system,which can collect data from a wireless sensor network in the transport environment.The IoT monitoring system collects wireless data via Vehicle-to-Infrastructure(V2I)channels to simulate key segments and their failure probability.Finally,the topological structure vulnerability index and the traffic function vulnerability index of road network are extracted from the vulnerability factors.The two indices are standardized by calculating the relative change rate,and the comprehensive index of the consequence after road network unit is in a failure state.Therefore,by calculating the failure probability of road network unit and comprehensive index of road network unit in failure state,the comprehensive vulnerability of road network can be evaluated by a risk calculation formula.In short,the IoT-based solutions to the new vulnerability assessment can help road network planning and traffic management departments to achieve the ITS goals. 展开更多
关键词 Internet of Things Intelligent transport systems vulnerability assessment transport network
下载PDF
Learning-Based Switched Reliable Control of Cyber-Physical Systems With Intermittent Communication Faults 被引量:1
17
作者 Xin Huang Jiuxiang Dong 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第3期711-724,共14页
This study deals with reliable control problems in data-driven cyber-physical systems(CPSs) with intermittent communication faults, where the faults may be caused by bad or broken communication devices and/or cyber at... This study deals with reliable control problems in data-driven cyber-physical systems(CPSs) with intermittent communication faults, where the faults may be caused by bad or broken communication devices and/or cyber attackers. To solve them, a watermark-based anomaly detector is proposed, where the faults are divided to be either detectable or undetectable.Secondly, the fault's intermittent characteristic is described by the average dwell-time(ADT)-like concept, and then the reliable control issues, under the undetectable faults to the detector, are converted into stabilization issues of switched systems. Furthermore,based on the identifier-critic-structure learning algorithm, a datadriven switched controller with a prescribed-performance-based switching law is proposed, and by the ADT approach, a tolerated fault set is given. Additionally, it is shown that the presented switching laws can improve the system performance degradation in asynchronous intervals, where the degradation is caused by the fault-maker-triggered switching rule, which is unknown for CPS operators. Finally, an illustrative example validates the proposed method. 展开更多
关键词 Adaptive dynamic programming(ADP) communication fault cyber-physical systems(CPSs) DATA-DRIVEN CONTROL RELIABLE CONTROL
下载PDF
Security and Privacy Challenges in Cyber-Physical Systems 被引量:1
18
作者 Fahd AlDosari 《Journal of Information Security》 2017年第4期285-295,共11页
Cyber-Physical Systems, or Smart-Embedded Systems, are co-engineered for the integration of physical, computational and networking resources. These resources are used to develop an efficient base for enhancing the qua... Cyber-Physical Systems, or Smart-Embedded Systems, are co-engineered for the integration of physical, computational and networking resources. These resources are used to develop an efficient base for enhancing the quality of services in all areas of life and achieving a classier lifestyle in terms of a required service’s functionality and timing. Cyber-Physical Systems (CPSs) complement the need to have smart products (e.g., homes, hospitals, airports, cities). In other words, regulate the three kinds of resources available: physical, computational, and networking. This regulation supports communication and interaction between the human word and digital word to find the required intelligence in all scopes of life, including Telecommunication, Power Generation and Distribution, and Manufacturing. Data Security is among the most important issues to be considered in recent technologies. Because Cyber-Physical Systems consist of interacting complex components and middle-ware, they face real challenges in being secure against cyber-attacks while functioning efficiently and without affecting or degrading their performance. This study gives a detailed description of CPSs, their challenges (including cyber-security attacks), characteristics, and related technologies. We also focus on the tradeoff between security and performance in CPS, and we present the most common Side Channel Attacks on the implementations of cryptographic algorithms (symmetric: AES and asymmetric: RSA) with the countermeasures against these attacks. 展开更多
关键词 SECURITY cyber-physical systems SIDE CHANNEL ATTACKS
下载PDF
A Triple Human-Digital Twin Architecture for Cyber-Physical Systems
19
作者 Duansen Shangguan Liping Chen +2 位作者 Chang Su Jianwan Ding Chan Liu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第6期1557-1578,共22页
With the development of information and communication technology and the advent of the Internet of Things(IoT)era,cyber-physical system(CPS)is becoming the trend of products or systems.The deep integration and real-ti... With the development of information and communication technology and the advent of the Internet of Things(IoT)era,cyber-physical system(CPS)is becoming the trend of products or systems.The deep integration and real-time interaction between the physical world and the virtual world expand system functions.Although there are some CPS implementation guidelines,the virtual world is still relatively abstract compared to the concrete physical world that can be touched through the IoT.Besides that,human is a non-negligible CPS endogenous interactive intelligent component.In this paper,we propose a triple human-digital twin architecture,where the physical objects and the digital twins that are the projections of the physical entities establish the cornerstone of human functioning together.And the hierarchically distributed digital twins grow dynamically with the physical entities along the lifecycle.Furthermore,the interaction and collaboration among the physical objects,the digital twins,and the humans in their respective worlds(the expected world,the interpreted world,and the physical world)integrate the full value chain of the products in anticipation of seamless synergy.Finally,we present a power management digital companion platform for the lunar probe to demonstrate the efficacy of the architecture. 展开更多
关键词 cyber-physical systems digital twin human factors systems architecture COLLABORATION
下载PDF
Topology-Based and Event-Oriented Approach to Simulation of Cyber-Physical Systems
20
作者 ZHENG Jun-xi ZHANG Ping +2 位作者 JIN Pei-gen LI Fang DU Guang-long 《Journal of Donghua University(English Edition)》 EI CAS 2016年第6期991-996,共6页
A simulation model for cyber-physical systems(CPSs)was presented.The model was developed by the method of combination of topology-based and event-oriented that could be used to simulate systems with routing flexibilit... A simulation model for cyber-physical systems(CPSs)was presented.The model was developed by the method of combination of topology-based and event-oriented that could be used to simulate systems with routing flexibility,service-selection flexibility and service- mode flexibility overall by integrating the strategies related.The validity of the model has been verified by two extensive experiments. 展开更多
关键词 topological-based event-oriented cyber-physical systems discrete event systems simulation model
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部