Feature-Based Prognosis of Performance and Cost Implications of Cyber-Physical Systems: An Illustration of Theory and Process

Author(s):  
Eliab Z. Opiyo ◽  
Imre Horváth

Prognosis and planning for the future life cycles is critical for both customers and developers of complex systems such as cyber-physical systems (CPSs). There are often uncertainties regarding the eventual costs and performances of CPSs. Having in advance a clear sense of the expected costs and performance is vital in the early development phases for decisions on, e.g., which functional features the CPS should have, whether to proceed with the development process, or whether to own a CPS or product. We focus specifically on prognosis of functional performance and cost implications of CPSs. The problem is that the available forecasting approaches cannot be used straightaway to tradeoff between costs and benefits, or to predict the benefits of investment in the early phases of the processes of development of CPSs. As a first step in an attempt to deal with these challenges, we have developed a feature-based reference scheme for deriving aspects and criteria for forecasting functional performance and cost implications of CPSs. We illustrate the applicability of the proposed scheme in this paper. We used this scheme as the basis for deriving the aspects and criteria for forecasting functional performance and cost implications of a cyber-physical printing utility. The scheme provided a systematic way of acquiring and formulating the aspects and criteria, and of figuring out the features that a cyber-physical printing utility should encompass. Overall, it helps to reduce the chance of overlooking the aspects and criteria.

Author(s):  
Linlin Zhang ◽  
Zehui Zhang ◽  
Cong Guan

AbstractFederated learning (FL) is a distributed learning approach, which allows the distributed computing nodes to collaboratively develop a global model while keeping their data locally. However, the issues of privacy-preserving and performance improvement hinder the applications of the FL in the industrial cyber-physical systems (ICPSs). In this work, we propose a privacy-preserving momentum FL approach, named PMFL, which uses the momentum term to accelerate the model convergence rate during the training process. Furthermore, a fully homomorphic encryption scheme CKKS is adopted to encrypt the gradient parameters of the industrial agents’ models for preserving their local privacy information. In particular, the cloud server calculates the global encrypted momentum term by utilizing the encrypted gradients based on the momentum gradient descent optimization algorithm (MGD). The performance of the proposed PMFL is evaluated on two common deep learning datasets, i.e., MNIST and Fashion-MNIST. Theoretical analysis and experiment results confirm that the proposed approach can improve the convergence rate while preserving the privacy information of the industrial agents.


Author(s):  
Bedir Tekinerdogan ◽  
Rakshit Mittal ◽  
Rima Al-Ali ◽  
Mauro Iacono ◽  
Eva Navarro ◽  
...  

Author(s):  
Dana Prochazkova ◽  
Jan Prochazka

The aim of risk management of socio-cyber-physical systems at operation is the integral safety which ensures their co-existence with their vicinity throughout their life cycles. On the basis of present knowledge and experience, part of risks that threaten socio-cyber-physical systems is coped by preven-tive measures during their designing and manufacturing. Due to dynamic changes of the world, the con-ditions of socio-cyber-physical systems at operations change. If changes exceed the socio-cyber-physical systems´ safety limits which were inserted into their designs, the accidents or socio-cyber-physical systems´ failures occur. The paper contains the Decision Support System for determination of risk rate of socio-cyber-physical systems. Its regular application shows present-day risk rate and allows to reveal danger situations and in time to apply mitigation measures. The methodology can find several applications in Education, especially in Engineering Education.


Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 1090 ◽  
Author(s):  
Yongkai Fan ◽  
Guanqun Zhao ◽  
Kuan-Ching Li ◽  
Bin Zhang ◽  
Gang Tan ◽  
...  

The trustworthiness of data is vital data analysis in the age of big data. In cyber-physical systems, most data is collected by sensors. With the increase of sensors as Internet of Things (IoT) nodes in the network, the security risk of data tampering, unauthorized access, false identify, and others are overgrowing because of vulnerable nodes, which leads to the great economic and social loss. This paper proposes a security scheme, Securing Nodes in IoT Perception Layer (SNPL), for protecting nodes in the perception layer. The SNPL is constructed by novel lightweight algorithms to ensure security and satisfy performance requirements, as well as safety technologies to provide security isolation for sensitive operations. A series of experiments with different types and numbers of nodes are presented. Experimental results and performance analysis show that SNPL is efficient and effective at protecting IoT from faulty or malicious nodes. Some potential practical application scenarios are also discussed to motivate the implementation of the proposed scheme in the real world.


2021 ◽  
Vol 20 (4) ◽  
pp. 1-24
Author(s):  
Lukas Gressl ◽  
Christian Steger ◽  
Ulrich Neffe

With the advent of the Internet of Things (IoT) and Cyber-Physical Systems (CPS), embedded devices have been gaining importance in our daily lives, as well as industrial processes. Independent of their usage, be it within an IoT system or a CPS, embedded devices are always an attractive target for security attacks, mainly due to their continuous network availability and the importance of the data they handle. Thus, the design of such systems requires a thorough consideration of the various security constraints they are liable to. Introducing these security constraints, next to other requirements, such as power consumption, and performance increases the number of design choices a system designer must consider. As the various constraints are often conflicting with each other, designers face the complex task of balancing them. System designers facilitate Design Space Exploration (DSE) tools to support a system designer in this job. However, available DSE tools only offer a limited way of considering security constraints during the design process. In this article, we introduce a novel DSE framework, which allows the consideration of security constraints, in the form of attack scenarios, and attack mitigations in the form of security tasks. Based on the descriptions of the system’s functionality and architecture, possible attacks, and known mitigation techniques, the framework finds the optimal design for a secure IoT device or CPS. Our framework’s functionality and its benefits are shown based on the design of a secure sensor system.


Author(s):  
Dana Prochazkova ◽  
Jan Prochazka

The aim of risk management of socio-cyber-physical systems at designing is the integral safety, which ensures their coexistence with their vicinity  throughout their life cycles. On the basis of present knowledge and experience, part of risks that threaten socio-cyber-physical systems shall be mitigated by preentive measures during their designing and manufacturing. Due to dynamic changes of the world, the conditions of socio-cyber-physical systems at operation change. If  changes exceed the socio-cyber-physical systems´ safety limits which were inserted into their designs, the accidents or  socio-cyber-physical sysems´ failures occur. The presented risk management plan is tool which ensures the prevention of such unaccepted situations and the safety.   


Sign in / Sign up

Export Citation Format

Share Document