scholarly journals Distributed Virtual Time-Based Synchronization for Simulation of Cyber-Physical Systems

2021 ◽  
Vol 31 (2) ◽  
pp. 1-24
Author(s):  
Christopher Hannon ◽  
Jiaqi Yan ◽  
Dong Jin

Our world today increasingly relies on the orchestration of digital and physical systems to ensure the successful operations of many complex and critical infrastructures. Simulation-based testbeds are useful tools for engineering those cyber-physical systems and evaluating their efficiency, security, and resilience. In this article, we present a cyber-physical system testing platform combining distributed physical computing and networking hardware and simulation models. A core component is the distributed virtual time system that enables the efficient synchronization of virtual clocks among distributed embedded Linux devices. Virtual clocks also enable high-fidelity experimentation by interrupting real and emulated cyber-physical applications to inject offline simulation data. We design and implement two modes of the distributed virtual time: periodic mode for scheduling repetitive events like sensor device measurements, and dynamic mode for on-demand interrupt-based synchronization. We also analyze the performance of both approaches to synchronization including overhead, accuracy, and error introduced from each approach. By interconnecting the embedded devices’ general purpose IO pins, they can coordinate and synchronize with low overhead, under 50 microseconds for eight processes across four embedded Linux devices. Finally, we demonstrate the usability of our testbed and the differences between both approaches in a power grid control application.

2021 ◽  
Vol 20 (4) ◽  
pp. 1-24
Author(s):  
Lukas Gressl ◽  
Christian Steger ◽  
Ulrich Neffe

With the advent of the Internet of Things (IoT) and Cyber-Physical Systems (CPS), embedded devices have been gaining importance in our daily lives, as well as industrial processes. Independent of their usage, be it within an IoT system or a CPS, embedded devices are always an attractive target for security attacks, mainly due to their continuous network availability and the importance of the data they handle. Thus, the design of such systems requires a thorough consideration of the various security constraints they are liable to. Introducing these security constraints, next to other requirements, such as power consumption, and performance increases the number of design choices a system designer must consider. As the various constraints are often conflicting with each other, designers face the complex task of balancing them. System designers facilitate Design Space Exploration (DSE) tools to support a system designer in this job. However, available DSE tools only offer a limited way of considering security constraints during the design process. In this article, we introduce a novel DSE framework, which allows the consideration of security constraints, in the form of attack scenarios, and attack mitigations in the form of security tasks. Based on the descriptions of the system’s functionality and architecture, possible attacks, and known mitigation techniques, the framework finds the optimal design for a secure IoT device or CPS. Our framework’s functionality and its benefits are shown based on the design of a secure sensor system.


Author(s):  
Fedor Burčiar ◽  
Pavel Važan ◽  
Simona Pulišová

Abstract As the term of Industry 4.0 becomes more and more relevant with each passing day, it is up to researchers and companies to find solutions to integrating all the technologies it covers. One of those technologies, even though not highly developed, is simulation and building Cyber-Physical Systems for gathering data and improving the production processes. In the research described in this paper, we focused on integrating production data with simulation models in order to make the process of understanding and learning about complex production systems as simple and as quick as possible. This paper contains three sections. The first one introduces the theoretical fundamentals of our research. The second one focuses on the methods used to create a digital model of production system. The final one discusses the results of the conducted experiments, and their impact on further research.


10.29007/f4vs ◽  
2020 ◽  
Author(s):  
Johan Lidén Eddeland ◽  
Sajed Miremadi ◽  
Knut Åkesson

Temporal-logic based falsification of Cyber-Physical Systems is a testing technique used to verify certain behaviours in simulation models, however the problem statement typically requires some model-specific tuning of parameters to achieve optimal results. In this experience report, we investigate how different optimization solvers and objective functions affect the falsification outcome for a benchmark set of models and specifications. With data from the four different solvers and three different objective functions for the falsification problem, we see that choice of solver and objective function depends both on the model and the specification that are to be falsified. We also note that using a robust semantics of Signal Temporal Logic typically increases falsification performance compared to using Boolean semantics.


Sensors ◽  
2018 ◽  
Vol 18 (12) ◽  
pp. 4356 ◽  
Author(s):  
Chien-Ying Chen ◽  
Monowar Hasan ◽  
Sibin Mohan

Modern embedded and cyber-physical systems are ubiquitous. Many critical cyber-physical systems have real-time requirements (e.g., avionics, automobiles, power grids, manufacturing systems, industrial control systems, etc.). Recent developments and new functionality require real-time embedded devices to be connected to the Internet. This gives rise to the real-time Internet-of-things (RT-IoT) that promises a better user experience through stronger connectivity and efficient use of next-generation embedded devices. However, RT-IoT are also increasingly becoming targets for cyber-attacks, which is exacerbated by this increased connectivity. This paper gives an introduction to RT-IoT systems, an outlook of current approaches and possible research challenges towards secure RT-IoT frameworks.


2018 ◽  
Vol 27 (4) ◽  
pp. 659-679 ◽  
Author(s):  
Andrea Bonci ◽  
Massimiliano Pirani ◽  
Sauro Longhi

Abstract The factory of the future scenario asks for new approaches to cope with the incoming challenges and complexity of cyber-physical systems. The role of database management systems is becoming central for control and automation technology in this new industrial scenario. This article proposes database-centric technology and architecture that aims to seamlessly integrate networking, artificial intelligence, and real-time control issues into a unified model of computing. The proposed methodology is also viable for the development of a framework that features simulation and rapid prototyping tools for smart and advanced industrial automation. The full expression of the potentialities in the presented approach is expected in particular for applications where tiny and distributed embedded devices collaborate to a shared computing task of relevant complexity.


Author(s):  
Okolie S.O. ◽  
Kuyoro S.O. ◽  
Ohwo O. B

Cyber-Physical Systems (CPS) will revolutionize how humans relate with the physical world around us. Many grand challenges await the economically vital domains of transportation, health-care, manufacturing, agriculture, energy, defence, aerospace and buildings. Exploration of these potentialities around space and time would create applications which would affect societal and economic benefit. This paper looks into the concept of emerging Cyber-Physical system, applications and security issues in sustaining development in various economic sectors; outlining a set of strategic Research and Development opportunities that should be accosted, so as to allow upgraded CPS to attain their potential and provide a wide range of societal advantages in the future.


Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


Sign in / Sign up

Export Citation Format

Share Document