首页 > 最新文献

ACM Trans. Cyber Phys. Syst.最新文献

英文 中文
The Lord of the Ring Road: A Review and Evaluation of Autonomous Control Policies for Traffic in a Ring Road 环城路之王:环城路交通自主控制策略综述与评价
Pub Date : 2022-01-31 DOI: 10.1145/3494577
Fang-Chieh Chou, A. R. Bagabaldo, A. Bayen
This study focuses on the comprehensive investigation of stop-and-go waves appearing in closed-circuit ring road traffic wherein we evaluate various longitudinal dynamical models for vehicles. It is known that the behavior of human-driven vehicles, with other traffic elements such as density held constant, could stimulate stop-and-go waves, which do not dissipate on the circuit ring road. Stop-and-go waves can be dissipated by adding automated vehicles (AVs) to the ring. Thorough investigations of the performance of AV longitudinal control algorithms were carried out in Flow, which is an integrated platform for reinforcement learning on traffic control. Ten AV algorithms presented in the literature are evaluated. For each AV algorithm, experiments are carried out by varying distributions and penetration rates of AVs. Two different distributions of AVs are studied. For the first distribution scenario, AVs are placed consecutively. Penetration rates are varied from 1 AV (5%) to all AVs (100%). For the second distribution scenario, AVs are placed with even distribution of human-driven vehicles in between any two AVs. In this scenario, penetration rates are varied from 2 AVs (10%) to 11 AVs (50%). Multiple runs (10 runs) are simulated to average out the randomness in the results. From more than 3,000 simulation experiments, we investigated how AV algorithms perform differently with varying distributions and penetration rates while all AV algorithms remained fixed under all distributions and penetration rates. Time to stabilize, maximum headway, vehicle miles traveled, and fuel economy are used to evaluate their performance. Using these metrics, we find that the traffic condition improvement is not necessarily dependent on the distribution for most of the AV controllers, particularly when no cooperation among AVs is considered. Traffic condition is generally improved with a higher AV penetration rate with only one of the AV algorithms showing a contrary trend. Among all AV algorithms in this study, the reinforcement learning controller shows the most consistent improvement under all distributions and penetration rates.
本研究的重点是对环形道路交通中出现的走走停停波进行综合研究,其中我们评估了车辆的各种纵向动力学模型。众所周知,在密度等其他交通因素保持不变的情况下,人类驾驶车辆的行为可能会产生走走停停的波动,而这种波动在环形公路上不会消散。通过在环路上增加自动驾驶车辆(AVs),可以消除走走停停的波动。在交通控制强化学习集成平台Flow中,对自动驾驶纵向控制算法的性能进行了深入的研究。评估了文献中提出的十种AV算法。针对每一种自动驾驶算法,分别采用不同的自动驾驶车辆分布和渗透率进行实验。研究了两种不同的av分布。对于第一种分配方案,av是连续放置的。渗透率从1辆自动驾驶汽车(5%)到所有自动驾驶汽车(100%)不等。对于第二种分布场景,自动驾驶汽车被均匀分布在任意两辆自动驾驶汽车之间。在这种情况下,普及率从2辆(10%)到11辆(50%)不等。模拟多次运行(10次运行)以平均结果中的随机性。从3000多个模拟实验中,我们研究了自动驾驶汽车算法在不同分布和渗透率下的表现差异,而所有自动驾驶汽车算法在所有分布和渗透率下保持不变。稳定时间、最大车头距、车辆行驶里程和燃油经济性被用来评估它们的性能。使用这些指标,我们发现交通状况的改善并不一定依赖于大多数自动驾驶控制器的分布,特别是当不考虑自动驾驶之间的合作时。随着自动驾驶普及率的提高,交通状况普遍得到改善,只有一种自动驾驶算法表现出相反的趋势。在本研究的所有AV算法中,强化学习控制器在所有分布和渗透率下都表现出最一致的改进。
{"title":"The Lord of the Ring Road: A Review and Evaluation of Autonomous Control Policies for Traffic in a Ring Road","authors":"Fang-Chieh Chou, A. R. Bagabaldo, A. Bayen","doi":"10.1145/3494577","DOIUrl":"https://doi.org/10.1145/3494577","url":null,"abstract":"This study focuses on the comprehensive investigation of stop-and-go waves appearing in closed-circuit ring road traffic wherein we evaluate various longitudinal dynamical models for vehicles. It is known that the behavior of human-driven vehicles, with other traffic elements such as density held constant, could stimulate stop-and-go waves, which do not dissipate on the circuit ring road. Stop-and-go waves can be dissipated by adding automated vehicles (AVs) to the ring. Thorough investigations of the performance of AV longitudinal control algorithms were carried out in Flow, which is an integrated platform for reinforcement learning on traffic control. Ten AV algorithms presented in the literature are evaluated. For each AV algorithm, experiments are carried out by varying distributions and penetration rates of AVs. Two different distributions of AVs are studied. For the first distribution scenario, AVs are placed consecutively. Penetration rates are varied from 1 AV (5%) to all AVs (100%). For the second distribution scenario, AVs are placed with even distribution of human-driven vehicles in between any two AVs. In this scenario, penetration rates are varied from 2 AVs (10%) to 11 AVs (50%). Multiple runs (10 runs) are simulated to average out the randomness in the results. From more than 3,000 simulation experiments, we investigated how AV algorithms perform differently with varying distributions and penetration rates while all AV algorithms remained fixed under all distributions and penetration rates. Time to stabilize, maximum headway, vehicle miles traveled, and fuel economy are used to evaluate their performance. Using these metrics, we find that the traffic condition improvement is not necessarily dependent on the distribution for most of the AV controllers, particularly when no cooperation among AVs is considered. Traffic condition is generally improved with a higher AV penetration rate with only one of the AV algorithms showing a contrary trend. Among all AV algorithms in this study, the reinforcement learning controller shows the most consistent improvement under all distributions and penetration rates.","PeriodicalId":120188,"journal":{"name":"ACM Trans. Cyber Phys. Syst.","volume":"15 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116394480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Detection and Mitigation of Sensor and CAN Bus Attacks in Vehicle Anti-Lock Braking Systems 汽车防抱死制动系统中传感器和CAN总线攻击的检测与缓解
Pub Date : 2022-01-31 DOI: 10.1145/3495534
Liuwang Kang, Haiying Shen
For a modern vehicle, if the sensor in a vehicle anti-lock braking system (ABS) or controller area network (CAN) bus is attacked during a brake process, the vehicle will lose driving direction control and the driver’s life will be highly threatened. However, current methods for detecting attacks are not sufficiently accurate, and no method can provide attack mitigation. To ensure vehicle ABS security, we propose an attack detection method to accurately detect both sensor attack (SA) and CAN bus attack in a vehicle ABS, and an attack mitigation strategy to mitigate their negative effects on the vehicle ABS. In our attack detection method, we build a vehicle state space equation that considers the real-time road friction coefficient to predict vehicle states (i.e., wheel speed and longitudinal brake force) with their previous values. Based on sets of historical measured vehicle states, we develop a search algorithm to find out attack changes (vehicle state changes because of attack) by minimizing errors between the predicted vehicle states and the measured vehicle states. In our attack mitigation strategy, attack changes are subtracted from the measured vehicle states to generate correct vehicle states for a vehicle ABS. We conducted the first real SA experiments to show how a magnet affects sensor readings. Our simulation results demonstrate that our attack detection method can detect SA and CAN bus attack more accurately compared with existing methods, and also that our attack mitigation strategy almost eliminates the attack’s effects on a vehicle ABS.
对于现代车辆而言,如果车辆防抱死制动系统(ABS)或控制器局域网(CAN)总线中的传感器在制动过程中受到攻击,将导致车辆失去对行驶方向的控制,严重威胁驾驶员的生命安全。但是,目前检测攻击的方法不够准确,而且没有任何方法可以提供攻击缓解。为了保证汽车ABS系统的安全性,我们提出了一种能够准确检测汽车ABS系统中传感器攻击(SA)和CAN总线攻击的攻击检测方法,并提出了一种攻击缓解策略来减轻它们对汽车ABS系统的负面影响。在我们的攻击检测方法中,我们建立了一个考虑实时道路摩擦系数的车辆状态空间方程,以预测车辆状态(即车轮速度和纵向制动力)与它们之前的值。基于历史测量的车辆状态集,我们开发了一种搜索算法,通过最小化预测的车辆状态与测量的车辆状态之间的误差来找出攻击变化(由于攻击而导致的车辆状态变化)。在我们的攻击缓解策略中,从测量的车辆状态中减去攻击变化,从而为车辆ABS生成正确的车辆状态。我们进行了第一次真实的SA实验,以展示磁铁如何影响传感器读数。仿真结果表明,与现有方法相比,我们的攻击检测方法可以更准确地检测出SA和can总线攻击,并且我们的攻击缓解策略几乎消除了攻击对汽车ABS的影响。
{"title":"Detection and Mitigation of Sensor and CAN Bus Attacks in Vehicle Anti-Lock Braking Systems","authors":"Liuwang Kang, Haiying Shen","doi":"10.1145/3495534","DOIUrl":"https://doi.org/10.1145/3495534","url":null,"abstract":"For a modern vehicle, if the sensor in a vehicle anti-lock braking system (ABS) or controller area network (CAN) bus is attacked during a brake process, the vehicle will lose driving direction control and the driver’s life will be highly threatened. However, current methods for detecting attacks are not sufficiently accurate, and no method can provide attack mitigation. To ensure vehicle ABS security, we propose an attack detection method to accurately detect both sensor attack (SA) and CAN bus attack in a vehicle ABS, and an attack mitigation strategy to mitigate their negative effects on the vehicle ABS. In our attack detection method, we build a vehicle state space equation that considers the real-time road friction coefficient to predict vehicle states (i.e., wheel speed and longitudinal brake force) with their previous values. Based on sets of historical measured vehicle states, we develop a search algorithm to find out attack changes (vehicle state changes because of attack) by minimizing errors between the predicted vehicle states and the measured vehicle states. In our attack mitigation strategy, attack changes are subtracted from the measured vehicle states to generate correct vehicle states for a vehicle ABS. We conducted the first real SA experiments to show how a magnet affects sensor readings. Our simulation results demonstrate that our attack detection method can detect SA and CAN bus attack more accurately compared with existing methods, and also that our attack mitigation strategy almost eliminates the attack’s effects on a vehicle ABS.","PeriodicalId":120188,"journal":{"name":"ACM Trans. Cyber Phys. Syst.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126426578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IoTranx: Transactions for Safer Smart Spaces IoTranx:更安全的智能空间交易
Pub Date : 2022-01-31 DOI: 10.1145/3471937
Chao Chen, A. Helal, Zhi Jin, Mingyue Zhang, Choonhwa Lee
Smart spaces such as smart homes deliver digital services to optimize space use and enhance user experience. They are composed of an Internet of Things (IoT), people, and physical content. They differ from traditional computer systems in that their cyber-physical nature ties intimately with the users and the built environment. The impact of ill-programmed applications in such spaces goes beyond loss of data or a computer crash, risking potentially physical harm to the space and its users. Ensuring smart space safety is therefore critically important to successfully deliver intimate and convenient services surrounding our daily lives. By modeling smart space as a highly dynamic database, we present IoT Transactions, an analogy to database transactions, as an abstraction for programming and executing the services as the handling of the devices in smart space. Unlike traditional database management systems that take a “clear room approach,” smart spaces take a “dirty room approach” where imperfection and unattainability of full control and guarantees are the new normal. We identify Atomicity, Isolation, Integrity and Durability (AI 2 D) as the set of properties necessary to define the safe runtime behavior for IoT transactions for maintaining “permissible device settings” of execution and to avoid or detect and resolve “impermissible settings.” Furthermore, we introduce a lock protocol, utilizing variations of lock concepts, that enforces AI 2 D safety properties during transaction processing. We show a brief proof of the protocol correctness and a detailed analytical model to evaluate its performance.
智能家居等智能空间提供数字化服务,优化空间使用,提升用户体验。它们由物联网(IoT)、人和物理内容组成。它们与传统计算机系统的不同之处在于,它们的网络物理性质与用户和建筑环境密切相关。在这些空间中,编程不良的应用程序的影响不仅仅是数据丢失或计算机崩溃,还可能对空间及其用户造成潜在的物理损害。因此,确保智能空间安全对于成功地为我们的日常生活提供贴心和便利的服务至关重要。通过将智能空间建模为一个高度动态的数据库,我们将物联网事务(类似于数据库事务)作为编程和执行服务的抽象,作为智能空间中设备的处理。与采用“干净房间方法”的传统数据库管理系统不同,智能空间采用“脏房间方法”,其中不完美和无法实现完全控制和保证是新的常态。我们将原子性、隔离性、完整性和持久性(AI 2d)确定为定义物联网事务的安全运行时行为所必需的属性集,以维护执行的“允许设备设置”,并避免或检测和解决“不允许设置”。此外,我们引入了一个锁协议,利用锁概念的变化,在事务处理期间强制执行AI 2d安全属性。我们给出了一个简短的协议正确性证明和一个详细的分析模型来评估其性能。
{"title":"IoTranx: Transactions for Safer Smart Spaces","authors":"Chao Chen, A. Helal, Zhi Jin, Mingyue Zhang, Choonhwa Lee","doi":"10.1145/3471937","DOIUrl":"https://doi.org/10.1145/3471937","url":null,"abstract":"\u0000 Smart spaces such as smart homes deliver digital services to optimize space use and enhance user experience. They are composed of an Internet of Things (IoT), people, and physical content. They differ from traditional computer systems in that their cyber-physical nature ties intimately with the users and the built environment. The impact of ill-programmed applications in such spaces goes beyond loss of data or a computer crash, risking potentially physical harm to the space and its users. Ensuring smart space safety is therefore critically important to successfully deliver intimate and convenient services surrounding our daily lives. By modeling smart space as a highly dynamic database, we present IoT Transactions, an analogy to database transactions, as an abstraction for programming and executing the services as the handling of the devices in smart space. Unlike traditional database management systems that take a “clear room approach,” smart spaces take a “dirty room approach” where imperfection and unattainability of full control and guarantees are the new normal. We identify Atomicity, Isolation, Integrity and Durability (AI\u0000 2\u0000 D) as the set of properties necessary to define the safe runtime behavior for IoT transactions for maintaining “permissible device settings” of execution and to avoid or detect and resolve “impermissible settings.” Furthermore, we introduce a lock protocol, utilizing variations of lock concepts, that enforces AI\u0000 2\u0000 D safety properties during transaction processing. We show a brief proof of the protocol correctness and a detailed analytical model to evaluate its performance.\u0000","PeriodicalId":120188,"journal":{"name":"ACM Trans. Cyber Phys. Syst.","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134454358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Roadrunner+: An Autonomous Intersection Management Cooperating with Connected Autonomous Vehicles and Pedestrians with Spillback Considered Roadrunner+:考虑溢出效应的自动驾驶车辆和行人的自动交叉口管理
Pub Date : 2022-01-31 DOI: 10.1145/3488246
Michael I.-C. Wang, Charles H.-P. Wen, H. J. Chao
The recent emergence of Connected Autonomous Vehicles (CAVs) enables the Autonomous Intersection Management (AIM) system, replacing traffic signals and human driving operations for improved safety and road efficiency. When CAVs approach an intersection, AIM schedules their intersection usage in a collision-free manner while minimizing their waiting times. In practice, however, there are pedestrian road-crossing requests and spillback problems, a blockage caused by the congestion of the downstream intersection when the traffic load exceeds the road capacity. As a result, collisions occur when CAVs ignore pedestrians or are forced to the congested road. In this article, we present a cooperative AIM system, named Roadrunner+ , which simultaneously considers CAVs, pedestrians, and upstream/downstream intersections for spillback handling, collision avoidance, and efficient CAV controls. The performance of Roadrunner+ is evaluated with the SUMO microscopic simulator. Our experimental results show that Roadrunner+ has 15.16% higher throughput than other AIM systems and 102.53% higher throughput than traditional traffic signals. Roadrunner+ also reduces 75.62% traveling delay compared to other AIM systems. Moreover, the results show that CAVs in Roadrunner+ save up to 7.64% in fuel consumption, and all the collisions caused by spillback are prevented in Roadrunner+.
最近出现的互联自动驾驶汽车(cav)使自动路口管理(AIM)系统取代了交通信号和人工驾驶操作,提高了安全性和道路效率。当自动驾驶汽车接近十字路口时,AIM以无碰撞的方式安排他们的十字路口使用,同时最大限度地减少他们的等待时间。然而,在实践中,存在行人过路请求和溢出问题,即当交通负荷超过道路容量时,下游十字路口拥堵造成的堵塞。因此,当自动驾驶汽车忽视行人或被迫在拥挤的道路上行驶时,就会发生碰撞。在这篇文章中,我们提出了一个名为Roadrunner+的协同AIM系统,该系统同时考虑了自动驾驶汽车、行人和上下游交叉路口的溢出处理、碰撞避免和有效的自动驾驶汽车控制。利用SUMO显微模拟器对Roadrunner+的性能进行了评估。实验结果表明,Roadrunner+的吞吐量比其他AIM系统高15.16%,比传统交通信号的吞吐量高102.53%。与其他AIM系统相比,Roadrunner+还减少了75.62%的旅行延误。结果表明,在Roadrunner+中,自动驾驶汽车可节省7.64%的燃油消耗,并且完全避免了由溢出引起的碰撞。
{"title":"Roadrunner+: An Autonomous Intersection Management Cooperating with Connected Autonomous Vehicles and Pedestrians with Spillback Considered","authors":"Michael I.-C. Wang, Charles H.-P. Wen, H. J. Chao","doi":"10.1145/3488246","DOIUrl":"https://doi.org/10.1145/3488246","url":null,"abstract":"\u0000 The recent emergence of Connected Autonomous Vehicles (CAVs) enables the Autonomous Intersection Management (AIM) system, replacing traffic signals and human driving operations for improved safety and road efficiency. When CAVs approach an intersection, AIM schedules their intersection usage in a collision-free manner while minimizing their waiting times. In practice, however, there are pedestrian road-crossing requests and spillback problems, a blockage caused by the congestion of the downstream intersection when the traffic load exceeds the road capacity. As a result, collisions occur when CAVs ignore pedestrians or are forced to the congested road. In this article, we present a cooperative AIM system, named\u0000 Roadrunner+\u0000 , which simultaneously considers CAVs, pedestrians, and upstream/downstream intersections for spillback handling, collision avoidance, and efficient CAV controls. The performance of Roadrunner+ is evaluated with the SUMO microscopic simulator. Our experimental results show that Roadrunner+ has 15.16% higher throughput than other AIM systems and 102.53% higher throughput than traditional traffic signals. Roadrunner+ also reduces 75.62% traveling delay compared to other AIM systems. Moreover, the results show that CAVs in Roadrunner+ save up to 7.64% in fuel consumption, and all the collisions caused by spillback are prevented in Roadrunner+.\u0000","PeriodicalId":120188,"journal":{"name":"ACM Trans. Cyber Phys. Syst.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130298552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Novel Approach for Deploying Minimum Sensors in Smart Buildings 一种在智能建筑中部署最小传感器的新方法
Pub Date : 2022-01-31 DOI: 10.1145/3477929
A. Agarwal, K. Ramamritham
Buildings, viewed as cyber-physical systems, become smart by deploying Building Management Systems (BMS). They should be aware about the state and environment of the building. This is achieved by developing a sensing system that senses different interesting factors of the building, called as “facets of sensing.” Depending on the application, different facets need to be sensed at various locations. Existing approaches for sensing these facets consist of deploying sensors at all the places so they can be sensed directly. But installing numerous sensors often aggravate the issues of user inconvenience, cost of installation and maintenance, and generation of e-waste. This article proposes how intelligently using the existing information can help to estimate the facets in cyber-physical systems like buildings, thereby reducing the sensors to be deployed. In this article, an optimization framework has been developed, which optimally deploys sensors in a building such that it satisfies BMS requirements with minimum number of sensors. The proposed solution is applied to real-world scenarios with cyber-physical systems. The results indicate that the proposed optimization framework is able to reduce the number of sensors by 59% and 49% when compared to the baseline and heuristic approach, respectively.
建筑被视为网络物理系统,通过部署建筑管理系统(BMS)变得智能化。他们应该了解建筑的状态和环境。这是通过开发一种传感系统来实现的,该系统可以感知建筑物的不同有趣因素,称为“传感方面”。根据应用程序的不同,需要在不同的位置检测不同的方面。现有的感知这些方面的方法包括在所有地方部署传感器,以便可以直接感知它们。但是,安装大量的传感器往往会加剧用户不便、安装和维护成本以及产生电子垃圾的问题。本文提出了如何智能地利用现有信息来帮助估计网络物理系统(如建筑物)中的各个方面,从而减少要部署的传感器。在本文中,开发了一个优化框架,它以最佳方式在建筑物中部署传感器,从而以最少的传感器数量满足BMS要求。提出的解决方案应用于具有网络物理系统的真实场景。结果表明,与基线和启发式方法相比,所提出的优化框架能够分别减少59%和49%的传感器数量。
{"title":"A Novel Approach for Deploying Minimum Sensors in Smart Buildings","authors":"A. Agarwal, K. Ramamritham","doi":"10.1145/3477929","DOIUrl":"https://doi.org/10.1145/3477929","url":null,"abstract":"Buildings, viewed as cyber-physical systems, become smart by deploying Building Management Systems (BMS). They should be aware about the state and environment of the building. This is achieved by developing a sensing system that senses different interesting factors of the building, called as “facets of sensing.” Depending on the application, different facets need to be sensed at various locations. Existing approaches for sensing these facets consist of deploying sensors at all the places so they can be sensed directly. But installing numerous sensors often aggravate the issues of user inconvenience, cost of installation and maintenance, and generation of e-waste. This article proposes how intelligently using the existing information can help to estimate the facets in cyber-physical systems like buildings, thereby reducing the sensors to be deployed. In this article, an optimization framework has been developed, which optimally deploys sensors in a building such that it satisfies BMS requirements with minimum number of sensors. The proposed solution is applied to real-world scenarios with cyber-physical systems. The results indicate that the proposed optimization framework is able to reduce the number of sensors by 59% and 49% when compared to the baseline and heuristic approach, respectively.","PeriodicalId":120188,"journal":{"name":"ACM Trans. Cyber Phys. Syst.","volume":"49 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124784466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tool Integration for Automated Synthesis of Distributed Embedded Controllers 分布式嵌入式控制器自动合成的工具集成
Pub Date : 2022-01-31 DOI: 10.1145/3477499
Debayan Roy, Licong Zhang, Wanli Chang, Dip Goswami, B. Vogel‐Heuser, S. Chakraborty
Controller design and their software implementations are usually done in isolated design spaces using respective COTS design tools. However, this separation of concerns can lead to long debugging and integration phases. This is because assumptions made about the implementation platform during the design phase—e.g., related to timing—might not hold in practice, thereby leading to unacceptable control performance. In order to address this, several control/architecture co-design techniques have been proposed in the literature. However, their adoption in practice has been hampered by the lack of design flows using commercial tools. To the best of our knowledge, this is the first article that implements such a co-design method using commercially available design tools in an automotive setting, with the aim of minimally disrupting existing design flows practiced in the industry. The goal of such co-design is to jointly determine controller and platform parameters in order to avoid any design-implementation gap , thereby minimizing implementation time testing and debugging. Our setting involves distributed implementations of control algorithms on automotive electronic control units ( ECUs ) communicating via a FlexRay bus. The co-design and the associated toolchain Co-Flex jointly determines controller and FlexRay parameters (that impact signal delays) in order to optimize specified design metrics. Co-Flex seamlessly integrates the modeling and analysis of control systems in MATLAB/Simulink with platform modeling and configuration in SIMTOOLS/SIMTARGET that is used for configuring FlexRay bus parameters. It automates the generation of multiple Pareto-optimal design options with respect to the quality of control and the resource usage, that an engineer can choose from. In this article, we outline a step-by-step software development process based on Co-Flex tools for distributed control applications. While our exposition is automotive specific, this design flow can easily be extended to other domains.
控制器设计及其软件实现通常在独立的设计空间中使用各自的COTS设计工具完成。然而,这种关注点分离可能导致长时间的调试和集成阶段。这是因为在设计阶段对实现平台做了假设。(与时间有关)在实践中可能不成立,从而导致不可接受的控制性能。为了解决这个问题,文献中提出了几种控制/体系结构协同设计技术。然而,由于缺乏使用商业工具的设计流程,它们在实践中的采用受到了阻碍。据我们所知,这是第一篇在汽车环境中使用商业上可用的设计工具实现这种协同设计方法的文章,其目的是尽量减少对行业中现有设计流程的干扰。这种协同设计的目标是共同确定控制器和平台参数,以避免任何设计与实现的差距,从而最大限度地减少实现时间的测试和调试。我们的设置涉及通过FlexRay总线通信的汽车电子控制单元(ecu)上的控制算法的分布式实现。协同设计和相关工具链Co-Flex共同确定控制器和FlexRay参数(影响信号延迟),以优化指定的设计指标。Co-Flex将MATLAB/Simulink中的控制系统建模和分析与SIMTOOLS/SIMTARGET中的平台建模和配置无缝集成,用于配置FlexRay总线参数。它可以根据控制质量和资源使用情况自动生成多个pareto最优设计选项,工程师可以从中进行选择。在本文中,我们概述了基于Co-Flex工具的分布式控制应用程序的逐步软件开发过程。虽然我们的说明是特定于汽车的,但是这个设计流程可以很容易地扩展到其他领域。
{"title":"Tool Integration for Automated Synthesis of Distributed Embedded Controllers","authors":"Debayan Roy, Licong Zhang, Wanli Chang, Dip Goswami, B. Vogel‐Heuser, S. Chakraborty","doi":"10.1145/3477499","DOIUrl":"https://doi.org/10.1145/3477499","url":null,"abstract":"\u0000 Controller design and their software implementations are usually done in isolated design spaces using respective COTS design tools. However, this separation of concerns can lead to long debugging and integration phases. This is because assumptions made about the implementation platform during the design phase—e.g., related to timing—might not hold in practice, thereby leading to unacceptable control performance. In order to address this, several\u0000 control/architecture co-design\u0000 techniques have been proposed in the literature. However, their adoption in practice has been hampered by the lack of design flows using commercial tools. To the best of our knowledge, this is the first article that implements such a\u0000 co-design\u0000 method using commercially available design tools in an automotive setting, with the aim of minimally disrupting existing design flows practiced in the industry. The goal of such co-design is to\u0000 jointly\u0000 determine controller and platform parameters in order to avoid any\u0000 design-implementation gap\u0000 , thereby minimizing implementation time testing and debugging. Our setting involves distributed implementations of control algorithms on automotive\u0000 electronic control units\u0000 (\u0000 ECUs\u0000 ) communicating via a FlexRay bus. The co-design and the associated toolchain\u0000 Co-Flex\u0000 jointly determines controller and FlexRay parameters (that impact signal delays) in order to optimize specified design metrics. Co-Flex seamlessly integrates the modeling and analysis of control systems in MATLAB/Simulink with platform modeling and configuration in SIMTOOLS/SIMTARGET that is used for configuring FlexRay bus parameters. It automates the generation of multiple\u0000 Pareto-optimal\u0000 design options with respect to the quality of control and the resource usage, that an engineer can choose from. In this article, we outline a step-by-step software development process based on Co-Flex tools for distributed control applications. While our exposition is automotive specific, this design flow can easily be extended to other domains.\u0000","PeriodicalId":120188,"journal":{"name":"ACM Trans. Cyber Phys. Syst.","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131669969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Wireless Control Bus: Enabling Efficient Multi-hop Event-Triggered Control with Concurrent Transmissions 无线控制总线:通过并发传输实现高效的多跳事件触发控制
Pub Date : 2021-01-26 DOI: 10.1145/3485467
M. Trobinger, G. D. Gleizer, T. Istomin, M. Mazo, A. Murphy, G. Picco
Event-triggered control ( ETC ) holds the potential to significantly improve the efficiency of wireless networked control systems. Unfortunately, its real-world impact has hitherto been hampered by the lack of a network stack able to transfer its benefits from theory to practice specifically by supporting the latency and reliability requirements of the aperiodic communication ETC induces. This is precisely the contribution of this article. Our Wireless Control Bus ( WCB ) exploits carefully orchestrated network-wide floods of concurrent transmissions to minimize overhead during quiescent, steady-state periods, and ensures timely and reliable collection of sensor readings and dissemination of actuation commands when an ETC triggering condition is violated. Using a cyber-physical testbed emulating a water distribution system controlled over a real-world multi-hop wireless network, we show that ETC over WCB achieves the same quality of periodic control at a fraction of the energy costs, therefore unleashing and concretely demonstrating its full potential for the first time.
事件触发控制(ETC)具有显著提高无线网络控制系统效率的潜力。不幸的是,迄今为止,由于缺乏能够将其优势从理论转移到实践的网络堆栈,特别是通过支持ETC引起的非周期性通信的延迟和可靠性要求,它的实际影响受到阻碍。这正是本文的贡献所在。我们的无线控制总线(WCB)利用精心编排的网络范围内的并发传输,以最大限度地减少静态和稳态期间的开销,并确保在违反ETC触发条件时及时可靠地收集传感器读数和传播驱动命令。通过一个网络物理测试平台,模拟了一个由真实世界的多跳无线网络控制的供水系统,我们证明了ETC在WCB上以一小部分能源成本实现了相同的周期性控制质量,从而首次释放并具体展示了其全部潜力。
{"title":"The Wireless Control Bus: Enabling Efficient Multi-hop Event-Triggered Control with Concurrent Transmissions","authors":"M. Trobinger, G. D. Gleizer, T. Istomin, M. Mazo, A. Murphy, G. Picco","doi":"10.1145/3485467","DOIUrl":"https://doi.org/10.1145/3485467","url":null,"abstract":"\u0000 Event-triggered control\u0000 (\u0000 ETC\u0000 ) holds the potential to significantly improve the efficiency of wireless networked control systems. Unfortunately, its real-world impact has hitherto been hampered by the lack of a network stack able to transfer its benefits from theory to practice specifically by supporting the latency and reliability requirements of the aperiodic communication ETC induces. This is precisely the contribution of this article.\u0000 \u0000 \u0000 Our\u0000 \u0000 Wireless Control Bus\u0000 \u0000 (\u0000 \u0000 WCB\u0000 \u0000 ) exploits carefully orchestrated network-wide floods of concurrent transmissions to minimize overhead during quiescent, steady-state periods, and ensures timely and reliable collection of sensor readings and dissemination of actuation commands when an ETC triggering condition is violated. Using a cyber-physical testbed emulating a water distribution system controlled over a real-world multi-hop wireless network, we show that ETC over\u0000 WCB\u0000 achieves the same quality of periodic control at a fraction of the energy costs, therefore unleashing and concretely demonstrating its full potential for the first time.\u0000","PeriodicalId":120188,"journal":{"name":"ACM Trans. Cyber Phys. Syst.","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115953644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Real-Time Middleware for Cyber-Physical Event Processing 用于信息物理事件处理的实时中间件
Pub Date : 2019-10-03 DOI: 10.1145/3218816
Chao Wang, C. Gill, Chenyang Lu
Cyber-physical systems (CPS) involve tight integration of cyber (computation) and physical domains, and both the effectiveness and correctness of a cyber-physical system application may rely on successful enforcement of constraints such as bounded latency and temporal validity subject to physical conditions. For many such systems (e.g., edge computing in the Industrial Internet of Things), it is desirable to enforce such constraints within a common middleware service (e.g., during event processing). In this article, we introduce CPEP, a new real-time middleware for cyber-physical event processing, with (1) extensible support for complex event processing operations, (2) execution prioritization and sharing, (3) enforcement of time consistency with load shedding, and (4) efficient memory management and concurrent data processing. We present the design, implementation, and empirical evaluation of CPEP and show that it can (1) support complex operations needed by many applications, (2) schedule data processing according to consumers’ priority levels, (3) enforce temporal validity, and (4) reduce processing delay and improve throughput of time-consistent events.
网络物理系统(CPS)涉及网络(计算)和物理领域的紧密集成,网络物理系统应用的有效性和正确性可能依赖于约束的成功实施,例如受物理条件限制的有限延迟和时间有效性。对于许多这样的系统(例如,工业物联网中的边缘计算),希望在公共中间件服务(例如,在事件处理期间)中强制执行此类约束。在本文中,我们介绍了CPEP,一种用于网络物理事件处理的新型实时中间件,具有(1)对复杂事件处理操作的可扩展支持,(2)执行优先级和共享,(3)通过负载减少实现时间一致性,以及(4)高效的内存管理和并发数据处理。我们介绍了CPEP的设计、实现和经验评估,并表明它可以(1)支持许多应用程序所需的复杂操作,(2)根据消费者的优先级级别调度数据处理,(3)强制时间有效性,(4)减少处理延迟并提高时间一致事件的吞吐量。
{"title":"Real-Time Middleware for Cyber-Physical Event Processing","authors":"Chao Wang, C. Gill, Chenyang Lu","doi":"10.1145/3218816","DOIUrl":"https://doi.org/10.1145/3218816","url":null,"abstract":"Cyber-physical systems (CPS) involve tight integration of cyber (computation) and physical domains, and both the effectiveness and correctness of a cyber-physical system application may rely on successful enforcement of constraints such as bounded latency and temporal validity subject to physical conditions. For many such systems (e.g., edge computing in the Industrial Internet of Things), it is desirable to enforce such constraints within a common middleware service (e.g., during event processing). In this article, we introduce CPEP, a new real-time middleware for cyber-physical event processing, with (1) extensible support for complex event processing operations, (2) execution prioritization and sharing, (3) enforcement of time consistency with load shedding, and (4) efficient memory management and concurrent data processing. We present the design, implementation, and empirical evaluation of CPEP and show that it can (1) support complex operations needed by many applications, (2) schedule data processing according to consumers’ priority levels, (3) enforce temporal validity, and (4) reduce processing delay and improve throughput of time-consistent events.","PeriodicalId":120188,"journal":{"name":"ACM Trans. Cyber Phys. Syst.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114862969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
ACM Trans. Cyber Phys. Syst.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1