Pub Date : 2013-09-30DOI: 10.1109/CPSNA.2013.6614242
Fardin Abdi Taghi Abad, Joel van der Woude, Yi Lu, Stanley Bak, M. Caccamo, L. Sha, R. Mancuso, Sibin Mohan
Modern industrial plants, vehicles and other cyber-physical systems are increasingly being built as an aggregation of embedded platforms. Together with the soaring number of such systems and the current trends of increased connectivity, new security concerns are emerging. Classic approaches to security are not often suitable for embedded platforms. In this paper we propose a hardware based approach for checking the integrity of code flow of real-time tasks whit precisely predictable overheads that do not affect the critical path. Specifically, we employ a hardware module to perform control flow graph (CFG) validation at run-time of real-time component. For this purpose, we developed a binary-based, CFG generation tool. In addition, we also present our implementation of a CFG integrity checking module. The proposed approach is aimed at improving real-time systems security.
{"title":"On-chip control flow integrity check for real time embedded systems","authors":"Fardin Abdi Taghi Abad, Joel van der Woude, Yi Lu, Stanley Bak, M. Caccamo, L. Sha, R. Mancuso, Sibin Mohan","doi":"10.1109/CPSNA.2013.6614242","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614242","url":null,"abstract":"Modern industrial plants, vehicles and other cyber-physical systems are increasingly being built as an aggregation of embedded platforms. Together with the soaring number of such systems and the current trends of increased connectivity, new security concerns are emerging. Classic approaches to security are not often suitable for embedded platforms. In this paper we propose a hardware based approach for checking the integrity of code flow of real-time tasks whit precisely predictable overheads that do not affect the critical path. Specifically, we employ a hardware module to perform control flow graph (CFG) validation at run-time of real-time component. For this purpose, we developed a binary-based, CFG generation tool. In addition, we also present our implementation of a CFG integrity checking module. The proposed approach is aimed at improving real-time systems security.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122766847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-09-30DOI: 10.1109/CPSNA.2013.6614244
Hokeun Kim, Liangpeng Guo, Edward A. Lee, A. Sangiovanni-Vincentelli
For emerging safety-critical systems, it is beneficial to cope with design validation, performance estimation, and design space exploration in early design stages. In this paper, we explore the architectural choices of an aircraft electric power system (EPS) controller using Ptolemy II and Metro II. The design is modeled in separate aspects: the functional aspect models the logics and behaviors that fulfill the functionality of the controller, and the architectural aspect models the behaviors of the platform that implements the controller. The co-design benefits from the rigorous Model of Computation (MoC) in Ptolemy II, which facilitates the analysis and validation of functional aspect, as well as the flexibility and expressiveness provided by Metro II, in which complex architectural models can be built with the flexibility of changing the mapping. Co-simulation integrates the functional model and the architectural model using Metro II semantics. By clearly separating the functional aspect and the architectural aspect, the performance can be estimated at an early design stage, and the architectural exploration can be done in a more efficient manner.We show the effectiveness and extensibility of our approach using experiments and results with example candidates for the aircraft EPS controller.
{"title":"A tool integration approach for architectural exploration of aircraft electric power systems","authors":"Hokeun Kim, Liangpeng Guo, Edward A. Lee, A. Sangiovanni-Vincentelli","doi":"10.1109/CPSNA.2013.6614244","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614244","url":null,"abstract":"For emerging safety-critical systems, it is beneficial to cope with design validation, performance estimation, and design space exploration in early design stages. In this paper, we explore the architectural choices of an aircraft electric power system (EPS) controller using Ptolemy II and Metro II. The design is modeled in separate aspects: the functional aspect models the logics and behaviors that fulfill the functionality of the controller, and the architectural aspect models the behaviors of the platform that implements the controller. The co-design benefits from the rigorous Model of Computation (MoC) in Ptolemy II, which facilitates the analysis and validation of functional aspect, as well as the flexibility and expressiveness provided by Metro II, in which complex architectural models can be built with the flexibility of changing the mapping. Co-simulation integrates the functional model and the architectural model using Metro II semantics. By clearly separating the functional aspect and the architectural aspect, the performance can be estimated at an early design stage, and the architectural exploration can be done in a more efficient manner.We show the effectiveness and extensibility of our approach using experiments and results with example candidates for the aircraft EPS controller.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129717407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-09-30DOI: 10.1109/CPSNA.2013.6614248
Han Zou, Hengtao Wang, Lihua Xie, Q. Jia
Radio Frequency Identification (RFID) technology has been widely used in many application domains. How to apply RFID technology to develop an Indoor Positioning System (IPS) has become a hot research topic in recent years. LANDMARC approach is one of the first IPSs by using active RFID tags and readers to provide location based service in indoor environment. However, major drawbacks of the LANDMARC approach are that its localization accuracy largely depends on the density of reference tags and the high cost of RFID readers. In order to overcome these drawbacks, two localization algorithms, namely weighted path loss (WPL) and extreme learning machine (ELM), are proposed in this paper. These two approaches are tested on a novel cost-efficient active RFID IPS. Based on our experimental results, both WPL and ELM can provide higher localization accuracy and robustness than existing ones.
{"title":"An RFID indoor positioning system by using weighted path loss and extreme learning machine","authors":"Han Zou, Hengtao Wang, Lihua Xie, Q. Jia","doi":"10.1109/CPSNA.2013.6614248","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614248","url":null,"abstract":"Radio Frequency Identification (RFID) technology has been widely used in many application domains. How to apply RFID technology to develop an Indoor Positioning System (IPS) has become a hot research topic in recent years. LANDMARC approach is one of the first IPSs by using active RFID tags and readers to provide location based service in indoor environment. However, major drawbacks of the LANDMARC approach are that its localization accuracy largely depends on the density of reference tags and the high cost of RFID readers. In order to overcome these drawbacks, two localization algorithms, namely weighted path loss (WPL) and extreme learning machine (ELM), are proposed in this paper. These two approaches are tested on a novel cost-efficient active RFID IPS. Based on our experimental results, both WPL and ELM can provide higher localization accuracy and robustness than existing ones.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124331342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-09-30DOI: 10.1109/CPSNA.2013.6614238
Andrew L. King, Lu Feng, O. Sokolsky, Insup Lee
We present an approach to establish safety of on-demand medical cyber-physical systems which are assembled to treat a patient in a specific clinical scenario. We treat such a system as a virtual medial device (VMD) and propose a model-based framework that includes a modeling language with formal semantics and a medical application platform (MAP) that provides the necessary deployment support for the VMD models.
{"title":"Assuring the safety of on-demand medical cyber-physical systems","authors":"Andrew L. King, Lu Feng, O. Sokolsky, Insup Lee","doi":"10.1109/CPSNA.2013.6614238","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614238","url":null,"abstract":"We present an approach to establish safety of on-demand medical cyber-physical systems which are assembled to treat a patient in a specific clinical scenario. We treat such a system as a virtual medial device (VMD) and propose a model-based framework that includes a modeling language with formal semantics and a medical application platform (MAP) that provides the necessary deployment support for the VMD models.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124852163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-09-30DOI: 10.1109/CPSNA.2013.6614246
Jong-Seok Choi, Timothy McCarthy, Maneesh Yadav, Minyoung Kim, C. Talcott, E. Gressier-Soudan
Patterns are of great interest for bootstraping complex systems such as networked cyber-physical systems (NCPS). Inspired by a new programming paradigm based on partially ordered knowledge sharing model for loosely coupled distributed computing and its implementation in our cyber-application framework, this paper studies how to program an NCPS and exploit the capabilities provided by the underlying framework. By identifying common patterns across a variety of use-cases - e.g., cyber-physical game, local anonymous chat, and collaborative brainstorming applications - we focus on design principles of NCPS, identifying the key abstractions, how they interact with the user and the knowledge system, how the ordering among knowledge items can be defined, and what features of knowledge dissemination are the most effective for certain scenarios.
{"title":"Application patterns for cyber-physical systems","authors":"Jong-Seok Choi, Timothy McCarthy, Maneesh Yadav, Minyoung Kim, C. Talcott, E. Gressier-Soudan","doi":"10.1109/CPSNA.2013.6614246","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614246","url":null,"abstract":"Patterns are of great interest for bootstraping complex systems such as networked cyber-physical systems (NCPS). Inspired by a new programming paradigm based on partially ordered knowledge sharing model for loosely coupled distributed computing and its implementation in our cyber-application framework, this paper studies how to program an NCPS and exploit the capabilities provided by the underlying framework. By identifying common patterns across a variety of use-cases - e.g., cyber-physical game, local anonymous chat, and collaborative brainstorming applications - we focus on design principles of NCPS, identifying the key abstractions, how they interact with the user and the knowledge system, how the ordering among knowledge items can be defined, and what features of knowledge dissemination are the most effective for certain scenarios.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130737925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-09-30DOI: 10.1109/CPSNA.2013.6614252
Fei He, J. Zhuang, N. Rao, Chris Y. T. Ma, David K. Y. Yau
We investigate the resilience of cyber physical systems by modeling the interaction between provider and attacker as a simultaneous game that incorporates cyber and physical spaces. Both the provider and attacker aim to maximize their individual utility, which is determined by a trade-off between target revenue and investment cost. The system resilience function is formulated as a power-form product of the survival probabilities of cyber and physical spaces, each with a corresponding correlation coefficient. The contest success functions based on the reinforcement and attack levels are used to estimate the survival probabilities of cyber and physical spaces. We present the provider strategies based on the Nash equilibrium of the game, and analyze the sensitivities with respect to cyber and physical correlation coefficients, target revenues and costs. The results show that these correlation coefficients affect the cyber and physical reinforcement strategies, and also provide new insights into the system resilience.
{"title":"Game-theoretic resilience analysis of Cyber-Physical Systems","authors":"Fei He, J. Zhuang, N. Rao, Chris Y. T. Ma, David K. Y. Yau","doi":"10.1109/CPSNA.2013.6614252","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614252","url":null,"abstract":"We investigate the resilience of cyber physical systems by modeling the interaction between provider and attacker as a simultaneous game that incorporates cyber and physical spaces. Both the provider and attacker aim to maximize their individual utility, which is determined by a trade-off between target revenue and investment cost. The system resilience function is formulated as a power-form product of the survival probabilities of cyber and physical spaces, each with a corresponding correlation coefficient. The contest success functions based on the reinforcement and attack levels are used to estimate the survival probabilities of cyber and physical spaces. We present the provider strategies based on the Nash equilibrium of the game, and analyze the sensitivities with respect to cyber and physical correlation coefficients, target revenues and costs. The results show that these correlation coefficients affect the cyber and physical reinforcement strategies, and also provide new insights into the system resilience.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131639812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-09-30DOI: 10.1109/CPSNA.2013.6614249
Naushin Nower, Yasuo Tan, A. Lim
Feedback data loss can severely degrade the overall system performance and as well as it can affect the control and computation of the Cyber-physical System (CPS). Therefore, incomplete feedback makes a great challenge in any uncertain condition to maintain the real-time control of the CPS. In this paper, we propose a data recovery scheme, called Efficient spatial data recovery (ESDR) scheme for CPS to minimize the error estimation and maximize the accuracy of the scheme. In this scheme, we also present an algorithm with Pearson correlation coefficient (PCC) to efficiently solve the long consecutive missing data. Numerical results reveal that the proposed ESDR scheme outperforms both weighted prediction (WP) and spatial temporal imputation (STI) algorithms regardless of the increment percentage of missing data in terms of the root mean square error, mean absolute error and integral of absolute error.
{"title":"Efficient spatial data recovery scheme for cyber-physical system","authors":"Naushin Nower, Yasuo Tan, A. Lim","doi":"10.1109/CPSNA.2013.6614249","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614249","url":null,"abstract":"Feedback data loss can severely degrade the overall system performance and as well as it can affect the control and computation of the Cyber-physical System (CPS). Therefore, incomplete feedback makes a great challenge in any uncertain condition to maintain the real-time control of the CPS. In this paper, we propose a data recovery scheme, called Efficient spatial data recovery (ESDR) scheme for CPS to minimize the error estimation and maximize the accuracy of the scheme. In this scheme, we also present an algorithm with Pearson correlation coefficient (PCC) to efficiently solve the long consecutive missing data. Numerical results reveal that the proposed ESDR scheme outperforms both weighted prediction (WP) and spatial temporal imputation (STI) algorithms regardless of the increment percentage of missing data in terms of the root mean square error, mean absolute error and integral of absolute error.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132713071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-09-30DOI: 10.1109/CPSNA.2013.6614257
Kilho Lee, I. Shin
The last decade has seen a rapid growth in the use of mobile devices all over the world. With an increasing use of mobile devices, mobile applications are getting more diverse and complex, demanding more computational resources. However, mobile devices are typically resource-limited (i.e., a slower-speed CPU, a smaller memory) due to a variety of reasons. Mobile users will be capable of running applications with heavy computation if they can offload some of their computations to other places, such as desktop or server machines. However, mobile users are typically subject to dynamically changing network environments, particularly, due to user mobility. This makes it hard to make good offloading decisions in mobile environments. In general, user's mobility can provide some hints for upcoming changes to network environments. Motivated by this, we propose a mobility model of each individual user taking advantage of the regularity of his/her mobility pattern, and develop an offloading decision making technique based on the mobility model. We evaluate our technique through trace-based simulation with real log data traces from 14 Android users. Our evaluation result shows that the proposed technique can help mobile devices to boost its performance in terms of response time and energy consumption, when users are highly mobile.
{"title":"User mobility-aware decision making for mobile computation offloading","authors":"Kilho Lee, I. Shin","doi":"10.1109/CPSNA.2013.6614257","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614257","url":null,"abstract":"The last decade has seen a rapid growth in the use of mobile devices all over the world. With an increasing use of mobile devices, mobile applications are getting more diverse and complex, demanding more computational resources. However, mobile devices are typically resource-limited (i.e., a slower-speed CPU, a smaller memory) due to a variety of reasons. Mobile users will be capable of running applications with heavy computation if they can offload some of their computations to other places, such as desktop or server machines. However, mobile users are typically subject to dynamically changing network environments, particularly, due to user mobility. This makes it hard to make good offloading decisions in mobile environments. In general, user's mobility can provide some hints for upcoming changes to network environments. Motivated by this, we propose a mobility model of each individual user taking advantage of the regularity of his/her mobility pattern, and develop an offloading decision making technique based on the mobility model. We evaluate our technique through trace-based simulation with real log data traces from 14 Android users. Our evaluation result shows that the proposed technique can help mobile devices to boost its performance in terms of response time and energy consumption, when users are highly mobile.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123019466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-09-30DOI: 10.1109/CPSNA.2013.6614256
Donghoon Lee, Songhwai Oh
This paper considers the problem of understanding human-place interaction, such as relationships among many users in a space and interactions between users and their surroundings, from trajectories of users in a common space. The discovered information can be applied to provide a number of services. For example, we can determine the optimal arrangement of items in a store or at an exhibition to maximize the profit or attention and systematically manage the pedestrian traffic. Users in a space is detected and tracked by a vision-based multi-target tracking algorithm and trajectories of users are identified by combining visual information and accelerometer readings from users' smartphones. We demonstrate that trajectories of users can be used to reveal a number of useful information about the users and the space, such as spatial occupancy of individual users, intimacy between users, objects of interests, and a common interest of users.
{"title":"Understanding human-place interaction from tracking and identification of many users","authors":"Donghoon Lee, Songhwai Oh","doi":"10.1109/CPSNA.2013.6614256","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614256","url":null,"abstract":"This paper considers the problem of understanding human-place interaction, such as relationships among many users in a space and interactions between users and their surroundings, from trajectories of users in a common space. The discovered information can be applied to provide a number of services. For example, we can determine the optimal arrangement of items in a store or at an exhibition to maximize the profit or attention and systematically manage the pedestrian traffic. Users in a space is detected and tracked by a vision-based multi-target tracking algorithm and trajectories of users are identified by combining visual information and accelerometer readings from users' smartphones. We demonstrate that trajectories of users can be used to reveal a number of useful information about the users and the space, such as spatial occupancy of individual users, intimacy between users, objects of interests, and a common interest of users.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121919811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-09-30DOI: 10.1109/CPSNA.2013.6614245
Chia-Tse Chu, C. Shih
Thanks to the active development on embedded, real-time, and control systems in last thirty years, we are now in the era of integrating these well-studied/designed systems as a large scale and complex systems, called Cyber-Physical Systems, to provide context-aware and user-centric services. In the processing of developing CPS, one of the major challenges is how to integrate the technologies developed by different communities into a coherent system. This paper presents the design and implementation of CPSsim, which is a framework to integrate several simulators, each of which simulates either discrete or continuous systems, to simulate the federated system. CPSsim enables the developers to use the simulators designated for the sub-systems of a CPS and to understand the behavior of the integrated system. Hence, there is no need to build a new simulator from scratch. In order to simulate the cyber-physical systems, the framework concurrently simulates the sub-systems working at different rates, and tackles the scalability issue. Furthermore, CPSsim targets the synchronization issue among simulators, each of which may adopt different simulation models and has different timing properties. To demonstrate the effectiveness, we use active train control as an example CPS and evaluate its performance.
{"title":"CPSSim: Simulation framework for large-scale Cyber-Physical Systems","authors":"Chia-Tse Chu, C. Shih","doi":"10.1109/CPSNA.2013.6614245","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614245","url":null,"abstract":"Thanks to the active development on embedded, real-time, and control systems in last thirty years, we are now in the era of integrating these well-studied/designed systems as a large scale and complex systems, called Cyber-Physical Systems, to provide context-aware and user-centric services. In the processing of developing CPS, one of the major challenges is how to integrate the technologies developed by different communities into a coherent system. This paper presents the design and implementation of CPSsim, which is a framework to integrate several simulators, each of which simulates either discrete or continuous systems, to simulate the federated system. CPSsim enables the developers to use the simulators designated for the sub-systems of a CPS and to understand the behavior of the integrated system. Hence, there is no need to build a new simulator from scratch. In order to simulate the cyber-physical systems, the framework concurrently simulates the sub-systems working at different rates, and tackles the scalability issue. Furthermore, CPSsim targets the synchronization issue among simulators, each of which may adopt different simulation models and has different timing properties. To demonstrate the effectiveness, we use active train control as an example CPS and evaluate its performance.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127121768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}