首页 > 最新文献

2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)最新文献

英文 中文
Verifying Safety for Resilient Cyber-Physical Systems via Reactive Software Restart 通过响应式软件重启验证弹性网络物理系统的安全性
Pub Date : 2022-05-01 DOI: 10.1109/iccps54341.2022.00016
Luyao Niu, D. Sahabandu, Andrew Clark, R. Poovendran
Resilient cyber-physical systems (CPS) must ensure safety and per-form required tasks in the presence of malicious cyber attacks. Recently, restart-based defenses have been proposed in which a CPS mitigates attacks by reverting to an initial safe state. In this paper, we consider a class of reactive restart approaches for CPS under malicious attacks with verifiable safety guarantees. We consider a setting where the controllers are engineered to crash and reboot following faults or attacks. We present a hybrid system model that captures the trade-off between security, availability, and safety of the CPS due to the reactive restart. We develop sufficient conditions under which an affine controller provides verifiable safety guar-antees for the physical plant using a barrier certificate approach. We synthesize safety-critical controllers using control barrier functions to guarantee system safety under given timing parameters. We present two case studies on the proposed approach using a warehouse temperature control system and a two-dimensional non-linear system. Our proposed approach guarantees the safety for both cases.
弹性网络物理系统(CPS)必须在存在恶意网络攻击的情况下确保安全并执行所需的任务。最近,已经提出了基于重启的防御,其中CPS通过恢复到初始安全状态来减轻攻击。在本文中,我们考虑了一类在恶意攻击下具有可验证安全保证的CPS响应式重启方法。我们考虑一种设置,其中控制器被设计为在故障或攻击后崩溃并重新启动。我们提出了一个混合系统模型,该模型捕获了由于响应式重启而导致的CPS的安全性、可用性和安全性之间的权衡。我们开发了仿射控制器使用屏障证书方法为物理设备提供可验证的安全保证的充分条件。利用控制屏障函数合成安全关键控制器,保证系统在给定定时参数下的安全。我们提出了使用仓库温度控制系统和二维非线性系统的两个案例研究。我们提出的方法保证了这两种情况的安全性。
{"title":"Verifying Safety for Resilient Cyber-Physical Systems via Reactive Software Restart","authors":"Luyao Niu, D. Sahabandu, Andrew Clark, R. Poovendran","doi":"10.1109/iccps54341.2022.00016","DOIUrl":"https://doi.org/10.1109/iccps54341.2022.00016","url":null,"abstract":"Resilient cyber-physical systems (CPS) must ensure safety and per-form required tasks in the presence of malicious cyber attacks. Recently, restart-based defenses have been proposed in which a CPS mitigates attacks by reverting to an initial safe state. In this paper, we consider a class of reactive restart approaches for CPS under malicious attacks with verifiable safety guarantees. We consider a setting where the controllers are engineered to crash and reboot following faults or attacks. We present a hybrid system model that captures the trade-off between security, availability, and safety of the CPS due to the reactive restart. We develop sufficient conditions under which an affine controller provides verifiable safety guar-antees for the physical plant using a barrier certificate approach. We synthesize safety-critical controllers using control barrier functions to guarantee system safety under given timing parameters. We present two case studies on the proposed approach using a warehouse temperature control system and a two-dimensional non-linear system. Our proposed approach guarantees the safety for both cases.","PeriodicalId":340078,"journal":{"name":"2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120905322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
ICCPS 2022 Organizers
Pub Date : 2022-05-01 DOI: 10.1109/iccps54341.2022.00006
{"title":"ICCPS 2022 Organizers","authors":"","doi":"10.1109/iccps54341.2022.00006","DOIUrl":"https://doi.org/10.1109/iccps54341.2022.00006","url":null,"abstract":"","PeriodicalId":340078,"journal":{"name":"2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125450607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
T-SYS: Timed-Based System Security for Real-Time Kernels T-SYS:实时内核的基于时间的系统安全性
Pub Date : 2022-05-01 DOI: 10.1109/iccps54341.2022.00029
Brayden McDonald, F. Mueller
The increasing proliferation of cyber-physical systems in a multitude of applications presents a pressing need for effective methods of securing such devices. Many such systems are subject to tight timing constraints, which are poorly suited to traditional security methods due to the large runtime overhead and execution time variation introduced. However, the regular (and well documented) timing specifications of real-time systems open up new avenues with which such systems can be secured. This paper contributes T-SYS, a timed-system method of detecting intrusions into real-time systems via timing anomalies. A prototype implementation of T-SYS is integrated into a commercial real-time operating system (RTOS) in order to demonstrate its feasibility. Further, a compiler-based tool is developed to realize a T-SYS implementation with elastic timing bounds. This tool sup-ports integration of T-SYS protection into applications as well as the RTOS the kernel itself. Results on an ARM hardware platform with benchmark tasks including those drawn from an open-source UAV code base compare T-SYS with another method of timing-based intrusion detection and assess its effectiveness in terms of detecting attacks as they intrude a system.
网络物理系统在众多应用中的日益扩散,迫切需要有效的方法来保护这些设备。许多这样的系统都受到严格的时间限制,由于引入了大量的运行时开销和执行时间变化,因此不适合传统的安全方法。然而,实时系统的常规(并且有良好文档的)定时规范为这些系统的安全开辟了新的途径。本文提出了一种通过定时异常检测实时系统入侵的定时系统方法T-SYS。为了证明其可行性,将T-SYS的原型实现集成到商业实时操作系统(RTOS)中。此外,还开发了一个基于编译器的工具来实现具有弹性时序边界的T-SYS实现。该工具支持将T-SYS保护集成到应用程序以及内核本身的RTOS中。在ARM硬件平台上的测试结果,包括从开源无人机代码库中提取的基准任务,将T-SYS与另一种基于时间的入侵检测方法进行比较,并评估其在检测入侵系统攻击方面的有效性。
{"title":"T-SYS: Timed-Based System Security for Real-Time Kernels","authors":"Brayden McDonald, F. Mueller","doi":"10.1109/iccps54341.2022.00029","DOIUrl":"https://doi.org/10.1109/iccps54341.2022.00029","url":null,"abstract":"The increasing proliferation of cyber-physical systems in a multitude of applications presents a pressing need for effective methods of securing such devices. Many such systems are subject to tight timing constraints, which are poorly suited to traditional security methods due to the large runtime overhead and execution time variation introduced. However, the regular (and well documented) timing specifications of real-time systems open up new avenues with which such systems can be secured. This paper contributes T-SYS, a timed-system method of detecting intrusions into real-time systems via timing anomalies. A prototype implementation of T-SYS is integrated into a commercial real-time operating system (RTOS) in order to demonstrate its feasibility. Further, a compiler-based tool is developed to realize a T-SYS implementation with elastic timing bounds. This tool sup-ports integration of T-SYS protection into applications as well as the RTOS the kernel itself. Results on an ARM hardware platform with benchmark tasks including those drawn from an open-source UAV code base compare T-SYS with another method of timing-based intrusion detection and assess its effectiveness in terms of detecting attacks as they intrude a system.","PeriodicalId":340078,"journal":{"name":"2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125455262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Making Vibration-based On-body Interaction Robust 使基于振动的与身体的交互更加稳健
Pub Date : 2022-05-01 DOI: 10.1109/iccps54341.2022.00041
Wenqiang Chen, Ziqi Wang, Pengrui Quan, Zhencan Peng, Shupei Lin, M. Srivastava, J. Stankovic
Wearable devices like smartwatches and smart wristbands have gained substantial popularity in recent years. However, due to the limited size of the touch screens, smartwatches typically have a poor interactive experience for users. Recently, new technology has converted the human body into a virtual interface using finger activity induced vibrations. However, these solutions fail to meet expectations during real-world deployments, e.g., system performance significantly degrades due to human-based variations, such as hand shapes, tapping forces, and device positions. To mitigate these human-based variations, we collected a dataset of 114 users, built a deep-learning model, and designed a novel Siamese domain adversarial training algorithm. In this way, we implement a robust system which works at accuracy (97%) across different hand shapes, finger activity strengths, and smartwatch positions on the wrist. We have posted a demo video on YouTube (https://youtu.be/N5-ggvy2qfI).
近年来,智能手表和智能腕带等可穿戴设备获得了极大的普及。然而,由于触摸屏的尺寸有限,智能手表的用户交互体验通常很差。最近,一项新技术利用手指活动引起的振动将人体转化为虚拟界面。然而,在实际部署中,这些解决方案无法满足预期,例如,由于人为因素的变化,例如手的形状、敲击力和设备位置,系统性能显著降低。为了减轻这些基于人类的变化,我们收集了114个用户的数据集,建立了一个深度学习模型,并设计了一种新的暹罗域对抗训练算法。通过这种方式,我们实现了一个强大的系统,在不同的手型、手指活动强度和智能手表在手腕上的位置上都能达到97%的准确性。我们在YouTube (https://youtu.be/N5-ggvy2qfI)上发布了演示视频。
{"title":"Making Vibration-based On-body Interaction Robust","authors":"Wenqiang Chen, Ziqi Wang, Pengrui Quan, Zhencan Peng, Shupei Lin, M. Srivastava, J. Stankovic","doi":"10.1109/iccps54341.2022.00041","DOIUrl":"https://doi.org/10.1109/iccps54341.2022.00041","url":null,"abstract":"Wearable devices like smartwatches and smart wristbands have gained substantial popularity in recent years. However, due to the limited size of the touch screens, smartwatches typically have a poor interactive experience for users. Recently, new technology has converted the human body into a virtual interface using finger activity induced vibrations. However, these solutions fail to meet expectations during real-world deployments, e.g., system performance significantly degrades due to human-based variations, such as hand shapes, tapping forces, and device positions. To mitigate these human-based variations, we collected a dataset of 114 users, built a deep-learning model, and designed a novel Siamese domain adversarial training algorithm. In this way, we implement a robust system which works at accuracy (97%) across different hand shapes, finger activity strengths, and smartwatch positions on the wrist. We have posted a demo video on YouTube (https://youtu.be/N5-ggvy2qfI).","PeriodicalId":340078,"journal":{"name":"2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131833620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive Cyber Security for Critical Infrastructure 关键基础设施的自适应网络安全
Pub Date : 2022-05-01 DOI: 10.1109/iccps54341.2022.00043
Emmanouil Samanis, Joseph Gardiner, A. Rashid
In the modern era, much of worldwide critical operations from a variety of different sectors are managed by industrial control systems (ICS). A typical ICS includes an extensive range of comput-erized devices, control systems, and networking appliances used to manage efficiently an industrial process across large geographical areas. ICS underpin sensitive and critical national infrastructures such as water treatment and energy production and transportation. The consequences of a successful attack against them can lead to shutting the infrastructure down which has major impacts such as production stoppages or safety implications for people, the environment, and assets. At the same time, running a process while the infrastructure is under attack or compromised also has safety im-plications, potentially catastrophic. This work-in-progress focuses on an adaptive approach, able to alter the defensive posture while providing assurances about operational capacity (or downgrading it) and safety. Our approach involves transforming policies from simply a means to enforce security requirements defined a priori, to adaptive objects that are capable to evolve in response to unfolding attacks. We use a case study of reconnaissance attacks and moving target defense as a means to realize such adaptive security policies.
在现代,许多来自不同部门的全球关键操作都是由工业控制系统(ICS)管理的。典型的ICS包括广泛的计算机化设备、控制系统和网络设备,用于有效地管理跨大地理区域的工业过程。ICS支撑着敏感和关键的国家基础设施,如水处理和能源生产和运输。成功攻击的后果可能导致基础设施关闭,这对人员、环境和资产产生重大影响,如生产停止或安全隐患。与此同时,在基础设施受到攻击或破坏时运行进程也有安全隐患,可能是灾难性的。这项正在进行的工作侧重于一种适应性方法,能够改变防御态势,同时保证作战能力(或降低作战能力)和安全性。我们的方法包括将策略从简单地强制执行先验定义的安全需求的方法转换为能够响应不断展开的攻击而进化的自适应对象。以侦察攻击和移动目标防御为例,实现了自适应安全策略。
{"title":"Adaptive Cyber Security for Critical Infrastructure","authors":"Emmanouil Samanis, Joseph Gardiner, A. Rashid","doi":"10.1109/iccps54341.2022.00043","DOIUrl":"https://doi.org/10.1109/iccps54341.2022.00043","url":null,"abstract":"In the modern era, much of worldwide critical operations from a variety of different sectors are managed by industrial control systems (ICS). A typical ICS includes an extensive range of comput-erized devices, control systems, and networking appliances used to manage efficiently an industrial process across large geographical areas. ICS underpin sensitive and critical national infrastructures such as water treatment and energy production and transportation. The consequences of a successful attack against them can lead to shutting the infrastructure down which has major impacts such as production stoppages or safety implications for people, the environment, and assets. At the same time, running a process while the infrastructure is under attack or compromised also has safety im-plications, potentially catastrophic. This work-in-progress focuses on an adaptive approach, able to alter the defensive posture while providing assurances about operational capacity (or downgrading it) and safety. Our approach involves transforming policies from simply a means to enforce security requirements defined a priori, to adaptive objects that are capable to evolve in response to unfolding attacks. We use a case study of reconnaissance attacks and moving target defense as a means to realize such adaptive security policies.","PeriodicalId":340078,"journal":{"name":"2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126428745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Toward Physics-Guided Safe Deep Reinforcement Learning for Green Data Center Cooling Control 面向绿色数据中心冷却控制的物理导向安全深度强化学习
Pub Date : 2022-05-01 DOI: 10.1109/iccps54341.2022.00021
Ruihang Wang, Xinyi Zhang, Xiaoxia Zhou, Yonggang Wen, Rui Tan
Deep reinforcement learning (DRL) has shown good performance in tackling Markov decision process (MDP) problems. As DRL opti-mizes a long-term reward, it is a promising approach to improving the energy efficiency of data center cooling. However, enforcement of thermal safety constraint during DRL's state exploration is a main challenge. The widely adopted reward shaping approach adds negative reward when the exploratory action results in unsafety. Thus, it needs to experience sufficient unsafe states before it learns how to prevent unsafety. In this paper, we propose a safety-aware DRL framework for single-hall data center cooling control. It applies offline imitation learning and online post-hoc rectification to holis-tically prevent thermal unsafety during online DRL. In particular, the post-hoc rectification searches for the minimum modification to the DRL-recommended action such that the rectified action will not result in unsafety. The rectification is designed based on a thermal state transition model that is fitted using historical safe operation traces and able to extrapolate the transitions to unsafe states ex-plored by DRL. Extensive evaluation for chilled water and direct expansion cooled data centers in two climate conditions shows that our approach saves 22.7% to 26.6% total data center power compared with conventional control, reduces safety violations by 94.5% to 99% compared with reward shaping.
深度强化学习(DRL)在解决马尔可夫决策过程(MDP)问题方面表现出良好的性能。由于DRL优化了长期回报,因此它是提高数据中心冷却能源效率的一种有前途的方法。然而,在DRL的状态勘探过程中,热安全约束的实施是主要的挑战。当探索性行为导致不安全时,普遍采用的奖励塑造方法增加了负奖励。因此,在学习如何预防不安全之前,它需要经历足够多的不安全状态。在本文中,我们提出了一个安全意识的DRL框架,用于单大厅数据中心的冷却控制。采用离线模仿学习和在线事后整改,从整体上防止在线DRL过程中的热不安全。特别地,事后整改搜索对drl推荐的操作的最小修改,使纠正后的操作不会导致不安全。整流设计基于热态转变模型,该模型使用历史安全运行轨迹拟合,并能够推断DRL探索的不安全状态的转变。对两种气候条件下的冷冻水和直接膨胀冷却数据中心的广泛评估表明,与传统控制相比,我们的方法节省了22.7%至26.6%的数据中心总电力,与奖励形成相比,减少了94.5%至99%的安全违规行为。
{"title":"Toward Physics-Guided Safe Deep Reinforcement Learning for Green Data Center Cooling Control","authors":"Ruihang Wang, Xinyi Zhang, Xiaoxia Zhou, Yonggang Wen, Rui Tan","doi":"10.1109/iccps54341.2022.00021","DOIUrl":"https://doi.org/10.1109/iccps54341.2022.00021","url":null,"abstract":"Deep reinforcement learning (DRL) has shown good performance in tackling Markov decision process (MDP) problems. As DRL opti-mizes a long-term reward, it is a promising approach to improving the energy efficiency of data center cooling. However, enforcement of thermal safety constraint during DRL's state exploration is a main challenge. The widely adopted reward shaping approach adds negative reward when the exploratory action results in unsafety. Thus, it needs to experience sufficient unsafe states before it learns how to prevent unsafety. In this paper, we propose a safety-aware DRL framework for single-hall data center cooling control. It applies offline imitation learning and online post-hoc rectification to holis-tically prevent thermal unsafety during online DRL. In particular, the post-hoc rectification searches for the minimum modification to the DRL-recommended action such that the rectified action will not result in unsafety. The rectification is designed based on a thermal state transition model that is fitted using historical safe operation traces and able to extrapolate the transitions to unsafe states ex-plored by DRL. Extensive evaluation for chilled water and direct expansion cooled data centers in two climate conditions shows that our approach saves 22.7% to 26.6% total data center power compared with conventional control, reduces safety violations by 94.5% to 99% compared with reward shaping.","PeriodicalId":340078,"journal":{"name":"2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124429045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Dynamic Obfuscation Framework for Security and Utility 安全与实用的动态混淆框架
Pub Date : 2022-05-01 DOI: 10.1109/iccps54341.2022.00028
Andrew Wintenberg, Matthew Blischke, S. Lafortune, N. Ozay
Obfuscation can be used by dynamic systems to ensure private and secure communication over networks vulnerable to eavesdroppers. Balancing the utility of sending information to intended recipients and privacy by hiding information from unintended recipients presents an interesting challenge. We propose a new framework for obfuscation that includes an inference interface to allow intended recipients to interpret obfuscated information. We model the security of the obfuscation with opacity, a formal notion of plausible deniability. Using techniques from distributed reactive synthesis, we show how to automatically design a privacy-enforcing obfuscator along with the inference interface that is given to intended recipients to use as a “key”. We demonstrate this approach by enforcing privacy while maintaining utility in a contact tracing model.
动态系统可以使用混淆来确保易受窃听者攻击的网络上的私有和安全通信。平衡向预期收件人发送信息的效用和通过向意外收件人隐藏信息来保护隐私是一个有趣的挑战。我们提出了一个新的混淆框架,其中包括一个推理接口,允许预期的接收者解释混淆的信息。我们用不透明度来模拟混淆的安全性,这是一种合理否认的正式概念。使用来自分布式反应性合成的技术,我们将展示如何自动设计一个强制隐私的混淆器,以及提供给预期接收者作为“密钥”使用的推理接口。我们通过在联系人跟踪模型中维护实用程序的同时强制隐私来演示这种方法。
{"title":"A Dynamic Obfuscation Framework for Security and Utility","authors":"Andrew Wintenberg, Matthew Blischke, S. Lafortune, N. Ozay","doi":"10.1109/iccps54341.2022.00028","DOIUrl":"https://doi.org/10.1109/iccps54341.2022.00028","url":null,"abstract":"Obfuscation can be used by dynamic systems to ensure private and secure communication over networks vulnerable to eavesdroppers. Balancing the utility of sending information to intended recipients and privacy by hiding information from unintended recipients presents an interesting challenge. We propose a new framework for obfuscation that includes an inference interface to allow intended recipients to interpret obfuscated information. We model the security of the obfuscation with opacity, a formal notion of plausible deniability. Using techniques from distributed reactive synthesis, we show how to automatically design a privacy-enforcing obfuscator along with the inference interface that is given to intended recipients to use as a “key”. We demonstrate this approach by enforcing privacy while maintaining utility in a contact tracing model.","PeriodicalId":340078,"journal":{"name":"2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129528274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Anomaly based Incident Detection in Large Scale Smart Transportation Systems 大规模智能交通系统中基于异常的事件检测
Pub Date : 2022-05-01 DOI: 10.1109/iccps54341.2022.00026
Md. Jaminur Islam, J. P. Talusan, Shameek Bhattacharjee, F. Tiausas, S. Vazirizade, Abhishek Dubey, K. Yasumoto, Sajal K. Das
Modern smart cities are focusing on smart transportation solutions to detect and mitigate the effects of various traffic incidents in the city. To materialize this, roadside units and ambient trans-portation sensors are being deployed to collect vehicular data that provides real-time traffic monitoring. In this paper, we first propose a real-time data-driven anomaly-based traffic incident detection framework for a city-scale smart transportation system. Specifically, we propose an incremental region growing approximation algorithm for optimal Spatio-temporal clustering of road segments and their data; such that road segments are strategically divided into highly correlated clusters. The highly correlated clusters enable identifying a Pythagorean Mean-based invariant as an anomaly detection metric that is highly stable under no incidents but shows a deviation in the presence of incidents. We learn the bounds of the invariants in a robust manner such that anomaly detection can generalize to unseen events, even when learning from real noisy data. We perform extensive experimental validation using mobility data collected from the City of Nashville, Tennessee, and prove that the method can detect incidents within each cluster in real-time.
现代智慧城市正专注于智能交通解决方案,以检测和减轻城市中各种交通事故的影响。为了实现这一目标,部署了路边单元和周围交通传感器来收集车辆数据,提供实时交通监控。在本文中,我们首先为城市规模的智能交通系统提出了一个实时数据驱动的基于异常的交通事件检测框架。具体而言,我们提出了一种增量区域增长近似算法,用于道路段及其数据的最优时空聚类;这样,路段被战略性地划分为高度相关的集群。高度相关的聚类可以识别基于毕达哥拉斯均值的不变量作为异常检测指标,该指标在没有事件的情况下高度稳定,但在事件存在时显示偏差。我们以鲁棒的方式学习不变量的边界,使得异常检测可以推广到看不见的事件,即使从真实的噪声数据中学习。我们使用从田纳西州纳什维尔市收集的移动数据进行了广泛的实验验证,并证明该方法可以实时检测每个集群中的事件。
{"title":"Anomaly based Incident Detection in Large Scale Smart Transportation Systems","authors":"Md. Jaminur Islam, J. P. Talusan, Shameek Bhattacharjee, F. Tiausas, S. Vazirizade, Abhishek Dubey, K. Yasumoto, Sajal K. Das","doi":"10.1109/iccps54341.2022.00026","DOIUrl":"https://doi.org/10.1109/iccps54341.2022.00026","url":null,"abstract":"Modern smart cities are focusing on smart transportation solutions to detect and mitigate the effects of various traffic incidents in the city. To materialize this, roadside units and ambient trans-portation sensors are being deployed to collect vehicular data that provides real-time traffic monitoring. In this paper, we first propose a real-time data-driven anomaly-based traffic incident detection framework for a city-scale smart transportation system. Specifically, we propose an incremental region growing approximation algorithm for optimal Spatio-temporal clustering of road segments and their data; such that road segments are strategically divided into highly correlated clusters. The highly correlated clusters enable identifying a Pythagorean Mean-based invariant as an anomaly detection metric that is highly stable under no incidents but shows a deviation in the presence of incidents. We learn the bounds of the invariants in a robust manner such that anomaly detection can generalize to unseen events, even when learning from real noisy data. We perform extensive experimental validation using mobility data collected from the City of Nashville, Tennessee, and prove that the method can detect incidents within each cluster in real-time.","PeriodicalId":340078,"journal":{"name":"2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133490901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Runtime Assurance for Intelligent Cyber-Physical Systems 智能信息物理系统的运行时保证
Pub Date : 2022-05-01 DOI: 10.1109/iccps54341.2022.00035
Vlada Dementyeva, Cameron Hickert, Nicolas Sarfaraz, S. Zanlongo, Tamim I. Sookoor
The designers of safety-critical CPS that are intelligently automated using machine learning (ML) are encouraged to define invariants and utilize metrics to quantify the uncertainty of ML decisions in addition to focusing on the performance and functionality of the algorithm. Wheatman et al. [11] present Runtime Assurance for Distributed Intelligent Control Systems (RADICS) that extends the Simplex architecture [9] to provide runtime assurance for Cyber-Physical Systems (CPS) being controlled by machine learning al-gorithms. RADICS can thus allow designers to guarantee some minimum level of system performance via a safety controller while simultaneously allowing for greater average performance via an artificial intelligence (AI) controller. Existing implementations of RADICS have focused on simulated applications such as vehicular traffic control using the Simulation of Urban Mobility (SUMO) [5] and Flow [12] environments. The aim of this project is to implement RADICS in a physical environment in order to investigate and understand the limitations and challenges of physical deployments. We have selected a water treatment testbed as the application to conduct this evaluation. As a demonstration at ICCPS, we hope to use this testbed deployment to study the impact of real-world issues such as communication latencies, sensor failures, and incomplete information on the RADICS runtime assurance system. We also plan to extend the physical testbed into a hardware-in-the-loop smart city environment where the fidelity of the physical testbed will complement the scalability and flexibility of simulated components. This will allow further evaluation of assurance capabilities such as RADICS before they are deployed in the real world to ensure the safe and reliable operation of intelligent CPS. This work�s novel contributions include an extension of RADICS towards real-world use in cyber-physical systems, analysis of problems inherent to the shift to physical domains, and the introduction of an ensemble-like method for calculating confidence in the RADICS white box monitor.
除了关注算法的性能和功能外,还鼓励使用机器学习(ML)智能自动化的安全关键型CPS的设计者定义不变量并利用指标来量化ML决策的不确定性。Wheatman等人[11]提出了分布式智能控制系统(RADICS)的运行时保证,扩展了Simplex架构[9],为由机器学习算法控制的网络物理系统(CPS)提供运行时保证。因此,RADICS可以让设计人员通过安全控制器保证系统性能的最低水平,同时通过人工智能(AI)控制器实现更高的平均性能。RADICS的现有实现侧重于模拟应用,例如使用城市移动模拟(SUMO)[5]和流量[12]环境的车辆交通控制。该项目的目的是在物理环境中实现RADICS,以便调查和了解物理部署的限制和挑战。我们选择了一个水处理试验台作为应用程序来进行此评估。作为ICCPS的演示,我们希望使用这个测试平台部署来研究实际问题的影响,例如通信延迟、传感器故障和RADICS运行时保证系统上的不完整信息。我们还计划将物理测试平台扩展到硬件在环智能城市环境中,其中物理测试平台的保真度将补充模拟组件的可扩展性和灵活性。这将允许在部署到现实世界之前对RADICS等保障能力进行进一步评估,以确保智能CPS的安全可靠运行。这项工作的新颖贡献包括将RADICS扩展到网络物理系统中的实际应用,分析转向物理域所固有的问题,以及引入一种类似集成的方法来计算RADICS白盒监视器的置信度。
{"title":"Runtime Assurance for Intelligent Cyber-Physical Systems","authors":"Vlada Dementyeva, Cameron Hickert, Nicolas Sarfaraz, S. Zanlongo, Tamim I. Sookoor","doi":"10.1109/iccps54341.2022.00035","DOIUrl":"https://doi.org/10.1109/iccps54341.2022.00035","url":null,"abstract":"The designers of safety-critical CPS that are intelligently automated using machine learning (ML) are encouraged to define invariants and utilize metrics to quantify the uncertainty of ML decisions in addition to focusing on the performance and functionality of the algorithm. Wheatman et al. [11] present Runtime Assurance for Distributed Intelligent Control Systems (RADICS) that extends the Simplex architecture [9] to provide runtime assurance for Cyber-Physical Systems (CPS) being controlled by machine learning al-gorithms. RADICS can thus allow designers to guarantee some minimum level of system performance via a safety controller while simultaneously allowing for greater average performance via an artificial intelligence (AI) controller. Existing implementations of RADICS have focused on simulated applications such as vehicular traffic control using the Simulation of Urban Mobility (SUMO) [5] and Flow [12] environments. The aim of this project is to implement RADICS in a physical environment in order to investigate and understand the limitations and challenges of physical deployments. We have selected a water treatment testbed as the application to conduct this evaluation. As a demonstration at ICCPS, we hope to use this testbed deployment to study the impact of real-world issues such as communication latencies, sensor failures, and incomplete information on the RADICS runtime assurance system. We also plan to extend the physical testbed into a hardware-in-the-loop smart city environment where the fidelity of the physical testbed will complement the scalability and flexibility of simulated components. This will allow further evaluation of assurance capabilities such as RADICS before they are deployed in the real world to ensure the safe and reliable operation of intelligent CPS. This work�s novel contributions include an extension of RADICS towards real-world use in cyber-physical systems, analysis of problems inherent to the shift to physical domains, and the introduction of an ensemble-like method for calculating confidence in the RADICS white box monitor.","PeriodicalId":340078,"journal":{"name":"2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121734450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
VaRSM: Versatile Autonomous Racquet Sports Machine VaRSM:多功能自主网拍运动机
Pub Date : 2022-05-01 DOI: 10.1109/iccps54341.2022.00025
F. Yang
In this paper, we present a system called Versatile Autonomous Racquet Sports Machine (VaRSM in short). VaRSM can play table tennis, tennis and badminton with respective racquets. There are two major challenges in building VaRSM: first, VaRSM must be able to strike and return balls of variable speed and power on fields of different size with diverse racquet motions; second, VaRSM must track and predict balls' fast trajectories and move its body in extremely short intervals of time. To address these challenges, we design several innovative technologies, which we group into the physical hardware module and the control software module. In the physical hardware module, we create a high speed swerve-drive platform and a high-flexibility racquet arm, using configurable integrated drive units. In the control software module, we develop a proactive progressive control method that takes advantage of the hardware's physical capabilities to achieve early ball trajectory prediction, quick striking decision-making, and fast yet stable machine motion. We build a prototype system based on these technologies. Our experiments demonstrate VaRSM is able to strike and return table tennis, tennis and badminton balls with high success rates and is capable of playing with human players. To our knowledge, VaRSM is the first machine able to play three different ball games, and may hold great significance in education, research, economy, and society.
本文提出了一种多功能自主球拍运动机(简称VaRSM)系统。VaRSM可以用各自的球拍打乒乓球、网球和羽毛球。建造VaRSM有两个主要的挑战:第一,VaRSM必须能够在不同大小的场地上用不同的球拍动作击打和回击不同速度和力量的球;其次,VaRSM必须跟踪和预测球的快速轨迹,并在极短的时间间隔内移动它的身体。为了应对这些挑战,我们设计了几种创新技术,我们将其分为物理硬件模块和控制软件模块。在物理硬件模块中,我们使用可配置的集成驱动单元创建了高速转向驱动平台和高灵活性的球拍臂。在控制软件模块中,我们开发了一种主动渐进控制方法,利用硬件的物理能力,实现早期的球轨迹预测,快速的击球决策,快速而稳定的机器运动。我们基于这些技术构建了一个原型系统。我们的实验表明,VaRSM能够以很高的成功率击打和回击乒乓球、网球和羽毛球,并且能够与人类运动员比赛。据我们所知,VaRSM是第一台能够玩三种不同球类运动的机器,在教育、研究、经济和社会方面可能具有重要意义。
{"title":"VaRSM: Versatile Autonomous Racquet Sports Machine","authors":"F. Yang","doi":"10.1109/iccps54341.2022.00025","DOIUrl":"https://doi.org/10.1109/iccps54341.2022.00025","url":null,"abstract":"In this paper, we present a system called Versatile Autonomous Racquet Sports Machine (VaRSM in short). VaRSM can play table tennis, tennis and badminton with respective racquets. There are two major challenges in building VaRSM: first, VaRSM must be able to strike and return balls of variable speed and power on fields of different size with diverse racquet motions; second, VaRSM must track and predict balls' fast trajectories and move its body in extremely short intervals of time. To address these challenges, we design several innovative technologies, which we group into the physical hardware module and the control software module. In the physical hardware module, we create a high speed swerve-drive platform and a high-flexibility racquet arm, using configurable integrated drive units. In the control software module, we develop a proactive progressive control method that takes advantage of the hardware's physical capabilities to achieve early ball trajectory prediction, quick striking decision-making, and fast yet stable machine motion. We build a prototype system based on these technologies. Our experiments demonstrate VaRSM is able to strike and return table tennis, tennis and badminton balls with high success rates and is capable of playing with human players. To our knowledge, VaRSM is the first machine able to play three different ball games, and may hold great significance in education, research, economy, and society.","PeriodicalId":340078,"journal":{"name":"2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121910054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1