首页 > 最新文献

Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems最新文献

英文 中文
Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems ACM/IEEE第六届信息物理系统国际会议论文集
A. Bayen, M. Branicky
This volume contains the papers presented at the Sixth ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS 2015), which was held with the Cyber-Physical Systems Week in Seattle, Washington, USA, on 13--16 April 2015. ICCPS has been the flagship conference on Cyber-Physical Systems (CPS) that tightly couple the cyber aspects of computing and communications with the physical aspects of dynamics and engineering. ICCPS, as an integral part of CPS Week, is pleased to be co-located with its sister conferences that focus on various components of CPS including embedded systems, hybrid systems, real-time systems, and wireless sensor networks. ICCPS aims to showcase cutting-edge research that spans both the cyber and physical aspects of CPS. In the process, it will bring together engineers from various disciplines and computer scientists to create the scientific foundations, identify new principles, present novel architectures, demonstrate promising applications, and enable powerful capabilities of CPS. In addition to its traditional focus on the foundations, applications, and examples of CPS, this year ICCPS has absorbed the former High Confidence Networked Systems (HiCoNS) conference and includes its focus on secure and resilient infrastructure for CPS.
本卷包含在第六届ACM/IEEE网络物理系统国际会议(ICCPS 2015)上发表的论文,该会议于2015年4月13日至16日在美国华盛顿州西雅图举行的网络物理系统周上举行。ICCPS是网络物理系统(CPS)的旗舰会议,它将计算和通信的网络方面与动力学和工程的物理方面紧密结合起来。ICCPS,作为CPS周的一个组成部分,很高兴与它的姊妹会议在一起,这些会议专注于CPS的各个组成部分,包括嵌入式系统、混合系统、实时系统和无线传感器网络。ICCPS旨在展示跨越CPS的网络和物理方面的前沿研究。在此过程中,它将汇集来自不同学科的工程师和计算机科学家来创建科学基础,确定新的原理,提出新的架构,展示有前途的应用,并使CPS的强大功能成为可能。除了传统上关注CPS的基础、应用和示例之外,今年的ICCPS还吸收了以前的高置信度网络系统(HiCoNS)会议,并将重点放在了CPS的安全和弹性基础设施上。
{"title":"Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems","authors":"A. Bayen, M. Branicky","doi":"10.1145/2735960","DOIUrl":"https://doi.org/10.1145/2735960","url":null,"abstract":"This volume contains the papers presented at the Sixth ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS 2015), which was held with the Cyber-Physical Systems Week in Seattle, Washington, USA, on 13--16 April 2015. ICCPS has been the flagship conference on Cyber-Physical Systems (CPS) that tightly couple the cyber aspects of computing and communications with the physical aspects of dynamics and engineering. ICCPS, as an integral part of CPS Week, is pleased to be co-located with its sister conferences that focus on various components of CPS including embedded systems, hybrid systems, real-time systems, and wireless sensor networks. \u0000 \u0000ICCPS aims to showcase cutting-edge research that spans both the cyber and physical aspects of CPS. In the process, it will bring together engineers from various disciplines and computer scientists to create the scientific foundations, identify new principles, present novel architectures, demonstrate promising applications, and enable powerful capabilities of CPS. In addition to its traditional focus on the foundations, applications, and examples of CPS, this year ICCPS has absorbed the former High Confidence Networked Systems (HiCoNS) conference and includes its focus on secure and resilient infrastructure for CPS.","PeriodicalId":344612,"journal":{"name":"Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems","volume":"104 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121058580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experimental analysis of denial-of-service attacks on teleoperated robotic systems 远程操作机器人系统的拒绝服务攻击实验分析
Tamara Bonaci, Junjie Yan, Jeffrey A. Herron, Tadayoshi Kohno, H. Chizeck
Applications of robotic systems have had an explosive growth in recent years. In 2008, more than eight million robots were deployed worldwide in factories, battlefields, and medical services. The number and the applications of robotic systems are expected to continue growing, and many future robots will be controlled by distant operators through wired and wireless communication networks. The open and uncontrollable nature of communication media between robots and operators renders these cyber-physical systems vulnerable to a variety of cyber-security threats, many of which cannot be prevented using traditional cryptographic methods. A question thus arises: what if teleoperated robots are attacked, compromised or taken over? In this paper, we systematically analyze cyber-security attacks against Raven II R, an advanced teleoperated robotic surgery system. We classify possible threats, and focus on denial-of-service (DoS) attacks, which cannot be prevented using available cryptographic solutions. Through a series of experiments involving human subjects, we analyze the impact of these attacks on teleoperated procedures. We use the Fitts' law as a way of quantifying the impact, and measure the increase in tasks' difficulty when under DoS attacks. We then consider possible steps to mitigate the identified DoS attacks, and evaluate the applicability of these solutions for teleoperated robotics. The broader goal of our paper is to raise awareness, and increase understanding of emerging cyber-security threats against teleoperated robotic systems.
近年来,机器人系统的应用有了爆炸性的增长。2008年,全世界有超过800万个机器人被部署在工厂、战场和医疗服务中。机器人系统的数量和应用预计将继续增长,许多未来的机器人将由远程操作员通过有线和无线通信网络控制。机器人和操作员之间通信媒体的开放性和不可控性使得这些网络物理系统容易受到各种网络安全威胁,其中许多威胁无法使用传统的加密方法进行预防。这样就产生了一个问题:如果远程操作的机器人受到攻击、破坏或被接管怎么办?在本文中,我们系统地分析了针对Raven II R的网络安全攻击,这是一种先进的远程操作机器人手术系统。我们对可能的威胁进行分类,并重点关注拒绝服务(DoS)攻击,使用可用的加密解决方案无法阻止这种攻击。通过一系列涉及人类受试者的实验,我们分析了这些攻击对远程操作程序的影响。我们使用Fitts定律作为一种量化影响的方法,并测量在遭受DoS攻击时任务难度的增加。然后,我们考虑可能的步骤来减轻已识别的DoS攻击,并评估这些解决方案对远程操作机器人的适用性。我们的论文的更广泛的目标是提高意识,并增加对远程操作机器人系统的新兴网络安全威胁的理解。
{"title":"Experimental analysis of denial-of-service attacks on teleoperated robotic systems","authors":"Tamara Bonaci, Junjie Yan, Jeffrey A. Herron, Tadayoshi Kohno, H. Chizeck","doi":"10.1145/2735960.2735980","DOIUrl":"https://doi.org/10.1145/2735960.2735980","url":null,"abstract":"Applications of robotic systems have had an explosive growth in recent years. In 2008, more than eight million robots were deployed worldwide in factories, battlefields, and medical services. The number and the applications of robotic systems are expected to continue growing, and many future robots will be controlled by distant operators through wired and wireless communication networks. The open and uncontrollable nature of communication media between robots and operators renders these cyber-physical systems vulnerable to a variety of cyber-security threats, many of which cannot be prevented using traditional cryptographic methods. A question thus arises: what if teleoperated robots are attacked, compromised or taken over? In this paper, we systematically analyze cyber-security attacks against Raven II R, an advanced teleoperated robotic surgery system. We classify possible threats, and focus on denial-of-service (DoS) attacks, which cannot be prevented using available cryptographic solutions. Through a series of experiments involving human subjects, we analyze the impact of these attacks on teleoperated procedures. We use the Fitts' law as a way of quantifying the impact, and measure the increase in tasks' difficulty when under DoS attacks. We then consider possible steps to mitigate the identified DoS attacks, and evaluate the applicability of these solutions for teleoperated robotics. The broader goal of our paper is to raise awareness, and increase understanding of emerging cyber-security threats against teleoperated robotic systems.","PeriodicalId":344612,"journal":{"name":"Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124808937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Fully bayesian learning and spatial reasoning with flexible human sensor networks 完全贝叶斯学习和空间推理与灵活的人体传感器网络
N. Ahmed, M. Campbell, D. Casbeer, Yongcan Cao, Derek B. Kingston
This work considers the challenging problem of simultaneous modeling and fusion of 'soft data' generated by a network of 'human sensors' for spatial state estimation tasks, such as lost target search or large area surveillance. Human sensors can opportunistically provide useful information to constrain difficult state estimation problems, but are imperfect information sources whose reliability cannot be easily determined in advance. Formal observation likelihood models are derived for flexible sketch-based observations, but are found to lead to analytically intractable statistical dependencies between unknown sensor parameters and spatial states of interest that cannot adequately characterized by simple point estimates. Hierarchical Bayesian models and centralized inference strategies based on Gibbs sampling are proposed to address these issues, especially in cases of sparse, noisy, ambiguous and conflicting soft data. This leads to an automatic online calibration procedure for human sensor networks, as well as conservative spatial state posteriors that naturally account for model uncertainties. Experimental outdoor target search results with real spatial human sensor data (obtained via networked mobile graphical sketch interfaces) demonstrate the proposed methodology.
这项工作考虑了由空间状态估计任务(如丢失目标搜索或大面积监视)的“人类传感器”网络生成的“软数据”的同时建模和融合的挑战性问题。人体传感器可以偶然地提供有用的信息来约束困难的状态估计问题,但它是不完美的信息源,其可靠性不能轻易地提前确定。正式的观测似然模型是为灵活的基于草图的观测推导出来的,但发现在未知传感器参数和感兴趣的空间状态之间存在难以分析的统计依赖关系,无法用简单的点估计充分表征。提出了层次贝叶斯模型和基于Gibbs抽样的集中推理策略来解决这些问题,特别是在稀疏、噪声、模糊和冲突的软数据情况下。这导致了人类传感器网络的自动在线校准过程,以及自然地解释模型不确定性的保守空间状态后验。使用真实空间人体传感器数据(通过网络移动图形草图界面获得)的室外目标搜索实验结果验证了所提出的方法。
{"title":"Fully bayesian learning and spatial reasoning with flexible human sensor networks","authors":"N. Ahmed, M. Campbell, D. Casbeer, Yongcan Cao, Derek B. Kingston","doi":"10.1145/2735960.2735970","DOIUrl":"https://doi.org/10.1145/2735960.2735970","url":null,"abstract":"This work considers the challenging problem of simultaneous modeling and fusion of 'soft data' generated by a network of 'human sensors' for spatial state estimation tasks, such as lost target search or large area surveillance. Human sensors can opportunistically provide useful information to constrain difficult state estimation problems, but are imperfect information sources whose reliability cannot be easily determined in advance. Formal observation likelihood models are derived for flexible sketch-based observations, but are found to lead to analytically intractable statistical dependencies between unknown sensor parameters and spatial states of interest that cannot adequately characterized by simple point estimates. Hierarchical Bayesian models and centralized inference strategies based on Gibbs sampling are proposed to address these issues, especially in cases of sparse, noisy, ambiguous and conflicting soft data. This leads to an automatic online calibration procedure for human sensor networks, as well as conservative spatial state posteriors that naturally account for model uncertainties. Experimental outdoor target search results with real spatial human sensor data (obtained via networked mobile graphical sketch interfaces) demonstrate the proposed methodology.","PeriodicalId":344612,"journal":{"name":"Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126817414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Controller synthesis for autonomous systems interacting with human operators 与人类操作者交互的自主系统的控制器综合
Lu Feng, Clemens Wiltsche, Laura R. Humphrey, U. Topcu
We propose an approach to synthesize control protocols for autonomous systems that account for uncertainties and imperfections in interactions with human operators. As an illustrative example, we consider a scenario involving road network surveillance by an unmanned aerial vehicle (UAV) that is controlled remotely by a human operator but also has a certain degree of autonomy. Depending on the type (i.e., probabilistic and/or nondeterministic) of knowledge about the uncertainties and imperfections in the operator-autonomy interactions, we use abstractions based on Markov decision processes and augment these models to stochastic two-player games. Our approach enables the synthesis of operator-dependent optimal mission plans for the UAV, highlighting the effects of operator characteristics (e.g., workload, proficiency, and fatigue) on UAV mission performance; it can also provide informative feedback (e.g., Pareto curves showing the trade-offs between multiple mission objectives), potentially assisting the operator in decision-making.
我们提出了一种综合自治系统控制协议的方法,该控制协议考虑了与人类操作员交互中的不确定性和不完善。作为一个说明性的例子,我们考虑一个场景,涉及无人驾驶飞行器(UAV)的道路网络监控,该无人机由人类操作员远程控制,但也具有一定程度的自主权。根据操作员-自治交互中的不确定性和不完善的知识类型(即概率和/或不确定性),我们使用基于马尔可夫决策过程的抽象,并将这些模型扩展到随机双人博弈。我们的方法能够为无人机合成依赖于操作员的最佳任务计划,突出操作员特征(例如,工作量,熟练程度和疲劳)对无人机任务性能的影响;它还可以提供信息反馈(例如,显示多个任务目标之间权衡的帕累托曲线),潜在地帮助操作员做出决策。
{"title":"Controller synthesis for autonomous systems interacting with human operators","authors":"Lu Feng, Clemens Wiltsche, Laura R. Humphrey, U. Topcu","doi":"10.1145/2735960.2735973","DOIUrl":"https://doi.org/10.1145/2735960.2735973","url":null,"abstract":"We propose an approach to synthesize control protocols for autonomous systems that account for uncertainties and imperfections in interactions with human operators. As an illustrative example, we consider a scenario involving road network surveillance by an unmanned aerial vehicle (UAV) that is controlled remotely by a human operator but also has a certain degree of autonomy. Depending on the type (i.e., probabilistic and/or nondeterministic) of knowledge about the uncertainties and imperfections in the operator-autonomy interactions, we use abstractions based on Markov decision processes and augment these models to stochastic two-player games. Our approach enables the synthesis of operator-dependent optimal mission plans for the UAV, highlighting the effects of operator characteristics (e.g., workload, proficiency, and fatigue) on UAV mission performance; it can also provide informative feedback (e.g., Pareto curves showing the trade-offs between multiple mission objectives), potentially assisting the operator in decision-making.","PeriodicalId":344612,"journal":{"name":"Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127754961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Developing associations between building occupancy and traffic congestion 发展建筑物占用率与交通拥堵之间的联系
Yi Yuan, C. Fan, Dan Wang, Linda Fu Xiao
Recently there is an increasing interest in smart city. Smart city differs from digital city mostly due to the ingredients of data analytics. In such context, computer science is nowadays jointly working with physical domains; and we make the physical domains smarter by providing adding values or cost reduction; for example, there are studies on smart buildings, smart transport, smart grid, etc. Most of these studies show a joint of computer science with a single physical domain. In this work, we study a connection of two physical domains, the built environment and transport.
最近,人们对智慧城市的兴趣越来越大。智慧城市与数字城市的区别主要在于数据分析的成分。在这样的背景下,计算机科学如今与物理领域共同工作;我们通过提供附加值或降低成本,使物理领域变得更加智能;比如智能建筑、智能交通、智能电网等方面的研究。这些研究大多显示了计算机科学与单一物理领域的结合。在这项工作中,我们研究了两个物理领域的联系,建筑环境和运输。
{"title":"Developing associations between building occupancy and traffic congestion","authors":"Yi Yuan, C. Fan, Dan Wang, Linda Fu Xiao","doi":"10.1145/2735960.2735990","DOIUrl":"https://doi.org/10.1145/2735960.2735990","url":null,"abstract":"Recently there is an increasing interest in smart city. Smart city differs from digital city mostly due to the ingredients of data analytics. In such context, computer science is nowadays jointly working with physical domains; and we make the physical domains smarter by providing adding values or cost reduction; for example, there are studies on smart buildings, smart transport, smart grid, etc. Most of these studies show a joint of computer science with a single physical domain. In this work, we study a connection of two physical domains, the built environment and transport.","PeriodicalId":344612,"journal":{"name":"Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125948630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Occupancy estimation using ultrasonic chirps 利用超声波啁啾进行占用估计
Oliver Shih, Anthony G. Rowe
Estimating the number of people within a room is important for a wide variety of applications including: HVAC load management, scheduling room allocations and guiding first responders to areas with trapped people. In this paper, we present an active sensing technique that uses changes in a room's acoustic properties to estimate the number of occupants. Frequency dependent models of reverberation and room capacity are often used when designing auditoriums and concert halls. We leverage this property by using measured changes in the ultrasonic spectrum reflected back from a wide-band transmitter to estimate occupancy. A centrally located beacon transmits an ultrasonic chirp and then records how the signal dissipates over time. By analyzing the frequency response over the chirp's bandwidth at a few known occupancy levels, we are able to extrapolate the response as the number of people in the room changes. We explore the design of an excitation signal that best senses the environment with the fewest number of training samples. Through experimentation, we show that our approach is able to capture the number of people in a wide-variety of room configurations with people counting accuracy below 10% of the maximum room capacity count with as few as two training points. Finally, we provide a simple mechanism that allows our system to recalibrate when we know the room is empty so that it can adapt dynamically over time.
估计房间内的人数对于各种应用都很重要,包括:暖通空调负荷管理,安排房间分配和指导急救人员到达被困人员区域。在本文中,我们提出了一种主动传感技术,该技术利用房间声学特性的变化来估计居住者的数量。在设计礼堂和音乐厅时,经常使用混响和房间容量的频率相关模型。我们利用这一特性,利用测量变化的超声波频谱反射回来从一个宽频带发射机估计占用。位于中心的信标发送超声波啁啾,然后记录信号随时间的消散情况。通过分析在几个已知占用水平下啁啾带宽上的频率响应,我们能够推断出房间中人数变化时的响应。我们探索了一种激励信号的设计,它可以用最少的训练样本来最好地感知环境。通过实验,我们表明我们的方法能够捕获各种房间配置中的人数,人数计数精度低于最大房间容量计数的10%,并且只有两个训练点。最后,我们提供了一个简单的机制,当我们知道房间是空的时,允许我们的系统重新校准,以便它可以随时间动态地适应。
{"title":"Occupancy estimation using ultrasonic chirps","authors":"Oliver Shih, Anthony G. Rowe","doi":"10.1145/2735960.2735969","DOIUrl":"https://doi.org/10.1145/2735960.2735969","url":null,"abstract":"Estimating the number of people within a room is important for a wide variety of applications including: HVAC load management, scheduling room allocations and guiding first responders to areas with trapped people. In this paper, we present an active sensing technique that uses changes in a room's acoustic properties to estimate the number of occupants. Frequency dependent models of reverberation and room capacity are often used when designing auditoriums and concert halls. We leverage this property by using measured changes in the ultrasonic spectrum reflected back from a wide-band transmitter to estimate occupancy. A centrally located beacon transmits an ultrasonic chirp and then records how the signal dissipates over time. By analyzing the frequency response over the chirp's bandwidth at a few known occupancy levels, we are able to extrapolate the response as the number of people in the room changes. We explore the design of an excitation signal that best senses the environment with the fewest number of training samples. Through experimentation, we show that our approach is able to capture the number of people in a wide-variety of room configurations with people counting accuracy below 10% of the maximum room capacity count with as few as two training points. Finally, we provide a simple mechanism that allows our system to recalibrate when we know the room is empty so that it can adapt dynamically over time.","PeriodicalId":344612,"journal":{"name":"Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems","volume":"70 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131748388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Sensor attack detection in the presence of transient faults 瞬时故障下的传感器攻击检测
Junkil Park, Radoslav Ivanov, James Weimer, M. Pajic, Insup Lee
This paper addresses the problem of detection and identification of sensor attacks in the presence of transient faults. We consider a system with multiple sensors measuring the same physical variable, where some sensors might be under attack and provide malicious values. We consider a setup, in which each sensor provides the controller with an interval of possible values for the true value. While approaches exist for detecting malicious sensor attacks, they are conservative in that they treat attacks and faults in the same way, thus neglecting the fact that sensors may provide faulty measurements at times due to temporary disturbances (e.g., a tunnel for GPS). To address this problem, we propose a transient fault model for each sensor and an algorithm designed to detect and identify attacks in the presence of transient faults. The fault model consists of three aspects: the size of the sensor's interval (1) and an upper bound on the number of errors (2) allowed in a given window size (3). Given such a model for each sensor, the algorithm uses pairwise inconsistencies between sensors to detect and identify attacks. In addition to the algorithm, we provide a framework for selecting a fault model for each sensor based on training data. Finally, we validate the algorithm's performance on real measurement data obtained from an unmanned ground vehicle.
本文研究了存在瞬态故障的传感器攻击的检测和识别问题。我们考虑一个具有多个传感器测量相同物理变量的系统,其中一些传感器可能受到攻击并提供恶意值。我们考虑一种设置,其中每个传感器为控制器提供真实值的可能值的间隔。虽然存在检测恶意传感器攻击的方法,但它们是保守的,因为它们以同样的方式对待攻击和故障,从而忽略了传感器有时可能由于临时干扰(例如,GPS的隧道)而提供错误测量的事实。为了解决这个问题,我们为每个传感器提出了一个瞬态故障模型,并设计了一种算法来检测和识别存在瞬态故障的攻击。故障模型由三个方面组成:传感器间隔的大小(1)和给定窗口大小(3)允许的错误数的上界(2)。给定每个传感器的这样一个模型,该算法使用传感器之间的两两不一致性来检测和识别攻击。除了算法之外,我们还提供了一个基于训练数据为每个传感器选择故障模型的框架。最后,在无人地面车辆实测数据上验证了算法的性能。
{"title":"Sensor attack detection in the presence of transient faults","authors":"Junkil Park, Radoslav Ivanov, James Weimer, M. Pajic, Insup Lee","doi":"10.1145/2735960.2735984","DOIUrl":"https://doi.org/10.1145/2735960.2735984","url":null,"abstract":"This paper addresses the problem of detection and identification of sensor attacks in the presence of transient faults. We consider a system with multiple sensors measuring the same physical variable, where some sensors might be under attack and provide malicious values. We consider a setup, in which each sensor provides the controller with an interval of possible values for the true value. While approaches exist for detecting malicious sensor attacks, they are conservative in that they treat attacks and faults in the same way, thus neglecting the fact that sensors may provide faulty measurements at times due to temporary disturbances (e.g., a tunnel for GPS). To address this problem, we propose a transient fault model for each sensor and an algorithm designed to detect and identify attacks in the presence of transient faults. The fault model consists of three aspects: the size of the sensor's interval (1) and an upper bound on the number of errors (2) allowed in a given window size (3). Given such a model for each sensor, the algorithm uses pairwise inconsistencies between sensors to detect and identify attacks. In addition to the algorithm, we provide a framework for selecting a fault model for each sensor based on training data. Finally, we validate the algorithm's performance on real measurement data obtained from an unmanned ground vehicle.","PeriodicalId":344612,"journal":{"name":"Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123538078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Controller verification in adaptive learning systems towards trusted autonomy 面向可信自治的自适应学习系统的控制器验证
Xiaodong Zhang, M. Clark, K. Rattan, Jonathan A. Muse
With the increasing levels of adaptation and autonomy in complex cyber-physical systems (CPS), the traditional notion that such systems can be fully tested and validated offline is becoming an impossible task. It is virtually impossible to analyze or test ahead of time all the possible parameter values resulting from the uncertainty in system operational and environmental conditions. This paper considers the problem of online controller verification in a class of first-order nonlinear uncertain systems incorporating neural network based learning algorithms. Based on several critical assumptions, an on-line neural network model is employed to ensure robustness and fault-tolerance to certain modeling uncertainty and physical faults under consideration. However, these assumptions may be violated in the presence of software faults or unanticipated physical faults in the closed-loop system, leading to unstable learning behaviors and controller malfunctions. Based on Lyapunov stability theory, a online controller verification scheme is developed to detect such unstable learning behaviors by continuously monitoring the decrease of Lyapunov functions. Adaptive thresholds for detecting malfunctions of the adaptive learning controller are derived, ensuring the robustness with respect to modeling uncertainty and neural network approximation error. Additionally, the detectability conditions are investigated, characterizing the class of detectable software faults and unanticipated hardware faults. An upper bound on the detection time of controller malfunction is also derived. Some simulation results using a two-tank system are shown to illustrate the effectiveness of the controller verification method.
随着复杂网络物理系统(CPS)的适应性和自主性水平的提高,传统观念认为这些系统可以离线进行全面测试和验证,这正成为一项不可能完成的任务。由于系统运行和环境条件的不确定性,提前分析或测试所有可能的参数值几乎是不可能的。研究一类一阶非线性不确定系统的在线控制器验证问题,该系统采用基于神经网络的学习算法。在几个关键假设的基础上,采用在线神经网络模型来保证对建模不确定性和物理故障的鲁棒性和容错性。然而,当闭环系统中存在软件故障或未预料到的物理故障时,这些假设可能会被打破,导致学习行为不稳定和控制器故障。基于Lyapunov稳定性理论,提出了一种控制器在线验证方案,通过连续监测Lyapunov函数的减小来检测这种不稳定的学习行为。推导了自适应学习控制器故障检测的自适应阈值,保证了控制器对建模不确定性和神经网络逼近误差的鲁棒性。此外,研究了可检测条件,表征了可检测的软件故障和不可预测的硬件故障的类别。给出了控制器故障检测时间的上界。仿真结果表明了该控制器验证方法的有效性。
{"title":"Controller verification in adaptive learning systems towards trusted autonomy","authors":"Xiaodong Zhang, M. Clark, K. Rattan, Jonathan A. Muse","doi":"10.1145/2735960.2735971","DOIUrl":"https://doi.org/10.1145/2735960.2735971","url":null,"abstract":"With the increasing levels of adaptation and autonomy in complex cyber-physical systems (CPS), the traditional notion that such systems can be fully tested and validated offline is becoming an impossible task. It is virtually impossible to analyze or test ahead of time all the possible parameter values resulting from the uncertainty in system operational and environmental conditions. This paper considers the problem of online controller verification in a class of first-order nonlinear uncertain systems incorporating neural network based learning algorithms. Based on several critical assumptions, an on-line neural network model is employed to ensure robustness and fault-tolerance to certain modeling uncertainty and physical faults under consideration. However, these assumptions may be violated in the presence of software faults or unanticipated physical faults in the closed-loop system, leading to unstable learning behaviors and controller malfunctions. Based on Lyapunov stability theory, a online controller verification scheme is developed to detect such unstable learning behaviors by continuously monitoring the decrease of Lyapunov functions. Adaptive thresholds for detecting malfunctions of the adaptive learning controller are derived, ensuring the robustness with respect to modeling uncertainty and neural network approximation error. Additionally, the detectability conditions are investigated, characterizing the class of detectable software faults and unanticipated hardware faults. An upper bound on the detection time of controller malfunction is also derived. Some simulation results using a two-tank system are shown to illustrate the effectiveness of the controller verification method.","PeriodicalId":344612,"journal":{"name":"Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126023104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Response-time analysis for real-time tasks in engine control applications 发动机控制应用中实时任务的响应时间分析
Alessandro Biondi, M. Natale, G. Buttazzo
Engine control systems include computational activities that are triggered at predetermined angular values of the crankshaft, and therefore generate a workload that tends to increase with the engine speed. To cope with overload conditions, a common practice adopted by the automotive industry is to design such angular tasks with a set of modes that switch at given rotation speeds to adapt the computational demand. For this reason, these tasks are referred to as adaptive variable-rate (AVR). This paper presents an exact response time analysis for engine control applications consisting of periodic and AVR tasks scheduled by fixed priority. The proposed analysis is first presented for task sets with a single AVR task, and then extended to consider multiple AVR tasks related to a common rotation source. A number of experimental results are reported to validate the proposed approach and compare it against an existing sufficient test.
发动机控制系统包括计算活动,这些计算活动在预定的曲轴角度值下触发,因此产生的工作量往往随着发动机转速的增加而增加。为了应对过载条件,汽车工业采用的一种常见做法是设计具有一组模式的角任务,这些模式在给定的转速下切换以适应计算需求。出于这个原因,这些任务被称为自适应可变速率(AVR)。本文给出了由固定优先级调度的周期性任务和AVR任务组成的发动机控制应用的精确响应时间分析。该分析首先针对具有单个AVR任务的任务集提出,然后扩展到考虑与公共旋转源相关的多个AVR任务。报告了一些实验结果来验证所提出的方法,并将其与现有的充分测试进行比较。
{"title":"Response-time analysis for real-time tasks in engine control applications","authors":"Alessandro Biondi, M. Natale, G. Buttazzo","doi":"10.1145/2735960.2735963","DOIUrl":"https://doi.org/10.1145/2735960.2735963","url":null,"abstract":"Engine control systems include computational activities that are triggered at predetermined angular values of the crankshaft, and therefore generate a workload that tends to increase with the engine speed. To cope with overload conditions, a common practice adopted by the automotive industry is to design such angular tasks with a set of modes that switch at given rotation speeds to adapt the computational demand. For this reason, these tasks are referred to as adaptive variable-rate (AVR). This paper presents an exact response time analysis for engine control applications consisting of periodic and AVR tasks scheduled by fixed priority. The proposed analysis is first presented for task sets with a single AVR task, and then extended to consider multiple AVR tasks related to a common rotation source. A number of experimental results are reported to validate the proposed approach and compare it against an existing sufficient test.","PeriodicalId":344612,"journal":{"name":"Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127010327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
SHARE: SoH-aware reconfiguration to enhance deliverable capacity of large-scale battery packs 共享:soh感知重构,提高大型电池组的交付能力
Liang He, Y. Gu, Ting Zhu, Cong Liu, K. Shin
Unbalanced battery cells are known to significantly degrade the performance and reliability of a large-scale battery system. In this paper, we exploit emerging reconfigurable battery packs to mitigate the cell imbalance via the joint consideration of system reconfigurability and State-of-Health (SoH) of cells. Via empirical measurements and validation, we observe that a significantly larger amount of capacity can be delivered when cells with similar SoH levels are connected in series during discharging, which in turn extends the system operation time. Based on this observation, we propose two SoH-aware reconfiguration algorithms focusing on fully and partially reconfigurable battery packs, and prove their (near) optimality. We evaluate the proposed SoH-aware reconfiguration algorithms using both experiments and simulations. The algorithms are shown to deliver about 10--30% more capacity than SoH-oblivious configuration approaches.
众所周知,不平衡电池会显著降低大型电池系统的性能和可靠性。在本文中,我们利用新兴的可重构电池组,通过联合考虑系统可重构性和电池的健康状态(SoH)来缓解电池的不平衡。通过实证测量和验证,我们观察到,当具有相似SoH水平的电池在放电期间串联时,可以提供显着更大的容量,从而延长系统运行时间。基于这一观察,我们提出了两种soh感知重构算法,重点关注完全可重构和部分可重构电池组,并证明了它们的(近)最优性。我们通过实验和仿真来评估所提出的soh感知重构算法。这些算法的容量比soh无关配置方法多出10- 30%。
{"title":"SHARE: SoH-aware reconfiguration to enhance deliverable capacity of large-scale battery packs","authors":"Liang He, Y. Gu, Ting Zhu, Cong Liu, K. Shin","doi":"10.1145/2735960.2735967","DOIUrl":"https://doi.org/10.1145/2735960.2735967","url":null,"abstract":"Unbalanced battery cells are known to significantly degrade the performance and reliability of a large-scale battery system. In this paper, we exploit emerging reconfigurable battery packs to mitigate the cell imbalance via the joint consideration of system reconfigurability and State-of-Health (SoH) of cells. Via empirical measurements and validation, we observe that a significantly larger amount of capacity can be delivered when cells with similar SoH levels are connected in series during discharging, which in turn extends the system operation time. Based on this observation, we propose two SoH-aware reconfiguration algorithms focusing on fully and partially reconfigurable battery packs, and prove their (near) optimality. We evaluate the proposed SoH-aware reconfiguration algorithms using both experiments and simulations. The algorithms are shown to deliver about 10--30% more capacity than SoH-oblivious configuration approaches.","PeriodicalId":344612,"journal":{"name":"Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121863712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
期刊
Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1