首页 > 最新文献

Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems最新文献

英文 中文
Environment-aware estimation of battery state-of-charge for mobile devices 移动设备电池状态的环境感知估计
Liang He, Youngmoon Lee, Eugene Kim, K. Shin
Reliable operation of mobile devices, such as smartphones and tablets, has become essential for a great many users around the globe. Mobile devices, however, have been reported to suffer from frequent, unexpected shutoffs - e.g., shutting off even when their batteries were shown to have up to 60% remaining state-of-charge (SoC) - especially in cold environments. Their main cause is found to be the inability of commodity mobile devices to account for the strong dependency between battery SoC and the environment temperature. To remedy this problem, we design, implement, and evaluate EA-SoC, a real-time Environment-Aware battery SoC estimation service for mobile devices. EA-SoC estimates the battery SoC with a cyber-physical approach, based on (1) a thermal circuit model in the cyber space capturing the physical interactions among the battery discharge current, temperature, and the environment, and (2) an empirically validated data-driven (i.e., cyber) model for the physical relations between battery temperature and battery resistance. We have conducted 35 experimental case-studies with two Nexus 5X smartphones to evaluate EA-SoC. EA-SoC is shown to report an average of 3% SoC when the phones shut off even in a -15°C environment, while that reported by the phones' built-in fuel-gauge chips could be over 90%.
智能手机和平板电脑等移动设备的可靠运行对全球许多用户来说已经变得至关重要。然而,据报道,移动设备经常遭受意外关机的困扰——例如,即使它们的电池显示有高达60%的剩余电量(SoC)也会关机——特别是在寒冷的环境中。发现其主要原因是商品移动设备无法解释电池SoC与环境温度之间的强烈依赖性。为了解决这个问题,我们设计、实现并评估了EA-SoC,这是一种用于移动设备的实时环境感知电池SoC评估服务。EA-SoC采用网络物理方法估算电池SoC,基于(1)网络空间中的热电路模型,捕获电池放电电流、温度和环境之间的物理相互作用,以及(2)经验验证的数据驱动(即网络)模型,用于电池温度和电池电阻之间的物理关系。我们对两款Nexus 5X智能手机进行了35个实验案例研究,以评估EA-SoC。即使在-15°C的环境中,当手机关闭时,EA-SoC报告的SoC平均为3%,而手机内置的燃料计芯片报告的SoC可能超过90%。
{"title":"Environment-aware estimation of battery state-of-charge for mobile devices","authors":"Liang He, Youngmoon Lee, Eugene Kim, K. Shin","doi":"10.1145/3302509.3313782","DOIUrl":"https://doi.org/10.1145/3302509.3313782","url":null,"abstract":"Reliable operation of mobile devices, such as smartphones and tablets, has become essential for a great many users around the globe. Mobile devices, however, have been reported to suffer from frequent, unexpected shutoffs - e.g., shutting off even when their batteries were shown to have up to 60% remaining state-of-charge (SoC) - especially in cold environments. Their main cause is found to be the inability of commodity mobile devices to account for the strong dependency between battery SoC and the environment temperature. To remedy this problem, we design, implement, and evaluate EA-SoC, a real-time Environment-Aware battery SoC estimation service for mobile devices. EA-SoC estimates the battery SoC with a cyber-physical approach, based on (1) a thermal circuit model in the cyber space capturing the physical interactions among the battery discharge current, temperature, and the environment, and (2) an empirically validated data-driven (i.e., cyber) model for the physical relations between battery temperature and battery resistance. We have conducted 35 experimental case-studies with two Nexus 5X smartphones to evaluate EA-SoC. EA-SoC is shown to report an average of 3% SoC when the phones shut off even in a -15°C environment, while that reported by the phones' built-in fuel-gauge chips could be over 90%.","PeriodicalId":413733,"journal":{"name":"Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130299536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Bounding network-induced delays for time-critical services in avionic systems using measurements and network calculus 使用测量和网络演算的航空电子系统中时间关键服务的边界网络诱导延迟
Huan Yang, Liang Cheng, Xiaoguang Ma
In this work, we propose to derive realistic, accurate bounds on network-induced delays for time-critical tasks running on Avionics Full-Duplex Switched (AFDX) Ethernet. Our preliminary evaluation results show that through measurement-based modeling and refining network-calculus-based analysis with measurements tight delay bounds can be obtained for AFDX networks with realistic traffic patterns and network workloads.
在这项工作中,我们建议推导出运行在航空电子全双工交换(AFDX)以太网上的时间关键任务的网络引起的延迟的现实,准确的边界。我们的初步评估结果表明,通过基于测量的建模和基于网络计算的精细化分析,可以获得具有真实流量模式和网络负载的AFDX网络的严格延迟界限。
{"title":"Bounding network-induced delays for time-critical services in avionic systems using measurements and network calculus","authors":"Huan Yang, Liang Cheng, Xiaoguang Ma","doi":"10.1145/3302509.3313330","DOIUrl":"https://doi.org/10.1145/3302509.3313330","url":null,"abstract":"In this work, we propose to derive realistic, accurate bounds on network-induced delays for time-critical tasks running on Avionics Full-Duplex Switched (AFDX) Ethernet. Our preliminary evaluation results show that through measurement-based modeling and refining network-calculus-based analysis with measurements tight delay bounds can be obtained for AFDX networks with realistic traffic patterns and network workloads.","PeriodicalId":413733,"journal":{"name":"Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131756797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Preventing battery attacks on electrical vehicles based on data-driven behavior modeling 基于数据驱动行为建模的电动汽车电池攻击防范
Liuwang Kang, Haiying Shen
With the rapid development of wireless communication technologies for electrical vehicles (EVs), as a critical part of a pure EV, batteries could be attacked (e.g., draining energy) to reduce driving range and increase driving range anxiety. However, no methods have been proposed to ensure security of EV batteries. In this paper, we propose the first battery attacks, which can turn on air condition and stop battery charging process by sending requests through a smartphone without being noticed by users. We then propose a Battery authentication method (Bauth) to detect the battery attacks. We firstly build a data-driven behavior model to describe a user's habits in turning on air condition and stopping battery charging. In the behavior model, to distinguish users that share a vehicle for high modeling accuracy, we apply the random forest technology to identify each user based on battery state. Based on the established behavior model, we then build a reinforcement learning model that judges whether an AC-turn-on or batter-charge-stop request from a smartphone is from the real user based on current vehicle states. We conducted real-life daily driving experiments with different participants to evaluate the battery attack detection accuracy of Bauth. The experimental results show that Bauth can prevent EV batteries from being attacked effectively in comparison with another method and its attack detection accuracy reaches as high as 93.44%.
随着电动汽车无线通信技术的快速发展,电池作为纯电动汽车的关键部件,可能会受到攻击(如耗电),从而降低续驶里程,增加续驶里程焦虑。然而,目前还没有办法确保电动汽车电池的安全性。在本文中,我们提出了第一种电池攻击,通过智能手机发送请求,可以在用户不注意的情况下打开空调并停止电池充电过程。然后,我们提出了一种电池认证方法(Bauth)来检测电池攻击。我们首先建立了一个数据驱动的行为模型来描述用户打开空调和停止电池充电的习惯。在行为模型中,为了区分共享车辆的用户以获得较高的建模精度,我们应用随机森林技术根据电池状态识别每个用户。在建立行为模型的基础上,我们建立了一个强化学习模型,根据当前车辆状态判断智能手机的交流打开或电池充电停止请求是否来自真实用户。我们对不同的参与者进行了现实生活中的日常驾驶实验,以评估Bauth的电池攻击检测精度。实验结果表明,与另一种方法相比,Bauth能有效防止电动汽车电池受到攻击,攻击检测准确率高达93.44%。
{"title":"Preventing battery attacks on electrical vehicles based on data-driven behavior modeling","authors":"Liuwang Kang, Haiying Shen","doi":"10.1145/3302509.3311035","DOIUrl":"https://doi.org/10.1145/3302509.3311035","url":null,"abstract":"With the rapid development of wireless communication technologies for electrical vehicles (EVs), as a critical part of a pure EV, batteries could be attacked (e.g., draining energy) to reduce driving range and increase driving range anxiety. However, no methods have been proposed to ensure security of EV batteries. In this paper, we propose the first battery attacks, which can turn on air condition and stop battery charging process by sending requests through a smartphone without being noticed by users. We then propose a Battery authentication method (Bauth) to detect the battery attacks. We firstly build a data-driven behavior model to describe a user's habits in turning on air condition and stopping battery charging. In the behavior model, to distinguish users that share a vehicle for high modeling accuracy, we apply the random forest technology to identify each user based on battery state. Based on the established behavior model, we then build a reinforcement learning model that judges whether an AC-turn-on or batter-charge-stop request from a smartphone is from the real user based on current vehicle states. We conducted real-life daily driving experiments with different participants to evaluate the battery attack detection accuracy of Bauth. The experimental results show that Bauth can prevent EV batteries from being attacked effectively in comparison with another method and its attack detection accuracy reaches as high as 93.44%.","PeriodicalId":413733,"journal":{"name":"Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123187843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Feature characterization for CPS software reuse 针对CPS软件重用的特征描述
Nayreet Islam, Akramul Azim
Many organizations continue to have reusable systems because they are cheaper, and associated with less time to market. Moreover, the practitioners experience lower risk if they choose to continually improve the reusable system rather than building a new system from scratch. Many reusable cyber-physical system (CPS) exist which interact with multiple physical entities. Users today expect modern CPS to satisfy a wide range of constraints at runtime. This paper characterizes the reusable CPS software by identifying the functional behaviors of the CPS as features along with the hierarchical relationships among them. We also recover dependencies (mandatory, optional, or, alternative) and cross-tree constraints (require, exclude) among the features as well as identify possible valid feature-configurations. In the experimental analysis, we discuss features and their configurations for three existing CPS software. Our framework benefits the practitioners in all stages of abstraction such as design, development, and testing.
许多组织继续使用可重用系统,因为它们更便宜,而且上市时间更短。此外,如果从业者选择持续改进可重用系统,而不是从零开始构建一个新系统,他们会经历更低的风险。存在许多可重用的网络物理系统(CPS),它们与多个物理实体相互作用。今天的用户期望现代CPS能够在运行时满足广泛的约束。本文通过将CPS的功能行为识别为特征以及它们之间的层次关系来表征可重用的CPS软件。我们还恢复特性之间的依赖关系(强制的、可选的或可选的)和交叉树约束(要求的、排除的),以及识别可能有效的特性配置。在实验分析中,我们讨论了现有的三种CPS软件的特点及其配置。我们的框架有利于抽象的所有阶段的实践者,例如设计、开发和测试。
{"title":"Feature characterization for CPS software reuse","authors":"Nayreet Islam, Akramul Azim","doi":"10.1145/3302509.3313318","DOIUrl":"https://doi.org/10.1145/3302509.3313318","url":null,"abstract":"Many organizations continue to have reusable systems because they are cheaper, and associated with less time to market. Moreover, the practitioners experience lower risk if they choose to continually improve the reusable system rather than building a new system from scratch. Many reusable cyber-physical system (CPS) exist which interact with multiple physical entities. Users today expect modern CPS to satisfy a wide range of constraints at runtime. This paper characterizes the reusable CPS software by identifying the functional behaviors of the CPS as features along with the hierarchical relationships among them. We also recover dependencies (mandatory, optional, or, alternative) and cross-tree constraints (require, exclude) among the features as well as identify possible valid feature-configurations. In the experimental analysis, we discuss features and their configurations for three existing CPS software. Our framework benefits the practitioners in all stages of abstraction such as design, development, and testing.","PeriodicalId":413733,"journal":{"name":"Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128073785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Managing the security-energy tradeoff in distributed cyber-physical systems 管理分布式网络物理系统中的安全-能源权衡
Anh-Duy Vu, R. Medhat, Borzoo Bonakdarpour
In this paper, we propose a technique that attempts to control energy consumption in distributed cyber-physical systems (CPS) in order to improve the level of security of the system. This is in contrast to most existing methods, where the system is set to use a certain level of authentication at design time, such as basic authentication, certificate-based authentication, or no authentication at all. To this end, we propose a notion of authenticatable task graph, which encodes standard task dependencies and allows for authentication tasks to be intermittently inserted into the computation task graph. The optimization objective here is to maximize the number of authentication tasks as well as peer-authentication, while remaining in the system energy bounds. We propose three offline optimization techniques and one online algorithm, where the system can dynamically manage the tradeoff between energy consumption and the level of security in the presence of uncertainties imposed by the physical environment. Our optimization algorithms are validated by a rich set of simulations as well as a real-world case study on a group of unmanned aerial vehicles (UAVs) that are assigned area search tasks and are required to perform peer-authentication within their battery limits.
本文提出了一种控制分布式网络物理系统(CPS)能耗的技术,以提高系统的安全水平。这与大多数现有方法形成对比,在这些方法中,系统被设置为在设计时使用某种级别的身份验证,例如基本身份验证、基于证书的身份验证或根本不进行身份验证。为此,我们提出了可认证任务图的概念,该概念对标准任务依赖关系进行编码,并允许将认证任务间歇性地插入计算任务图中。这里的优化目标是最大化身份验证任务和对等身份验证的数量,同时保持在系统能量范围内。我们提出了三种离线优化技术和一种在线算法,其中系统可以在物理环境施加的不确定性存在的情况下动态管理能耗和安全级别之间的权衡。我们的优化算法通过丰富的模拟和对一组无人驾驶飞行器(uav)的实际案例研究进行了验证,这些无人机被分配了区域搜索任务,并需要在电池限制内执行同行认证。
{"title":"Managing the security-energy tradeoff in distributed cyber-physical systems","authors":"Anh-Duy Vu, R. Medhat, Borzoo Bonakdarpour","doi":"10.1145/3302509.3311051","DOIUrl":"https://doi.org/10.1145/3302509.3311051","url":null,"abstract":"In this paper, we propose a technique that attempts to control energy consumption in distributed cyber-physical systems (CPS) in order to improve the level of security of the system. This is in contrast to most existing methods, where the system is set to use a certain level of authentication at design time, such as basic authentication, certificate-based authentication, or no authentication at all. To this end, we propose a notion of authenticatable task graph, which encodes standard task dependencies and allows for authentication tasks to be intermittently inserted into the computation task graph. The optimization objective here is to maximize the number of authentication tasks as well as peer-authentication, while remaining in the system energy bounds. We propose three offline optimization techniques and one online algorithm, where the system can dynamically manage the tradeoff between energy consumption and the level of security in the presence of uncertainties imposed by the physical environment. Our optimization algorithms are validated by a rich set of simulations as well as a real-world case study on a group of unmanned aerial vehicles (UAVs) that are assigned area search tasks and are required to perform peer-authentication within their battery limits.","PeriodicalId":413733,"journal":{"name":"Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems","volume":"563 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127683843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Age-of-information vs. value-of-information scheduling for cellular networked control systems 蜂窝网络控制系统的信息时代与信息价值调度
Onur Ayan, Mikhail Vilgelm, M. Klügel, S. Hirche, W. Kellerer
Age-of-Information (AoI) is a recently introduced metric for network operation with sensor applications which quantifies the freshness of data. In the context of networked control systems (NCSs), we compare the worth of the AoI metric with the value-of-information (VoI) metric, which is related to the uncertainty reduction in stochastic processes. First, we show that the uncertainty propagates non-linearly over time depending on system dynamics. Next, we define the value of a new update of the process of interest as a function of AoI and system parameters of the NCSs. We use the aggregated update value as a utility for the centralized scheduling problem in a cellular NCS composed of multiple heterogeneous control loops. By conducting a simulative analysis, we show that prioritizing transmissions with higher VoI improves performance of the NCSs compared with providing fair data freshness to all sub-systems equally.
信息年龄(Age-of-Information, AoI)是最近引入的用于传感器应用的网络运行度量,它量化了数据的新鲜度。在网络控制系统(NCSs)的背景下,我们比较了AoI度量与信息价值(VoI)度量的价值,后者与随机过程中的不确定性减少有关。首先,我们证明了不确定性随时间的非线性传播取决于系统动力学。接下来,我们将感兴趣的过程的新更新的值定义为AoI和ncs的系统参数的函数。在由多个异构控制回路组成的蜂窝NCS中,我们使用聚合更新值作为集中调度问题的实用工具。通过进行模拟分析,我们表明,与平等地为所有子系统提供公平的数据新鲜度相比,优先考虑具有较高VoI的传输可以提高NCSs的性能。
{"title":"Age-of-information vs. value-of-information scheduling for cellular networked control systems","authors":"Onur Ayan, Mikhail Vilgelm, M. Klügel, S. Hirche, W. Kellerer","doi":"10.1145/3302509.3311050","DOIUrl":"https://doi.org/10.1145/3302509.3311050","url":null,"abstract":"Age-of-Information (AoI) is a recently introduced metric for network operation with sensor applications which quantifies the freshness of data. In the context of networked control systems (NCSs), we compare the worth of the AoI metric with the value-of-information (VoI) metric, which is related to the uncertainty reduction in stochastic processes. First, we show that the uncertainty propagates non-linearly over time depending on system dynamics. Next, we define the value of a new update of the process of interest as a function of AoI and system parameters of the NCSs. We use the aggregated update value as a utility for the centralized scheduling problem in a cellular NCS composed of multiple heterogeneous control loops. By conducting a simulative analysis, we show that prioritizing transmissions with higher VoI improves performance of the NCSs compared with providing fair data freshness to all sub-systems equally.","PeriodicalId":413733,"journal":{"name":"Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115951959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 85
An online decision-theoretic pipeline for responder dispatch 一种在线响应调度决策理论管道
Ayan Mukhopadhyay, Geoffrey Pettet, Chinmaya Samal, A. Dubey, Yevgeniy Vorobeychik
The problem of dispatching emergency responders to service traffic accidents, fire, distress calls and crimes plagues urban areas across the globe. While such problems have been extensively looked at, most approaches are offline. Such methodologies fail to capture the dynamically changing environments under which critical emergency response occurs, and therefore, fail to be implemented in practice. Any holistic approach towards creating a pipeline for effective emergency response must also look at other challenges that it subsumes - predicting when and where incidents happen and understanding the changing environmental dynamics. We describe a system that collectively deals with all these problems in an online manner, meaning that the models get updated with streaming data sources. We highlight why such an approach is crucial to the effectiveness of emergency response, and present an algorithmic framework that can compute promising actions for a given decision-theoretic model for responder dispatch. We argue that carefully crafted heuristic measures can balance the trade-off between computational time and the quality of solutions achieved and highlight why such an approach is more scalable and tractable than traditional approaches. We also present an online mechanism for incident prediction, as well as an approach based on recurrent neural networks for learning and predicting environmental features that affect responder dispatch. We compare our methodology with prior state-of-the-art and existing dispatch strategies in the field, which show that our approach results in a reduction in response time of responders with a drastic reduction in computational time.
派遣紧急救援人员处理交通事故、火灾、求救电话和犯罪的问题困扰着全球的城市地区。虽然这些问题已经得到了广泛的研究,但大多数方法都是离线的。这种方法无法捕捉到发生重大应急反应的动态变化的环境,因此无法在实践中实施。任何旨在建立有效应急响应管道的整体方法都必须考虑到它所包含的其他挑战——预测事件发生的时间和地点,以及了解不断变化的环境动态。我们描述了一个以在线方式共同处理所有这些问题的系统,这意味着模型可以通过流数据源进行更新。我们强调了为什么这种方法对应急响应的有效性至关重要,并提出了一个算法框架,可以为响应者调度的给定决策理论模型计算有希望的行动。我们认为,精心设计的启发式方法可以平衡计算时间和解决方案质量之间的权衡,并强调为什么这种方法比传统方法更具可扩展性和可处理性。我们还提出了一种事件预测的在线机制,以及一种基于递归神经网络的方法,用于学习和预测影响响应者调度的环境特征。我们将我们的方法与先前最先进的和现有的调度策略进行了比较,结果表明,我们的方法减少了响应者的响应时间,大大减少了计算时间。
{"title":"An online decision-theoretic pipeline for responder dispatch","authors":"Ayan Mukhopadhyay, Geoffrey Pettet, Chinmaya Samal, A. Dubey, Yevgeniy Vorobeychik","doi":"10.1145/3302509.3311055","DOIUrl":"https://doi.org/10.1145/3302509.3311055","url":null,"abstract":"The problem of dispatching emergency responders to service traffic accidents, fire, distress calls and crimes plagues urban areas across the globe. While such problems have been extensively looked at, most approaches are offline. Such methodologies fail to capture the dynamically changing environments under which critical emergency response occurs, and therefore, fail to be implemented in practice. Any holistic approach towards creating a pipeline for effective emergency response must also look at other challenges that it subsumes - predicting when and where incidents happen and understanding the changing environmental dynamics. We describe a system that collectively deals with all these problems in an online manner, meaning that the models get updated with streaming data sources. We highlight why such an approach is crucial to the effectiveness of emergency response, and present an algorithmic framework that can compute promising actions for a given decision-theoretic model for responder dispatch. We argue that carefully crafted heuristic measures can balance the trade-off between computational time and the quality of solutions achieved and highlight why such an approach is more scalable and tractable than traditional approaches. We also present an online mechanism for incident prediction, as well as an approach based on recurrent neural networks for learning and predicting environmental features that affect responder dispatch. We compare our methodology with prior state-of-the-art and existing dispatch strategies in the field, which show that our approach results in a reduction in response time of responders with a drastic reduction in computational time.","PeriodicalId":413733,"journal":{"name":"Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124479203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Two-way coding in control systems under injection attacks: from attack detection to attack correction 注入攻击下控制系统的双向编码:从攻击检测到攻击纠正
Song Fang, K. Johansson, M. Skoglund, H. Sandberg, H. Ishii
In this paper, we introduce the method of two-way coding, a concept originating in communication theory characterizing coding schemes for two-way channels, into (networked) feedback control systems under injection attacks. We first show that the presence of two-way coding can distort the perspective of the attacker on the control system. In general, the distorted viewpoint on the attacker side as a consequence of two-way coding will facilitate detecting the attacks, or restricting what the attacker can do, or even correcting the attack effect. In the particular case of zero-dynamics attacks, if the attacks are to be designed according to the original plant, then they will be easily detected; while if the attacks are designed with respect to the equivalent plant as viewed by the attacker, then under the additional assumption that the plant is stabilizable by static output feedback, the attack effect may be corrected in steady state.
在本文中,我们引入双向编码的方法,一个概念起源于通信理论表征双向信道的编码方案,到(网络)反馈控制系统在注入攻击。我们首先证明双向编码的存在会扭曲攻击者对控制系统的看法。一般来说,由于双向编码,攻击方的视角被扭曲,这将有助于检测攻击,或者限制攻击者的行为,甚至纠正攻击效果。在零动态攻击的特殊情况下,如果攻击是按照原始工厂设计的,那么它们很容易被检测到;然而,如果攻击是针对攻击者所看到的等效工厂设计的,那么在该工厂可通过静态输出反馈稳定的额外假设下,攻击效果可能会在稳态中得到纠正。
{"title":"Two-way coding in control systems under injection attacks: from attack detection to attack correction","authors":"Song Fang, K. Johansson, M. Skoglund, H. Sandberg, H. Ishii","doi":"10.1145/3302509.3311047","DOIUrl":"https://doi.org/10.1145/3302509.3311047","url":null,"abstract":"In this paper, we introduce the method of two-way coding, a concept originating in communication theory characterizing coding schemes for two-way channels, into (networked) feedback control systems under injection attacks. We first show that the presence of two-way coding can distort the perspective of the attacker on the control system. In general, the distorted viewpoint on the attacker side as a consequence of two-way coding will facilitate detecting the attacks, or restricting what the attacker can do, or even correcting the attack effect. In the particular case of zero-dynamics attacks, if the attacks are to be designed according to the original plant, then they will be easily detected; while if the attacks are designed with respect to the equivalent plant as viewed by the attacker, then under the additional assumption that the plant is stabilizable by static output feedback, the attack effect may be corrected in steady state.","PeriodicalId":413733,"journal":{"name":"Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116305391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Simulation to scaled city: zero-shot policy transfer for traffic control via autonomous vehicles 对规模化城市的模拟:通过自动驾驶汽车进行交通控制的零射击政策转移
Kathy Jang, Logan E. Beaver, Behdad Chalaki, Ben Remer, Eugene Vinitsky, Andreas A. Malikopoulos, A. Bayen
Using deep reinforcement learning, we successfully train a set of two autonomous vehicles to lead a fleet of vehicles onto a round-about and then transfer this policy from simulation to a scaled city without fine-tuning. We use Flow, a library for deep reinforcement learning in microsimulators, to train two policies, (1) a policy with noise injected into the state and action space and (2) a policy without any injected noise. In simulation, the autonomous vehicles learn an emergent metering behavior for both policies which allows smooth merging. We then directly transfer this policy without any tuning to the University of Delaware's Scaled Smart City (UDSSC), a 1:25 scale testbed for connected and automated vehicles. We characterize the performance of the transferred policy based on how thoroughly the ramp metering behavior is captured in UDSSC. We show that the noise-free policy results in severe slowdowns and only, occasionally, it exhibits acceptable metering behavior. On the other hand, the noise-injected policy consistently performs an acceptable metering behavior, implying that the noise eventually aids with the zero-shot policy transfer. Finally, the transferred, noise-injected policy leads to a 5% reduction of average travel time and a reduction of 22% in maximum travel time in the UDSSC. Videos of the proposed self-learning controllers can be found at https://sites.google.com/view/iccps-policy-transfer.
使用深度强化学习,我们成功地训练了一组两辆自动驾驶汽车,将车队引导到环形交叉路口,然后在没有微调的情况下将该策略从模拟转移到规模城市。我们使用Flow,一个用于微模拟器中深度强化学习的库,来训练两个策略,(1)一个将噪声注入状态和动作空间的策略,(2)一个没有任何注入噪声的策略。在仿真中,自动驾驶汽车学习了一种紧急计量行为,以实现两种策略的顺利合并。然后,我们直接将此策略转移到特拉华大学的规模化智能城市(UDSSC),这是一个1:25比例的联网和自动驾驶汽车测试平台。我们根据在UDSSC中捕获斜坡计量行为的彻底程度来描述传输策略的性能。我们表明,无噪声策略导致严重的减速,只是,偶尔,它表现出可接受的计量行为。另一方面,噪声注入策略始终执行可接受的计量行为,这意味着噪声最终有助于零射击策略传输。最后,在UDSSC中,传递的噪声注入策略导致平均旅行时间减少5%,最大旅行时间减少22%。所提出的自学习控制器的视频可以在https://sites.google.com/view/iccps-policy-transfer上找到。
{"title":"Simulation to scaled city: zero-shot policy transfer for traffic control via autonomous vehicles","authors":"Kathy Jang, Logan E. Beaver, Behdad Chalaki, Ben Remer, Eugene Vinitsky, Andreas A. Malikopoulos, A. Bayen","doi":"10.1145/3302509.3313784","DOIUrl":"https://doi.org/10.1145/3302509.3313784","url":null,"abstract":"Using deep reinforcement learning, we successfully train a set of two autonomous vehicles to lead a fleet of vehicles onto a round-about and then transfer this policy from simulation to a scaled city without fine-tuning. We use Flow, a library for deep reinforcement learning in microsimulators, to train two policies, (1) a policy with noise injected into the state and action space and (2) a policy without any injected noise. In simulation, the autonomous vehicles learn an emergent metering behavior for both policies which allows smooth merging. We then directly transfer this policy without any tuning to the University of Delaware's Scaled Smart City (UDSSC), a 1:25 scale testbed for connected and automated vehicles. We characterize the performance of the transferred policy based on how thoroughly the ramp metering behavior is captured in UDSSC. We show that the noise-free policy results in severe slowdowns and only, occasionally, it exhibits acceptable metering behavior. On the other hand, the noise-injected policy consistently performs an acceptable metering behavior, implying that the noise eventually aids with the zero-shot policy transfer. Finally, the transferred, noise-injected policy leads to a 5% reduction of average travel time and a reduction of 22% in maximum travel time in the UDSSC. Videos of the proposed self-learning controllers can be found at https://sites.google.com/view/iccps-policy-transfer.","PeriodicalId":413733,"journal":{"name":"Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132105940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
A multilevel cybersecurity and safety monitor for embedded cyber-physical systems: WIP abstract 嵌入式网络物理系统的多级网络安全和安全监控:WIP摘要
S. Gautham, Georgios Bakirtzis, Matthew T. Leccadito, R. Klenke, C. Elks
Cyber-physical systems (CPS) are composed of various embedded subsystems (often realized on system on chip technology) and require specialized software, firmware and hardware to coordinate with the rest of the system. These multiple levels of integration expose attack surfaces which can be susceptible to attack vectors that require novel architectural methods to effectively secure against. We present a multilevel monitor architecture cybersecurity approach applied to a flight control system (FCS). We develop formal framework for the architecture using Event Calculus to define the interactions among the monitors and the system under observation.
信息物理系统(CPS)由各种嵌入式子系统(通常在系统芯片技术上实现)组成,需要专门的软件、固件和硬件与系统的其余部分协调。这些多级集成暴露了容易受到攻击向量影响的攻击面,这些攻击向量需要新颖的体系结构方法来有效地保护。我们提出了一种应用于飞行控制系统(FCS)的多级监控架构网络安全方法。我们使用事件演算为该体系结构开发了正式框架,以定义监视器与被观察系统之间的交互。
{"title":"A multilevel cybersecurity and safety monitor for embedded cyber-physical systems: WIP abstract","authors":"S. Gautham, Georgios Bakirtzis, Matthew T. Leccadito, R. Klenke, C. Elks","doi":"10.1145/3302509.3313321","DOIUrl":"https://doi.org/10.1145/3302509.3313321","url":null,"abstract":"Cyber-physical systems (CPS) are composed of various embedded subsystems (often realized on system on chip technology) and require specialized software, firmware and hardware to coordinate with the rest of the system. These multiple levels of integration expose attack surfaces which can be susceptible to attack vectors that require novel architectural methods to effectively secure against. We present a multilevel monitor architecture cybersecurity approach applied to a flight control system (FCS). We develop formal framework for the architecture using Event Calculus to define the interactions among the monitors and the system under observation.","PeriodicalId":413733,"journal":{"name":"Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129209909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1