{"title":"ICCPS '21: ACM/IEEE 12th International Conference on Cyber-Physical Systems, Nashville, Tennessee, USA, May 19-21, 2021","authors":"","doi":"10.1145/3450267","DOIUrl":"https://doi.org/10.1145/3450267","url":null,"abstract":"","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79658352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-26DOI: 10.1109/ICCPS.2016.7479099
H. Neema, P. Völgyesi, Bradley Potteiger, W. Emfinger, X. Koutsoukos, G. Karsai, Yevgeniy Vorobeychik, J. Sztipanovits
In-depth consideration and evaluation of security and resilience is necessary for developing the scientific foundations and technology of Cyber-Physical Systems (CPS). In this demonstration, we present SURE [1], a CPS experimentation and evaluation testbed for security and resilience focusing on transportation networks. The testbed includes (1) a heterogeneous modeling and simulation integration platform, (2) a Web-based tool for modeling CPS in adversarial environments, and (3) a framework for evaluating resilience using attacker-defender games. Users such as CPS designers and operators can interact with the testbed to evaluate monitoring and control schemes that include sensor placement and traffic signal configuration.
{"title":"Demo Abstract: SURE: An Experimentation and Evaluation Testbed for CPS Security and Resilience","authors":"H. Neema, P. Völgyesi, Bradley Potteiger, W. Emfinger, X. Koutsoukos, G. Karsai, Yevgeniy Vorobeychik, J. Sztipanovits","doi":"10.1109/ICCPS.2016.7479099","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479099","url":null,"abstract":"In-depth consideration and evaluation of security and resilience is necessary for developing the scientific foundations and technology of Cyber-Physical Systems (CPS). In this demonstration, we present SURE [1], a CPS experimentation and evaluation testbed for security and resilience focusing on transportation networks. The testbed includes (1) a heterogeneous modeling and simulation integration platform, (2) a Web-based tool for modeling CPS in adversarial environments, and (3) a framework for evaluating resilience using attacker-defender games. Users such as CPS designers and operators can interact with the testbed to evaluate monitoring and control schemes that include sensor placement and traffic signal configuration.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"9 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80094736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-11DOI: 10.1109/ICCPS.2016.7479114
Hae Young Lee, So-Jin Lee
Summary form only given. Discrete event system specification (DEVS), a formalism for modeling and simulation, has been recently applied to the engineering of CPS, which also makes the necessity of model checking for DEVS arisen. Model-transformation-based approaches were first proposed; timed or linear hybrid automata are obtained from DEVS models, and then verified using model checkers. But, due to the different semantics in state transitions, the transformation often involves manual tasks, such as abstraction and approximation. To eliminate such manual tasks, we have proposed a DEVS subclass that is less expressive, but verifiable. For reachability analysis, its models can be interpreted as transition systems and region automata (RA). Although our DEVS subclass and RA have different semantics with respect to model execution, they are equivalent in terms of reachability analysis. Thus, the reachability could be analyzed based on model checking techniques of timed automata. In many DEVS-based environments, models should be developed by programming languages. To enables the modelers to specify CPS in a visual way, we have proposed a visual modeling language based on our subclass. In our language, the behavior and structure of CPS are graphically specified by basic model diagrams and coupled model diagrams, respectively. Based on our subclass and languages, we have implemented a proof-of-concept environment that supports visual modeling of CPS as well as simulation and reachability analysis of the models. To enable the consideration of the hybrid nature and heterogeneity in CPS, DEVS subclasses, languages, verification techniques and environments will be further investigated.
只提供摘要形式。离散事件系统规范(Discrete event system specification, DEVS)作为一种建模和仿真的形式化方法,近年来被应用于CPS工程中,这也使得对离散事件系统规范进行模型检验的必要性产生。首先提出了基于模型转换的方法;从DEVS模型中得到定时或线性混合自动机,然后使用模型检查器进行验证。但是,由于状态转换中的语义不同,转换通常涉及手动任务,例如抽象和近似。为了消除这种手工任务,我们提出了一个DEVS子类,它的表达能力较差,但可验证。对于可达性分析,其模型可以解释为转换系统和区域自动机(RA)。尽管我们的DEVS子类和RA在模型执行方面具有不同的语义,但它们在可达性分析方面是等效的。因此,可以基于时间自动机的模型检验技术对可达性进行分析。在许多基于dev的环境中,模型应该由编程语言开发。为了使建模者能够以可视化的方式指定CPS,我们提出了一种基于子类的可视化建模语言。在我们的语言中,CPS的行为和结构分别由基本模型图和耦合模型图以图形方式指定。基于我们的子类和语言,我们实现了一个概念验证环境,它支持CPS的可视化建模以及模型的仿真和可达性分析。为了考虑到CPS的混合性质和异质性,DEVS子类、语言、验证技术和环境将进一步研究。
{"title":"Poster Abstract: Modeling, Simulation and Verification Environment for Engineering Cyber-Physical Systems Based on Discrete Event System Specification","authors":"Hae Young Lee, So-Jin Lee","doi":"10.1109/ICCPS.2016.7479114","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479114","url":null,"abstract":"Summary form only given. Discrete event system specification (DEVS), a formalism for modeling and simulation, has been recently applied to the engineering of CPS, which also makes the necessity of model checking for DEVS arisen. Model-transformation-based approaches were first proposed; timed or linear hybrid automata are obtained from DEVS models, and then verified using model checkers. But, due to the different semantics in state transitions, the transformation often involves manual tasks, such as abstraction and approximation. To eliminate such manual tasks, we have proposed a DEVS subclass that is less expressive, but verifiable. For reachability analysis, its models can be interpreted as transition systems and region automata (RA). Although our DEVS subclass and RA have different semantics with respect to model execution, they are equivalent in terms of reachability analysis. Thus, the reachability could be analyzed based on model checking techniques of timed automata. In many DEVS-based environments, models should be developed by programming languages. To enables the modelers to specify CPS in a visual way, we have proposed a visual modeling language based on our subclass. In our language, the behavior and structure of CPS are graphically specified by basic model diagrams and coupled model diagrams, respectively. Based on our subclass and languages, we have implemented a proof-of-concept environment that supports visual modeling of CPS as well as simulation and reachability analysis of the models. To enable the consideration of the hybrid nature and heterogeneity in CPS, DEVS subclasses, languages, verification techniques and environments will be further investigated.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"4 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79520854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-11DOI: 10.1109/ICCPS.2016.7479110
Austin Jones, Usman Ali, M. Egerstedt
Agricultural automation presents challenges typically encountered in the realm of cyber-physical systems, such as incomplete information (plant health indicators), external disturbances (weather), limited control authority (fertilizers cannot make a plant mature arbitrarily fast), and a combination of discrete events and continuous plant dynamics. In this paper, we investigate the problem of optimal pesticide spray scheduling. Regulations impose strict requirements on scheduling, e.g., individual pesticides are only effective during certain seasons and pesticides cannot be sprayed too close to harvest time. We show how to translate these requirements to a metric temporal logic formula over the space of schedules. We next use the theory of optimal mode scheduling to generate a schedule that minimizes the risk of various infestations over time while guaranteeing the satisfaction of the constraints. We demonstrate this methodology via simulation with scheduling constraints based on recommendations and regulations from agricultural experts. Our case study considers blueberries, a crop whose cultivation currently involves little automation.
{"title":"Optimal Pesticide Scheduling in Precision Agriculture","authors":"Austin Jones, Usman Ali, M. Egerstedt","doi":"10.1109/ICCPS.2016.7479110","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479110","url":null,"abstract":"Agricultural automation presents challenges typically encountered in the realm of cyber-physical systems, such as incomplete information (plant health indicators), external disturbances (weather), limited control authority (fertilizers cannot make a plant mature arbitrarily fast), and a combination of discrete events and continuous plant dynamics. In this paper, we investigate the problem of optimal pesticide spray scheduling. Regulations impose strict requirements on scheduling, e.g., individual pesticides are only effective during certain seasons and pesticides cannot be sprayed too close to harvest time. We show how to translate these requirements to a metric temporal logic formula over the space of schedules. We next use the theory of optimal mode scheduling to generate a schedule that minimizes the risk of various infestations over time while guaranteeing the satisfaction of the constraints. We demonstrate this methodology via simulation with scheduling constraints based on recommendations and regulations from agricultural experts. Our case study considers blueberries, a crop whose cultivation currently involves little automation.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"1 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83062004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-11DOI: 10.1109/ICCPS.2016.7479128
Subhav Pradhan, A. Dubey, A. Gokhale
Extensible Cyber-Physical Systems (CPS) are loosely connected, multi-domain platforms that "virtualize" their resources to provide an open platform capable of hosting different cyber-physical applications. These cyber- physical platforms are extensible since resources and applications can be added or removed at any time. However, realizing such platform requires resolving challenges emanating from different properties; for this paper, we focus on resilience. Resilience is important for extensible CPS to make sure that extensibility of a system doesn't result in failures and anomalies.
{"title":"WiP Abstract: Platform for Designing and Managing Resilient and Extensible CPS","authors":"Subhav Pradhan, A. Dubey, A. Gokhale","doi":"10.1109/ICCPS.2016.7479128","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479128","url":null,"abstract":"Extensible Cyber-Physical Systems (CPS) are loosely connected, multi-domain platforms that \"virtualize\" their resources to provide an open platform capable of hosting different cyber-physical applications. These cyber- physical platforms are extensible since resources and applications can be added or removed at any time. However, realizing such platform requires resolving challenges emanating from different properties; for this paper, we focus on resilience. Resilience is important for extensible CPS to make sure that extensibility of a system doesn't result in failures and anomalies.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"35 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75453498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-11DOI: 10.1109/ICCPS.2016.7479103
Jiang Wan, A. Lopez, M. A. Faruque
Modern automotive Cyber-Physical Systems (CPSs) are increasingly adopting wireless communications for Intra-Vehicular, Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) protocols as a promising solution for challenges such as the wire harnessing problem, collision detection, and collision avoidance. Regrettably, this new trend results in new security vulnerabilities that can put the safety and privacy of the automotive CPS and passengers at great risk. In addition, automotive wireless communication security is constrained by strict energy and performance limitations of Electronic Controller Units (ECUs) and sensor nodes. As a result, the key generation and management for secure automotive CPS wireless communication is an open research challenge. This paper aims to help solve these security challenges by presenting a practical key generation technique based on the reciprocity and high spatial and temporal variation properties of the automotive wireless communication channel. To validate the practicality and effectiveness of our approach, we have conducted separate real- world experiments with automobiles and with RC cars. Lastly, we demonstrate through simulations that we can generate keys with high security strength (keys with 67% min-entropy) with up to 10X improvement in performance and 20X reduction in code size overhead in comparison to the state- of-the-art security techniques.
{"title":"Exploiting Wireless Channel Randomness to Generate Keys for Automotive Cyber-Physical System Security","authors":"Jiang Wan, A. Lopez, M. A. Faruque","doi":"10.1109/ICCPS.2016.7479103","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479103","url":null,"abstract":"Modern automotive Cyber-Physical Systems (CPSs) are increasingly adopting wireless communications for Intra-Vehicular, Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) protocols as a promising solution for challenges such as the wire harnessing problem, collision detection, and collision avoidance. Regrettably, this new trend results in new security vulnerabilities that can put the safety and privacy of the automotive CPS and passengers at great risk. In addition, automotive wireless communication security is constrained by strict energy and performance limitations of Electronic Controller Units (ECUs) and sensor nodes. As a result, the key generation and management for secure automotive CPS wireless communication is an open research challenge. This paper aims to help solve these security challenges by presenting a practical key generation technique based on the reciprocity and high spatial and temporal variation properties of the automotive wireless communication channel. To validate the practicality and effectiveness of our approach, we have conducted separate real- world experiments with automobiles and with RC cars. Lastly, we demonstrate through simulations that we can generate keys with high security strength (keys with 67% min-entropy) with up to 10X improvement in performance and 20X reduction in code size overhead in comparison to the state- of-the-art security techniques.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"16 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73223044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-11DOI: 10.1109/ICCPS.2016.7479126
Masaki Igarashi, Atsushi Shimada, H. Nagahara, R. Taniguchi
We propose a method for forecasting power demand based on action plan declaration. Conventional method uses sensing data such as time series of power consumption and weather information and fails to forecast power demand due to unstable user behavior. By using action plan declared by user, meanwhile, we achieve rough forecasting of power demand.
{"title":"WiP Abstract: Human-Assisted Power Demand Forecasting Based on Action Plan Declaration","authors":"Masaki Igarashi, Atsushi Shimada, H. Nagahara, R. Taniguchi","doi":"10.1109/ICCPS.2016.7479126","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479126","url":null,"abstract":"We propose a method for forecasting power demand based on action plan declaration. Conventional method uses sensing data such as time series of power consumption and weather information and fails to forecast power demand due to unstable user behavior. By using action plan declared by user, meanwhile, we achieve rough forecasting of power demand.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"1 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84158507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-11DOI: 10.1109/ICCPS.2016.7479098
Mohamed Abdur Rahman, Akhlaq Ahmad
In this demo we will present a suite of smartphone applications that support location-aware, personalized multimedia services to a very large crowd with the help of a cyber computing infrastructure. As a proof of concept, we target Hajj where more than 5 million pilgrims perform spatio-temporal activities. The cyber-physical system creates an ad-hoc social network among pilgrims, their family members, Hajj authorities, vehicles that provide services to the pilgrims, medical doctors and hospitals, and the city admins. The crowdsourced multimedia data from the suite of smartphone applications are captured by the cyber environment, processed to extract context information, sent to a cloud environment for real-time query processing, and finally shared with a very large crowd. The framework has been deployed since 2014.
{"title":"Demo Abstract: HajjCPS - A Cyber Physical Environment for Providing Location-Aware Services to a Very Large Crowd","authors":"Mohamed Abdur Rahman, Akhlaq Ahmad","doi":"10.1109/ICCPS.2016.7479098","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479098","url":null,"abstract":"In this demo we will present a suite of smartphone applications that support location-aware, personalized multimedia services to a very large crowd with the help of a cyber computing infrastructure. As a proof of concept, we target Hajj where more than 5 million pilgrims perform spatio-temporal activities. The cyber-physical system creates an ad-hoc social network among pilgrims, their family members, Hajj authorities, vehicles that provide services to the pilgrims, medical doctors and hospitals, and the city admins. The crowdsourced multimedia data from the suite of smartphone applications are captured by the cyber environment, processed to extract context information, sent to a cloud environment for real-time query processing, and finally shared with a very large crowd. The framework has been deployed since 2014.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"10 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90986049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-11DOI: 10.1109/ICCPS.2016.7479132
Chenyang Yuan, Jérôme Thai, A. Bayen
The vulnerability of Mobility-as-a-Service (MaaS) systems to Denial-of-Service (DoS) attacks is studied. We use a queuing-theoretical framework to model the re-dispatch process used by operators to maintain a high service availability, as well as potential cyber-attacks on this process. It encompasses a customer arrival rate model at different sections of an urban area to pick up vehicles traveling within the network. Expanding this re-balance model, we analyze DoS cyber-attacks of MaaS systems by controlling a fraction of the cars maliciously through fake reservations (so called Zombies) placed in the system (similar to the computer science field where a Zombie is a computer that a remote attacker has accessed for malicious purpose). The attacker can then use the block-coordinate descent algorithm proposed in the present work to derive optimal strategies to minimize the efficiency of the MaaS system, thereby allowing us to quantify the economic loss of such systems under attack. The technique is shown to work well and enables us to arbitrarily deplete taxi availabilities based on the attacker's choice and the radius of attacks, which is demonstrated by drawing a "Cal" logo in Manhattan. Finally, a cost-benefit analysis using data from 75 million taxi trips shows diminishing returns for the attacker and that countermeasures raising the attack cost to more than $15 could protect MaaS systems in NYC from Zombies.
{"title":"ZUbers against ZLyfts Apocalypse: An Analysis Framework for DoS Attacks on Mobility-As-A-Service Systems","authors":"Chenyang Yuan, Jérôme Thai, A. Bayen","doi":"10.1109/ICCPS.2016.7479132","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479132","url":null,"abstract":"The vulnerability of Mobility-as-a-Service (MaaS) systems to Denial-of-Service (DoS) attacks is studied. We use a queuing-theoretical framework to model the re-dispatch process used by operators to maintain a high service availability, as well as potential cyber-attacks on this process. It encompasses a customer arrival rate model at different sections of an urban area to pick up vehicles traveling within the network. Expanding this re-balance model, we analyze DoS cyber-attacks of MaaS systems by controlling a fraction of the cars maliciously through fake reservations (so called Zombies) placed in the system (similar to the computer science field where a Zombie is a computer that a remote attacker has accessed for malicious purpose). The attacker can then use the block-coordinate descent algorithm proposed in the present work to derive optimal strategies to minimize the efficiency of the MaaS system, thereby allowing us to quantify the economic loss of such systems under attack. The technique is shown to work well and enables us to arbitrarily deplete taxi availabilities based on the attacker's choice and the radius of attacks, which is demonstrated by drawing a \"Cal\" logo in Manhattan. Finally, a cost-benefit analysis using data from 75 million taxi trips shows diminishing returns for the attacker and that countermeasures raising the attack cost to more than $15 could protect MaaS systems in NYC from Zombies.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"7 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80089473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-11DOI: 10.1109/ICCPS.2016.7479071
Konstantinos Gatsis, Alejandro Ribeiro, George J. Pappas
In modern control applications multiple wireless sensors need to efficiently share the available wireless medium to communicate with their respective actuators. Random access policies, where each sensor independently decides whether to access the shared wireless medium, are attractive as they do not require central coordination. However interference between simultaneous transmissions causes transmitted packets to collide, leading to control performance degradation or potentially instability. Given plant and controller dynamics, we derive a sufficient condition for the access policy employed by each sensor so that wireless interference does not violate stability of any involved control loop. Based on this decoupling condition we design random access communication policies that are control-aware by adapting to the physical plant states measured by the sensors online. The control performance of our design is illustrated in numerical simulations.
{"title":"Control-Aware Random Access Communication","authors":"Konstantinos Gatsis, Alejandro Ribeiro, George J. Pappas","doi":"10.1109/ICCPS.2016.7479071","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479071","url":null,"abstract":"In modern control applications multiple wireless sensors need to efficiently share the available wireless medium to communicate with their respective actuators. Random access policies, where each sensor independently decides whether to access the shared wireless medium, are attractive as they do not require central coordination. However interference between simultaneous transmissions causes transmitted packets to collide, leading to control performance degradation or potentially instability. Given plant and controller dynamics, we derive a sufficient condition for the access policy employed by each sensor so that wireless interference does not violate stability of any involved control loop. Based on this decoupling condition we design random access communication policies that are control-aware by adapting to the physical plant states measured by the sensors online. The control performance of our design is illustrated in numerical simulations.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"62 2 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88678686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}