首页 > 最新文献

2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)最新文献

英文 中文
ICCPS '21: ACM/IEEE 12th International Conference on Cyber-Physical Systems, Nashville, Tennessee, USA, May 19-21, 2021 ICCPS '21: ACM/IEEE第12届网络物理系统国际会议,美国田纳西州纳什维尔,2021年5月19-21日
{"title":"ICCPS '21: ACM/IEEE 12th International Conference on Cyber-Physical Systems, Nashville, Tennessee, USA, May 19-21, 2021","authors":"","doi":"10.1145/3450267","DOIUrl":"https://doi.org/10.1145/3450267","url":null,"abstract":"","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79658352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Demo Abstract: SURE: An Experimentation and Evaluation Testbed for CPS Security and Resilience 摘要:SURE: CPS安全性和弹性的实验与评估测试平台
Pub Date : 2016-05-26 DOI: 10.1109/ICCPS.2016.7479099
H. Neema, P. Völgyesi, Bradley Potteiger, W. Emfinger, X. Koutsoukos, G. Karsai, Yevgeniy Vorobeychik, J. Sztipanovits
In-depth consideration and evaluation of security and resilience is necessary for developing the scientific foundations and technology of Cyber-Physical Systems (CPS). In this demonstration, we present SURE [1], a CPS experimentation and evaluation testbed for security and resilience focusing on transportation networks. The testbed includes (1) a heterogeneous modeling and simulation integration platform, (2) a Web-based tool for modeling CPS in adversarial environments, and (3) a framework for evaluating resilience using attacker-defender games. Users such as CPS designers and operators can interact with the testbed to evaluate monitoring and control schemes that include sensor placement and traffic signal configuration.
深入考虑和评估安全性和弹性是发展网络物理系统(CPS)的科学基础和技术所必需的。在本次演示中,我们介绍了SURE[1],这是一个专注于交通网络的安全性和弹性的CPS实验和评估测试平台。该测试平台包括(1)异构建模和仿真集成平台,(2)基于web的对抗环境中CPS建模工具,以及(3)使用攻击防御游戏评估弹性的框架。CPS设计人员和操作员等用户可以与测试平台进行交互,以评估监测和控制方案,包括传感器放置和交通信号配置。
{"title":"Demo Abstract: SURE: An Experimentation and Evaluation Testbed for CPS Security and Resilience","authors":"H. Neema, P. Völgyesi, Bradley Potteiger, W. Emfinger, X. Koutsoukos, G. Karsai, Yevgeniy Vorobeychik, J. Sztipanovits","doi":"10.1109/ICCPS.2016.7479099","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479099","url":null,"abstract":"In-depth consideration and evaluation of security and resilience is necessary for developing the scientific foundations and technology of Cyber-Physical Systems (CPS). In this demonstration, we present SURE [1], a CPS experimentation and evaluation testbed for security and resilience focusing on transportation networks. The testbed includes (1) a heterogeneous modeling and simulation integration platform, (2) a Web-based tool for modeling CPS in adversarial environments, and (3) a framework for evaluating resilience using attacker-defender games. Users such as CPS designers and operators can interact with the testbed to evaluate monitoring and control schemes that include sensor placement and traffic signal configuration.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"9 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80094736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Poster Abstract: Modeling, Simulation and Verification Environment for Engineering Cyber-Physical Systems Based on Discrete Event System Specification 摘要:基于离散事件系统规范的工程信息物理系统建模、仿真与验证环境
Pub Date : 2016-04-11 DOI: 10.1109/ICCPS.2016.7479114
Hae Young Lee, So-Jin Lee
Summary form only given. Discrete event system specification (DEVS), a formalism for modeling and simulation, has been recently applied to the engineering of CPS, which also makes the necessity of model checking for DEVS arisen. Model-transformation-based approaches were first proposed; timed or linear hybrid automata are obtained from DEVS models, and then verified using model checkers. But, due to the different semantics in state transitions, the transformation often involves manual tasks, such as abstraction and approximation. To eliminate such manual tasks, we have proposed a DEVS subclass that is less expressive, but verifiable. For reachability analysis, its models can be interpreted as transition systems and region automata (RA). Although our DEVS subclass and RA have different semantics with respect to model execution, they are equivalent in terms of reachability analysis. Thus, the reachability could be analyzed based on model checking techniques of timed automata. In many DEVS-based environments, models should be developed by programming languages. To enables the modelers to specify CPS in a visual way, we have proposed a visual modeling language based on our subclass. In our language, the behavior and structure of CPS are graphically specified by basic model diagrams and coupled model diagrams, respectively. Based on our subclass and languages, we have implemented a proof-of-concept environment that supports visual modeling of CPS as well as simulation and reachability analysis of the models. To enable the consideration of the hybrid nature and heterogeneity in CPS, DEVS subclasses, languages, verification techniques and environments will be further investigated.
只提供摘要形式。离散事件系统规范(Discrete event system specification, DEVS)作为一种建模和仿真的形式化方法,近年来被应用于CPS工程中,这也使得对离散事件系统规范进行模型检验的必要性产生。首先提出了基于模型转换的方法;从DEVS模型中得到定时或线性混合自动机,然后使用模型检查器进行验证。但是,由于状态转换中的语义不同,转换通常涉及手动任务,例如抽象和近似。为了消除这种手工任务,我们提出了一个DEVS子类,它的表达能力较差,但可验证。对于可达性分析,其模型可以解释为转换系统和区域自动机(RA)。尽管我们的DEVS子类和RA在模型执行方面具有不同的语义,但它们在可达性分析方面是等效的。因此,可以基于时间自动机的模型检验技术对可达性进行分析。在许多基于dev的环境中,模型应该由编程语言开发。为了使建模者能够以可视化的方式指定CPS,我们提出了一种基于子类的可视化建模语言。在我们的语言中,CPS的行为和结构分别由基本模型图和耦合模型图以图形方式指定。基于我们的子类和语言,我们实现了一个概念验证环境,它支持CPS的可视化建模以及模型的仿真和可达性分析。为了考虑到CPS的混合性质和异质性,DEVS子类、语言、验证技术和环境将进一步研究。
{"title":"Poster Abstract: Modeling, Simulation and Verification Environment for Engineering Cyber-Physical Systems Based on Discrete Event System Specification","authors":"Hae Young Lee, So-Jin Lee","doi":"10.1109/ICCPS.2016.7479114","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479114","url":null,"abstract":"Summary form only given. Discrete event system specification (DEVS), a formalism for modeling and simulation, has been recently applied to the engineering of CPS, which also makes the necessity of model checking for DEVS arisen. Model-transformation-based approaches were first proposed; timed or linear hybrid automata are obtained from DEVS models, and then verified using model checkers. But, due to the different semantics in state transitions, the transformation often involves manual tasks, such as abstraction and approximation. To eliminate such manual tasks, we have proposed a DEVS subclass that is less expressive, but verifiable. For reachability analysis, its models can be interpreted as transition systems and region automata (RA). Although our DEVS subclass and RA have different semantics with respect to model execution, they are equivalent in terms of reachability analysis. Thus, the reachability could be analyzed based on model checking techniques of timed automata. In many DEVS-based environments, models should be developed by programming languages. To enables the modelers to specify CPS in a visual way, we have proposed a visual modeling language based on our subclass. In our language, the behavior and structure of CPS are graphically specified by basic model diagrams and coupled model diagrams, respectively. Based on our subclass and languages, we have implemented a proof-of-concept environment that supports visual modeling of CPS as well as simulation and reachability analysis of the models. To enable the consideration of the hybrid nature and heterogeneity in CPS, DEVS subclasses, languages, verification techniques and environments will be further investigated.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"4 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79520854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal Pesticide Scheduling in Precision Agriculture 精准农业中农药最优调度
Pub Date : 2016-04-11 DOI: 10.1109/ICCPS.2016.7479110
Austin Jones, Usman Ali, M. Egerstedt
Agricultural automation presents challenges typically encountered in the realm of cyber-physical systems, such as incomplete information (plant health indicators), external disturbances (weather), limited control authority (fertilizers cannot make a plant mature arbitrarily fast), and a combination of discrete events and continuous plant dynamics. In this paper, we investigate the problem of optimal pesticide spray scheduling. Regulations impose strict requirements on scheduling, e.g., individual pesticides are only effective during certain seasons and pesticides cannot be sprayed too close to harvest time. We show how to translate these requirements to a metric temporal logic formula over the space of schedules. We next use the theory of optimal mode scheduling to generate a schedule that minimizes the risk of various infestations over time while guaranteeing the satisfaction of the constraints. We demonstrate this methodology via simulation with scheduling constraints based on recommendations and regulations from agricultural experts. Our case study considers blueberries, a crop whose cultivation currently involves little automation.
农业自动化提出了通常在网络物理系统领域遇到的挑战,例如不完整的信息(植物健康指标),外部干扰(天气),有限的控制权限(肥料不能使植物任意快速成熟),以及离散事件和连续植物动态的组合。本文研究了最优农药喷洒调度问题。法规对时间表有严格的要求,例如,个别农药只在某些季节有效,不能太接近收获时间喷洒农药。我们将展示如何将这些需求转换为日程空间上的度量时态逻辑公式。接下来,我们使用最优模式调度理论来生成一个调度计划,该计划可以在保证满足约束的情况下,使各种侵扰的风险随着时间的推移最小化。我们通过基于农业专家的建议和法规的调度约束的仿真来证明这种方法。我们的案例研究以蓝莓为例,这种作物的种植目前几乎没有自动化。
{"title":"Optimal Pesticide Scheduling in Precision Agriculture","authors":"Austin Jones, Usman Ali, M. Egerstedt","doi":"10.1109/ICCPS.2016.7479110","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479110","url":null,"abstract":"Agricultural automation presents challenges typically encountered in the realm of cyber-physical systems, such as incomplete information (plant health indicators), external disturbances (weather), limited control authority (fertilizers cannot make a plant mature arbitrarily fast), and a combination of discrete events and continuous plant dynamics. In this paper, we investigate the problem of optimal pesticide spray scheduling. Regulations impose strict requirements on scheduling, e.g., individual pesticides are only effective during certain seasons and pesticides cannot be sprayed too close to harvest time. We show how to translate these requirements to a metric temporal logic formula over the space of schedules. We next use the theory of optimal mode scheduling to generate a schedule that minimizes the risk of various infestations over time while guaranteeing the satisfaction of the constraints. We demonstrate this methodology via simulation with scheduling constraints based on recommendations and regulations from agricultural experts. Our case study considers blueberries, a crop whose cultivation currently involves little automation.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"1 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83062004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
WiP Abstract: Platform for Designing and Managing Resilient and Extensible CPS 面向弹性可扩展CPS的设计与管理平台
Pub Date : 2016-04-11 DOI: 10.1109/ICCPS.2016.7479128
Subhav Pradhan, A. Dubey, A. Gokhale
Extensible Cyber-Physical Systems (CPS) are loosely connected, multi-domain platforms that "virtualize" their resources to provide an open platform capable of hosting different cyber-physical applications. These cyber- physical platforms are extensible since resources and applications can be added or removed at any time. However, realizing such platform requires resolving challenges emanating from different properties; for this paper, we focus on resilience. Resilience is important for extensible CPS to make sure that extensibility of a system doesn't result in failures and anomalies.
可扩展的网络物理系统(CPS)是松散连接的多域平台,可以“虚拟化”其资源,以提供能够承载不同网络物理应用程序的开放平台。这些网络物理平台是可扩展的,因为资源和应用程序可以随时添加或删除。然而,实现这样的平台需要解决来自不同属性的挑战;在本文中,我们关注的是弹性。弹性对于可扩展的CPS来说非常重要,它可以确保系统的可扩展性不会导致故障和异常。
{"title":"WiP Abstract: Platform for Designing and Managing Resilient and Extensible CPS","authors":"Subhav Pradhan, A. Dubey, A. Gokhale","doi":"10.1109/ICCPS.2016.7479128","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479128","url":null,"abstract":"Extensible Cyber-Physical Systems (CPS) are loosely connected, multi-domain platforms that \"virtualize\" their resources to provide an open platform capable of hosting different cyber-physical applications. These cyber- physical platforms are extensible since resources and applications can be added or removed at any time. However, realizing such platform requires resolving challenges emanating from different properties; for this paper, we focus on resilience. Resilience is important for extensible CPS to make sure that extensibility of a system doesn't result in failures and anomalies.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"35 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75453498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploiting Wireless Channel Randomness to Generate Keys for Automotive Cyber-Physical System Security 利用无线信道随机性生成汽车信息物理系统安全密钥
Pub Date : 2016-04-11 DOI: 10.1109/ICCPS.2016.7479103
Jiang Wan, A. Lopez, M. A. Faruque
Modern automotive Cyber-Physical Systems (CPSs) are increasingly adopting wireless communications for Intra-Vehicular, Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) protocols as a promising solution for challenges such as the wire harnessing problem, collision detection, and collision avoidance. Regrettably, this new trend results in new security vulnerabilities that can put the safety and privacy of the automotive CPS and passengers at great risk. In addition, automotive wireless communication security is constrained by strict energy and performance limitations of Electronic Controller Units (ECUs) and sensor nodes. As a result, the key generation and management for secure automotive CPS wireless communication is an open research challenge. This paper aims to help solve these security challenges by presenting a practical key generation technique based on the reciprocity and high spatial and temporal variation properties of the automotive wireless communication channel. To validate the practicality and effectiveness of our approach, we have conducted separate real- world experiments with automobiles and with RC cars. Lastly, we demonstrate through simulations that we can generate keys with high security strength (keys with 67% min-entropy) with up to 10X improvement in performance and 20X reduction in code size overhead in comparison to the state- of-the-art security techniques.
现代汽车网络物理系统(cps)越来越多地采用车载、车对车(V2V)和车对基础设施(V2I)协议的无线通信,作为解决线束问题、碰撞检测和碰撞避免等挑战的有前途的解决方案。令人遗憾的是,这种新趋势导致了新的安全漏洞,可能使汽车CPS和乘客的安全和隐私面临巨大风险。此外,汽车无线通信的安全性受到电子控制器单元(ecu)和传感器节点严格的能量和性能限制的制约。因此,安全汽车CPS无线通信的密钥生成和管理是一个开放的研究挑战。为了解决这些安全问题,本文提出了一种基于汽车无线通信信道互易性和高时空变化特性的实用密钥生成技术。为了验证我们方法的实用性和有效性,我们用汽车和遥控汽车分别进行了真实世界的实验。最后,我们通过模拟证明,与最先进的安全技术相比,我们可以生成具有高安全强度的密钥(最小熵为67%的密钥),性能提高10倍,代码大小开销减少20倍。
{"title":"Exploiting Wireless Channel Randomness to Generate Keys for Automotive Cyber-Physical System Security","authors":"Jiang Wan, A. Lopez, M. A. Faruque","doi":"10.1109/ICCPS.2016.7479103","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479103","url":null,"abstract":"Modern automotive Cyber-Physical Systems (CPSs) are increasingly adopting wireless communications for Intra-Vehicular, Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) protocols as a promising solution for challenges such as the wire harnessing problem, collision detection, and collision avoidance. Regrettably, this new trend results in new security vulnerabilities that can put the safety and privacy of the automotive CPS and passengers at great risk. In addition, automotive wireless communication security is constrained by strict energy and performance limitations of Electronic Controller Units (ECUs) and sensor nodes. As a result, the key generation and management for secure automotive CPS wireless communication is an open research challenge. This paper aims to help solve these security challenges by presenting a practical key generation technique based on the reciprocity and high spatial and temporal variation properties of the automotive wireless communication channel. To validate the practicality and effectiveness of our approach, we have conducted separate real- world experiments with automobiles and with RC cars. Lastly, we demonstrate through simulations that we can generate keys with high security strength (keys with 67% min-entropy) with up to 10X improvement in performance and 20X reduction in code size overhead in comparison to the state- of-the-art security techniques.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"16 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73223044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
WiP Abstract: Human-Assisted Power Demand Forecasting Based on Action Plan Declaration 摘要:基于行动计划声明的人工辅助电力需求预测
Pub Date : 2016-04-11 DOI: 10.1109/ICCPS.2016.7479126
Masaki Igarashi, Atsushi Shimada, H. Nagahara, R. Taniguchi
We propose a method for forecasting power demand based on action plan declaration. Conventional method uses sensing data such as time series of power consumption and weather information and fails to forecast power demand due to unstable user behavior. By using action plan declared by user, meanwhile, we achieve rough forecasting of power demand.
提出了一种基于行动计划声明的电力需求预测方法。传统的方法利用时间序列的电力消耗和天气信息等传感数据,由于用户行为不稳定,无法预测电力需求。同时利用用户的行动计划,实现对电力需求的粗略预测。
{"title":"WiP Abstract: Human-Assisted Power Demand Forecasting Based on Action Plan Declaration","authors":"Masaki Igarashi, Atsushi Shimada, H. Nagahara, R. Taniguchi","doi":"10.1109/ICCPS.2016.7479126","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479126","url":null,"abstract":"We propose a method for forecasting power demand based on action plan declaration. Conventional method uses sensing data such as time series of power consumption and weather information and fails to forecast power demand due to unstable user behavior. By using action plan declared by user, meanwhile, we achieve rough forecasting of power demand.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"1 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84158507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demo Abstract: HajjCPS - A Cyber Physical Environment for Providing Location-Aware Services to a Very Large Crowd 摘要:HajjCPS——一个为非常大的人群提供位置感知服务的网络物理环境
Pub Date : 2016-04-11 DOI: 10.1109/ICCPS.2016.7479098
Mohamed Abdur Rahman, Akhlaq Ahmad
In this demo we will present a suite of smartphone applications that support location-aware, personalized multimedia services to a very large crowd with the help of a cyber computing infrastructure. As a proof of concept, we target Hajj where more than 5 million pilgrims perform spatio-temporal activities. The cyber-physical system creates an ad-hoc social network among pilgrims, their family members, Hajj authorities, vehicles that provide services to the pilgrims, medical doctors and hospitals, and the city admins. The crowdsourced multimedia data from the suite of smartphone applications are captured by the cyber environment, processed to extract context information, sent to a cloud environment for real-time query processing, and finally shared with a very large crowd. The framework has been deployed since 2014.
在这个演示中,我们将展示一套智能手机应用程序,这些应用程序在网络计算基础设施的帮助下,为非常大的人群提供位置感知、个性化的多媒体服务。作为概念的证明,我们的目标是有500多万朝圣者进行时空活动的朝觐。网络物理系统在朝觐者、他们的家庭成员、朝觐当局、为朝觐者提供服务的车辆、医生和医院以及城市管理人员之间建立了一个特别的社会网络。来自智能手机应用套件的众包多媒体数据被网络环境捕获,处理以提取上下文信息,发送到云环境进行实时查询处理,最后与非常大的人群共享。该框架自2014年开始部署。
{"title":"Demo Abstract: HajjCPS - A Cyber Physical Environment for Providing Location-Aware Services to a Very Large Crowd","authors":"Mohamed Abdur Rahman, Akhlaq Ahmad","doi":"10.1109/ICCPS.2016.7479098","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479098","url":null,"abstract":"In this demo we will present a suite of smartphone applications that support location-aware, personalized multimedia services to a very large crowd with the help of a cyber computing infrastructure. As a proof of concept, we target Hajj where more than 5 million pilgrims perform spatio-temporal activities. The cyber-physical system creates an ad-hoc social network among pilgrims, their family members, Hajj authorities, vehicles that provide services to the pilgrims, medical doctors and hospitals, and the city admins. The crowdsourced multimedia data from the suite of smartphone applications are captured by the cyber environment, processed to extract context information, sent to a cloud environment for real-time query processing, and finally shared with a very large crowd. The framework has been deployed since 2014.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"10 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90986049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ZUbers against ZLyfts Apocalypse: An Analysis Framework for DoS Attacks on Mobility-As-A-Service Systems ZUbers对抗ZLyfts启示:移动即服务系统DoS攻击的分析框架
Pub Date : 2016-04-11 DOI: 10.1109/ICCPS.2016.7479132
Chenyang Yuan, Jérôme Thai, A. Bayen
The vulnerability of Mobility-as-a-Service (MaaS) systems to Denial-of-Service (DoS) attacks is studied. We use a queuing-theoretical framework to model the re-dispatch process used by operators to maintain a high service availability, as well as potential cyber-attacks on this process. It encompasses a customer arrival rate model at different sections of an urban area to pick up vehicles traveling within the network. Expanding this re-balance model, we analyze DoS cyber-attacks of MaaS systems by controlling a fraction of the cars maliciously through fake reservations (so called Zombies) placed in the system (similar to the computer science field where a Zombie is a computer that a remote attacker has accessed for malicious purpose). The attacker can then use the block-coordinate descent algorithm proposed in the present work to derive optimal strategies to minimize the efficiency of the MaaS system, thereby allowing us to quantify the economic loss of such systems under attack. The technique is shown to work well and enables us to arbitrarily deplete taxi availabilities based on the attacker's choice and the radius of attacks, which is demonstrated by drawing a "Cal" logo in Manhattan. Finally, a cost-benefit analysis using data from 75 million taxi trips shows diminishing returns for the attacker and that countermeasures raising the attack cost to more than $15 could protect MaaS systems in NYC from Zombies.
研究了移动即服务(MaaS)系统在DoS攻击下的脆弱性。我们使用排队理论框架来模拟运营商用于维持高服务可用性的重新调度过程,以及对该过程的潜在网络攻击。它包含了一个客户到达率模型,在一个城市地区的不同部分,以挑选在网络内行驶的车辆。扩展这个重新平衡模型,我们通过放置在系统中的假预订(所谓的僵尸)恶意控制一小部分汽车来分析MaaS系统的DoS网络攻击(类似于计算机科学领域,僵尸是远程攻击者出于恶意目的访问的计算机)。然后,攻击者可以使用本工作中提出的块坐标下降算法来推导最优策略,以最大限度地降低MaaS系统的效率,从而使我们能够量化攻击下此类系统的经济损失。该技术被证明工作良好,使我们能够根据攻击者的选择和攻击半径任意耗尽出租车可用性,这是通过在曼哈顿绘制“Cal”标志来证明的。最后,使用7500万次出租车行程数据进行的成本效益分析显示,攻击者的收益递减,而将攻击成本提高到15美元以上的对策可以保护纽约市的MaaS系统免受僵尸攻击。
{"title":"ZUbers against ZLyfts Apocalypse: An Analysis Framework for DoS Attacks on Mobility-As-A-Service Systems","authors":"Chenyang Yuan, Jérôme Thai, A. Bayen","doi":"10.1109/ICCPS.2016.7479132","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479132","url":null,"abstract":"The vulnerability of Mobility-as-a-Service (MaaS) systems to Denial-of-Service (DoS) attacks is studied. We use a queuing-theoretical framework to model the re-dispatch process used by operators to maintain a high service availability, as well as potential cyber-attacks on this process. It encompasses a customer arrival rate model at different sections of an urban area to pick up vehicles traveling within the network. Expanding this re-balance model, we analyze DoS cyber-attacks of MaaS systems by controlling a fraction of the cars maliciously through fake reservations (so called Zombies) placed in the system (similar to the computer science field where a Zombie is a computer that a remote attacker has accessed for malicious purpose). The attacker can then use the block-coordinate descent algorithm proposed in the present work to derive optimal strategies to minimize the efficiency of the MaaS system, thereby allowing us to quantify the economic loss of such systems under attack. The technique is shown to work well and enables us to arbitrarily deplete taxi availabilities based on the attacker's choice and the radius of attacks, which is demonstrated by drawing a \"Cal\" logo in Manhattan. Finally, a cost-benefit analysis using data from 75 million taxi trips shows diminishing returns for the attacker and that countermeasures raising the attack cost to more than $15 could protect MaaS systems in NYC from Zombies.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"7 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80089473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Control-Aware Random Access Communication 控制感知随机存取通信
Pub Date : 2016-04-11 DOI: 10.1109/ICCPS.2016.7479071
Konstantinos Gatsis, Alejandro Ribeiro, George J. Pappas
In modern control applications multiple wireless sensors need to efficiently share the available wireless medium to communicate with their respective actuators. Random access policies, where each sensor independently decides whether to access the shared wireless medium, are attractive as they do not require central coordination. However interference between simultaneous transmissions causes transmitted packets to collide, leading to control performance degradation or potentially instability. Given plant and controller dynamics, we derive a sufficient condition for the access policy employed by each sensor so that wireless interference does not violate stability of any involved control loop. Based on this decoupling condition we design random access communication policies that are control-aware by adapting to the physical plant states measured by the sensors online. The control performance of our design is illustrated in numerical simulations.
在现代控制应用中,多个无线传感器需要有效地共享可用的无线介质,以便与各自的执行器进行通信。随机访问策略,其中每个传感器独立决定是否访问共享无线媒体,是有吸引力的,因为它们不需要中央协调。但是,同时传输之间的干扰会导致传输的数据包发生碰撞,从而导致控制性能下降或潜在的不稳定。在给定对象和控制器的动态情况下,我们推导了每个传感器所采用的访问策略的充分条件,使无线干扰不破坏任何相关控制回路的稳定性。基于这种解耦条件,我们通过适应传感器在线测量的物理设备状态,设计了具有控制感知的随机访问通信策略。数值仿真表明了我们设计的控制性能。
{"title":"Control-Aware Random Access Communication","authors":"Konstantinos Gatsis, Alejandro Ribeiro, George J. Pappas","doi":"10.1109/ICCPS.2016.7479071","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479071","url":null,"abstract":"In modern control applications multiple wireless sensors need to efficiently share the available wireless medium to communicate with their respective actuators. Random access policies, where each sensor independently decides whether to access the shared wireless medium, are attractive as they do not require central coordination. However interference between simultaneous transmissions causes transmitted packets to collide, leading to control performance degradation or potentially instability. Given plant and controller dynamics, we derive a sufficient condition for the access policy employed by each sensor so that wireless interference does not violate stability of any involved control loop. Based on this decoupling condition we design random access communication policies that are control-aware by adapting to the physical plant states measured by the sensors online. The control performance of our design is illustrated in numerical simulations.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"62 2 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88678686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
期刊
2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1