Alessandro Brighente, M. Conti, Denis Donadel, F. Turrin
Electric Vehicles (EVs) represent a green alternative to traditional fuel-powered vehicles. To enforce their widespread use, both the technical development and the security of users shall be guaranteed. Users’ privacy represents a possible threat that impairs the adoption of EVs. In particular, recent works showed the feasibility of identifying EVs based on the current exchanged during the charging phase. In fact, while the resource negotiation phase runs over secure communication protocols, the signal exchanged during the actual charging contains features peculiar to each EV. In what is commonly known as profiling, a suitable feature extractor can associate such features to each EV. In this paper, we propose EVScout2.0, an extended and improved version of our previously proposed framework to profile EVs based on their charging behavior. By exploiting the current and pilot signals exchanged during the charging phase, our scheme can extract features peculiar for each EV, hence allowing their profiling. We implemented and tested EVScout2.0 over a set of real-world measurements considering over 7500 charging sessions from a total of 137 EVs. In particular, numerical results show the superiority of EVScout2.0 with respect to the previous version. EVScout2.0 can profile EVs, attaining a maximum of 0.88 for both recall and precision scores in the case of a balanced dataset. To the best of the authors’ knowledge, these results set a new benchmark for upcoming privacy research for large datasets of EVs.
{"title":"EVScout2.0: Electric Vehicle Profiling Through Charging Profile","authors":"Alessandro Brighente, M. Conti, Denis Donadel, F. Turrin","doi":"10.1145/3565268","DOIUrl":"https://doi.org/10.1145/3565268","url":null,"abstract":"Electric Vehicles (EVs) represent a green alternative to traditional fuel-powered vehicles. To enforce their widespread use, both the technical development and the security of users shall be guaranteed. Users’ privacy represents a possible threat that impairs the adoption of EVs. In particular, recent works showed the feasibility of identifying EVs based on the current exchanged during the charging phase. In fact, while the resource negotiation phase runs over secure communication protocols, the signal exchanged during the actual charging contains features peculiar to each EV. In what is commonly known as profiling, a suitable feature extractor can associate such features to each EV. In this paper, we propose EVScout2.0, an extended and improved version of our previously proposed framework to profile EVs based on their charging behavior. By exploiting the current and pilot signals exchanged during the charging phase, our scheme can extract features peculiar for each EV, hence allowing their profiling. We implemented and tested EVScout2.0 over a set of real-world measurements considering over 7500 charging sessions from a total of 137 EVs. In particular, numerical results show the superiority of EVScout2.0 with respect to the previous version. EVScout2.0 can profile EVs, attaining a maximum of 0.88 for both recall and precision scores in the case of a balanced dataset. To the best of the authors’ knowledge, these results set a new benchmark for upcoming privacy research for large datasets of EVs.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"1 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47795077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiachen Mao, Huanrui Yang, Ang Li, H. Li, Yiran Chen
The invention of Transformer model structure boosts the performance of Neural Machine Translation (NMT) tasks to an unprecedented level. Many previous works have been done to make the Transformer model more execution-friendly on resource-constrained platforms. These researches can be categorized into three key fields: Model Pruning, Transfer Learning, and Efficient Transformer Variants. The family of model pruning methods are popular for their simplicity in practice and promising compression rate and have achieved great success in the field of convolution neural networks (CNNs) for many vision tasks. Nonetheless, previous Transformer pruning works did not perform a thorough model analysis and evaluation on each Transformer component on off-the-shelf mobile devices. In this work, we analyze and prune transformer models at the line-wise granularity and also implement our pruning method on real mobile platforms. We explore the properties of all Transformer components as well as their sparsity features, which are leveraged to guide Transformer model pruning. We name our whole Transformer analysis and pruning pipeline as TPrune. In TPrune, we first propose Block-wise Structured Sparsity Learning (BSSL) to analyze Transformer model property. Then, based on the characters derived from BSSL, we apply Structured Hoyer Square (SHS) to derive the final pruned models. Comparing with the state-of-the-art Transformer pruning methods, TPrune is able to achieve a higher model compression rate with less performance degradation. Experimental results show that our pruned models achieve 1.16×–1.92× speedup on mobile devices with 0%–8% BLEU score degradation compared with the original Transformer model.
{"title":"TPrune","authors":"Jiachen Mao, Huanrui Yang, Ang Li, H. Li, Yiran Chen","doi":"10.1145/3446640","DOIUrl":"https://doi.org/10.1145/3446640","url":null,"abstract":"The invention of Transformer model structure boosts the performance of Neural Machine Translation (NMT) tasks to an unprecedented level. Many previous works have been done to make the Transformer model more execution-friendly on resource-constrained platforms. These researches can be categorized into three key fields: Model Pruning, Transfer Learning, and Efficient Transformer Variants. The family of model pruning methods are popular for their simplicity in practice and promising compression rate and have achieved great success in the field of convolution neural networks (CNNs) for many vision tasks. Nonetheless, previous Transformer pruning works did not perform a thorough model analysis and evaluation on each Transformer component on off-the-shelf mobile devices. In this work, we analyze and prune transformer models at the line-wise granularity and also implement our pruning method on real mobile platforms. We explore the properties of all Transformer components as well as their sparsity features, which are leveraged to guide Transformer model pruning. We name our whole Transformer analysis and pruning pipeline as TPrune. In TPrune, we first propose Block-wise Structured Sparsity Learning (BSSL) to analyze Transformer model property. Then, based on the characters derived from BSSL, we apply Structured Hoyer Square (SHS) to derive the final pruned models. Comparing with the state-of-the-art Transformer pruning methods, TPrune is able to achieve a higher model compression rate with less performance degradation. Experimental results show that our pruned models achieve 1.16×–1.92× speedup on mobile devices with 0%–8% BLEU score degradation compared with the original Transformer model.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"13 1","pages":"1 - 22"},"PeriodicalIF":2.3,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3446640","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64037610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kai Li, N. Lu, Jingjing Zheng, Pei Zhang, Wei Ni, E. Tovar
Thanks to flexible deployment and excellent maneuverability, autonomous drones have been recently considered as an effective means to act as aerial data relays for wireless ground devices with limited or no cellular infrastructure, e.g., smart farming in a remote area. Due to the broadcast nature of wireless channels, data communications between the drones and the ground devices are vulnerable to eavesdropping attacks. This article develops BloothAir, which is a secure multi-hop aerial relay system based on Bluetooth Low Energy (BLE) connected autonomous drones. For encrypting the BLE communications in BloothAir, a channel-based secret key generation is proposed, where received signal strength at the drones and the ground devices is quantized to generate the secret keys. Moreover, a dynamic programming-based channel quantization scheme is studied to minimize the secret key bit mismatch rate of the drones and the ground devices by recursively adjusting the quantization intervals. To validate the design of BloothAir, we build a multi-hop aerial relay testbed by using the MX400 drone platform and the Gust radio transceiver, which is a new lightweight onboard BLE communicator specially developed for the drone. Extensive real-world experiments demonstrate that the BloothAir system achieves a significantly lower secret key bit mismatch rate than the key generation benchmarks, which use the static quantization intervals. In addition, the high randomness of the generated secret keys is verified by the standard NIST test, thereby effectively protecting the BLE communications in BloothAir from the eavesdropping attacks.
{"title":"BloothAir","authors":"Kai Li, N. Lu, Jingjing Zheng, Pei Zhang, Wei Ni, E. Tovar","doi":"10.1145/3448254","DOIUrl":"https://doi.org/10.1145/3448254","url":null,"abstract":"Thanks to flexible deployment and excellent maneuverability, autonomous drones have been recently considered as an effective means to act as aerial data relays for wireless ground devices with limited or no cellular infrastructure, e.g., smart farming in a remote area. Due to the broadcast nature of wireless channels, data communications between the drones and the ground devices are vulnerable to eavesdropping attacks. This article develops BloothAir, which is a secure multi-hop aerial relay system based on Bluetooth Low Energy (BLE) connected autonomous drones. For encrypting the BLE communications in BloothAir, a channel-based secret key generation is proposed, where received signal strength at the drones and the ground devices is quantized to generate the secret keys. Moreover, a dynamic programming-based channel quantization scheme is studied to minimize the secret key bit mismatch rate of the drones and the ground devices by recursively adjusting the quantization intervals. To validate the design of BloothAir, we build a multi-hop aerial relay testbed by using the MX400 drone platform and the Gust radio transceiver, which is a new lightweight onboard BLE communicator specially developed for the drone. Extensive real-world experiments demonstrate that the BloothAir system achieves a significantly lower secret key bit mismatch rate than the key generation benchmarks, which use the static quantization intervals. In addition, the high randomness of the generated secret keys is verified by the standard NIST test, thereby effectively protecting the BLE communications in BloothAir from the eavesdropping attacks.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"4 1","pages":"1 - 22"},"PeriodicalIF":2.3,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90655146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pierre-François Gimenez, Jonathan Roux, E. Alata, G. Auriol, M. Kaâniche, V. Nicomette
The expansion of the Internet-of-Things (IoT) market is visible in homes, factories, public places, and smart cities. While the massive deployment of connected devices offers opportunities to improve quality of life and to develop new services, the impact of such devices on the security of the users in a context where the level of malicious threat continues to increase is a major concern. One of the challenges is the heterogeneity and constant evolution of wireless technologies and protocols used. To overcome this problem, we propose RIDS, a Radio Intrusion Detection System that is based on the monitoring and profiling of radio communications at the physical layer level using autoencoder neural networks. RIDS is independent of the wireless protocols and modulation technologies used. Besides, it is designed to provide a threefold diagnosis of the detected anomalies: temporal (start and end date of the detected anomaly), frequential (main frequency of the anomaly), and spatial (location of the origin of the anomaly). To demonstrate the relevance and the efficiency of our approach, we collected a large dataset of radio-communications recorded with three different probes deployed in an experimental room. Multiple real-world attacks involving a wide variety of communication technologies are also injected to assess the detection and diagnosis efficiency. The results demonstrate the efficiency of RIDS in detecting and diagnosing anomalies that occurred in the 400–500 Mhz and 800–900 Mhz frequency bands. It is noteworthy that compromised devices and attacks using these communication bands are generally not easily covered by traditional solutions.
{"title":"RIDS","authors":"Pierre-François Gimenez, Jonathan Roux, E. Alata, G. Auriol, M. Kaâniche, V. Nicomette","doi":"10.1145/3441458","DOIUrl":"https://doi.org/10.1145/3441458","url":null,"abstract":"The expansion of the Internet-of-Things (IoT) market is visible in homes, factories, public places, and smart cities. While the massive deployment of connected devices offers opportunities to improve quality of life and to develop new services, the impact of such devices on the security of the users in a context where the level of malicious threat continues to increase is a major concern. One of the challenges is the heterogeneity and constant evolution of wireless technologies and protocols used. To overcome this problem, we propose RIDS, a Radio Intrusion Detection System that is based on the monitoring and profiling of radio communications at the physical layer level using autoencoder neural networks. RIDS is independent of the wireless protocols and modulation technologies used. Besides, it is designed to provide a threefold diagnosis of the detected anomalies: temporal (start and end date of the detected anomaly), frequential (main frequency of the anomaly), and spatial (location of the origin of the anomaly). To demonstrate the relevance and the efficiency of our approach, we collected a large dataset of radio-communications recorded with three different probes deployed in an experimental room. Multiple real-world attacks involving a wide variety of communication technologies are also injected to assess the detection and diagnosis efficiency. The results demonstrate the efficiency of RIDS in detecting and diagnosing anomalies that occurred in the 400–500 Mhz and 800–900 Mhz frequency bands. It is noteworthy that compromised devices and attacks using these communication bands are generally not easily covered by traditional solutions.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"13 1","pages":"1 - 1"},"PeriodicalIF":2.3,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81335073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless sensor networks accommodating the mobility of nodes will play important roles in the future. In residential, rehabilitation, and clinical settings, sensor nodes can be attached to the body of a patient for long-term and uninterrupted monitoring of vital biomedical signals. Likewise, in industrial settings, workers as well as mobile robots can carry sensor nodes to augment their perception and to seamlessly interact with their environments. Nevertheless, such applications require reliable communications as well as high throughput. Considering the primary design goals of the sensing platforms (low-power, affordable cost, large-scale deployment, longevity, operating in the ISM band), maintaining reliable links is a formidable challenge. This challenge can partially be alleviated if the nature of link quality fluctuation can be known or estimated on time. Indeed, higher-level protocols such as handover and routing protocols rely on knowledge of link quality fluctuation to seamlessly transfer communication to alternative routes when the quality of existing routes deteriorates. In this article, we present the result of extensive experimental study to characterise link quality fluctuation in mobile environments. The study focuses on slow movements (<5 km h-1) signifying the movement of people and robots and transceivers complying to the IEEE 802.15.4 specification. Hence, we deployed mobile robots that interact with strategically placed stationary relay nodes. Our study considered different types of link quality characterisation metrics that provide complementary and useful insights. To demonstrate the usefulness of our experiments and observations, we implemented a link quality estimation technique using a Kalman Filter. To set up the model, we employed two link quality metrics along with the statistics we established during our experiments. The article will compare the performance of four proposed approaches with ours.
{"title":"Characterization of Link Quality Fluctuation in Mobile Wireless Sensor Networks","authors":"Jianjun Wen, W. Dargie","doi":"10.1145/3448737","DOIUrl":"https://doi.org/10.1145/3448737","url":null,"abstract":"Wireless sensor networks accommodating the mobility of nodes will play important roles in the future. In residential, rehabilitation, and clinical settings, sensor nodes can be attached to the body of a patient for long-term and uninterrupted monitoring of vital biomedical signals. Likewise, in industrial settings, workers as well as mobile robots can carry sensor nodes to augment their perception and to seamlessly interact with their environments. Nevertheless, such applications require reliable communications as well as high throughput. Considering the primary design goals of the sensing platforms (low-power, affordable cost, large-scale deployment, longevity, operating in the ISM band), maintaining reliable links is a formidable challenge. This challenge can partially be alleviated if the nature of link quality fluctuation can be known or estimated on time. Indeed, higher-level protocols such as handover and routing protocols rely on knowledge of link quality fluctuation to seamlessly transfer communication to alternative routes when the quality of existing routes deteriorates. In this article, we present the result of extensive experimental study to characterise link quality fluctuation in mobile environments. The study focuses on slow movements (<5 km h-1) signifying the movement of people and robots and transceivers complying to the IEEE 802.15.4 specification. Hence, we deployed mobile robots that interact with strategically placed stationary relay nodes. Our study considered different types of link quality characterisation metrics that provide complementary and useful insights. To demonstrate the usefulness of our experiments and observations, we implemented a link quality estimation technique using a Kalman Filter. To set up the model, we employed two link quality metrics along with the statistics we established during our experiments. The article will compare the performance of four proposed approaches with ours.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":" ","pages":"1 - 24"},"PeriodicalIF":2.3,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3448737","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45561528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Craig Bakker, Arnab Bhattacharya, S. Chatterjee, D. Vrabie
Increasing connectivity to the Internet for remote monitoring and control has made cyber-physical systems more vulnerable to deliberate attacks; purely cyber attacks can thereby have physical consequences. Long-term, stealthy attacks such as Stuxnet can be described as Advanced Persistent Threats (APTs). Here, we extend our previous work on hypergames and APTs to develop hypergame-based defender strategies that are robust to deception and do not rely on attack detection. These strategies provide provable bounds—and provably optimal bounds—on the attacker payoff. Strategies based on Bayesian priors do not provide such bounds. We then numerically demonstrate our approach on a building control subsystem and discuss next steps in extending this approach toward an operational capability.
{"title":"Metagames and Hypergames for Deception-Robust Control","authors":"Craig Bakker, Arnab Bhattacharya, S. Chatterjee, D. Vrabie","doi":"10.1145/3439430","DOIUrl":"https://doi.org/10.1145/3439430","url":null,"abstract":"Increasing connectivity to the Internet for remote monitoring and control has made cyber-physical systems more vulnerable to deliberate attacks; purely cyber attacks can thereby have physical consequences. Long-term, stealthy attacks such as Stuxnet can be described as Advanced Persistent Threats (APTs). Here, we extend our previous work on hypergames and APTs to develop hypergame-based defender strategies that are robust to deception and do not rely on attack detection. These strategies provide provable bounds—and provably optimal bounds—on the attacker payoff. Strategies based on Bayesian priors do not provide such bounds. We then numerically demonstrate our approach on a building control subsystem and discuss next steps in extending this approach toward an operational capability.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"5 1","pages":"1 - 25"},"PeriodicalIF":2.3,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3439430","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44719075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this article, we focus on inferring high-level descriptions of a system from its execution traces. Specifically, we consider a classification problem where system behaviors are described using formulae of Signal Temporal Logic (STL). Given a finite set of pairs of system traces and labels, where each label indicates whether the corresponding trace exhibits some system property, we devised a decision-tree-based framework that outputs an STL formula that can distinguish the traces. We also extend this approach to the online learning scenario. In this setting, it is assumed that new signals may arrive over time and the previously inferred formula should be updated to accommodate the new data. The proposed approach presents some advantages over traditional machine learning classifiers. In particular, the produced formulae are interpretable and can be used in other phases of the system’s operation, such as monitoring and control. We present two case studies to illustrate the effectiveness of the proposed algorithms: (1) a fault detection problem in an automotive system and (2) an anomaly detection problem in a maritime environment.
{"title":"Offline and Online Learning of Signal Temporal Logic Formulae Using Decision Trees","authors":"Giuseppe Bombara, C. Belta","doi":"10.1145/3433994","DOIUrl":"https://doi.org/10.1145/3433994","url":null,"abstract":"In this article, we focus on inferring high-level descriptions of a system from its execution traces. Specifically, we consider a classification problem where system behaviors are described using formulae of Signal Temporal Logic (STL). Given a finite set of pairs of system traces and labels, where each label indicates whether the corresponding trace exhibits some system property, we devised a decision-tree-based framework that outputs an STL formula that can distinguish the traces. We also extend this approach to the online learning scenario. In this setting, it is assumed that new signals may arrive over time and the previously inferred formula should be updated to accommodate the new data. The proposed approach presents some advantages over traditional machine learning classifiers. In particular, the produced formulae are interpretable and can be used in other phases of the system’s operation, such as monitoring and control. We present two case studies to illustrate the effectiveness of the proposed algorithms: (1) a fault detection problem in an automotive system and (2) an anomaly detection problem in a maritime environment.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"5 1","pages":"1 - 23"},"PeriodicalIF":2.3,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3433994","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43707011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For many Cyber-Physical Systems (CPS), timing is crucial for safety, security, and responsiveness of the system behavior. Time is key to enabling coordinated actions among the many, often heavily distributed, components of a CPS. For example, in power systems, the time of all phasor measurement units (PMUs) is synchronized via GPS signals, because otherwise aligning data from various distributed PMUs will become impossible, rendering state estimates wrong and unusable. With the increasing connectivity in modern CPS, requirements on timing accuracy and synchronization are evolving, ranging from tight, picosecond synchronization accuracy in power systems to high precision and accuracy requirements for wireless and low-power networks. Smart cities and connected vehicles pose new technological challenges and timing properties play an important role for coordination and security. Despite the importance of time in CPS, there are significant gaps in specifying, reasoning about, verifying, and testing the timing behavior of systems. In practice, timing in CPS is often an afterthought in the development process. While experienced domain experts might understand the desired timing behavior of the CPS, they often do not have a standardized, formal way of describing the timing requirements, let alone incorporating timing properties as part of the design. Even if a design is accompanied with well-defined timing requirements, it is difficult to verify whether a given design satisfies those requirements. The article in this special issue address challenges ranging from specifying, modeling, and verifying time in CPS in various application domains, including automotive control, communication, and manufacturing. • In their work on “Composable Finite State Machine–based Modeling for Quality-ofInformation-Aware Cyber-physical Systems,” Rafael Rosales and Michael Paulitsch present a model-based design methodology and introduce composable design patterns to address the following Quality-of-Information properties: timeliness, correctness, completeness, consistency, and accuracy. By specifying and composing behaviors using extended finite state machines, reuse and robustness are increased and dynamic validation and optimization of functional and nonfunctional properties is enabled. • The article “System-level Logical Execution Time: Augmenting the Logical Execution Time Paradigm for Distributed Real-time Automotive Software,” by Kai-Björn Gemlau, Leonie Köhler, Rolf Ernst, and Sophie Quinton, apply the well-known logical execution time paradigm, which abstracts away notoriously hard-to-characterize and often non-deterministic physical execution times, not just to a single component but also in a systemwide context. By explicitly acknowledging the fact that communication times are not negligible and cannot be abstracted way, the work addresses challenges in the design and verification of complex automotive systems, such as predictability, synchronization, composability,
{"title":"Introduction to the Special Issue on Time for CPS (TCPS)","authors":"Aviral Shrivastava, P. Derler","doi":"10.1145/3433948","DOIUrl":"https://doi.org/10.1145/3433948","url":null,"abstract":"For many Cyber-Physical Systems (CPS), timing is crucial for safety, security, and responsiveness of the system behavior. Time is key to enabling coordinated actions among the many, often heavily distributed, components of a CPS. For example, in power systems, the time of all phasor measurement units (PMUs) is synchronized via GPS signals, because otherwise aligning data from various distributed PMUs will become impossible, rendering state estimates wrong and unusable. With the increasing connectivity in modern CPS, requirements on timing accuracy and synchronization are evolving, ranging from tight, picosecond synchronization accuracy in power systems to high precision and accuracy requirements for wireless and low-power networks. Smart cities and connected vehicles pose new technological challenges and timing properties play an important role for coordination and security. Despite the importance of time in CPS, there are significant gaps in specifying, reasoning about, verifying, and testing the timing behavior of systems. In practice, timing in CPS is often an afterthought in the development process. While experienced domain experts might understand the desired timing behavior of the CPS, they often do not have a standardized, formal way of describing the timing requirements, let alone incorporating timing properties as part of the design. Even if a design is accompanied with well-defined timing requirements, it is difficult to verify whether a given design satisfies those requirements. The article in this special issue address challenges ranging from specifying, modeling, and verifying time in CPS in various application domains, including automotive control, communication, and manufacturing. • In their work on “Composable Finite State Machine–based Modeling for Quality-ofInformation-Aware Cyber-physical Systems,” Rafael Rosales and Michael Paulitsch present a model-based design methodology and introduce composable design patterns to address the following Quality-of-Information properties: timeliness, correctness, completeness, consistency, and accuracy. By specifying and composing behaviors using extended finite state machines, reuse and robustness are increased and dynamic validation and optimization of functional and nonfunctional properties is enabled. • The article “System-level Logical Execution Time: Augmenting the Logical Execution Time Paradigm for Distributed Real-time Automotive Software,” by Kai-Björn Gemlau, Leonie Köhler, Rolf Ernst, and Sophie Quinton, apply the well-known logical execution time paradigm, which abstracts away notoriously hard-to-characterize and often non-deterministic physical execution times, not just to a single component but also in a systemwide context. By explicitly acknowledging the fact that communication times are not negligible and cannot be abstracted way, the work addresses challenges in the design and verification of complex automotive systems, such as predictability, synchronization, composability,","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":" ","pages":"1 - 2"},"PeriodicalIF":2.3,"publicationDate":"2021-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3433948","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47093143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shili Sheng, Erfan Pakdamanian, Kyungtae Han, Ziran Wang, John K. Lenneman, David Parker, Lu Feng
Recent work has considered personalized route planning based on user profiles, but none of it accounts for human trust. We argue that human trust is an important factor to consider when planning routes for automated vehicles. This article presents a trust-based route-planning approach for automated vehicles. We formalize the human-vehicle interaction as a partially observable Markov decision process (POMDP) and model trust as a partially observable state variable of the POMDP, representing the human’s hidden mental state. We build data-driven models of human trust dynamics and takeover decisions, which are incorporated in the POMDP framework, using data collected from an online user study with 100 participants on the Amazon Mechanical Turk platform. We compute optimal routes for automated vehicles by solving optimal policies in the POMDP planning and evaluate the resulting routes via human subject experiments with 22 participants on a driving simulator. The experimental results show that participants taking the trust-based route generally reported more positive responses in the after-driving survey than those taking the baseline (trust-free) route. In addition, we analyze the trade-offs between multiple planning objectives (e.g., trust, distance, energy consumption) via multi-objective optimization of the POMDP. We also identify a set of open issues and implications for real-world deployment of the proposed approach in automated vehicles.
{"title":"Planning for Automated Vehicles with Human Trust","authors":"Shili Sheng, Erfan Pakdamanian, Kyungtae Han, Ziran Wang, John K. Lenneman, David Parker, Lu Feng","doi":"10.1145/3561059","DOIUrl":"https://doi.org/10.1145/3561059","url":null,"abstract":"Recent work has considered personalized route planning based on user profiles, but none of it accounts for human trust. We argue that human trust is an important factor to consider when planning routes for automated vehicles. This article presents a trust-based route-planning approach for automated vehicles. We formalize the human-vehicle interaction as a partially observable Markov decision process (POMDP) and model trust as a partially observable state variable of the POMDP, representing the human’s hidden mental state. We build data-driven models of human trust dynamics and takeover decisions, which are incorporated in the POMDP framework, using data collected from an online user study with 100 participants on the Amazon Mechanical Turk platform. We compute optimal routes for automated vehicles by solving optimal policies in the POMDP planning and evaluate the resulting routes via human subject experiments with 22 participants on a driving simulator. The experimental results show that participants taking the trust-based route generally reported more positive responses in the after-driving survey than those taking the baseline (trust-free) route. In addition, we analyze the trade-offs between multiple planning objectives (e.g., trust, distance, energy consumption) via multi-objective optimization of the POMDP. We also identify a set of open issues and implications for real-world deployment of the proposed approach in automated vehicles.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"6 1","pages":"1 - 21"},"PeriodicalIF":2.3,"publicationDate":"2021-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49015243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fei Miao, Sihong He, Lynn Pepin, Shuo Han, Abdeltawab M. Hendawi, Mohamed E. Khalefa, J. Stankovic, G. Pappas
With the transformation to smarter cities and the development of technologies, a large amount of data is collected from sensors in real time. Services provided by ride-sharing systems such as taxis, mobility-on-demand autonomous vehicles, and bike sharing systems are popular. This paradigm provides opportunities for improving transportation systems’ performance by allocating ride-sharing vehicles toward predicted demand proactively. However, how to deal with uncertainties in the predicted demand probability distribution for improving the average system performance is still a challenging and unsolved task. Considering this problem, in this work, we develop a data-driven distributionally robust vehicle balancing method to minimize the worst-case expected cost. We design efficient algorithms for constructing uncertainty sets of demand probability distributions for different prediction methods and leverage a quad-tree dynamic region partition method for better capturing the dynamic spatial-temporal properties of the uncertain demand. We then derive an equivalent computationally tractable form for numerically solving the distributionally robust problem. We evaluate the performance of the data-driven vehicle balancing algorithm under different demand prediction and region partition methods based on four years of taxi trip data for New York City (NYC). We show that the average total idle driving distance is reduced by 30% with the distributionally robust vehicle balancing method using quad-tree dynamic region partitions, compared with vehicle balancing methods based on static region partitions without considering demand uncertainties. This is about a 60-million-mile or a 8-million-dollar cost reduction annually in NYC.
{"title":"Data-driven Distributionally Robust Optimization For Vehicle Balancing of Mobility-on-Demand Systems","authors":"Fei Miao, Sihong He, Lynn Pepin, Shuo Han, Abdeltawab M. Hendawi, Mohamed E. Khalefa, J. Stankovic, G. Pappas","doi":"10.1145/3418287","DOIUrl":"https://doi.org/10.1145/3418287","url":null,"abstract":"With the transformation to smarter cities and the development of technologies, a large amount of data is collected from sensors in real time. Services provided by ride-sharing systems such as taxis, mobility-on-demand autonomous vehicles, and bike sharing systems are popular. This paradigm provides opportunities for improving transportation systems’ performance by allocating ride-sharing vehicles toward predicted demand proactively. However, how to deal with uncertainties in the predicted demand probability distribution for improving the average system performance is still a challenging and unsolved task. Considering this problem, in this work, we develop a data-driven distributionally robust vehicle balancing method to minimize the worst-case expected cost. We design efficient algorithms for constructing uncertainty sets of demand probability distributions for different prediction methods and leverage a quad-tree dynamic region partition method for better capturing the dynamic spatial-temporal properties of the uncertain demand. We then derive an equivalent computationally tractable form for numerically solving the distributionally robust problem. We evaluate the performance of the data-driven vehicle balancing algorithm under different demand prediction and region partition methods based on four years of taxi trip data for New York City (NYC). We show that the average total idle driving distance is reduced by 30% with the distributionally robust vehicle balancing method using quad-tree dynamic region partitions, compared with vehicle balancing methods based on static region partitions without considering demand uncertainties. This is about a 60-million-mile or a 8-million-dollar cost reduction annually in NYC.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"5 1","pages":"1 - 27"},"PeriodicalIF":2.3,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3418287","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41555488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}