Challenges of the Cyber Physical Systems Research

Page 1

CYBER PHYSICAL SYSTEMS RESEARCH CHALLENGES

Li, Z., Huang, C., Dong, X., & Ren, C. (2020). Resource-Efficient Cyber-Physical Systems Design:

A

Survey.

Microprocessors

and

Microsystems,

103183. doi:10.1016/j.micpro.2020.103183

1. Introduction In recent years, Cyber-Physical Systems (CPSs), which combine physical and computer components, have grown in popularity. CPSs are commonly employed in complicated applications like smart power grids, transportation systems, and economic structure since they are difficult problems in and of themselves. Due to the widespread use of CPSs in applications, security is a significant and demanding component that requires more consideration throughout CPS design. CPS are changing the way we interact with the physical environment. This revolution, of course, is not free [1]. Because even old embedded systems must meet higher


standards than general-purpose computers, we must pay close attention to the physical-aware designed system needs of the next generation if we are to fully trust them.

2. CPS Research Challenges 2.1 Real-time system abstraction Because of the large number of sensors and actuators, as well as computers that interchange various forms of data, developing a new framework that allows us to abstract the salient aspects of systems in real time is crucial. The network topology of CPS, for example, may vary dynamically as a result of physical conditions [2]. As a result, there is a need for research into novel distributed real-time computing and communication mechanisms that can accurately reflect the important interactions among CPS elements and, in turn, provide the requisite level of performance, such as safety, security, resilience, and dependability.


2.2

2.2 Robustness, safety, and security Unlike logical computing in cyber systems, interactions with the physical world are inevitably fraught with uncertainty due to issues like as unpredictability in the environment, mistakes in physical devices, and potential security threats [3]. As a result, overall system robustness, security, and safety are crucial in CPS. To this aim, the inherent character of CPS can be exploited by utilising the physical information about the system's location and timing.

2.3 Hybrid system modelling and control The primary distinction between physical and cyberspace is that the former evolves in real time, whilst the latter changes in response to discrete logic. As a result, for CPS design, a rigorous hybrid system modelling and control mechanism that integrates both the physical and cyber aspects is required [4]. For example, to close the feedback control loop, a new theoretical framework is required that can combine continuous-time systems with event-triggered logical systems. Both temporal scales (from microseconds to months or years) and dimensional orders (from on-chip to possibly planetary scale) should be carefully considered in this framework [5].

2.4 Control over networks Time-driven and event-driven computing, time-varying delays, transmission failures, and system reconfiguration are all obstacles in the design and implementation of networked control in CPS [6]. The following challenges face CPS researchers when designing network protocols: ensuring mission-critical quality-of-service over wireless networks, balancing control law design and real-time computation constraints, bridging the gap between continuous and discrete time systems, and ensuring the reliability and robustness of large-scale systems [7].

Tutors India, a UK-based academic writing company offering the dissertation help and assistance. In the business for over 17 years. Highly qualified writers. Thousands of real


customer reviews . So how do you create the perfect dissertation? Let us show you the dissertation services we have on offer and start your journey to success now:


2.5 Sensor-actuator networks For more than a decade, wireless sensor networks have been widely researched. Nonetheless, wireless sensor-actuator networks (WSAN) are a new field that hasn't received enough attention, particularly from the perspective of CPS. In the design of sensor-actuator networks, the interaction between sensors, actuators, physical systems, and computing elements should be carefully considered [8]. Physical details and effects of actuators on the whole system, in particular, have not been adequately considered in system design thus far.

2.6 Verification and validation To ensure that the overall CPS requirements are met, hardware and software components, operating systems, and middleware must go through comprehensive compositional verification and testing. CPS, in particular, must go above existing cyber infrastructure in terms of reliability. For instance, it is well known in the aviation industry that the certification process consumes more than half of the resources required to build new systems [9]. Overdesign is the most wellknown process for developing safe system certification in this industry. However, with today's large-scale complex systems, merely using the overdesign technique is becoming intractable. As a result, we need new models, methods, and tools that can include compositional verification and validation of software and other parts throughout the design stage [10].

2.7 Control and scheduling co-design. Co-designing control and scheduling is a well-studied topic in the real-time and embedded systems community. However, with the introduction of CPS, co-design issues are being reassessed in a number of ways. Because CPS are often networked control systems, the impact of network delay on system stability has lately been investigated in terms of the trade-off between system stability and real-time schedulability. This research yielded a non-periodic control strategy that can ensure overall system stability while using the least amount of computer resources possible [11].

2.8 Computational abstraction


Programming abstractions should represent physical qualities such as physics and chemistry laws, safety, real-time and power restrictions, resources, resilience, and security in a compostable manner.

2.9 Architecture At the meta-level, CPS architectures must be consistent and capture a wide range of physical data. For large-scale CPS, new network protocols will be required. The concept of being "globally virtual, locally physical" can be used to develop a new paradigm [12]. 3. FUNCTIONALITY OF CPS DOMAINS The table below summarises the CPS applications in terms of their functionality. Type of Domain Smart Manufacturing

Scale/Functionality Optimizing productivity in the manufacturing of goods or the delivery of services at a medium scale.

Emergency Response

Medium/Large Scale: dealing with risks to public safety as well

as

protecting

the

environment

and

critical

infrastructure. Air Transportation

Operation and traffic management of aviation systems on a large scale.

Critical Infrastructure

Distribution of basic necessities such as water, electricity, gas, and oil on a large scale.

Health Care and Medicine

On a medium scale, patients' health problems are monitored and relevant steps are taken.

Intelligent Transportation

On a medium/large scale, real-time data exchange improves traffic safety, coordination, and services.

Robotic for Service

Human welfare services on a small/medium scale.


3. Conclusion Thus CPS development is no longer a resource optimization challenge, but rather a matter of general design and implementation. The embedded platform (cyber space) and the controllers (physical space) are built separately and then integrated in the traditional design paradigm. Despite efforts to improve resource efficiency for CPS, there are still a number of issues to be resolved [13]

Tutors India, a UK-based academic writing company offering the dissertation help and assistance. In the business for over 17 years. Highly qualified writers. Thousands of real customer reviews . So how do you create the perfect dissertation? Let us show you the dissertation services we have on offer and start your journey to success now:


References [1]

A. Darwish en A. E. Hassanien, Cyber physical systems design, methodology, and integration: the current status and future outlook, Journal of Ambient Intelligence and Humanized Computing, Okt 14, 2018, 9, (5), :1541–1556., doi: 10.1007/s12652-0170575-4.

[2]

Z. Li, C. Huang, X. Dong, en C. Ren, Resource-efficient cyber-physical systems design: A survey,

Microprocessors

and

Microsystems,

Sep

2020,

77,

:103183.,

doi:

10.1016/j.micpro.2020.103183. [3]

R. Alguliyev, Y. Imamverdiyev, en L. Sukhostat, Cyber-physical systems and their security issues,

Computers

in

Industry,

Sep

2018,

100,

:212–223.,

doi:

10.1016/j.compind.2018.04.017. [4]

J.-P. A. Yaacoub, O. Salman, H. N. Noura, N. Kaaniche, A. Chehab, en M. Malli, Cyberphysical systems security: Limitations, issues and future trends, Microprocessors and Microsystems, Sep 2020, 77, :103201., doi: 10.1016/j.micpro.2020.103201.

[5]

D. Ding, Q.-L. Han, Y. Xiang, X. Ge, en X.-M. Zhang, A survey on security control and attack detection for industrial cyber-physical systems, Neurocomputing, Jan 2018, 275, : 1674–1683., doi: 10.1016/j.neucom.2017.10.009.

[6]

R. Calinescu, J. Camara, en C. Paterson, Socio-Cyber-Physical Systems: Models, Opportunities, Open Challenges, in 2019 IEEE/ACM 5th International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS), Mei 2019, Mei 2019, : 2–6., doi: 10.1109/SEsCPS.2019.00008.

[7]

N. Adam, Cyber-physical systems security, in Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies - CSIIRW ’09, 2009, 2009, :1., doi: 10.1145/1558607.1558609.


[8]

R. Atat, L. Liu, J. Wu, G. Li, C. Ye, en Y. Yang, Big Data Meet Cyber-Physical Systems: A Panoramic

Survey,

IEEE

Access,

2018,

6,

:73603–73636.,

doi:

10.1109/ACCESS.2018.2878681. [9]

M.-P. Pacaux-Lemoine, Q. Berdal, S. Enjalbert, en D. Trentesaux, Towards human-based industrial cyber-physical systems, in 2018 IEEE Industrial Cyber-Physical Systems (ICPS), Mei 2018, Mei 2018, :615–620., doi: 10.1109/ICPHYS.2018.8390776.

[10]

H. Koc, S. S. Shaik, en P. P. Madupu, Reliability Modeling and Analysis for Cyber Physical Systems, in 2019 IEEE 9th Annual Computing and Communication Workshop and

Conference

(CCWC),

Jan

2019,

Jan

2019,

:0448–0451.,

doi:

10.1109/CCWC.2019.8666606. [11]

F. Dressler, Cyber Physical Social Systems: Towards Deeply Integrated Hybridized Systems,

in

2018

Communications

International (ICNC),

Mrt

Conference

on

Computing,

2018,

Mrt

2018,

Networking :420–424.,

and doi:

10.1109/ICCNC.2018.8390404. [12]

C. A. González, M. Varmazyar, S. Nejati, L. C. Briand, en Y. Isasi, Enabling Model Testing of Cyber-Physical Systems, in Proceedings of the 21th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, Okt 2018, Okt 14, 2018, :176–186., doi: 10.1145/3239372.3239409.

[13]

M. Elshenawy, B. Abdulhai, en M. El-Darieby, Towards a service-oriented cyber–physical systems of systems for smart city mobility applications, Future Generation Computer Systems, Feb 2018, 79, :575–587., doi: 10.1016/j.future.2017.09.047.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.