Spelling suggestions: "subject:"cyberphysical systems"" "subject:"bothphysical systems""
1 |
Establishment of a Cyber-Physical Systems (CPS) Test Bed to Explore Traffic Collision Avoidance System (TCAS) Vulnerabilities to Cyber AttacksGraziano, Timothy Michael 10 August 2021 (has links)
Traffic Collision Avoidance Systems (TCAS) are safety-critical, unauthenticated, ranging systems required in commercial aircraft. Previous work has proposed TCAS vulnerabilities to attacks from malicious actors with low cost software defined radios (SDR) and inexpensive open-source software (GNU radio) where spoofing TCAS radio signals in now possible. This paper outlines a proposed threat model for several TCAS vulnerabilities from an adversarial perspective. Periodic and aperiodic attack models are explored as possible low latency solutions to spoof TCAS range estimation. A TCAS test bed is established with commercial avionics to demonstrate the efficacy of proposed vulnerabilities. SDRs and Vector Waveform Generators (VWGs) are used to achieve desired latency. Sensor inputs to the TCAS system are spoofed with micro-controllers. These include Radar Altimeter, Barometric Altimeter, and Air Data Computer (ADC) heading and attitude information transmitted by Aeronautical Radio INC (ARINC) 429 encoding protocol. TCAS spoofing is attempted against the test bed and analysis conducted on the timing results and test bed performance indicators. The threat model is analyzed qualitatively and quantitatively. / Master of Science / Traffic Collision Avoidance Systems (TCAS), or Airborne Collision Avoidance Systems ACAS), are safety-critical systems required by the Federal Aviation Administration (FAA) in commercial aircraft. They work by sending queries to surrounding aircraft in the form of radio transmission. Aircraft in the who receive these transmissions send replies. Information in these replies allow the TCAS system to determine if a nearby aircraft may travel too close to itself. TCAS can then determine help both pilots avoid a mid-air collision. Information in the messages can be faked by a malicious actor. To explore these vulnerabilities a test bed is built with commercial grade TCAS equipment. Several types of attacks are evaluated.
|
2 |
Parallel and distributed cyber-physical system simulationPfeifer, Dylan Conrad 06 November 2014 (has links)
The traditions of real-time and embedded system engineering have evolved into a new field of cyber-physical systems (CPSs). The increase in complexity of CPS components and the multi-domain engineering composition of CPSs challenge the current best practices in design and simulation. To address the challenges of CPS simulation, this work introduces a simulator coordination method drawing from strengths of the field of parallel and distributed simulation (PADS), yet offering benefits aimed towards the challenges of coordinating CPS engineering design simulators. The method offers the novel concept of Interpolated Event data types applied to Kahn Process Networks in order to provide simulator coordination. This can enable conservative and optimistic coordination of multiple heterogeneous and homogeneous simulators, but provide important benefits for CPS simulation, such as the opportunity to reduce functional requirements for simulator interfacing compared to existing solutions. The method is analyzed in theoretical properties and instantiated in software tools SimConnect and SimTalk. Finally, an experimental study applies the method and tools to accelerate Spice circuit simulation with tradeoffs in speed versus accuracy, and demonstrates the coordination of three heterogeneous simulators for a CPS simulation with increasing component model refinement and realism. / text
|
3 |
Cyber-Physical systems for maintenance in Industry 4.0He, Kaifei, Jin, Man January 2016 (has links)
As two emerging terms in industry field, “Industry 4.0” and “Cyber-Physical System” have attracted an increasing amount of attention from both researchers and manufactures. Available advanced technologies brought by these terms, offers possible solutions and improvements for future maintenance. The purpose of the thesis is to identify how Industry 4.0 integrates with Cyber-Physical Systems regarding maintenance management and the requirements for companies to reach the ideal smart factory. Two researcher questions were studied to fulfill the purpose. Firstly, identifying the integration between Industry 4.0 and CPS regarding maintenance functions. Secondly, to investigate how such integration contribute to maintenance management in an ideal future factory.
|
4 |
Implementation of the DEECo component framework for embedded systems / Implementation of the DEECo component framework for embedded systemsMatěna, Vladimír January 2014 (has links)
Recent development in the field of distributed and decentralized cyber-physical systems led to emerge of DEECo model. As many DEECo use cases are embedded applications it is interesting to evaluate DEECo on embedded hardware. Currently there is only reference DEECo implementation which is written in Java thus cannot be used for embedded applications. As part of this thesis C++ DEECo mapping and embedded CDEECo++ framework were designed using FreeRTOS operating system for task scheduling and synchronization. An example application designed for the STM32F4 board demonstrates usability of the framework. This thesis contains description of the DEECo mapping into the C++ language, source codes of the CDEECo++ framework, documentation and example application including basic measurement of its real- time properties. Powered by TCPDF (www.tcpdf.org)
|
5 |
Design and Analysis of Intrusion Detection Protocols in Cyber Physical SystemsMitchel, Robert Raymondl III 23 April 2013 (has links)
In this dissertation research we aim to design and validate intrusion detection system (IDS) protocols for a cyber physical system (CPS) comprising sensors, actuators, control units, and physical objects for controlling and protecting physical infrastructures.<br />The design part includes host IDS, system IDS and IDS response designs. The validation part includes a novel model-based analysis methodology with simulation validation. Our objective is to maximize the CPS reliability or lifetime in the presence of malicious nodes performing attacks which can cause security failures. Our host IDS design results in a lightweight, accurate, autonomous and adaptive protocol that runs on every node in the CPS to detect misbehavior of neighbor nodes based on state-based behavior specifications. Our system IDS design results in a robust and resilient protocol that can cope with malicious, erroneous, partly trusted, uncertain and incomplete information in a CPS. Our IDS response design results in a highly adaptive and dynamic control protocol that can adjust detection strength in response to environment changes in attacker strength and behavior. The end result is an energy-aware and adaptive IDS that can maximize the CPS lifetime in the presence of malicious attacks, as well as malicious, erroneous, partly trusted, uncertain and incomplete information.<br />We develop a probability model based on stochastic Petri nets to describe the behavior of a CPS incorporating our proposed intrusion detection and response designs, subject to attacks by malicious nodes exhibiting a range of attacker behaviors, including reckless, random, insidious and opportunistic attacker models. We identify optimal intrusion detection settings under which the CPS reliability or lifetime is maximized for each attacker model. Adaptive control for maximizing IDS performance is achieved by dynamically adjusting detection and response strength in response to attacker strength and behavior detected at runtime. We conduct extensive analysis of our designs with four case studies, namely, a mobile group CPS, a medical CPS, a smart grid CPS and an unmanned aircraft CPS. The results show that our adaptive intrusion and response designs operating at optimizing conditions significantly outperform existing anomaly-based IDS techniques for CPSs. / Ph. D.
|
6 |
Resilience and Cybersecurity for Distribution Systems with Distributed Energy ResourcesSomda, Baza R. 05 1900 (has links)
Heightened awareness of the impact of climate change has led to rapidly increasing penetration of renewable energy resources in electric energy distribution systems. Those distributed energy resources (DERs), mostly inverter-based, can act as resiliency sources for the grid but also introduce new control and stability challenges. In this thesis, a cyber-physical system (CPS) testbed is proposed combining a real-time electro-magnetic transient power system simulation and a practical model for communication network simulation. By regularly updating the CPS testbed with real-world SCADA information, a digital twin is effectively created. The digital twin allows the testing of novel microgrid control and cybersecurity strategies. Simulations using the Virginia Tech Electric Service (VTES) as a test case demonstrate the capability of adequately controlled resources, including solar PV, energy storage, and a synchronous generator, to enhance resilience by providing energy to critical loads. The DERs comply with IEEE disturbance ride-through requirements and switching transients are maintained within acceptable limits. A comprehensive DER-based resiliency plan is developed and validated for the Virginia Tech smart grid. / M.S. / In the last two decades, the increased occurrence of major power outages in the United States underscores the critical need to improve the reliability and resilience of the power grid. Massive investments have been made to install information and communications technology enabling near real-time monitoring and control of the smart grid. Simultaneously, heightened awareness of the impact of climate change led to rapidly increasing penetration of renewable energy resources at the distribution system level. Those distributed energy resources, mostly inverter-based, can act as resiliency sources for the grid but also introduce new control and stability challenges. In this work, a comprehensive testbed is proposed for the real-time simulation of both the power systems and communication networks. This method allows the testing of novel microgrid control and cybersecurity strategies. The testbed is used to develop and validate a resiliency plan for the Virginia Tech Electric Service using distributed energy resources.
|
7 |
Design Optimization Techniques for Time-Critical Cyber-Physical SystemsZhao, Yecheng 20 January 2020 (has links)
Cyber-Physical Systems (CPS) are widely deployed in critical applications which are subject to strict timing constraints. To ensure correct timing behavior, much of the effort has been dedicated to the development of validation and verification methods for CPS (e.g., system models and their timing and schedulability analysis). As CPS is becoming increasingly complex, there is an urgent need for efficient optimization techniques that can aid the design of large-scale systems. Specifically, techniques that can find good design options in a reasonable amount of time while meeting all the timing and other critical requirements are becoming vital. However, the current mindset is to use existing schedulability analysis and optimization techniques for the design optimization of time-critical CPS. This has resulted in two issues in today's CPS design: 1) Existing timing and schedulability analysis are very difficult and inefficient to be integrated into well-established optimization frameworks such as mathematical programming; 2) New system models and timing analysis are being developed in a way that is increasingly unfriendly to optimization. Due to these difficulties, existing practice for optimization mostly relies on meta or ad-hoc heuristics, which suffers either from sub-optimality or limited applicability. In this dissertation, we seek to address these issues and explore two new directions for developing optimization algorithms for time-critical CPS. The first is to develop {em optimization-oriented timing analysis}, that are efficient to formulate in mathematical programming framework. The second is a domain-specific optimization framework. The framework leverages domain-specific knowledge to provide methods that abstract timing analysis into a simple mathematical form. This allows to efficiently handle the complexity of timing analysis in optimization algorithms. The results on a number of case studies show that the proposed approaches have the potential to significantly improve upon scalability (several orders of magnitude faster) and solution quality, while being applicable to various system models, timing analysis techniques, and design optimization problems in time-critical CPS. / Doctor of Philosophy / Cyber-Physical Systems (CPS) tightly intertwine computing units and physical plants to accomplish complex tasks such as control and monitoring. They are often deployed in critical applications subject to strict timing constraints. For example, many control applications and tasks are required to finished within bounded latencies. To guarantee such timing correctness, much of the effort has been dedicated to studying methods for delay and latency estimation. These techniques are known as schedulability analysis/timing analysis. As CPS becomes increasingly complex, there is an urgent need for efficient optimization techniques that can aid the design of large-scale and correct CPS. Specifically, techniques that can find good design options in reasonable amount of time while meeting all the timing and other critical requirements are becoming vital. However, most of the existing schedulability analysis are either non-linear, non-convex, non-continuous or without closed form. This gives significant challenge for integrating these analysis into optimization. In this dissertation, we explore two new paradigm-shifting approaches for developing optimization algorithms for the design of CPS. Experimental evaluations on both synthetic and industrial case studies show that the new approaches significantly improve upon existing optimization techniques in terms of scalability and quality of solution.
|
8 |
Cyber-physical Algorithms for Enhancing CollaborationGuymon, Daniel Wade 18 May 2012 (has links)
The research presented in this thesis covers two specific problems within the larger domain of cyber-physical algorithms for enhancing collaboration between one or more people. The two specific problems are 1) determining when people are going to arrive late to a meeting and 2) creating ad-hoc secure pairing protocols for short-range communication. The domain was broken down at opposite extremes in order to derive these problems to work on: 1) collaborations that are planned long in advance and deviations from the plan need to be detected and 2) collaborations that are not planned and need to be dynamically created and secured. Empirical results show the functionality and performance of user late arrival detection for planned collaborations and end-user authentication protocols for unplanned collaborations. / Master of Science
|
9 |
Towards Cloud-based Vehicular Cyber-physical SystemsAlam, Kazi Masudul January 2017 (has links)
We are living in the age of information technology, where we are fully occupied with
the revolutionary innovations of the last few decades such as the Internet, mobile devices, wireless communications, social networks, wearables, cloud computing, etc. While these technologies have become integral part of our daily life, we are now anxiously waiting to embrace Internet-of-Things (IoT), intelligent digital assistants, driver-less cars, drone deliveries, virtual reality, and smart city applications. Recently, research community is demonstrating increasing interests about Cyber-Physical Systems (CPS) that resides in the cross-section of embedded systems, network communications, and scalable distributed infrastructures.
The main responsibility of a CPS is to collect sensory data about the physical world and to inform the computation module using communication technologies that processes the data, identifies important insights and notifies back using a feedback loop. These notifications can however be control commands to reconfigure the physical world. Such a setup is a useful method to deploy smart city applications. In this dissertation, we keep our focus onto the smart transport objective using vehicular CPS (VCPS) based systems organization. We have compiled this dissertation with our research contributions in this growing field of VCPS.
One of our key contributions in this field is an architecture reference model for the cloud-based CPS, C2PS, where we analytically describe the key properties of a CPS: computation, communication and control, while integrating cloud features to it. We have identified various types of computation and interaction modes of this paradigm as well as describe Bayesian network and fuzzy logic based smart connection to select a mode at any time.
It is considered that the true adoption of CPS is only possible through the deployment of the IoT systems. Thus, it is important to have IoT as a foundation
in the CPS architectures. Our next contribution is to leverage existing Vehicular Adhoc Network (VANET) technologies and map them with the standard IoT-Architecture reference model to design the VCPS, Social Internet-of-Vehicles (SIoV). In this process, we have identified the social structures and system interactions among the subsystems involved in the SIoV. We also present a message structure to facilitate different types of SIoV interactions.
The ability of dynamic reconfiguration in a C2PS is very appealing. We capture this feature in the VCPS by designing a model-based reconfiguration scheme for the SIoV, where we measure the data workloads of distinct subsystems involved in various types of SIoV interactions. We further use these models to design dynamic adaptation schemes for the subsystems involved in VCPS interactions.
Our final contribution is an application development platform based on C2PS design technique that uses server-client based system communications. In this platform, server side is built using JAVA, client side uses Android, message communication uses JSON and every component has its own MySQL database to store the interactions. We use this platform to emulate and deploy SIoV related applications and scenarios. Such a platform is necessary to continue C2PS related research and developments in the laboratory environment.
|
10 |
Algorithmically induced architectures for multi-agent systemRamachandran, Thiagarajan 27 May 2016 (has links)
The objective of this thesis is to understand the interactions between the computational mechanisms, described by algorithms and software, and the physical world, described by differential equations, in the context of networked systems. Such systems can be denoted as cyber-physical nodes connected over a network. In this work, the power grid is used as a guiding example and a rich source of problems which can be generalized to networked cyber-physical systems. We address specific problems that arise in cyber-physical networks due to the presence of a computational network and a physical network as well as provide directions for future research.
|
Page generated in 0.0977 seconds