advanced topics
play

Advanced Topics in Cyber-Physical Systems Jack Stankovic BP - PowerPoint PPT Presentation

Advanced Topics in Cyber-Physical Systems Jack Stankovic BP America Professor Department of Computer Science University of Virginia Fall 2011 Outline (first 2 classes) Course Logistics/Goals Intro to Cyber Physical Systems (CPS)


  1. Advanced Topics in Cyber-Physical Systems Jack Stankovic BP America Professor Department of Computer Science University of Virginia Fall 2011

  2. Outline (first 2 classes) • Course Logistics/Goals • Intro to Cyber Physical Systems (CPS) – Nothing less than the future!!! • Motivating Exemplars of Required Research • Proposed approach: *-aware solution

  3. Lament from Industry • …we can’t hire students trained in the multi- disciplinary areas we require … mainly control, SP, and CS

  4. Class Structure • Part I – Introduction/Background • Part II – Medical Applications – Energy-Based Applications • Part III – Run Time Validation – Anomaly Detection – Role of Control Theory

  5. Reading Assignments • Part I - Introduction – 2 background papers on CPS • Part II - Applications – 7 papers on WH and BSN – 6 papers on Saving Energy • Part III – Technology Topics – 4 papers on Runtime Validation – 2 papers on Anomaly Detection – 4 papers on Role of Control Theory

  6. Grading • Selected Reading Summaries – 25% • Paper Presentation – 50% • Class Participation – 25%

  7. Course Goals • Basis for improved CPS understanding and research • Capability to simultaneously address multiple issues • Significant exposure to advanced topics in a new research area

  8. Prerequisites • Recommended – Computer Networking • Questions for Class – OS? – Computer Architecture? – Control Theory? – Real-time? – Sensors? – WSNs?

  9. Intro - Outline • What are Cyber Physical Systems? • Exemplars of Required Research – Components – Lightweight Security – Robustness and Diversity – Systems of Systems • *-aware solution approach

  10. Acknowledgements/Info • CPS Program (3 years in the making) – Core of about 10 people – Expanded to more than 30 researchers – Expanded to 100s of researchers – NSF CPS ($30,000,000 per year) – PCAST 2007 report: #1 priority for Federal Investment – Expanding to other agencies – European Union - $7B (ARTEMIS)

  11. Definition • CPS is the co-joining of computation and communication with physical processes. • Functionality and salient system characteristics are realized through the coordination and interaction of networked physical and computational objects. • CPS exhibits an intimate coupling between the cyber and physical that manifests itself from the nano world to large-scale wide-area systems of systems.

  12. Computing in Physical Systems Road and Street Networks Environmental Industrial Heterogeneous Networks Battlefield Networks Networks Wireless Networks with Sensors and Actuators Building Vehicle Networks Networks Body Networks

  13. Important? • US Auto - $500B in annual revenue – By 2015 40% of auto value in CPS • Aerospace - $125B • Medical – 20% of US economy by 2020 • Energy, infrastructures (electric power grid, defense, agriculture, …)

  14. What is a CPS? • Isn’t is just an embedded system? • Not the main question • Simply parsing “CPS” -> Many systems are CPS, but that is not the issue • REALLY INTERESTED IN – New research needed for the next generation of physical-cyber systems

  15. Confluence of Key Areas Scheduling Cost Form Factor Fault Tolerance Severe Constraints Wired networks Small Scale Level of Uncertainty Closed Embedded Real-Time Systems Architecture Principles Linear Adaptive Wireless Sensor Distributed Networks Noisy C. Control Decentralized Sensing Open Scale Human Models Real-Time/Actuation Open

  16. What’s New • Scale • Systems of systems • Confluence of physical, wireless and computing • Human Participation in Loop • Open Level of Uncertainty

  17. Question • Define “open”

  18. CPS • Are CPS simply embedded systems on steroids? – Interact with the physical world – Constraints on cpu, power, cost, memory, bandwidth, … – Control actuators

  19. • Is the Internet just a LAN on steroids? • Confluence of the right technologies at the right time can result in – Fundamental paradigm shift – Totally new systems – Revolutionize business, science, entertainment, … – Transform how we interact with the physical world

  20. More Areas • Signal Processing • AI • Data Mining • Robotics • Security and Privacy • Formal Methods • Software Engineering

  21. Physical Affects Cyber • Can we develop a science? • Examples?

  22. Energy Efficient Surveillance System Ad-Hoc Network 1. An unmanned plane (UAV) deploys motes Neighbor Discovery Time Synchronization Parameterization Sentry Selection Coordinate Grid Data Aggregation Zzz... Data Streaming Group Management Leader Election Localization Sentry Network Monitor Power management Reconfiguration Reliable MAC Leader Migration 3. Sensor network detects 2. Motes establish an sensor network Scheduling vehicles and wakes up with power management the sensor nodes State Synchronization ……

  23. What Physical Things Affect the Cyber? • In the sensing? • In the wireless? • In the environment?

  24. Tracking Example (1) • Sensing: – Magnetic sensor takes 35 ms to stabilize • affects real-time analysis • affects sleep/wakeup logic – Physical properties of targets affect algorithms and time to process (uncertainty fundamental) • Use shape, engine noise, … • Environmental factors must be addressed such as wind, obstacles, …

  25. Tracking Example (2) • Sensor Fusion: – Sensor fusion to avoid false alarms • power management may have sensors in sleep state (affects fusion algorithms and real-time analysis) – Location of nodes, target properties and environmental conditions affect fusion algorithms • Target itself might block messages needed for fusion algorithms

  26. Tracking Example (3) • Wireless: – Missing and delayed control signals alters FC loops; impossibility results for hard real-time guarantees (new notions of guarantees) • Humans: – Don’t follow nice trajectories; active avoidance in tracking examples – Social models, human models

  27. Realistic (Integrated) Solutions • CPS must tolerate R – Failures O B – Noise U – Uncertainty S – Imprecision T N – Security attacks E – Lack of perfect synchrony E S – Disconnectedness – Scale – Openness – Increasing complexity – Heterogeneity

  28. Research Ideas/Exemplars 1. New Components/Compositional Theory 2. Lightweight, Adaptive, Reactive Security 3. Robustness and Diversity 4. Systems of Systems

  29. Component-Based (today - mostly) Reuse Modularity Component Portability Reconfigure Beginning to consider performance

  30. Component-Based (Tomorrow) Sensors Support for control Actuators Reflective Information Support for cross cutting performance security Component mobility dependability costs real-time power dynamics openness

  31. Component Architecture

  32. Component Architecture 2 Cross Application Layering Optional Middleware Wireless Stack Non-traditional OS (yet standard) Cyber Physical Hardware Abstraction Layer Radio Sensors CPU Mem Power RAM Flash

  33. Tasks in Architecture Robust Scheduling Tasks Deadlines Algorithm EDF 1 Schedulable Yes 2 Order 1,2,3 3 How robust? CF=1 1 2 3 TIME

  34. Robust Scheduling For Real World CPS Tasks Deadlines Algorithm EDF 1 Schedulable Yes 2 (1.8) Order 1,2,3 3 How robust? 1.8 CF 1 2 3 TIME

  35. Required • Robust, Real-Time, Dynamic, Open, Heterogeneous Compositional Theory – Based on underlying physical realities – Real-Time scheduling is dynamic (based on current instances of CPS constraints)

  36. Security - VigilNet 1. An unmanned plane (UAV) deploys motes Zzz... Sentry 3. Sensor network detects 2. Motes establish a sensor network vehicles and wakes up with power management the sensor nodes

  37. VigilNet Architecture

  38. Security Issues • Every one of the 30 services can be attacked • Too expensive to make every service attack- proof MICAz mote: 8 MHz 8-bit uP • Attacks will evolve anyway 128 MB code 4 KB data mem 250 Kbps radio • Cannot collect, re-program, and re-deploy

  39. Security Approach • Operate in the presence of security attacks – Robust decentralized protocols – Runtime control of security vs. performance tradeoffs • Self-healing architecture • Evolve to new, unanticipated attacks – Recall – open system! • Lightweight solutions required due to severe constraints

  40. Self-Healing Architecture

  41. Aspect Oriented Programming (AOP) Functional Modules RT Logging Encryption Power Control Aspects

  42. SIGF: Secure Routing • The SIGF family provides incremental steps between stateless and shared-state protocols. • SIGF allows efficient operation when no attacks are present, and good enough security when they are.

  43. Robustness and Diversity • Good for security • Good for real world systems • Good for uncertainties of physical interactions

  44. Example Problem Accurate Node Location in Complex Environments

  45. GPS - Not Cost Effective - Line of Sight

  46. Range Free Centroid APIT - High Anchor Density - Inaccurate -Large Areas without anchors

  47. Range Free DV-Hop Inaccurate

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend