Advanced Topics in Cyber-Physical Systems Jack Stankovic BP - - PowerPoint PPT Presentation

advanced topics
SMART_READER_LITE
LIVE PREVIEW

Advanced Topics in Cyber-Physical Systems Jack Stankovic BP - - PowerPoint PPT Presentation

Advanced Topics in Cyber-Physical Systems Jack Stankovic BP America Professor Department of Computer Science University of Virginia Fall 2011 Outline (first 2 classes) Course Logistics/Goals Intro to Cyber Physical Systems (CPS)


slide-1
SLIDE 1

Advanced Topics in Cyber-Physical Systems

Jack Stankovic BP America Professor Department of Computer Science University of Virginia Fall 2011

slide-2
SLIDE 2

Outline (first 2 classes)

  • Course Logistics/Goals
  • Intro to Cyber Physical Systems (CPS)

– Nothing less than the future!!!

  • Motivating Exemplars of Required

Research

  • Proposed approach: *-aware solution
slide-3
SLIDE 3

Lament from Industry

  • …we can’t hire students trained in the

multi-disciplinary areas we require … mainly control, SP, and CS

slide-4
SLIDE 4

Class Structure

  • Part I

– Introduction/Background

  • Part II

– Medical Applications – Energy-Based Applications

  • Part III

– Run Time Validation – Anomaly Detection – Role of Control Theory

slide-5
SLIDE 5

Reading Assignments

  • Part I - Introduction

– 2 background papers on CPS

  • Part II - Applications

– 7 papers on WH and BSN – 6 papers on Saving Energy

  • Part III – Technology Topics

– 4 papers on Runtime Validation – 2 papers on Anomaly Detection – 4 papers on Role of Control Theory

slide-6
SLIDE 6

Grading

  • Selected Reading Summaries – 25%
  • Paper Presentation – 50%
  • Class Participation – 25%
slide-7
SLIDE 7

Course Goals

  • Basis for improved CPS understanding

and research

  • Capability to simultaneously address

multiple issues

  • Significant exposure to advanced topics

in a new research area

slide-8
SLIDE 8

Prerequisites

  • Recommended

– Computer Networking

  • Questions for Class

– OS? – Computer Architecture? – Control Theory? – Real-time? – Sensors? – WSNs?

slide-9
SLIDE 9

Intro - Outline

  • What are Cyber Physical Systems?
  • Exemplars of Required Research

– Components – Lightweight Security – Robustness and Diversity – Systems of Systems

  • *-aware solution approach
slide-10
SLIDE 10

Acknowledgements/Info

  • CPS Program (3 years in the making)

– Core of about 10 people – Expanded to more than 30 researchers – Expanded to 100s of researchers – NSF CPS ($30,000,000 per year) – PCAST 2007 report: #1 priority for Federal Investment – Expanding to other agencies – European Union - $7B (ARTEMIS)

slide-11
SLIDE 11

Definition

  • CPS is the co-joining of computation and

communication with physical processes.

  • Functionality and salient system

characteristics are realized through the coordination and interaction of networked physical and computational objects.

  • CPS exhibits an intimate coupling between

the cyber and physical that manifests itself from the nano world to large-scale wide-area systems of systems.

slide-12
SLIDE 12

Computing in Physical Systems

Body Networks Road and Street Networks Battlefield Networks Vehicle Networks Industrial Networks Building Networks Environmental Networks

Heterogeneous Wireless Networks with Sensors and Actuators

slide-13
SLIDE 13

Important?

  • US Auto - $500B in annual revenue

– By 2015 40% of auto value in CPS

  • Aerospace - $125B
  • Medical – 20% of US economy by 2020
  • Energy, infrastructures (electric power

grid, defense, agriculture, …)

slide-14
SLIDE 14

What is a CPS?

  • Isn’t is just an embedded system?
  • Not the main question
  • Simply parsing “CPS” -> Many systems

are CPS, but that is not the issue

  • REALLY INTERESTED IN

– New research needed for the next generation of physical-cyber systems

slide-15
SLIDE 15

Confluence of Key Areas

Real-Time Control Cost Form Factor Severe Constraints Small Scale Closed Scheduling Fault Tolerance Wired networks Level of Uncertainty Noisy C. Sensing Scale Real-Time/Actuation Open Wireless Sensor Networks Embedded Systems Linear Adaptive Distributed Decentralized Open Human Models Architecture Principles

slide-16
SLIDE 16

What’s New

  • Scale
  • Systems of systems
  • Confluence of physical, wireless and

computing

  • Human Participation in Loop
  • Open

Level of Uncertainty

slide-17
SLIDE 17

Question

  • Define “open”
slide-18
SLIDE 18

CPS

  • Are CPS simply embedded systems on

steroids?

– Interact with the physical world – Constraints on cpu, power, cost, memory, bandwidth, … – Control actuators

slide-19
SLIDE 19
  • Is the Internet just a LAN on

steroids?

  • Confluence of the right technologies at

the right time can result in

– Fundamental paradigm shift – Totally new systems – Revolutionize business, science, entertainment, … – Transform how we interact with the physical world

slide-20
SLIDE 20

More Areas

  • Signal Processing
  • AI
  • Data Mining
  • Robotics
  • Security and Privacy
  • Formal Methods
  • Software Engineering
slide-21
SLIDE 21

Physical Affects Cyber

  • Can we develop a science?
  • Examples?
slide-22
SLIDE 22
  • 1. An unmanned plane (UAV) deploys motes
  • 2. Motes establish an sensor network

with power management 3. Sensor network detects vehicles and wakes up the sensor nodes

Zzz...

Energy Efficient Surveillance System

Ad-Hoc Network Neighbor Discovery Time Synchronization Parameterization Sentry Selection Coordinate Grid Data Aggregation Data Streaming Group Management Leader Election Localization Network Monitor Power management Reconfiguration Reliable MAC Leader Migration Scheduling State Synchronization …… Sentry

slide-23
SLIDE 23

What Physical Things Affect the Cyber?

  • In the sensing?
  • In the wireless?
  • In the environment?
slide-24
SLIDE 24

Tracking Example (1)

  • Sensing:

– Magnetic sensor takes 35 ms to stabilize

  • affects real-time analysis
  • affects sleep/wakeup logic

– Physical properties of targets affect algorithms and time to process (uncertainty fundamental)

  • Use shape, engine noise, …
  • Environmental factors must be addressed such

as wind, obstacles, …

slide-25
SLIDE 25

Tracking Example (2)

  • Sensor Fusion:

– Sensor fusion to avoid false alarms

  • power management may have sensors in sleep

state (affects fusion algorithms and real-time analysis)

– Location of nodes, target properties and environmental conditions affect fusion algorithms

  • Target itself might block messages needed for

fusion algorithms

slide-26
SLIDE 26

Tracking Example (3)

  • Wireless:

– Missing and delayed control signals alters FC loops; impossibility results for hard real-time guarantees (new notions of guarantees)

  • Humans:

– Don’t follow nice trajectories; active avoidance in tracking examples – Social models, human models

slide-27
SLIDE 27

Realistic (Integrated) Solutions

  • CPS must tolerate

– Failures – Noise – Uncertainty – Imprecision – Security attacks – Lack of perfect synchrony – Disconnectedness – Scale – Openness – Increasing complexity – Heterogeneity

R O B U S T N E E S

slide-28
SLIDE 28

Research Ideas/Exemplars

  • 1. New Components/Compositional

Theory

  • 2. Lightweight, Adaptive, Reactive

Security

  • 3. Robustness and Diversity
  • 4. Systems of Systems
slide-29
SLIDE 29

Component-Based (today - mostly)

Component Reuse Modularity Portability Reconfigure Beginning to consider performance

slide-30
SLIDE 30

Component-Based (Tomorrow)

Component Sensors Actuators Reflective Information Support for cross cutting performance security mobility dependability costs real-time power dynamics

  • penness

Support for control

slide-31
SLIDE 31

Component Architecture

slide-32
SLIDE 32

Component Architecture 2

Non-traditional OS (yet standard)

Cyber Physical Hardware Abstraction Layer Radio Sensors CPU Mem Power RAM Flash Application Wireless Stack Optional Middleware Cross Layering

slide-33
SLIDE 33

Tasks in Architecture

Robust Scheduling

1 2 3 1 2 3 Tasks Deadlines TIME Algorithm EDF Schedulable Yes Order 1,2,3 How robust? CF=1

slide-34
SLIDE 34

Robust Scheduling For Real World CPS

1 2 3 1 2 3 Tasks Deadlines TIME Algorithm EDF Schedulable Yes Order 1,2,3 How robust? 1.8 CF (1.8)

slide-35
SLIDE 35

Required

  • Robust, Real-Time, Dynamic, Open,

Heterogeneous Compositional Theory

– Based on underlying physical realities – Real-Time scheduling is dynamic (based on current instances of CPS constraints)

slide-36
SLIDE 36
  • 1. An unmanned plane (UAV) deploys motes

2. Motes establish a sensor network with power management 3. Sensor network detects vehicles and wakes up the sensor nodes

Zzz...

Security - VigilNet

Sentry

slide-37
SLIDE 37

VigilNet Architecture

slide-38
SLIDE 38

Security Issues

  • Every one of the 30 services can be attacked
  • Too expensive to make every service attack-

proof

  • Attacks will evolve anyway
  • Cannot collect, re-program, and re-deploy

MICAz mote: 8 MHz 8-bit uP 128 MB code 4 KB data mem 250 Kbps radio

slide-39
SLIDE 39

Security Approach

  • Operate in the presence of security attacks

– Robust decentralized protocols – Runtime control of security vs. performance tradeoffs

  • Self-healing architecture
  • Evolve to new, unanticipated attacks

– Recall – open system!

  • Lightweight solutions required due to severe

constraints

slide-40
SLIDE 40

Self-Healing Architecture

slide-41
SLIDE 41

Aspect Oriented Programming (AOP)

Functional Modules

Aspects

Logging Encryption Power Control RT

slide-42
SLIDE 42

SIGF: Secure Routing

  • The SIGF family provides incremental steps

between stateless and shared-state protocols.

  • SIGF allows efficient operation when no

attacks are present, and good enough security when they are.

slide-43
SLIDE 43

Robustness and Diversity

  • Good for security
  • Good for real world systems
  • Good for uncertainties of physical

interactions

slide-44
SLIDE 44

Example Problem

Accurate Node Location in Complex Environments

slide-45
SLIDE 45

GPS

  • Not Cost Effective
  • Line of Sight
slide-46
SLIDE 46

Range Free

Centroid

  • High Anchor Density
  • Inaccurate
  • Large Areas without anchors

APIT

slide-47
SLIDE 47

Range Free

DV-Hop

Inaccurate

slide-48
SLIDE 48

Low Cost - Accurate

(X1, Y1, R1)

(X1, Y1, R1) at T1

(X2, Y2, R2)

(X2, Y2, R2) at T2

Spotlight

Line of Sight

slide-49
SLIDE 49

Hierarchical Framework

Choose best / Weighted average If not localized – try another algorithm All nodes have a location at this point.

slide-50
SLIDE 50

Evaluation

  • TOSSIM

– 400 nodes in 300x300ft2 – 200x200ft2

  • bstructed area

– 50ft radio range – 10% nodes have GPS – 15% nodes in

  • pen area can’t

be localized

slide-51
SLIDE 51

Evaluation

slide-52
SLIDE 52

Evaluation

All nodes are localized

slide-53
SLIDE 53

Zzz...

System of Systems

Sentry

slide-54
SLIDE 54

Systems of Systems

  • Example of Openness
  • Control loops across systems
  • RT constraints across systems
  • Human Participation
slide-55
SLIDE 55

Adaptive/Decentralized Control

  • Missing messages
  • Delayed messages
  • Wrong messages
  • Real-time constraints
slide-56
SLIDE 56

System Architecture

Internet

Local Transport Protocol Local Transport Protocol

Programming Station Server Server Nodes Nodes

slide-57
SLIDE 57

System Architecture

Internet

Local Transport Protocol Local Transport Protocol

Programming Station Server Server Nodes Nodes Information about Services, Interfaces Location

slide-58
SLIDE 58

System Architecture

Internet Programming Station Server Server Nodes Nodes

Local Transport Protocol Local Transport Protocol

High level Programming Language EXE High Level Virtual Machine High Level Virtual Machine Low Level Virtual Machine Low Level Virtual Machine

slide-59
SLIDE 59

System Architecture

RT Internet

Local Transport Protocol Local Transport Protocol

Programming/ Control Server Server Nodes Nodes Responsible for Resource management User access rights

Cross System Control Cross System RT

Beyond Best Effort

slide-60
SLIDE 60

Correct Architecture?

  • 6LoWPAN based
  • WEB services based
slide-61
SLIDE 61

CPS - Enabler for Dramatic Innovation

  • New global-scale, personal medical

delivery systems

  • New paradigms for scientific discovery
  • Smart (Micro) Agriculture
  • Towards the end of terrorism
  • Wireless Airplanes
  • Next Generation Internet
slide-62
SLIDE 62

Key Point

  • Connection to the physical world will be

so pervasive that systems will be open even if you think they are not