ACM Trans. Cyber Phys. Syst.最新文献

筛选
英文 中文
The Lord of the Ring Road: A Review and Evaluation of Autonomous Control Policies for Traffic in a Ring Road 环城路之王:环城路交通自主控制策略综述与评价
ACM Trans. Cyber Phys. Syst. Pub Date : 2022-01-31 DOI: 10.1145/3494577
Fang-Chieh Chou, A. R. Bagabaldo, A. Bayen
{"title":"The Lord of the Ring Road: A Review and Evaluation of Autonomous Control Policies for Traffic in a Ring Road","authors":"Fang-Chieh Chou, A. R. Bagabaldo, A. Bayen","doi":"10.1145/3494577","DOIUrl":"https://doi.org/10.1145/3494577","url":null,"abstract":"This study focuses on the comprehensive investigation of stop-and-go waves appearing in closed-circuit ring road traffic wherein we evaluate various longitudinal dynamical models for vehicles. It is known that the behavior of human-driven vehicles, with other traffic elements such as density held constant, could stimulate stop-and-go waves, which do not dissipate on the circuit ring road. Stop-and-go waves can be dissipated by adding automated vehicles (AVs) to the ring. Thorough investigations of the performance of AV longitudinal control algorithms were carried out in Flow, which is an integrated platform for reinforcement learning on traffic control. Ten AV algorithms presented in the literature are evaluated. For each AV algorithm, experiments are carried out by varying distributions and penetration rates of AVs. Two different distributions of AVs are studied. For the first distribution scenario, AVs are placed consecutively. Penetration rates are varied from 1 AV (5%) to all AVs (100%). For the second distribution scenario, AVs are placed with even distribution of human-driven vehicles in between any two AVs. In this scenario, penetration rates are varied from 2 AVs (10%) to 11 AVs (50%). Multiple runs (10 runs) are simulated to average out the randomness in the results. From more than 3,000 simulation experiments, we investigated how AV algorithms perform differently with varying distributions and penetration rates while all AV algorithms remained fixed under all distributions and penetration rates. Time to stabilize, maximum headway, vehicle miles traveled, and fuel economy are used to evaluate their performance. Using these metrics, we find that the traffic condition improvement is not necessarily dependent on the distribution for most of the AV controllers, particularly when no cooperation among AVs is considered. Traffic condition is generally improved with a higher AV penetration rate with only one of the AV algorithms showing a contrary trend. Among all AV algorithms in this study, the reinforcement learning controller shows the most consistent improvement under all distributions and penetration rates.","PeriodicalId":120188,"journal":{"name":"ACM Trans. Cyber Phys. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116394480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Detection and Mitigation of Sensor and CAN Bus Attacks in Vehicle Anti-Lock Braking Systems 汽车防抱死制动系统中传感器和CAN总线攻击的检测与缓解
ACM Trans. Cyber Phys. Syst. Pub Date : 2022-01-31 DOI: 10.1145/3495534
Liuwang Kang, Haiying Shen
{"title":"Detection and Mitigation of Sensor and CAN Bus Attacks in Vehicle Anti-Lock Braking Systems","authors":"Liuwang Kang, Haiying Shen","doi":"10.1145/3495534","DOIUrl":"https://doi.org/10.1145/3495534","url":null,"abstract":"For a modern vehicle, if the sensor in a vehicle anti-lock braking system (ABS) or controller area network (CAN) bus is attacked during a brake process, the vehicle will lose driving direction control and the driver’s life will be highly threatened. However, current methods for detecting attacks are not sufficiently accurate, and no method can provide attack mitigation. To ensure vehicle ABS security, we propose an attack detection method to accurately detect both sensor attack (SA) and CAN bus attack in a vehicle ABS, and an attack mitigation strategy to mitigate their negative effects on the vehicle ABS. In our attack detection method, we build a vehicle state space equation that considers the real-time road friction coefficient to predict vehicle states (i.e., wheel speed and longitudinal brake force) with their previous values. Based on sets of historical measured vehicle states, we develop a search algorithm to find out attack changes (vehicle state changes because of attack) by minimizing errors between the predicted vehicle states and the measured vehicle states. In our attack mitigation strategy, attack changes are subtracted from the measured vehicle states to generate correct vehicle states for a vehicle ABS. We conducted the first real SA experiments to show how a magnet affects sensor readings. Our simulation results demonstrate that our attack detection method can detect SA and CAN bus attack more accurately compared with existing methods, and also that our attack mitigation strategy almost eliminates the attack’s effects on a vehicle ABS.","PeriodicalId":120188,"journal":{"name":"ACM Trans. Cyber Phys. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126426578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IoTranx: Transactions for Safer Smart Spaces IoTranx:更安全的智能空间交易
ACM Trans. Cyber Phys. Syst. Pub Date : 2022-01-31 DOI: 10.1145/3471937
Chao Chen, A. Helal, Zhi Jin, Mingyue Zhang, Choonhwa Lee
{"title":"IoTranx: Transactions for Safer Smart Spaces","authors":"Chao Chen, A. Helal, Zhi Jin, Mingyue Zhang, Choonhwa Lee","doi":"10.1145/3471937","DOIUrl":"https://doi.org/10.1145/3471937","url":null,"abstract":"\u0000 Smart spaces such as smart homes deliver digital services to optimize space use and enhance user experience. They are composed of an Internet of Things (IoT), people, and physical content. They differ from traditional computer systems in that their cyber-physical nature ties intimately with the users and the built environment. The impact of ill-programmed applications in such spaces goes beyond loss of data or a computer crash, risking potentially physical harm to the space and its users. Ensuring smart space safety is therefore critically important to successfully deliver intimate and convenient services surrounding our daily lives. By modeling smart space as a highly dynamic database, we present IoT Transactions, an analogy to database transactions, as an abstraction for programming and executing the services as the handling of the devices in smart space. Unlike traditional database management systems that take a “clear room approach,” smart spaces take a “dirty room approach” where imperfection and unattainability of full control and guarantees are the new normal. We identify Atomicity, Isolation, Integrity and Durability (AI\u0000 2\u0000 D) as the set of properties necessary to define the safe runtime behavior for IoT transactions for maintaining “permissible device settings” of execution and to avoid or detect and resolve “impermissible settings.” Furthermore, we introduce a lock protocol, utilizing variations of lock concepts, that enforces AI\u0000 2\u0000 D safety properties during transaction processing. We show a brief proof of the protocol correctness and a detailed analytical model to evaluate its performance.\u0000","PeriodicalId":120188,"journal":{"name":"ACM Trans. Cyber Phys. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134454358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Roadrunner+: An Autonomous Intersection Management Cooperating with Connected Autonomous Vehicles and Pedestrians with Spillback Considered Roadrunner+:考虑溢出效应的自动驾驶车辆和行人的自动交叉口管理
ACM Trans. Cyber Phys. Syst. Pub Date : 2022-01-31 DOI: 10.1145/3488246
Michael I.-C. Wang, Charles H.-P. Wen, H. J. Chao
{"title":"Roadrunner+: An Autonomous Intersection Management Cooperating with Connected Autonomous Vehicles and Pedestrians with Spillback Considered","authors":"Michael I.-C. Wang, Charles H.-P. Wen, H. J. Chao","doi":"10.1145/3488246","DOIUrl":"https://doi.org/10.1145/3488246","url":null,"abstract":"\u0000 The recent emergence of Connected Autonomous Vehicles (CAVs) enables the Autonomous Intersection Management (AIM) system, replacing traffic signals and human driving operations for improved safety and road efficiency. When CAVs approach an intersection, AIM schedules their intersection usage in a collision-free manner while minimizing their waiting times. In practice, however, there are pedestrian road-crossing requests and spillback problems, a blockage caused by the congestion of the downstream intersection when the traffic load exceeds the road capacity. As a result, collisions occur when CAVs ignore pedestrians or are forced to the congested road. In this article, we present a cooperative AIM system, named\u0000 Roadrunner+\u0000 , which simultaneously considers CAVs, pedestrians, and upstream/downstream intersections for spillback handling, collision avoidance, and efficient CAV controls. The performance of Roadrunner+ is evaluated with the SUMO microscopic simulator. Our experimental results show that Roadrunner+ has 15.16% higher throughput than other AIM systems and 102.53% higher throughput than traditional traffic signals. Roadrunner+ also reduces 75.62% traveling delay compared to other AIM systems. Moreover, the results show that CAVs in Roadrunner+ save up to 7.64% in fuel consumption, and all the collisions caused by spillback are prevented in Roadrunner+.\u0000","PeriodicalId":120188,"journal":{"name":"ACM Trans. Cyber Phys. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130298552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Novel Approach for Deploying Minimum Sensors in Smart Buildings 一种在智能建筑中部署最小传感器的新方法
ACM Trans. Cyber Phys. Syst. Pub Date : 2022-01-31 DOI: 10.1145/3477929
A. Agarwal, K. Ramamritham
{"title":"A Novel Approach for Deploying Minimum Sensors in Smart Buildings","authors":"A. Agarwal, K. Ramamritham","doi":"10.1145/3477929","DOIUrl":"https://doi.org/10.1145/3477929","url":null,"abstract":"Buildings, viewed as cyber-physical systems, become smart by deploying Building Management Systems (BMS). They should be aware about the state and environment of the building. This is achieved by developing a sensing system that senses different interesting factors of the building, called as “facets of sensing.” Depending on the application, different facets need to be sensed at various locations. Existing approaches for sensing these facets consist of deploying sensors at all the places so they can be sensed directly. But installing numerous sensors often aggravate the issues of user inconvenience, cost of installation and maintenance, and generation of e-waste. This article proposes how intelligently using the existing information can help to estimate the facets in cyber-physical systems like buildings, thereby reducing the sensors to be deployed. In this article, an optimization framework has been developed, which optimally deploys sensors in a building such that it satisfies BMS requirements with minimum number of sensors. The proposed solution is applied to real-world scenarios with cyber-physical systems. The results indicate that the proposed optimization framework is able to reduce the number of sensors by 59% and 49% when compared to the baseline and heuristic approach, respectively.","PeriodicalId":120188,"journal":{"name":"ACM Trans. Cyber Phys. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124784466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tool Integration for Automated Synthesis of Distributed Embedded Controllers 分布式嵌入式控制器自动合成的工具集成
ACM Trans. Cyber Phys. Syst. Pub Date : 2022-01-31 DOI: 10.1145/3477499
Debayan Roy, Licong Zhang, Wanli Chang, Dip Goswami, B. Vogel‐Heuser, S. Chakraborty
{"title":"Tool Integration for Automated Synthesis of Distributed Embedded Controllers","authors":"Debayan Roy, Licong Zhang, Wanli Chang, Dip Goswami, B. Vogel‐Heuser, S. Chakraborty","doi":"10.1145/3477499","DOIUrl":"https://doi.org/10.1145/3477499","url":null,"abstract":"\u0000 Controller design and their software implementations are usually done in isolated design spaces using respective COTS design tools. However, this separation of concerns can lead to long debugging and integration phases. This is because assumptions made about the implementation platform during the design phase—e.g., related to timing—might not hold in practice, thereby leading to unacceptable control performance. In order to address this, several\u0000 control/architecture co-design\u0000 techniques have been proposed in the literature. However, their adoption in practice has been hampered by the lack of design flows using commercial tools. To the best of our knowledge, this is the first article that implements such a\u0000 co-design\u0000 method using commercially available design tools in an automotive setting, with the aim of minimally disrupting existing design flows practiced in the industry. The goal of such co-design is to\u0000 jointly\u0000 determine controller and platform parameters in order to avoid any\u0000 design-implementation gap\u0000 , thereby minimizing implementation time testing and debugging. Our setting involves distributed implementations of control algorithms on automotive\u0000 electronic control units\u0000 (\u0000 ECUs\u0000 ) communicating via a FlexRay bus. The co-design and the associated toolchain\u0000 Co-Flex\u0000 jointly determines controller and FlexRay parameters (that impact signal delays) in order to optimize specified design metrics. Co-Flex seamlessly integrates the modeling and analysis of control systems in MATLAB/Simulink with platform modeling and configuration in SIMTOOLS/SIMTARGET that is used for configuring FlexRay bus parameters. It automates the generation of multiple\u0000 Pareto-optimal\u0000 design options with respect to the quality of control and the resource usage, that an engineer can choose from. In this article, we outline a step-by-step software development process based on Co-Flex tools for distributed control applications. While our exposition is automotive specific, this design flow can easily be extended to other domains.\u0000","PeriodicalId":120188,"journal":{"name":"ACM Trans. Cyber Phys. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131669969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Wireless Control Bus: Enabling Efficient Multi-hop Event-Triggered Control with Concurrent Transmissions 无线控制总线:通过并发传输实现高效的多跳事件触发控制
ACM Trans. Cyber Phys. Syst. Pub Date : 2021-01-26 DOI: 10.1145/3485467
M. Trobinger, G. D. Gleizer, T. Istomin, M. Mazo, A. Murphy, G. Picco
{"title":"The Wireless Control Bus: Enabling Efficient Multi-hop Event-Triggered Control with Concurrent Transmissions","authors":"M. Trobinger, G. D. Gleizer, T. Istomin, M. Mazo, A. Murphy, G. Picco","doi":"10.1145/3485467","DOIUrl":"https://doi.org/10.1145/3485467","url":null,"abstract":"\u0000 Event-triggered control\u0000 (\u0000 ETC\u0000 ) holds the potential to significantly improve the efficiency of wireless networked control systems. Unfortunately, its real-world impact has hitherto been hampered by the lack of a network stack able to transfer its benefits from theory to practice specifically by supporting the latency and reliability requirements of the aperiodic communication ETC induces. This is precisely the contribution of this article.\u0000 \u0000 \u0000 Our\u0000 \u0000 Wireless Control Bus\u0000 \u0000 (\u0000 \u0000 WCB\u0000 \u0000 ) exploits carefully orchestrated network-wide floods of concurrent transmissions to minimize overhead during quiescent, steady-state periods, and ensures timely and reliable collection of sensor readings and dissemination of actuation commands when an ETC triggering condition is violated. Using a cyber-physical testbed emulating a water distribution system controlled over a real-world multi-hop wireless network, we show that ETC over\u0000 WCB\u0000 achieves the same quality of periodic control at a fraction of the energy costs, therefore unleashing and concretely demonstrating its full potential for the first time.\u0000","PeriodicalId":120188,"journal":{"name":"ACM Trans. Cyber Phys. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115953644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Real-Time Middleware for Cyber-Physical Event Processing 用于信息物理事件处理的实时中间件
ACM Trans. Cyber Phys. Syst. Pub Date : 2019-10-03 DOI: 10.1145/3218816
Chao Wang, C. Gill, Chenyang Lu
{"title":"Real-Time Middleware for Cyber-Physical Event Processing","authors":"Chao Wang, C. Gill, Chenyang Lu","doi":"10.1145/3218816","DOIUrl":"https://doi.org/10.1145/3218816","url":null,"abstract":"Cyber-physical systems (CPS) involve tight integration of cyber (computation) and physical domains, and both the effectiveness and correctness of a cyber-physical system application may rely on successful enforcement of constraints such as bounded latency and temporal validity subject to physical conditions. For many such systems (e.g., edge computing in the Industrial Internet of Things), it is desirable to enforce such constraints within a common middleware service (e.g., during event processing). In this article, we introduce CPEP, a new real-time middleware for cyber-physical event processing, with (1) extensible support for complex event processing operations, (2) execution prioritization and sharing, (3) enforcement of time consistency with load shedding, and (4) efficient memory management and concurrent data processing. We present the design, implementation, and empirical evaluation of CPEP and show that it can (1) support complex operations needed by many applications, (2) schedule data processing according to consumers’ priority levels, (3) enforce temporal validity, and (4) reduce processing delay and improve throughput of time-consistent events.","PeriodicalId":120188,"journal":{"name":"ACM Trans. Cyber Phys. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114862969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信