{"title":"Privacy preserving origin-destination flow measurement in vehicular cyber-physical systems","authors":"Yian Zhou, Shigang Chen, Zhen Mo, Yafeng Yin","doi":"10.1109/CPSNA.2013.6614243","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614243","url":null,"abstract":"Traffic volume measurement is one of the most basic functions of road planning and management. In this paper, we investigate an important problem of privacy preserving “point-to-point” traffic volume measurement. We formalize “point-to-point” traffic as an origin-destination (O-D) flow, which represents the set of vehicles traveling from one geographical location (origin) to another location (destination). We take advantage of vehicular cyber-physical systems (VCPS) to exploit the potential for a fundamental shift in the way how O-D data are collected. The challenge is to allow the collection of statistical O-D flow information, yet protect identities of individual vehicles. To address that, we design two novel schemes which utilize both the latest technological advance in VCPS and the nice properties of a family of commutative one-way hash functions. Furthermore, we adopt statistical methodology and use sampling to achieve far better efficiency with graceful degradation in measurement accuracy. We perform simulations to demonstrate the feasibility and scalability of our schemes.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127369617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ART-Linux for high-frequency system control","authors":"S. Kagami, Y. Ishiwata, K. Nishiwaki","doi":"10.1109/CPSNA.2013.6614247","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614247","url":null,"abstract":"This paper presents the design and implementation of ART-Linux - a low-latency real-time extension of the Linux kernel for high-frequency system control. It is particularly tailored for the Intel x86 architecture, providing real-time (periodic) task execution system calls in user-space. ART-Linux provides simple yet strong system calls to allow periodic real-time programs to run in user-space with existing Linux device drivers, while providing users with standard developing, executing, debugging, and investigating environments. There is no need to add special device drivers. In order to achieve real-time functions in the Linux kernel, ART-Linux introduces the following techniques: 1) a mutualexclusive execution mechanism realized by virtual processor numbers, 2) a transfer queue to avoid mutex-locked mutual-exclusive execution, and 3) a multi-level priority inversion function. A finegrained implementation tuning of these techniques achieves very small jitters for specified periods (less than 20[μs] in practice). Experimental results using a well-known humanoid robot called HRP-2 no.12 demonstrate that jitters of cycle times are retained in an acceptable range for humanoid control.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128826982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Ou, C. Huang, C. Hu, J. W. Liu, E. Chu, C. Shih
{"title":"Responsive alert delivery over IP network","authors":"Y. Ou, C. Huang, C. Hu, J. W. Liu, E. Chu, C. Shih","doi":"10.1109/CPSNA.2013.6614241","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614241","url":null,"abstract":"Intelligent Guards against Disasters (iGaDs) are devices and applications deployed pervasively in future smart homes and environments. By receiving and processing standard-based machine-readable disaster alert messages from authorized senders and taking appropriate actions in response, they aim to help us better cope with natural disasters. The focus of this paper is on responsive delivery of alert messages over an IP network to a huge number of embedded iGaDs. The Asynchronous Message Delivery Service (AMeDS) is designed for this purpose. After presenting an overview of iGaDs and AMeDs, the paper describes an end-to-end scheduling mechanism used by AMeDS and discusses performance limitations in pushing time-critical alerts to iGaDs over the Internet.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"62 3-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120903948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of temperature control using cyber-physical system approach in home environment","authors":"W. Shein, Zhuo Cheng, Yasuo Tan, A. Lim","doi":"10.1109/CPSNA.2013.6614250","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614250","url":null,"abstract":"Technology advances allow us to design smart home system for the purpose of achieving high demand on occupants' comfort. In this research, we focus on building a thermal comfort controller for the existing hybrid temperature control (HTC) system, which is based on the cyber-physical system (CPS) approach. By using air-conditioner, window and curtain, our proposed controller can acquire the desired temperature while achieving high energy efficiency. We evaluate and verify our proposed controller in the cyber-physical home system environment by using MATLAB/Simulink tool and the raw data gathered from actual measurements.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131590667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manato Hirabayashi, S. Kato, M. Edahiro, K. Takeda, Taiki Kawano, S. Mita
{"title":"GPU implementations of object detection using HOG features and deformable models","authors":"Manato Hirabayashi, S. Kato, M. Edahiro, K. Takeda, Taiki Kawano, S. Mita","doi":"10.1109/CPSNA.2013.6614255","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614255","url":null,"abstract":"Vision-based object detection using camera sensors is an essential piece of perception for autonomous vehicles. Various combinations of features and models can be applied to increase the quality and the speed of object detection. A well-known approach uses histograms of oriented gradients (HOG) with deformable models to detect a car in an image [15]. A major challenge of this approach can be found in computational cost introducing a real-time constraint relevant to the real world. In this paper, we present an implementation technique using graphics processing units (GPUs) to accelerate computations of scoring similarity of the input image and the pre-defined models. Our implementation considers the entire program structure as well as the specific algorithm for practical use. We apply the presented technique to the real-world vehicle detection program and demonstrate that our implementation using commodity GPUs can achieve speedups of 3x to 5x in frame-rate over sequential and multithreaded implementations using traditional CPUs.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127085835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stochastic online sensor scheduler for remote state estimation","authors":"Junfeng Wu, Yilin Mo, Ling Shi","doi":"10.1109/CPSNA.2013.6614251","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614251","url":null,"abstract":"In this paper, a remote state estimation problem where a sensor measures the state of a linear discrete-time process in an infinite time horizon is considered. We aim to minimize the average estimation error subject to a limited sensor-estimator communication rate. We propose a stochastic online sensor schedule: whether or not the sensor sends data is based on its measurements and a stochastic holding time between the present and the most recent sensor-estimator communication instance. This decision process is formulated as a generalized geometric programming (GGP) optimization problem. It can be solved with a tractable computational complexity and provides a better performance compared with the optimal offline schedule. Numerical example is provided to illustrate main results.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132899737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defending malicious attacks in Cyber Physical Systems","authors":"Chia-Mei Chen, H. Hsiao, Peng-Yu Yang, Ya-Hui Ou","doi":"10.1109/CPSNA.2013.6614240","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614240","url":null,"abstract":"An increasing number of security incidents on industrial control systems drew a lot of concerns lately. Many attacks involved multiple attack vectors similar to internet attacks. However, CPS are more vulnerable to attacks. To evade detection, a hacker may apply multiple attack stages to gain the access to a control system. For example, he first employs a group of zombies (compromised machines) to identify the vulnerabilities of the target system and the findings would send back to the hacker through a communication channel. Once the correct access information is found by the zombies, the hacker could gain unauthorized access without violating any detection rules. The control system may be compromised by such multi-stage attacks and an appropriate defense mechanism is desired. In order to detect the sequence of such attack, this study correlates network information and system logs to find the stages of the attack. Finite state model, hidden Markov chain, is adopted to identify the multi-stage attacks and to prevent real damage. The results show that the proposed system can identify the multi-stage attacks in the early stage efficiently to prevent further damage in the networks.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115283977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lifelog-based active movement assistant system","authors":"Yusuke Satonaka, Takumi Kitazawa, Kazuki Suzuki, Yuki Fukuzaki, Takuya Azumi, N. Nishio","doi":"10.1109/CPSNA.2013.6614239","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614239","url":null,"abstract":"In our daily life, we commute between home and office. Even if we leave at around the same time and on the the same route, the arrival time might not be the same due to the difference in walking speed, traffic conditions and trains to ride. Therefore, it is useful to develop a movement assisting system which can give the user timely pace-making advice. In order to give such advice automatically, the system has to know an accurate progress of the movement, the method of transportation and its mobility characteristics; walking speed, routes and traffic congestion characteristics. Hence, we propose a movement assisting system that proactively checks user's movement progress and gives timely advice upon automatically created personalized plan. Utilizing user's daily life log data of movements, it extracts key features as the places the often visited at and methods of transportation between them, and estimates arrival time to the destination according to their movement characteristics. In the case of movement by bus, our system could reduce 25% of arrival time estimation error compared with the conventional methods.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117073467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-efficient sensor and task scheduling for extending battery life in a sensor node","authors":"Qian Zhao, Y. Nakamoto","doi":"10.1109/CPSNA.2013.6614253","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614253","url":null,"abstract":"Wireless sensor nodes are becoming more and more common in various settings and require a long battery life for better maintainability. Since most sensor nodes are powered by batteries, energy efficiency of the sensor node became a critical problem. In an experiment, we observed that battery voltage drops quickly due to a high peak power consumption. When battery voltage dropped to the operation voltage, the sensor stops working even though some useful charge remains in the battery. We propose three off-line algorithms that extend battery life by scheduling sensors' execution time that is able to reduce peak power consumption as much as possible under a deadline constraint. Moreover, we present a DVFS-enabled periodical task execution algorithm and an execution time scaling periodical task execution algorithm to improve the total energy efficiency of the sensor node. We also simulated these sensor scheduling algorithms and the task scheduling algorithms to evaluate their effectiveness. The simulation results showed that one of the three sensor scheduling algorithms dramatically can extend battery life approximately three time as long as in simultaneous sensor activation, and the two task scheduling algorithms are more energy efficient compared with continuous task execution.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"141 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133356510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Konečný, Walid Taha, J. Duracz, Adam Duracz, A. Ames
{"title":"Enclosing the behavior of a hybrid system up to and beyond a Zeno point","authors":"M. Konečný, Walid Taha, J. Duracz, Adam Duracz, A. Ames","doi":"10.1109/CPSNA.2013.6614258","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614258","url":null,"abstract":"Even simple hybrid systems like the classic bouncing ball can exhibit Zeno behaviors. The existence of this type of behavior has so far forced simulators to either ignore some events or risk looping indefinitely. This in turn forces modelers to either insert ad hoc restrictions to circumvent Zeno behavior or to abandon hybrid modeling. To address this problem, we take a fresh look at event detection and localization. A key insight that emerges from this investigation is that an enclosure for a given time interval can be valid independently of the occurrence of a given event. Such an event can then even occur an unbounded number of times, thus making it possible to handle certain types of Zeno behavior.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128694938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}