{"title":"ICCPS '21: ACM/IEEE 12th International Conference on Cyber-Physical Systems, Nashville, Tennessee, USA, May 19-21, 2021","authors":"","doi":"10.1145/3450267","DOIUrl":"https://doi.org/10.1145/3450267","url":null,"abstract":"","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79658352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Neema, P. Völgyesi, Bradley Potteiger, W. Emfinger, X. Koutsoukos, G. Karsai, Yevgeniy Vorobeychik, J. Sztipanovits
{"title":"Demo Abstract: SURE: An Experimentation and Evaluation Testbed for CPS Security and Resilience","authors":"H. Neema, P. Völgyesi, Bradley Potteiger, W. Emfinger, X. Koutsoukos, G. Karsai, Yevgeniy Vorobeychik, J. Sztipanovits","doi":"10.1109/ICCPS.2016.7479099","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479099","url":null,"abstract":"In-depth consideration and evaluation of security and resilience is necessary for developing the scientific foundations and technology of Cyber-Physical Systems (CPS). In this demonstration, we present SURE [1], a CPS experimentation and evaluation testbed for security and resilience focusing on transportation networks. The testbed includes (1) a heterogeneous modeling and simulation integration platform, (2) a Web-based tool for modeling CPS in adversarial environments, and (3) a framework for evaluating resilience using attacker-defender games. Users such as CPS designers and operators can interact with the testbed to evaluate monitoring and control schemes that include sensor placement and traffic signal configuration.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"9 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80094736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Poster Abstract: Modeling, Simulation and Verification Environment for Engineering Cyber-Physical Systems Based on Discrete Event System Specification","authors":"Hae Young Lee, So-Jin Lee","doi":"10.1109/ICCPS.2016.7479114","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479114","url":null,"abstract":"Summary form only given. Discrete event system specification (DEVS), a formalism for modeling and simulation, has been recently applied to the engineering of CPS, which also makes the necessity of model checking for DEVS arisen. Model-transformation-based approaches were first proposed; timed or linear hybrid automata are obtained from DEVS models, and then verified using model checkers. But, due to the different semantics in state transitions, the transformation often involves manual tasks, such as abstraction and approximation. To eliminate such manual tasks, we have proposed a DEVS subclass that is less expressive, but verifiable. For reachability analysis, its models can be interpreted as transition systems and region automata (RA). Although our DEVS subclass and RA have different semantics with respect to model execution, they are equivalent in terms of reachability analysis. Thus, the reachability could be analyzed based on model checking techniques of timed automata. In many DEVS-based environments, models should be developed by programming languages. To enables the modelers to specify CPS in a visual way, we have proposed a visual modeling language based on our subclass. In our language, the behavior and structure of CPS are graphically specified by basic model diagrams and coupled model diagrams, respectively. Based on our subclass and languages, we have implemented a proof-of-concept environment that supports visual modeling of CPS as well as simulation and reachability analysis of the models. To enable the consideration of the hybrid nature and heterogeneity in CPS, DEVS subclasses, languages, verification techniques and environments will be further investigated.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"4 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79520854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Pesticide Scheduling in Precision Agriculture","authors":"Austin Jones, Usman Ali, M. Egerstedt","doi":"10.1109/ICCPS.2016.7479110","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479110","url":null,"abstract":"Agricultural automation presents challenges typically encountered in the realm of cyber-physical systems, such as incomplete information (plant health indicators), external disturbances (weather), limited control authority (fertilizers cannot make a plant mature arbitrarily fast), and a combination of discrete events and continuous plant dynamics. In this paper, we investigate the problem of optimal pesticide spray scheduling. Regulations impose strict requirements on scheduling, e.g., individual pesticides are only effective during certain seasons and pesticides cannot be sprayed too close to harvest time. We show how to translate these requirements to a metric temporal logic formula over the space of schedules. We next use the theory of optimal mode scheduling to generate a schedule that minimizes the risk of various infestations over time while guaranteeing the satisfaction of the constraints. We demonstrate this methodology via simulation with scheduling constraints based on recommendations and regulations from agricultural experts. Our case study considers blueberries, a crop whose cultivation currently involves little automation.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"1 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83062004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WiP Abstract: Platform for Designing and Managing Resilient and Extensible CPS","authors":"Subhav Pradhan, A. Dubey, A. Gokhale","doi":"10.1109/ICCPS.2016.7479128","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479128","url":null,"abstract":"Extensible Cyber-Physical Systems (CPS) are loosely connected, multi-domain platforms that \"virtualize\" their resources to provide an open platform capable of hosting different cyber-physical applications. These cyber- physical platforms are extensible since resources and applications can be added or removed at any time. However, realizing such platform requires resolving challenges emanating from different properties; for this paper, we focus on resilience. Resilience is important for extensible CPS to make sure that extensibility of a system doesn't result in failures and anomalies.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"35 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75453498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploiting Wireless Channel Randomness to Generate Keys for Automotive Cyber-Physical System Security","authors":"Jiang Wan, A. Lopez, M. A. Faruque","doi":"10.1109/ICCPS.2016.7479103","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479103","url":null,"abstract":"Modern automotive Cyber-Physical Systems (CPSs) are increasingly adopting wireless communications for Intra-Vehicular, Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) protocols as a promising solution for challenges such as the wire harnessing problem, collision detection, and collision avoidance. Regrettably, this new trend results in new security vulnerabilities that can put the safety and privacy of the automotive CPS and passengers at great risk. In addition, automotive wireless communication security is constrained by strict energy and performance limitations of Electronic Controller Units (ECUs) and sensor nodes. As a result, the key generation and management for secure automotive CPS wireless communication is an open research challenge. This paper aims to help solve these security challenges by presenting a practical key generation technique based on the reciprocity and high spatial and temporal variation properties of the automotive wireless communication channel. To validate the practicality and effectiveness of our approach, we have conducted separate real- world experiments with automobiles and with RC cars. Lastly, we demonstrate through simulations that we can generate keys with high security strength (keys with 67% min-entropy) with up to 10X improvement in performance and 20X reduction in code size overhead in comparison to the state- of-the-art security techniques.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"16 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73223044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Masaki Igarashi, Atsushi Shimada, H. Nagahara, R. Taniguchi
{"title":"WiP Abstract: Human-Assisted Power Demand Forecasting Based on Action Plan Declaration","authors":"Masaki Igarashi, Atsushi Shimada, H. Nagahara, R. Taniguchi","doi":"10.1109/ICCPS.2016.7479126","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479126","url":null,"abstract":"We propose a method for forecasting power demand based on action plan declaration. Conventional method uses sensing data such as time series of power consumption and weather information and fails to forecast power demand due to unstable user behavior. By using action plan declared by user, meanwhile, we achieve rough forecasting of power demand.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"1 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84158507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demo Abstract: HajjCPS - A Cyber Physical Environment for Providing Location-Aware Services to a Very Large Crowd","authors":"Mohamed Abdur Rahman, Akhlaq Ahmad","doi":"10.1109/ICCPS.2016.7479098","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479098","url":null,"abstract":"In this demo we will present a suite of smartphone applications that support location-aware, personalized multimedia services to a very large crowd with the help of a cyber computing infrastructure. As a proof of concept, we target Hajj where more than 5 million pilgrims perform spatio-temporal activities. The cyber-physical system creates an ad-hoc social network among pilgrims, their family members, Hajj authorities, vehicles that provide services to the pilgrims, medical doctors and hospitals, and the city admins. The crowdsourced multimedia data from the suite of smartphone applications are captured by the cyber environment, processed to extract context information, sent to a cloud environment for real-time query processing, and finally shared with a very large crowd. The framework has been deployed since 2014.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"10 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90986049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ZUbers against ZLyfts Apocalypse: An Analysis Framework for DoS Attacks on Mobility-As-A-Service Systems","authors":"Chenyang Yuan, Jérôme Thai, A. Bayen","doi":"10.1109/ICCPS.2016.7479132","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479132","url":null,"abstract":"The vulnerability of Mobility-as-a-Service (MaaS) systems to Denial-of-Service (DoS) attacks is studied. We use a queuing-theoretical framework to model the re-dispatch process used by operators to maintain a high service availability, as well as potential cyber-attacks on this process. It encompasses a customer arrival rate model at different sections of an urban area to pick up vehicles traveling within the network. Expanding this re-balance model, we analyze DoS cyber-attacks of MaaS systems by controlling a fraction of the cars maliciously through fake reservations (so called Zombies) placed in the system (similar to the computer science field where a Zombie is a computer that a remote attacker has accessed for malicious purpose). The attacker can then use the block-coordinate descent algorithm proposed in the present work to derive optimal strategies to minimize the efficiency of the MaaS system, thereby allowing us to quantify the economic loss of such systems under attack. The technique is shown to work well and enables us to arbitrarily deplete taxi availabilities based on the attacker's choice and the radius of attacks, which is demonstrated by drawing a \"Cal\" logo in Manhattan. Finally, a cost-benefit analysis using data from 75 million taxi trips shows diminishing returns for the attacker and that countermeasures raising the attack cost to more than $15 could protect MaaS systems in NYC from Zombies.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"7 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80089473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Konstantinos Gatsis, Alejandro Ribeiro, George J. Pappas
{"title":"Control-Aware Random Access Communication","authors":"Konstantinos Gatsis, Alejandro Ribeiro, George J. Pappas","doi":"10.1109/ICCPS.2016.7479071","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479071","url":null,"abstract":"In modern control applications multiple wireless sensors need to efficiently share the available wireless medium to communicate with their respective actuators. Random access policies, where each sensor independently decides whether to access the shared wireless medium, are attractive as they do not require central coordination. However interference between simultaneous transmissions causes transmitted packets to collide, leading to control performance degradation or potentially instability. Given plant and controller dynamics, we derive a sufficient condition for the access policy employed by each sensor so that wireless interference does not violate stability of any involved control loop. Based on this decoupling condition we design random access communication policies that are control-aware by adapting to the physical plant states measured by the sensors online. The control performance of our design is illustrated in numerical simulations.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"62 2 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88678686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}