Cyber Physical System

In 2006, Cyber Physical Systems (CPS), the new word was invented in the United States [1]. The combination of devices like sensors with embedded systems is quickly receiving its place in cyber world. These devices jointly with the information filed are becoming the main focal point, called as Cyber Physical Systems. This word was found keeping in mind the escaling significance of relations among the mutually related computing systems with the physical world [2]. The author of this paper gives an overview of CPS architecture, its functions and its security threat. Citation: Navin Dhinnesh ADC, Mepco Schlenk Engineering College. "Cyber Physical System." Global Research and Development Journal For Engineering 34 2018: 12 - 14.

GRD Journals- Global Research and Development Journal for Engineering | Volume 3 | Issue 4 | March 2018
ISSN: 2455-5703
All rights reserved by www.grdjournals.com 12
Cyber Physical System
Navin Dhinnesh ADC
Assistant Professor (Sr. Gr)
Department of Computer Applications
Mepco Schlenk Engineering College, Sivakasi
Abstract
In 2006, Cyber Physical Systems (CPS), the new word was invented in the United States [1]. The combination of devices like
sensors with embedded systems is quickly receiving its place in cyber world. These devices jointly with the information filed are
becoming the main focal point, called as Cyber Physical Systems. This word was found keeping in mind the escaling significance
of relations among the mutually related computing systems with the physical world [2]. The author of this paper gives an overview
of CPS architecture, its functions and its security threat.
Keywords- Internet of Things, Sensor, Cyber-Physical Systems, Real Time Systems, Embedded Systems
I. INTRODUCTION
Combining the applications that are very much beneficial in the aspect of computing both in space and time are said to be cyber
physical systems [3]. The combined effect of two systems, cyber and physical, has changed our work style [4]. The Cyber Physical
System (CPS) is considered as a smart system, which is extremely interconnected. CPS and Internet of Things (IoT) have closely
related concepts. The CPS impact is very much obvious in the field of autonomous vehicles, Robots, etc., CPS have assisted in the
development of smart devices [5. These smart devices are connected by means of IoT and allowed to work together. The
combination of both CPS and IoT are capable of capturing and processing data so that the user gets constructive information from
it. CPS is considered to be networked as well as distributed among Real Times Systems (RTS) [6]. CPS has few distinguished
properties like: Self-adaptation, Self-organization, Self-optimization, etc.
Some of the examples of CPS are: medical devices, aerospace systems, defense systems, etc. CPS should function
dependably, at the same time in a safe and secure manner. CPS is measured as convergence of embedded systems. Now a day the
field of aerospace, factory automation is very much in need of CPS. These lead to finding of new research horizons. CPS is also
for non-technical users too. CPS is now a day becoming ubiquitous. As internet brought change in transformation in human life,
CPS change the way in working together with the physical world. CPS will work with the systems that react more swiftly and also
with the systems that are so accurate [7]. In coming years, all the smart systems will be using CPS. Cross layer design plays a vital
role here since a system is believed to be CPS if and only if there exists a stiff interaction among physical and cyber parts.
II. ARCHITECTURE OF CPS
The CPS architecture shown in Figure 1 comprises of Controller, Sensor and Actuator to interact with the physical world. Physical
world include: physical entities, humans, and physical sensors. The CPS architecture will be suitable mainly for many applications
and also for services.
Fig. 1: CPS Architecture
Cyber Physical System
(GRDJE/ Volume 3 / Issue 4 / 003)
All rights reserved by www.grdjournals.com 13
A. Functions of Cyber Physical System
CPS functions are classified into five levels. They are: i) Configuration Level, ii) Cognition Level, iii) Cyber Level, iv) Data to
Information Conversion Level, and v) Smart Connection Level. The five levels [4] are shown in Figure 2
Fig. 2: Five levels of Cyber Physical System
Image Courtesy [8]
B. Security Threats in CPS
The most vulnerable threat in CPS are the potential threats, which must be handled from various angles. Conventionally if a system
is said to be secure only when it suit the following three security necessities [9]: i) Confidentiality, ii) Availability, and iii) Integrity.
A threat is nothing but a situation which is probable of making damage [10]. Potential threats are the one which will be possible
but not thus far real. Every threat is classified into five critical factors as: source, target, motive, attack vector, and potential penalty.
Table I shows the various critical factors and their outcomes.
Table 1: Critical factors and their outcomes
S. No Critical Factor Outcome
1 Source
is the origin of an attack
Three types:
i) Adversarial threat – from person, groups or nations
ii) Accidental threat – accidentally caused
iii) Environmental threat – natural disasters [11]
2 Target main target will be CPS components as well as CPS applications
3 Motive may be political or spying or criminal [12] [13]
4 Attack Vector
May execute any one among the following four methods.
i) Interception
ii) Interruption
iii) Modification
iv) Fabrication
5 Penalty will negotiate the systems confidentiality, reliability, availability, privacy, or protection
III.CHALLENGES IN CPS
There are numerous challenges in CPS. The author has taken into consideration Automotive and Medical CPS for our discussion.
A. Automotive Scenario [14]
People are now using lot of sensors in the field of automobile sector, mainly for protecting the passenger from any danger. The
system will be assisting the drivers who are driving their vehicle in a monotonous manner. These are the basics of autonomous
vehicles. A vehicle to be autonomous the sensors must be very much useful in assistance in fault findings, communication between
vehicles, etc. The main communication among vehicles will permit exchange of data like speed, traffic, etc.
Cyber Physical System
(GRDJE/ Volume 3 / Issue 4 / 003)
All rights reserved by www.grdjournals.com 14
B. Medical Cyber-Physical Systems
This is mainly for monitoring the patients. These systems must also be monitored, since it should not mal function. Medical CPS
is mainly for monitoring the patient`s body. The machines used to monitor patients are proton therapy, implantable devices, etc.
The devices should work properly and must not malfunction. Safety and reliability are very important here.
IV.CONCLUSION
All the computing systems must be rethought. Although by using the CPS, a country may be protected from attacks coming from
inside, but it cannot from the external world. Now a day the current trend is that everyone is practicing cyber physical system.
Using this secured CPS, one can protect so many human lives.
ACKNOWLEDGEMENT
The author acknowledges the support and encouragement by the Management, Principal and Director of Computer Applications
department, towards this work.
REFERENCE
[1] Lee, E. A. (2006). Cyber-physical systems—are computing foundations adequate? NSF Workshop on Cyber-Physical Systems: Research Motivation,
Techniques and Roadmap, Austin, Texas.
[2] L Wang, M Törngren, M Onori, “Current status and advancement of cyber-physical systems in manufacturing”, Journal of Manufacturing Systems, 37, pp
517 -527, 2015
[3] Rajkumar R, et. al, “Cyber physical systems: The Next Computing Revolution”, Design Automation Conference, 2010
[4] Wilbur L. Ross, Kent Rochford, “Framework for Cyber -Physical Systems: Overview, National Institute of Standards and Technology, U.S. Department of
Commerce, Volume 1, Version 1.0, June 2017 Available : https://doi.org/10.6028/NIST.SP.1500-201.pdf
[5] Nishtha Kessawni, Sanjay Kumar, “Cyber Physical Systems and Smart Cities”, CSI Communications, Vol 41, Issue 9, pp 29 – 30, December 2017
[6] Suseela, Kavitha, “Cyber Physical System (CPS) and its Implications”, CSI Communications, Vol 41, Issue 9, pp 8 – 10, December 2017
[7] Antsaklis P, “Goals and Challenges in Cyber-Physical Systems Research Editorial of the Editor in Chief”, IEEE Transactions on Automatic Control, Vol. 59,
No. 12, Dec 2014
[8] https://en.wikipedia.org/wiki/Cyber-physical_system
[9] A Humayed, J Lin, F Li, B Luo, “Cyber-Physical Systems Security – A Survey”, Cornell University Library, Jan 2017, Available:
https://arxiv.org/pdf/1701.04525.pdf
[10] Charles P. Pfleeger and Shari Lawrence Pfleeger, “Security in Computing (4th Edition)”, Prentice Hall PTR, Upper Saddle River, NJ, USA, 2006
[11] James L Cebula and Lisa R Young. A taxonomy of operational cyber security risks. Technical report, DTIC Document, 2010
[12] Roberto Setola. Cyber threats to scada systems, 2011.
[13] US-CERT. Cyber threat source descriptions, “https://ics- gov/content/cyber-threat-source-descriptions”, 2009
[14] Bartocci E, “Cyber-Physical Systems: Theoretical and Practical Challenges”, ERCIM news 2017. Available online: https://ercim-
news.ercim.eu/en97/special/cyber-physical-systems-theoretical-and-practical-challenges

Recommended

Cyber-Physical Systems by
Cyber-Physical SystemsCyber-Physical Systems
Cyber-Physical SystemsSinem Coleri Ergen
6K views22 slides
Final cyber physical system (1) by
Final cyber physical system (1)Final cyber physical system (1)
Final cyber physical system (1)vanisre jaiswal
8.5K views23 slides
Cyber physical manufacturing systems by
Cyber physical manufacturing systemsCyber physical manufacturing systems
Cyber physical manufacturing systemsDr Prashant S Humnabad
650 views29 slides
Cyber Physical System: Architecture, Applications and Research Challenges by
Cyber Physical System: Architecture, Applicationsand Research ChallengesCyber Physical System: Architecture, Applicationsand Research Challenges
Cyber Physical System: Architecture, Applications and Research ChallengesSyed Hassan Ahmed
5.8K views12 slides
The Impacts of Cyber Physical Systems on Products by
The Impacts of Cyber Physical Systems on ProductsThe Impacts of Cyber Physical Systems on Products
The Impacts of Cyber Physical Systems on ProductsArian Razmi Farooji
2.2K views12 slides
Data processing in Cyber-Physical Systems by
Data processing in Cyber-Physical SystemsData processing in Cyber-Physical Systems
Data processing in Cyber-Physical SystemsBob Marcus
885 views115 slides

More Related Content

What's hot

Object Detection Beyond Mask R-CNN and RetinaNet I by
Object Detection Beyond Mask R-CNN and RetinaNet IObject Detection Beyond Mask R-CNN and RetinaNet I
Object Detection Beyond Mask R-CNN and RetinaNet IWanjin Yu
3.6K views61 slides
Digital Transformation and Power BI by
Digital Transformation and Power BIDigital Transformation and Power BI
Digital Transformation and Power BIAniket Kanitkar
1.5K views12 slides
Software management renaissance by
Software management renaissanceSoftware management renaissance
Software management renaissanceKuppusamy P
1.4K views68 slides
Industry 4.0 by
Industry 4.0Industry 4.0
Industry 4.0Anuj Gupta
431 views15 slides
Cyber physical systems and robotics by
Cyber physical systems and roboticsCyber physical systems and robotics
Cyber physical systems and roboticstrinhanhtuan247
9.1K views67 slides
Industry 4.0 A Great Future by
Industry 4.0 A Great FutureIndustry 4.0 A Great Future
Industry 4.0 A Great FutureSuraj Biswas
832 views33 slides

What's hot(20)

Object Detection Beyond Mask R-CNN and RetinaNet I by Wanjin Yu
Object Detection Beyond Mask R-CNN and RetinaNet IObject Detection Beyond Mask R-CNN and RetinaNet I
Object Detection Beyond Mask R-CNN and RetinaNet I
Wanjin Yu3.6K views
Digital Transformation and Power BI by Aniket Kanitkar
Digital Transformation and Power BIDigital Transformation and Power BI
Digital Transformation and Power BI
Aniket Kanitkar1.5K views
Software management renaissance by Kuppusamy P
Software management renaissanceSoftware management renaissance
Software management renaissance
Kuppusamy P1.4K views
Industry 4.0 by Anuj Gupta
Industry 4.0Industry 4.0
Industry 4.0
Anuj Gupta431 views
Cyber physical systems and robotics by trinhanhtuan247
Cyber physical systems and roboticsCyber physical systems and robotics
Cyber physical systems and robotics
trinhanhtuan2479.1K views
Industry 4.0 A Great Future by Suraj Biswas
Industry 4.0 A Great FutureIndustry 4.0 A Great Future
Industry 4.0 A Great Future
Suraj Biswas832 views
Designing for IoT and Cyber-Physical System by Maurizio Caporali
Designing for IoT and Cyber-Physical SystemDesigning for IoT and Cyber-Physical System
Designing for IoT and Cyber-Physical System
Maurizio Caporali1.1K views
A Survey on Machine Learning Algorithms by AM Publications
A Survey on Machine Learning AlgorithmsA Survey on Machine Learning Algorithms
A Survey on Machine Learning Algorithms
AM Publications348 views
UBIQUITOUS COMPUTING - Mary M by Mary Margarat
UBIQUITOUS COMPUTING - Mary MUBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary M
Mary Margarat7.6K views
Is AI going to provide safety for us? by DLabs
Is AI going to provide safety for us?Is AI going to provide safety for us?
Is AI going to provide safety for us?
DLabs300 views
Smart Manufacturing by Lukas Ott
Smart ManufacturingSmart Manufacturing
Smart Manufacturing
Lukas Ott2.4K views
Artificial Intelligence Introduction & Business usecases by Vikas Jain
Artificial Intelligence Introduction & Business usecasesArtificial Intelligence Introduction & Business usecases
Artificial Intelligence Introduction & Business usecases
Vikas Jain526 views
Smart city as a Digital Twin by SANGHEE SHIN
Smart city as a Digital TwinSmart city as a Digital Twin
Smart city as a Digital Twin
SANGHEE SHIN2.8K views
Edge Computing: Bringing the Internet Closer to You by Megan O'Keefe
Edge Computing: Bringing the Internet Closer to YouEdge Computing: Bringing the Internet Closer to You
Edge Computing: Bringing the Internet Closer to You
Megan O'Keefe2.3K views
Leveraging Cloud for Non-Production Environments by Cognizant
Leveraging Cloud for Non-Production EnvironmentsLeveraging Cloud for Non-Production Environments
Leveraging Cloud for Non-Production Environments
Cognizant3.5K views
Smart surveillance by Puneet soni
Smart surveillanceSmart surveillance
Smart surveillance
Puneet soni2.5K views
AI for Manufacturing (Machine Vision, Edge AI, Federated Learning) by byteLAKE
AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)
AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)
byteLAKE717 views
Machine Learning and Industrie 4.0 by Peter Schleinitz
Machine Learning and Industrie 4.0Machine Learning and Industrie 4.0
Machine Learning and Industrie 4.0
Peter Schleinitz2.2K views

Similar to Cyber Physical System

Artificial intelligence and machine learning in dynamic cyber risk analytics ... by
Artificial intelligence and machine learning in dynamic cyber risk analytics ...Artificial intelligence and machine learning in dynamic cyber risk analytics ...
Artificial intelligence and machine learning in dynamic cyber risk analytics ...Petar Radanliev
9 views8 slides
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems by
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsUpsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsIRJET Journal
38 views5 slides
IRJET- Architectural Modeling and Cybersecurity Analysis of Cyber-Physical Sy... by
IRJET- Architectural Modeling and Cybersecurity Analysis of Cyber-Physical Sy...IRJET- Architectural Modeling and Cybersecurity Analysis of Cyber-Physical Sy...
IRJET- Architectural Modeling and Cybersecurity Analysis of Cyber-Physical Sy...IRJET Journal
31 views17 slides
IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst... by
IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...
IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...IRJET Journal
17 views4 slides
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL... by
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...ijcsit
9 views12 slides
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical... by
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...AIRCC Publishing Corporation
9 views12 slides

Similar to Cyber Physical System(20)

Artificial intelligence and machine learning in dynamic cyber risk analytics ... by Petar Radanliev
Artificial intelligence and machine learning in dynamic cyber risk analytics ...Artificial intelligence and machine learning in dynamic cyber risk analytics ...
Artificial intelligence and machine learning in dynamic cyber risk analytics ...
Petar Radanliev9 views
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems by IRJET Journal
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsUpsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
IRJET Journal38 views
IRJET- Architectural Modeling and Cybersecurity Analysis of Cyber-Physical Sy... by IRJET Journal
IRJET- Architectural Modeling and Cybersecurity Analysis of Cyber-Physical Sy...IRJET- Architectural Modeling and Cybersecurity Analysis of Cyber-Physical Sy...
IRJET- Architectural Modeling and Cybersecurity Analysis of Cyber-Physical Sy...
IRJET Journal31 views
IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst... by IRJET Journal
IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...
IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...
IRJET Journal17 views
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL... by ijcsit
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
ijcsit9 views
Testing and Development Challenges for Complex Cyber-Physical Systems: Insi... by Sebastiano Panichella
Testing and Development Challenges for  Complex Cyber-Physical Systems:  Insi...Testing and Development Challenges for  Complex Cyber-Physical Systems:  Insi...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insi...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe... by IRJET Journal
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
IRJET Journal104 views
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective T... by Sebastiano Panichella
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective T...Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective T...
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective T...
Cyber physical systems: A smart city perspective by IJECEIAES
Cyber physical systems: A smart city perspective  Cyber physical systems: A smart city perspective
Cyber physical systems: A smart city perspective
IJECEIAES37 views
Cyber security: challenges for society- literature review by IOSR Journals
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature review
IOSR Journals1K views
76 s201918 by IJRAT
76 s20191876 s201918
76 s201918
IJRAT44 views
Dealing with the Internet of Insecure Things by Arosha Bandara
Dealing with the Internet of Insecure ThingsDealing with the Internet of Insecure Things
Dealing with the Internet of Insecure Things
Arosha Bandara381 views
Nuclear Facilities Are Among The Most Highly Secured... by Crystal Williams
Nuclear Facilities Are Among The Most Highly Secured...Nuclear Facilities Are Among The Most Highly Secured...
Nuclear Facilities Are Among The Most Highly Secured...
A Smart ITS based Sensor Network for Transport System with Integration of Io... by IRJET Journal
A Smart ITS based Sensor Network for Transport System with Integration of  Io...A Smart ITS based Sensor Network for Transport System with Integration of  Io...
A Smart ITS based Sensor Network for Transport System with Integration of Io...
IRJET Journal45 views
National Incident Management System Response Paper by Donna Gallegos
National Incident Management System Response PaperNational Incident Management System Response Paper
National Incident Management System Response Paper
Donna Gallegos2 views
A secure service provisioning framework for cyber physical cloud computing sy... by ijdpsjournal
A secure service provisioning framework for cyber physical cloud computing sy...A secure service provisioning framework for cyber physical cloud computing sy...
A secure service provisioning framework for cyber physical cloud computing sy...
ijdpsjournal380 views

More from GRD Journals

Solid Waste Management a need of Time by
Solid Waste Management a need of TimeSolid Waste Management a need of Time
Solid Waste Management a need of TimeGRD Journals
103 views4 slides
Sequential Batch Reactor by
Sequential Batch ReactorSequential Batch Reactor
Sequential Batch ReactorGRD Journals
473 views3 slides
Self-Tuning Fuzzy PID Design for BLDC Speed Control by
Self-Tuning Fuzzy PID Design for BLDC Speed ControlSelf-Tuning Fuzzy PID Design for BLDC Speed Control
Self-Tuning Fuzzy PID Design for BLDC Speed ControlGRD Journals
92 views8 slides
Foot Lever Operated Refrigerator Door Opener and Motor Operated Closure by
Foot Lever Operated Refrigerator Door Opener and Motor Operated ClosureFoot Lever Operated Refrigerator Door Opener and Motor Operated Closure
Foot Lever Operated Refrigerator Door Opener and Motor Operated ClosureGRD Journals
72 views3 slides
Methodology for Prevention and Repair of Cracks in Building by
Methodology for Prevention and Repair of Cracks in BuildingMethodology for Prevention and Repair of Cracks in Building
Methodology for Prevention and Repair of Cracks in BuildingGRD Journals
3.4K views7 slides
Glass Fiber Reinforced Gypsum Panel use in Building Construction by
Glass Fiber Reinforced Gypsum Panel use in Building ConstructionGlass Fiber Reinforced Gypsum Panel use in Building Construction
Glass Fiber Reinforced Gypsum Panel use in Building ConstructionGRD Journals
424 views5 slides

More from GRD Journals(6)

Solid Waste Management a need of Time by GRD Journals
Solid Waste Management a need of TimeSolid Waste Management a need of Time
Solid Waste Management a need of Time
GRD Journals103 views
Sequential Batch Reactor by GRD Journals
Sequential Batch ReactorSequential Batch Reactor
Sequential Batch Reactor
GRD Journals473 views
Self-Tuning Fuzzy PID Design for BLDC Speed Control by GRD Journals
Self-Tuning Fuzzy PID Design for BLDC Speed ControlSelf-Tuning Fuzzy PID Design for BLDC Speed Control
Self-Tuning Fuzzy PID Design for BLDC Speed Control
GRD Journals92 views
Foot Lever Operated Refrigerator Door Opener and Motor Operated Closure by GRD Journals
Foot Lever Operated Refrigerator Door Opener and Motor Operated ClosureFoot Lever Operated Refrigerator Door Opener and Motor Operated Closure
Foot Lever Operated Refrigerator Door Opener and Motor Operated Closure
GRD Journals72 views
Methodology for Prevention and Repair of Cracks in Building by GRD Journals
Methodology for Prevention and Repair of Cracks in BuildingMethodology for Prevention and Repair of Cracks in Building
Methodology for Prevention and Repair of Cracks in Building
GRD Journals3.4K views
Glass Fiber Reinforced Gypsum Panel use in Building Construction by GRD Journals
Glass Fiber Reinforced Gypsum Panel use in Building ConstructionGlass Fiber Reinforced Gypsum Panel use in Building Construction
Glass Fiber Reinforced Gypsum Panel use in Building Construction
GRD Journals424 views

Recently uploaded

String.pptx by
String.pptxString.pptx
String.pptxAnanthi Palanisamy
47 views24 slides
Electrical Crimping by
Electrical CrimpingElectrical Crimping
Electrical CrimpingIwiss Tools Co.,Ltd
21 views22 slides
Object Oriented Programming with JAVA by
Object Oriented Programming with JAVAObject Oriented Programming with JAVA
Object Oriented Programming with JAVADemian Antony D'Mello
95 views28 slides
7_DVD_Combinational_MOS_Logic_Circuits.pdf by
7_DVD_Combinational_MOS_Logic_Circuits.pdf7_DVD_Combinational_MOS_Logic_Circuits.pdf
7_DVD_Combinational_MOS_Logic_Circuits.pdfUsha Mehta
59 views133 slides
CHEMICAL KINETICS.pdf by
CHEMICAL KINETICS.pdfCHEMICAL KINETICS.pdf
CHEMICAL KINETICS.pdfAguedaGutirrez
8 views337 slides
802.11 Computer Networks by
802.11 Computer Networks802.11 Computer Networks
802.11 Computer NetworksTusharChoudhary72015
9 views33 slides

Recently uploaded(20)

7_DVD_Combinational_MOS_Logic_Circuits.pdf by Usha Mehta
7_DVD_Combinational_MOS_Logic_Circuits.pdf7_DVD_Combinational_MOS_Logic_Circuits.pdf
7_DVD_Combinational_MOS_Logic_Circuits.pdf
Usha Mehta59 views
MSA Website Slideshow (16).pdf by msaucla
MSA Website Slideshow (16).pdfMSA Website Slideshow (16).pdf
MSA Website Slideshow (16).pdf
msaucla46 views
Design and analysis of a new undergraduate Computer Engineering degree – a me... by WaelBadawy6
Design and analysis of a new undergraduate Computer Engineering degree – a me...Design and analysis of a new undergraduate Computer Engineering degree – a me...
Design and analysis of a new undergraduate Computer Engineering degree – a me...
WaelBadawy653 views
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th... by ahmedmesaiaoun
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...
ahmedmesaiaoun12 views
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) by Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
9_DVD_Dynamic_logic_circuits.pdf by Usha Mehta
9_DVD_Dynamic_logic_circuits.pdf9_DVD_Dynamic_logic_circuits.pdf
9_DVD_Dynamic_logic_circuits.pdf
Usha Mehta28 views
Thermal aware task assignment for multicore processors using genetic algorithm by IJECEIAES
Thermal aware task assignment for multicore processors using genetic algorithm Thermal aware task assignment for multicore processors using genetic algorithm
Thermal aware task assignment for multicore processors using genetic algorithm
IJECEIAES30 views
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L... by Anowar Hossain
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
Anowar Hossain12 views

Cyber Physical System

  • 1. GRD Journals- Global Research and Development Journal for Engineering | Volume 3 | Issue 4 | March 2018 ISSN: 2455-5703 All rights reserved by www.grdjournals.com 12 Cyber Physical System Navin Dhinnesh ADC Assistant Professor (Sr. Gr) Department of Computer Applications Mepco Schlenk Engineering College, Sivakasi Abstract In 2006, Cyber Physical Systems (CPS), the new word was invented in the United States [1]. The combination of devices like sensors with embedded systems is quickly receiving its place in cyber world. These devices jointly with the information filed are becoming the main focal point, called as Cyber Physical Systems. This word was found keeping in mind the escaling significance of relations among the mutually related computing systems with the physical world [2]. The author of this paper gives an overview of CPS architecture, its functions and its security threat. Keywords- Internet of Things, Sensor, Cyber-Physical Systems, Real Time Systems, Embedded Systems I. INTRODUCTION Combining the applications that are very much beneficial in the aspect of computing both in space and time are said to be cyber physical systems [3]. The combined effect of two systems, cyber and physical, has changed our work style [4]. The Cyber Physical System (CPS) is considered as a smart system, which is extremely interconnected. CPS and Internet of Things (IoT) have closely related concepts. The CPS impact is very much obvious in the field of autonomous vehicles, Robots, etc., CPS have assisted in the development of smart devices [5. These smart devices are connected by means of IoT and allowed to work together. The combination of both CPS and IoT are capable of capturing and processing data so that the user gets constructive information from it. CPS is considered to be networked as well as distributed among Real Times Systems (RTS) [6]. CPS has few distinguished properties like: Self-adaptation, Self-organization, Self-optimization, etc. Some of the examples of CPS are: medical devices, aerospace systems, defense systems, etc. CPS should function dependably, at the same time in a safe and secure manner. CPS is measured as convergence of embedded systems. Now a day the field of aerospace, factory automation is very much in need of CPS. These lead to finding of new research horizons. CPS is also for non-technical users too. CPS is now a day becoming ubiquitous. As internet brought change in transformation in human life, CPS change the way in working together with the physical world. CPS will work with the systems that react more swiftly and also with the systems that are so accurate [7]. In coming years, all the smart systems will be using CPS. Cross layer design plays a vital role here since a system is believed to be CPS if and only if there exists a stiff interaction among physical and cyber parts. II. ARCHITECTURE OF CPS The CPS architecture shown in Figure 1 comprises of Controller, Sensor and Actuator to interact with the physical world. Physical world include: physical entities, humans, and physical sensors. The CPS architecture will be suitable mainly for many applications and also for services. Fig. 1: CPS Architecture
  • 2. Cyber Physical System (GRDJE/ Volume 3 / Issue 4 / 003) All rights reserved by www.grdjournals.com 13 A. Functions of Cyber Physical System CPS functions are classified into five levels. They are: i) Configuration Level, ii) Cognition Level, iii) Cyber Level, iv) Data to Information Conversion Level, and v) Smart Connection Level. The five levels [4] are shown in Figure 2 Fig. 2: Five levels of Cyber Physical System Image Courtesy [8] B. Security Threats in CPS The most vulnerable threat in CPS are the potential threats, which must be handled from various angles. Conventionally if a system is said to be secure only when it suit the following three security necessities [9]: i) Confidentiality, ii) Availability, and iii) Integrity. A threat is nothing but a situation which is probable of making damage [10]. Potential threats are the one which will be possible but not thus far real. Every threat is classified into five critical factors as: source, target, motive, attack vector, and potential penalty. Table I shows the various critical factors and their outcomes. Table 1: Critical factors and their outcomes S. No Critical Factor Outcome 1 Source is the origin of an attack Three types: i) Adversarial threat – from person, groups or nations ii) Accidental threat – accidentally caused iii) Environmental threat – natural disasters [11] 2 Target main target will be CPS components as well as CPS applications 3 Motive may be political or spying or criminal [12] [13] 4 Attack Vector May execute any one among the following four methods. i) Interception ii) Interruption iii) Modification iv) Fabrication 5 Penalty will negotiate the systems confidentiality, reliability, availability, privacy, or protection III.CHALLENGES IN CPS There are numerous challenges in CPS. The author has taken into consideration Automotive and Medical CPS for our discussion. A. Automotive Scenario [14] People are now using lot of sensors in the field of automobile sector, mainly for protecting the passenger from any danger. The system will be assisting the drivers who are driving their vehicle in a monotonous manner. These are the basics of autonomous vehicles. A vehicle to be autonomous the sensors must be very much useful in assistance in fault findings, communication between vehicles, etc. The main communication among vehicles will permit exchange of data like speed, traffic, etc.
  • 3. Cyber Physical System (GRDJE/ Volume 3 / Issue 4 / 003) All rights reserved by www.grdjournals.com 14 B. Medical Cyber-Physical Systems This is mainly for monitoring the patients. These systems must also be monitored, since it should not mal function. Medical CPS is mainly for monitoring the patient`s body. The machines used to monitor patients are proton therapy, implantable devices, etc. The devices should work properly and must not malfunction. Safety and reliability are very important here. IV.CONCLUSION All the computing systems must be rethought. Although by using the CPS, a country may be protected from attacks coming from inside, but it cannot from the external world. Now a day the current trend is that everyone is practicing cyber physical system. Using this secured CPS, one can protect so many human lives. ACKNOWLEDGEMENT The author acknowledges the support and encouragement by the Management, Principal and Director of Computer Applications department, towards this work. REFERENCE [1] Lee, E. A. (2006). Cyber-physical systems—are computing foundations adequate? NSF Workshop on Cyber-Physical Systems: Research Motivation, Techniques and Roadmap, Austin, Texas. [2] L Wang, M Törngren, M Onori, “Current status and advancement of cyber-physical systems in manufacturing”, Journal of Manufacturing Systems, 37, pp 517 -527, 2015 [3] Rajkumar R, et. al, “Cyber physical systems: The Next Computing Revolution”, Design Automation Conference, 2010 [4] Wilbur L. Ross, Kent Rochford, “Framework for Cyber -Physical Systems: Overview, National Institute of Standards and Technology, U.S. Department of Commerce, Volume 1, Version 1.0, June 2017 Available : https://doi.org/10.6028/NIST.SP.1500-201.pdf [5] Nishtha Kessawni, Sanjay Kumar, “Cyber Physical Systems and Smart Cities”, CSI Communications, Vol 41, Issue 9, pp 29 – 30, December 2017 [6] Suseela, Kavitha, “Cyber Physical System (CPS) and its Implications”, CSI Communications, Vol 41, Issue 9, pp 8 – 10, December 2017 [7] Antsaklis P, “Goals and Challenges in Cyber-Physical Systems Research Editorial of the Editor in Chief”, IEEE Transactions on Automatic Control, Vol. 59, No. 12, Dec 2014 [8] https://en.wikipedia.org/wiki/Cyber-physical_system [9] A Humayed, J Lin, F Li, B Luo, “Cyber-Physical Systems Security – A Survey”, Cornell University Library, Jan 2017, Available: https://arxiv.org/pdf/1701.04525.pdf [10] Charles P. Pfleeger and Shari Lawrence Pfleeger, “Security in Computing (4th Edition)”, Prentice Hall PTR, Upper Saddle River, NJ, USA, 2006 [11] James L Cebula and Lisa R Young. A taxonomy of operational cyber security risks. Technical report, DTIC Document, 2010 [12] Roberto Setola. Cyber threats to scada systems, 2011. [13] US-CERT. Cyber threat source descriptions, “https://ics- gov/content/cyber-threat-source-descriptions”, 2009 [14] Bartocci E, “Cyber-Physical Systems: Theoretical and Practical Challenges”, ERCIM news 2017. Available online: https://ercim- news.ercim.eu/en97/special/cyber-physical-systems-theoretical-and-practical-challenges