SlideShare a Scribd company logo
1 of 3
Download to read offline
GRD Journals- Global Research and Development Journal for Engineering | Volume 3 | Issue 4 | March 2018
ISSN: 2455-5703
All rights reserved by www.grdjournals.com 12
Cyber Physical System
Navin Dhinnesh ADC
Assistant Professor (Sr. Gr)
Department of Computer Applications
Mepco Schlenk Engineering College, Sivakasi
Abstract
In 2006, Cyber Physical Systems (CPS), the new word was invented in the United States [1]. The combination of devices like
sensors with embedded systems is quickly receiving its place in cyber world. These devices jointly with the information filed are
becoming the main focal point, called as Cyber Physical Systems. This word was found keeping in mind the escaling significance
of relations among the mutually related computing systems with the physical world [2]. The author of this paper gives an overview
of CPS architecture, its functions and its security threat.
Keywords- Internet of Things, Sensor, Cyber-Physical Systems, Real Time Systems, Embedded Systems
I. INTRODUCTION
Combining the applications that are very much beneficial in the aspect of computing both in space and time are said to be cyber
physical systems [3]. The combined effect of two systems, cyber and physical, has changed our work style [4]. The Cyber Physical
System (CPS) is considered as a smart system, which is extremely interconnected. CPS and Internet of Things (IoT) have closely
related concepts. The CPS impact is very much obvious in the field of autonomous vehicles, Robots, etc., CPS have assisted in the
development of smart devices [5. These smart devices are connected by means of IoT and allowed to work together. The
combination of both CPS and IoT are capable of capturing and processing data so that the user gets constructive information from
it. CPS is considered to be networked as well as distributed among Real Times Systems (RTS) [6]. CPS has few distinguished
properties like: Self-adaptation, Self-organization, Self-optimization, etc.
Some of the examples of CPS are: medical devices, aerospace systems, defense systems, etc. CPS should function
dependably, at the same time in a safe and secure manner. CPS is measured as convergence of embedded systems. Now a day the
field of aerospace, factory automation is very much in need of CPS. These lead to finding of new research horizons. CPS is also
for non-technical users too. CPS is now a day becoming ubiquitous. As internet brought change in transformation in human life,
CPS change the way in working together with the physical world. CPS will work with the systems that react more swiftly and also
with the systems that are so accurate [7]. In coming years, all the smart systems will be using CPS. Cross layer design plays a vital
role here since a system is believed to be CPS if and only if there exists a stiff interaction among physical and cyber parts.
II. ARCHITECTURE OF CPS
The CPS architecture shown in Figure 1 comprises of Controller, Sensor and Actuator to interact with the physical world. Physical
world include: physical entities, humans, and physical sensors. The CPS architecture will be suitable mainly for many applications
and also for services.
Fig. 1: CPS Architecture
Cyber Physical System
(GRDJE/ Volume 3 / Issue 4 / 003)
All rights reserved by www.grdjournals.com 13
A. Functions of Cyber Physical System
CPS functions are classified into five levels. They are: i) Configuration Level, ii) Cognition Level, iii) Cyber Level, iv) Data to
Information Conversion Level, and v) Smart Connection Level. The five levels [4] are shown in Figure 2
Fig. 2: Five levels of Cyber Physical System
Image Courtesy [8]
B. Security Threats in CPS
The most vulnerable threat in CPS are the potential threats, which must be handled from various angles. Conventionally if a system
is said to be secure only when it suit the following three security necessities [9]: i) Confidentiality, ii) Availability, and iii) Integrity.
A threat is nothing but a situation which is probable of making damage [10]. Potential threats are the one which will be possible
but not thus far real. Every threat is classified into five critical factors as: source, target, motive, attack vector, and potential penalty.
Table I shows the various critical factors and their outcomes.
Table 1: Critical factors and their outcomes
S. No Critical Factor Outcome
1 Source
is the origin of an attack
Three types:
i) Adversarial threat – from person, groups or nations
ii) Accidental threat – accidentally caused
iii) Environmental threat – natural disasters [11]
2 Target main target will be CPS components as well as CPS applications
3 Motive may be political or spying or criminal [12] [13]
4 Attack Vector
May execute any one among the following four methods.
i) Interception
ii) Interruption
iii) Modification
iv) Fabrication
5 Penalty will negotiate the systems confidentiality, reliability, availability, privacy, or protection
III.CHALLENGES IN CPS
There are numerous challenges in CPS. The author has taken into consideration Automotive and Medical CPS for our discussion.
A. Automotive Scenario [14]
People are now using lot of sensors in the field of automobile sector, mainly for protecting the passenger from any danger. The
system will be assisting the drivers who are driving their vehicle in a monotonous manner. These are the basics of autonomous
vehicles. A vehicle to be autonomous the sensors must be very much useful in assistance in fault findings, communication between
vehicles, etc. The main communication among vehicles will permit exchange of data like speed, traffic, etc.
Cyber Physical System
(GRDJE/ Volume 3 / Issue 4 / 003)
All rights reserved by www.grdjournals.com 14
B. Medical Cyber-Physical Systems
This is mainly for monitoring the patients. These systems must also be monitored, since it should not mal function. Medical CPS
is mainly for monitoring the patient`s body. The machines used to monitor patients are proton therapy, implantable devices, etc.
The devices should work properly and must not malfunction. Safety and reliability are very important here.
IV.CONCLUSION
All the computing systems must be rethought. Although by using the CPS, a country may be protected from attacks coming from
inside, but it cannot from the external world. Now a day the current trend is that everyone is practicing cyber physical system.
Using this secured CPS, one can protect so many human lives.
ACKNOWLEDGEMENT
The author acknowledges the support and encouragement by the Management, Principal and Director of Computer Applications
department, towards this work.
REFERENCE
[1] Lee, E. A. (2006). Cyber-physical systems—are computing foundations adequate? NSF Workshop on Cyber-Physical Systems: Research Motivation,
Techniques and Roadmap, Austin, Texas.
[2] L Wang, M Törngren, M Onori, “Current status and advancement of cyber-physical systems in manufacturing”, Journal of Manufacturing Systems, 37, pp
517 -527, 2015
[3] Rajkumar R, et. al, “Cyber physical systems: The Next Computing Revolution”, Design Automation Conference, 2010
[4] Wilbur L. Ross, Kent Rochford, “Framework for Cyber -Physical Systems: Overview, National Institute of Standards and Technology, U.S. Department of
Commerce, Volume 1, Version 1.0, June 2017 Available : https://doi.org/10.6028/NIST.SP.1500-201.pdf
[5] Nishtha Kessawni, Sanjay Kumar, “Cyber Physical Systems and Smart Cities”, CSI Communications, Vol 41, Issue 9, pp 29 – 30, December 2017
[6] Suseela, Kavitha, “Cyber Physical System (CPS) and its Implications”, CSI Communications, Vol 41, Issue 9, pp 8 – 10, December 2017
[7] Antsaklis P, “Goals and Challenges in Cyber-Physical Systems Research Editorial of the Editor in Chief”, IEEE Transactions on Automatic Control, Vol. 59,
No. 12, Dec 2014
[8] https://en.wikipedia.org/wiki/Cyber-physical_system
[9] A Humayed, J Lin, F Li, B Luo, “Cyber-Physical Systems Security – A Survey”, Cornell University Library, Jan 2017, Available:
https://arxiv.org/pdf/1701.04525.pdf
[10] Charles P. Pfleeger and Shari Lawrence Pfleeger, “Security in Computing (4th Edition)”, Prentice Hall PTR, Upper Saddle River, NJ, USA, 2006
[11] James L Cebula and Lisa R Young. A taxonomy of operational cyber security risks. Technical report, DTIC Document, 2010
[12] Roberto Setola. Cyber threats to scada systems, 2011.
[13] US-CERT. Cyber threat source descriptions, “https://ics- gov/content/cyber-threat-source-descriptions”, 2009
[14] Bartocci E, “Cyber-Physical Systems: Theoretical and Practical Challenges”, ERCIM news 2017. Available online: https://ercim-
news.ercim.eu/en97/special/cyber-physical-systems-theoretical-and-practical-challenges

More Related Content

What's hot

Industry 4.0 , 5.0.pdf
Industry 4.0 , 5.0.pdfIndustry 4.0 , 5.0.pdf
Industry 4.0 , 5.0.pdfAtharNaemi
 
Siemens_2022_JPM-Digital-Twin-Conference.pdf
Siemens_2022_JPM-Digital-Twin-Conference.pdfSiemens_2022_JPM-Digital-Twin-Conference.pdf
Siemens_2022_JPM-Digital-Twin-Conference.pdfAlekseySolomin
 
The Most Definitive guide to Industrial IoT Implementation
The Most Definitive guide to Industrial IoT ImplementationThe Most Definitive guide to Industrial IoT Implementation
The Most Definitive guide to Industrial IoT ImplementationAditya Basu
 
Final cyber physical system (1)
Final cyber physical system (1)Final cyber physical system (1)
Final cyber physical system (1)vanisre jaiswal
 
Smart manufacturing – Industrial Automation Solutions
Smart manufacturing – Industrial Automation SolutionsSmart manufacturing – Industrial Automation Solutions
Smart manufacturing – Industrial Automation SolutionsUnmesh Ballal
 
IOT Presentation Seminar PPT
IOT Presentation Seminar PPTIOT Presentation Seminar PPT
IOT Presentation Seminar PPTHimanshu Jaswal
 
Edge Computing: Bringing the Internet Closer to You
Edge Computing: Bringing the Internet Closer to YouEdge Computing: Bringing the Internet Closer to You
Edge Computing: Bringing the Internet Closer to YouMegan O'Keefe
 
Smart Manufacturing
Smart ManufacturingSmart Manufacturing
Smart ManufacturingCSA Group
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on CybersecurityGraham Mann
 
Industry 4.0 – the German vision for advanced manufacturing
Industry 4.0 – the German vision for advanced manufacturing  Industry 4.0 – the German vision for advanced manufacturing
Industry 4.0 – the German vision for advanced manufacturing Vinnova
 
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex TrainingAdvanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex TrainingBryan Len
 
CYBER-PHYSICAL-SYSTEM.pptx
CYBER-PHYSICAL-SYSTEM.pptxCYBER-PHYSICAL-SYSTEM.pptx
CYBER-PHYSICAL-SYSTEM.pptxPrasadNagelli
 
Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Samir Bounab
 
Meetup #3 - Cyber-physical view of the Internet of Everything
Meetup #3 - Cyber-physical view of the Internet of EverythingMeetup #3 - Cyber-physical view of the Internet of Everything
Meetup #3 - Cyber-physical view of the Internet of EverythingFrancesco Rago
 

What's hot (20)

Industry 4.0 , 5.0.pdf
Industry 4.0 , 5.0.pdfIndustry 4.0 , 5.0.pdf
Industry 4.0 , 5.0.pdf
 
Siemens_2022_JPM-Digital-Twin-Conference.pdf
Siemens_2022_JPM-Digital-Twin-Conference.pdfSiemens_2022_JPM-Digital-Twin-Conference.pdf
Siemens_2022_JPM-Digital-Twin-Conference.pdf
 
The Most Definitive guide to Industrial IoT Implementation
The Most Definitive guide to Industrial IoT ImplementationThe Most Definitive guide to Industrial IoT Implementation
The Most Definitive guide to Industrial IoT Implementation
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
Edge-Fog Cloud
Edge-Fog CloudEdge-Fog Cloud
Edge-Fog Cloud
 
Final cyber physical system (1)
Final cyber physical system (1)Final cyber physical system (1)
Final cyber physical system (1)
 
Smart manufacturing – Industrial Automation Solutions
Smart manufacturing – Industrial Automation SolutionsSmart manufacturing – Industrial Automation Solutions
Smart manufacturing – Industrial Automation Solutions
 
IOT Presentation Seminar PPT
IOT Presentation Seminar PPTIOT Presentation Seminar PPT
IOT Presentation Seminar PPT
 
What is industry 4.0
What is industry 4.0 What is industry 4.0
What is industry 4.0
 
Edge Computing: Bringing the Internet Closer to You
Edge Computing: Bringing the Internet Closer to YouEdge Computing: Bringing the Internet Closer to You
Edge Computing: Bringing the Internet Closer to You
 
Smart Manufacturing
Smart ManufacturingSmart Manufacturing
Smart Manufacturing
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
 
Industry 4.0 – the German vision for advanced manufacturing
Industry 4.0 – the German vision for advanced manufacturing  Industry 4.0 – the German vision for advanced manufacturing
Industry 4.0 – the German vision for advanced manufacturing
 
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex TrainingAdvanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
CYBER-PHYSICAL-SYSTEM.pptx
CYBER-PHYSICAL-SYSTEM.pptxCYBER-PHYSICAL-SYSTEM.pptx
CYBER-PHYSICAL-SYSTEM.pptx
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Edge Computing : future of IoT ?
Edge Computing : future of IoT ?
 
Meetup #3 - Cyber-physical view of the Internet of Everything
Meetup #3 - Cyber-physical view of the Internet of EverythingMeetup #3 - Cyber-physical view of the Internet of Everything
Meetup #3 - Cyber-physical view of the Internet of Everything
 
Industry 4.0 and Smart Factory
Industry 4.0 and Smart FactoryIndustry 4.0 and Smart Factory
Industry 4.0 and Smart Factory
 

Similar to Cyber Physical System

Artificial intelligence and machine learning in dynamic cyber risk analytics ...
Artificial intelligence and machine learning in dynamic cyber risk analytics ...Artificial intelligence and machine learning in dynamic cyber risk analytics ...
Artificial intelligence and machine learning in dynamic cyber risk analytics ...Petar Radanliev
 
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsUpsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsIRJET Journal
 
IRJET- Architectural Modeling and Cybersecurity Analysis of Cyber-Physical Sy...
IRJET- Architectural Modeling and Cybersecurity Analysis of Cyber-Physical Sy...IRJET- Architectural Modeling and Cybersecurity Analysis of Cyber-Physical Sy...
IRJET- Architectural Modeling and Cybersecurity Analysis of Cyber-Physical Sy...IRJET Journal
 
IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...
IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...
IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...IRJET Journal
 
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...ijcsit
 
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...AIRCC Publishing Corporation
 
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securitybijejournal
 
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...IRJET Journal
 
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...Sebastiano Panichella
 
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...Sebastiano Panichella
 
Cyber physical systems: A smart city perspective
Cyber physical systems: A smart city perspective  Cyber physical systems: A smart city perspective
Cyber physical systems: A smart city perspective IJECEIAES
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewIOSR Journals
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
Dealing with the Internet of Insecure Things
Dealing with the Internet of Insecure ThingsDealing with the Internet of Insecure Things
Dealing with the Internet of Insecure ThingsArosha Bandara
 
A Smart ITS based Sensor Network for Transport System with Integration of Io...
A Smart ITS based Sensor Network for Transport System with Integration of  Io...A Smart ITS based Sensor Network for Transport System with Integration of  Io...
A Smart ITS based Sensor Network for Transport System with Integration of Io...IRJET Journal
 
A secure service provisioning framework for cyber physical cloud computing sy...
A secure service provisioning framework for cyber physical cloud computing sy...A secure service provisioning framework for cyber physical cloud computing sy...
A secure service provisioning framework for cyber physical cloud computing sy...ijdpsjournal
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
How Cyber-Physical Systems Are Reshaping the Robotics Landscape
How Cyber-Physical Systems Are Reshaping the Robotics LandscapeHow Cyber-Physical Systems Are Reshaping the Robotics Landscape
How Cyber-Physical Systems Are Reshaping the Robotics LandscapeCognizant
 

Similar to Cyber Physical System (20)

Artificial intelligence and machine learning in dynamic cyber risk analytics ...
Artificial intelligence and machine learning in dynamic cyber risk analytics ...Artificial intelligence and machine learning in dynamic cyber risk analytics ...
Artificial intelligence and machine learning in dynamic cyber risk analytics ...
 
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsUpsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
 
IRJET- Architectural Modeling and Cybersecurity Analysis of Cyber-Physical Sy...
IRJET- Architectural Modeling and Cybersecurity Analysis of Cyber-Physical Sy...IRJET- Architectural Modeling and Cybersecurity Analysis of Cyber-Physical Sy...
IRJET- Architectural Modeling and Cybersecurity Analysis of Cyber-Physical Sy...
 
IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...
IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...
IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...
 
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
 
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
 
Cps sec sg sg2017 conf_iran
Cps sec sg  sg2017 conf_iranCps sec sg  sg2017 conf_iran
Cps sec sg sg2017 conf_iran
 
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber security
 
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
 
P01821104110
P01821104110P01821104110
P01821104110
 
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
 
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
 
Cyber physical systems: A smart city perspective
Cyber physical systems: A smart city perspective  Cyber physical systems: A smart city perspective
Cyber physical systems: A smart city perspective
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature review
 
76 s201918
76 s20191876 s201918
76 s201918
 
Dealing with the Internet of Insecure Things
Dealing with the Internet of Insecure ThingsDealing with the Internet of Insecure Things
Dealing with the Internet of Insecure Things
 
A Smart ITS based Sensor Network for Transport System with Integration of Io...
A Smart ITS based Sensor Network for Transport System with Integration of  Io...A Smart ITS based Sensor Network for Transport System with Integration of  Io...
A Smart ITS based Sensor Network for Transport System with Integration of Io...
 
A secure service provisioning framework for cyber physical cloud computing sy...
A secure service provisioning framework for cyber physical cloud computing sy...A secure service provisioning framework for cyber physical cloud computing sy...
A secure service provisioning framework for cyber physical cloud computing sy...
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
How Cyber-Physical Systems Are Reshaping the Robotics Landscape
How Cyber-Physical Systems Are Reshaping the Robotics LandscapeHow Cyber-Physical Systems Are Reshaping the Robotics Landscape
How Cyber-Physical Systems Are Reshaping the Robotics Landscape
 

More from GRD Journals

Solid Waste Management a need of Time
Solid Waste Management a need of TimeSolid Waste Management a need of Time
Solid Waste Management a need of TimeGRD Journals
 
Sequential Batch Reactor
Sequential Batch ReactorSequential Batch Reactor
Sequential Batch ReactorGRD Journals
 
Self-Tuning Fuzzy PID Design for BLDC Speed Control
Self-Tuning Fuzzy PID Design for BLDC Speed ControlSelf-Tuning Fuzzy PID Design for BLDC Speed Control
Self-Tuning Fuzzy PID Design for BLDC Speed ControlGRD Journals
 
Foot Lever Operated Refrigerator Door Opener and Motor Operated Closure
Foot Lever Operated Refrigerator Door Opener and Motor Operated ClosureFoot Lever Operated Refrigerator Door Opener and Motor Operated Closure
Foot Lever Operated Refrigerator Door Opener and Motor Operated ClosureGRD Journals
 
Methodology for Prevention and Repair of Cracks in Building
Methodology for Prevention and Repair of Cracks in BuildingMethodology for Prevention and Repair of Cracks in Building
Methodology for Prevention and Repair of Cracks in BuildingGRD Journals
 
Glass Fiber Reinforced Gypsum Panel use in Building Construction
Glass Fiber Reinforced Gypsum Panel use in Building ConstructionGlass Fiber Reinforced Gypsum Panel use in Building Construction
Glass Fiber Reinforced Gypsum Panel use in Building ConstructionGRD Journals
 

More from GRD Journals (6)

Solid Waste Management a need of Time
Solid Waste Management a need of TimeSolid Waste Management a need of Time
Solid Waste Management a need of Time
 
Sequential Batch Reactor
Sequential Batch ReactorSequential Batch Reactor
Sequential Batch Reactor
 
Self-Tuning Fuzzy PID Design for BLDC Speed Control
Self-Tuning Fuzzy PID Design for BLDC Speed ControlSelf-Tuning Fuzzy PID Design for BLDC Speed Control
Self-Tuning Fuzzy PID Design for BLDC Speed Control
 
Foot Lever Operated Refrigerator Door Opener and Motor Operated Closure
Foot Lever Operated Refrigerator Door Opener and Motor Operated ClosureFoot Lever Operated Refrigerator Door Opener and Motor Operated Closure
Foot Lever Operated Refrigerator Door Opener and Motor Operated Closure
 
Methodology for Prevention and Repair of Cracks in Building
Methodology for Prevention and Repair of Cracks in BuildingMethodology for Prevention and Repair of Cracks in Building
Methodology for Prevention and Repair of Cracks in Building
 
Glass Fiber Reinforced Gypsum Panel use in Building Construction
Glass Fiber Reinforced Gypsum Panel use in Building ConstructionGlass Fiber Reinforced Gypsum Panel use in Building Construction
Glass Fiber Reinforced Gypsum Panel use in Building Construction
 

Recently uploaded

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Recently uploaded (20)

9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 

Cyber Physical System

  • 1. GRD Journals- Global Research and Development Journal for Engineering | Volume 3 | Issue 4 | March 2018 ISSN: 2455-5703 All rights reserved by www.grdjournals.com 12 Cyber Physical System Navin Dhinnesh ADC Assistant Professor (Sr. Gr) Department of Computer Applications Mepco Schlenk Engineering College, Sivakasi Abstract In 2006, Cyber Physical Systems (CPS), the new word was invented in the United States [1]. The combination of devices like sensors with embedded systems is quickly receiving its place in cyber world. These devices jointly with the information filed are becoming the main focal point, called as Cyber Physical Systems. This word was found keeping in mind the escaling significance of relations among the mutually related computing systems with the physical world [2]. The author of this paper gives an overview of CPS architecture, its functions and its security threat. Keywords- Internet of Things, Sensor, Cyber-Physical Systems, Real Time Systems, Embedded Systems I. INTRODUCTION Combining the applications that are very much beneficial in the aspect of computing both in space and time are said to be cyber physical systems [3]. The combined effect of two systems, cyber and physical, has changed our work style [4]. The Cyber Physical System (CPS) is considered as a smart system, which is extremely interconnected. CPS and Internet of Things (IoT) have closely related concepts. The CPS impact is very much obvious in the field of autonomous vehicles, Robots, etc., CPS have assisted in the development of smart devices [5. These smart devices are connected by means of IoT and allowed to work together. The combination of both CPS and IoT are capable of capturing and processing data so that the user gets constructive information from it. CPS is considered to be networked as well as distributed among Real Times Systems (RTS) [6]. CPS has few distinguished properties like: Self-adaptation, Self-organization, Self-optimization, etc. Some of the examples of CPS are: medical devices, aerospace systems, defense systems, etc. CPS should function dependably, at the same time in a safe and secure manner. CPS is measured as convergence of embedded systems. Now a day the field of aerospace, factory automation is very much in need of CPS. These lead to finding of new research horizons. CPS is also for non-technical users too. CPS is now a day becoming ubiquitous. As internet brought change in transformation in human life, CPS change the way in working together with the physical world. CPS will work with the systems that react more swiftly and also with the systems that are so accurate [7]. In coming years, all the smart systems will be using CPS. Cross layer design plays a vital role here since a system is believed to be CPS if and only if there exists a stiff interaction among physical and cyber parts. II. ARCHITECTURE OF CPS The CPS architecture shown in Figure 1 comprises of Controller, Sensor and Actuator to interact with the physical world. Physical world include: physical entities, humans, and physical sensors. The CPS architecture will be suitable mainly for many applications and also for services. Fig. 1: CPS Architecture
  • 2. Cyber Physical System (GRDJE/ Volume 3 / Issue 4 / 003) All rights reserved by www.grdjournals.com 13 A. Functions of Cyber Physical System CPS functions are classified into five levels. They are: i) Configuration Level, ii) Cognition Level, iii) Cyber Level, iv) Data to Information Conversion Level, and v) Smart Connection Level. The five levels [4] are shown in Figure 2 Fig. 2: Five levels of Cyber Physical System Image Courtesy [8] B. Security Threats in CPS The most vulnerable threat in CPS are the potential threats, which must be handled from various angles. Conventionally if a system is said to be secure only when it suit the following three security necessities [9]: i) Confidentiality, ii) Availability, and iii) Integrity. A threat is nothing but a situation which is probable of making damage [10]. Potential threats are the one which will be possible but not thus far real. Every threat is classified into five critical factors as: source, target, motive, attack vector, and potential penalty. Table I shows the various critical factors and their outcomes. Table 1: Critical factors and their outcomes S. No Critical Factor Outcome 1 Source is the origin of an attack Three types: i) Adversarial threat – from person, groups or nations ii) Accidental threat – accidentally caused iii) Environmental threat – natural disasters [11] 2 Target main target will be CPS components as well as CPS applications 3 Motive may be political or spying or criminal [12] [13] 4 Attack Vector May execute any one among the following four methods. i) Interception ii) Interruption iii) Modification iv) Fabrication 5 Penalty will negotiate the systems confidentiality, reliability, availability, privacy, or protection III.CHALLENGES IN CPS There are numerous challenges in CPS. The author has taken into consideration Automotive and Medical CPS for our discussion. A. Automotive Scenario [14] People are now using lot of sensors in the field of automobile sector, mainly for protecting the passenger from any danger. The system will be assisting the drivers who are driving their vehicle in a monotonous manner. These are the basics of autonomous vehicles. A vehicle to be autonomous the sensors must be very much useful in assistance in fault findings, communication between vehicles, etc. The main communication among vehicles will permit exchange of data like speed, traffic, etc.
  • 3. Cyber Physical System (GRDJE/ Volume 3 / Issue 4 / 003) All rights reserved by www.grdjournals.com 14 B. Medical Cyber-Physical Systems This is mainly for monitoring the patients. These systems must also be monitored, since it should not mal function. Medical CPS is mainly for monitoring the patient`s body. The machines used to monitor patients are proton therapy, implantable devices, etc. The devices should work properly and must not malfunction. Safety and reliability are very important here. IV.CONCLUSION All the computing systems must be rethought. Although by using the CPS, a country may be protected from attacks coming from inside, but it cannot from the external world. Now a day the current trend is that everyone is practicing cyber physical system. Using this secured CPS, one can protect so many human lives. ACKNOWLEDGEMENT The author acknowledges the support and encouragement by the Management, Principal and Director of Computer Applications department, towards this work. REFERENCE [1] Lee, E. A. (2006). Cyber-physical systems—are computing foundations adequate? NSF Workshop on Cyber-Physical Systems: Research Motivation, Techniques and Roadmap, Austin, Texas. [2] L Wang, M Törngren, M Onori, “Current status and advancement of cyber-physical systems in manufacturing”, Journal of Manufacturing Systems, 37, pp 517 -527, 2015 [3] Rajkumar R, et. al, “Cyber physical systems: The Next Computing Revolution”, Design Automation Conference, 2010 [4] Wilbur L. Ross, Kent Rochford, “Framework for Cyber -Physical Systems: Overview, National Institute of Standards and Technology, U.S. Department of Commerce, Volume 1, Version 1.0, June 2017 Available : https://doi.org/10.6028/NIST.SP.1500-201.pdf [5] Nishtha Kessawni, Sanjay Kumar, “Cyber Physical Systems and Smart Cities”, CSI Communications, Vol 41, Issue 9, pp 29 – 30, December 2017 [6] Suseela, Kavitha, “Cyber Physical System (CPS) and its Implications”, CSI Communications, Vol 41, Issue 9, pp 8 – 10, December 2017 [7] Antsaklis P, “Goals and Challenges in Cyber-Physical Systems Research Editorial of the Editor in Chief”, IEEE Transactions on Automatic Control, Vol. 59, No. 12, Dec 2014 [8] https://en.wikipedia.org/wiki/Cyber-physical_system [9] A Humayed, J Lin, F Li, B Luo, “Cyber-Physical Systems Security – A Survey”, Cornell University Library, Jan 2017, Available: https://arxiv.org/pdf/1701.04525.pdf [10] Charles P. Pfleeger and Shari Lawrence Pfleeger, “Security in Computing (4th Edition)”, Prentice Hall PTR, Upper Saddle River, NJ, USA, 2006 [11] James L Cebula and Lisa R Young. A taxonomy of operational cyber security risks. Technical report, DTIC Document, 2010 [12] Roberto Setola. Cyber threats to scada systems, 2011. [13] US-CERT. Cyber threat source descriptions, “https://ics- gov/content/cyber-threat-source-descriptions”, 2009 [14] Bartocci E, “Cyber-Physical Systems: Theoretical and Practical Challenges”, ERCIM news 2017. Available online: https://ercim- news.ercim.eu/en97/special/cyber-physical-systems-theoretical-and-practical-challenges