SlideShare a Scribd company logo
S Y E D H A S S A N A H M E D , G W A N G H Y U N K I M A N D
D O N G K Y U N K I M .
h a s s a n @ m o n e t . k n u . a c . k r
M O N E T W I R E L E S S L A B O R A T O R Y
K Y U N G P O O K N A T I O N A L U N I V E R S I T Y
S O U T H K O R E A .
Cyber Physical System:
Architecture, Applications
and Research Challenges
Contents
 Key Trends in Systems.
 CPS Applications.
 Proposed Architecture.
 Dynamic Communications.
 CPS Integration.
 Open Research Challenges.
3/9/2015CPS@Wireless Days 2013
2
Source: www.cs.binghamton.edu
Key Trends in Systems
3/9/2015CPS@Wireless Days 2013
3
 System complexity
 Increasing functionality
 Increasing integration and networking interoperability
 Growing importance and reliance on software
 Increasing number of non-functional constraints
 Nature of tomorrow’s systems
 Dynamic, ever-changing, dependable, high-confidence
 Self-*(aware, adapting, repairing, sustaining)
Cyber-Physical Systems
 Everywhere, used by everyone, for everything
 Expectations: 24/7 availability, 100% reliability, 100% connectivity,
instantaneous response, remember everything forever, ...
 Classes: young to old, able and disabled, rich and poor, literate and
illiterate, ...
 Numbers: individuals, special groups, social networks, cultures,
populations, ...
CPS Applications
3/9/2015CPS@Wireless Days 2013
4
 Healthcare
 Medical devices
 Health management networks
 Transportation
 Automotive electronics
 Vehicular networks and smart highways
 Aviation and airspace management
 Avionics
 Railroad systems
 Process control
 Large-scale Infrastructure
 Physical infrastructure monitoring and control
 Electricity generation and distribution
 Building and environmental controls
 Defense systems
 Tele-physical operations
 Telemedicine
 Tele-manipulation
Architecture Contents
 Sensing Module:
 Data collection from physical world through sensors.
 Data Management Module(DMM):
 Consists of the computational devices and storage media.
 Next Generation Internet:
 Enabling applications to select the path, or paths that their packets take
between the source and destination.
 Service Aware Modules (SAM):
 Sensed data is being recognized and sent to the services available.
 Application Module (AM):
 Services are deployed and interact with NGI.
 Info is saved on database for QoS support. [NoSQL]
 Sensors and Actuators:
 Actuator receives the commands from the Application Module, and
executes.
3/9/2015CPS@Wireless Days 2013
5
Security Assurance
3/9/2015CPS@Wireless Days 2013
6
How can we provide people and society
with cyber-physical systems that they
can trust their lives on?
Trustworthy:
Reliable, Secure, Privacy-
preserving, Usable, etc.
Security for CPS
3/9/2015CPS@Wireless Days 2013
7
 Safety, Security and Privacy
 Primary aim of all CPS design
 Ensure no harm comes to the underlying physical process
 Ensuring security/privacy crucial for safety
 CPS are deployed in missions critical settings
 Collect sensitive data and can actuate changes in the physical
process
 Composing individually secure systems into a composed system
might not be good enough
 Computation and Energy limitations .
 Utilizing properties from underlying physical process might be
a way to proceed
Proposed Architecture
3/9/2015CPS@Wireless Days 2013
8
Dynamic Communications
3/9/2015CPS@Wireless Days 2013
9
NGI
DMM Service Aware Module
Application Module
S1
S1
S1
S1A1 S1A1
AM
S1A1
SAM
S1
S1A1
1st Time, S1
Similar Data
Physical
Devices
Actuators.
IoT
WSN
Wired
M2M
CPS Integration
 Vehicular Scenario:
 Service aware modules make communication and control efficient by
providing the best application in different services to a single car.
 Agriculture Scenario:
 Greenhouse: After receiving a configuration of greenhouse by
consumer, here our feedback awareness makes network efficient to
control different services like watering, humidity, plant health
monitoring etc. with real time control.
 Health Scenario:
 Hospital: Real time monitoring and control can be achieved by Data
Management Module and Service awareness module which also
plays an important role in order to provide QoS monitoring. While
designing a system for hospital, sensitive applications are queued on
the top priority.
3/9/2015CPS@Wireless Days 2013
10
Open Challenges & Future Work…
3/9/2015CPS@Wireless Days 2013
11
 QoS-Aware Communication Protocols:
 Identification of application requirement of each type of traffic.
 Efficiency.
 Resource Management:
 Huge amount of dynamic data.
 Auto Management Techniques are required.
 QoS-Aware Power Management:
 In CPS, dynamic computing demands much CPU energy. Minimization can be
proposed by exploiting dynamic voltage technology.
 Simulation Tools:
 Simulation models dealing with dynamic communications.
 Future Work:
 Implementing Proposed Architecture in Simulated/Test-bed Environments.
 Smart/Unifying Routing Schemes are required for Real Time sensing/actuating
devices.
Q/A Session…
3/9/2015CPS@Wireless Days 2013
12
MoNeT Wireless Lab,
Kyungpook National University,
South Korea.
http://monet.knu.ac.kr
THANK YOU

More Related Content

What's hot

Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
Dr. Mazlan Abbas
 
Cyber Physical System
Cyber Physical SystemCyber Physical System
Cyber Physical System
GRD Journals
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
Abdullah Alfadhly
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)
Kunal Adhikari
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
Vishnupriya T H
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
Ramana Reddy
 
Manet
ManetManet
IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and Challenges
Asim Rais Siddiqui
 
1. Introduction to Embedded Systems & IoT
1. Introduction to Embedded Systems & IoT1. Introduction to Embedded Systems & IoT
1. Introduction to Embedded Systems & IoT
IEEE MIU SB
 
IoT and Smart Manufacturing
IoT and Smart ManufacturingIoT and Smart Manufacturing
IoT and Smart Manufacturing
Harrison Fortier
 
Artificial Intelligence in Computer Networks
Artificial Intelligence in Computer NetworksArtificial Intelligence in Computer Networks
Artificial Intelligence in Computer Networks
Abdullah Khosa
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologies
pavan penugonda
 
Unit 4
Unit 4Unit 4
Internet of Things: A Hands-On Approach
Internet of Things: A Hands-On ApproachInternet of Things: A Hands-On Approach
Internet of Things: A Hands-On Approach
Arshdeep Bahga
 
Integration of Sensors & Actuators With Arduino.pptx
Integration of Sensors & Actuators With Arduino.pptxIntegration of Sensors & Actuators With Arduino.pptx
Integration of Sensors & Actuators With Arduino.pptx
NShravani1
 
Smart sensors and their Application
Smart sensors and their ApplicationSmart sensors and their Application
Smart sensors and their Application
Yash Kant
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
Devyani Vasistha
 
Internet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptInternet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar ppt
Nishant Kayal
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
skumartarget
 
Components of IOT Implementation
Components of IOT ImplementationComponents of IOT Implementation
Components of IOT Implementation
Aashiq Ahamed N
 

What's hot (20)

Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
 
Cyber Physical System
Cyber Physical SystemCyber Physical System
Cyber Physical System
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
Manet
ManetManet
Manet
 
IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and Challenges
 
1. Introduction to Embedded Systems & IoT
1. Introduction to Embedded Systems & IoT1. Introduction to Embedded Systems & IoT
1. Introduction to Embedded Systems & IoT
 
IoT and Smart Manufacturing
IoT and Smart ManufacturingIoT and Smart Manufacturing
IoT and Smart Manufacturing
 
Artificial Intelligence in Computer Networks
Artificial Intelligence in Computer NetworksArtificial Intelligence in Computer Networks
Artificial Intelligence in Computer Networks
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologies
 
Unit 4
Unit 4Unit 4
Unit 4
 
Internet of Things: A Hands-On Approach
Internet of Things: A Hands-On ApproachInternet of Things: A Hands-On Approach
Internet of Things: A Hands-On Approach
 
Integration of Sensors & Actuators With Arduino.pptx
Integration of Sensors & Actuators With Arduino.pptxIntegration of Sensors & Actuators With Arduino.pptx
Integration of Sensors & Actuators With Arduino.pptx
 
Smart sensors and their Application
Smart sensors and their ApplicationSmart sensors and their Application
Smart sensors and their Application
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
 
Internet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptInternet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar ppt
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Components of IOT Implementation
Components of IOT ImplementationComponents of IOT Implementation
Components of IOT Implementation
 

Similar to Cyber Physical System: Architecture, Applications and Research Challenges

Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...University of Southern California
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
IJERD Editor
 
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
Partha Sarathi Kar
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
PayamBarnaghi
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Next gen emergency-aware platform
Next gen emergency-aware platformNext gen emergency-aware platform
Next gen emergency-aware platform
Prodapt Solutions
 
Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud Computing
Tahmin Aysha Murshed
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud Computing
IRJET Journal
 
Towards Security Software Engineering the Smart Grid as a System of Systems
Towards Security Software Engineering the Smart Grid as a System of SystemsTowards Security Software Engineering the Smart Grid as a System of Systems
Towards Security Software Engineering the Smart Grid as a System of Systems
Vanea Chiprianov
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET Journal
 
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET Journal
 
Barriers to government cloud adoption
Barriers to government cloud adoptionBarriers to government cloud adoption
Barriers to government cloud adoption
IJMIT JOURNAL
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET Journal
 
How Cyber-Physical Systems Are Reshaping the Robotics Landscape
How Cyber-Physical Systems Are Reshaping the Robotics LandscapeHow Cyber-Physical Systems Are Reshaping the Robotics Landscape
How Cyber-Physical Systems Are Reshaping the Robotics Landscape
Cognizant
 
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
chokrio
 

Similar to Cyber Physical System: Architecture, Applications and Research Challenges (20)

Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
 
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Next gen emergency-aware platform
Next gen emergency-aware platformNext gen emergency-aware platform
Next gen emergency-aware platform
 
Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud Computing
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud Computing
 
The M2M platform for a connected world
The M2M platform for a connected worldThe M2M platform for a connected world
The M2M platform for a connected world
 
Towards Security Software Engineering the Smart Grid as a System of Systems
Towards Security Software Engineering the Smart Grid as a System of SystemsTowards Security Software Engineering the Smart Grid as a System of Systems
Towards Security Software Engineering the Smart Grid as a System of Systems
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
 
Bn4301364368
Bn4301364368Bn4301364368
Bn4301364368
 
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
 
Barriers to government cloud adoption
Barriers to government cloud adoptionBarriers to government cloud adoption
Barriers to government cloud adoption
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
 
SSNI-Report-Final
SSNI-Report-FinalSSNI-Report-Final
SSNI-Report-Final
 
How Cyber-Physical Systems Are Reshaping the Robotics Landscape
How Cyber-Physical Systems Are Reshaping the Robotics LandscapeHow Cyber-Physical Systems Are Reshaping the Robotics Landscape
How Cyber-Physical Systems Are Reshaping the Robotics Landscape
 
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
 

More from Syed Hassan Ahmed

Vehicular Content Centric Network (VCCN): A Survey and Research Challenges
Vehicular Content Centric Network (VCCN): A Survey and Research ChallengesVehicular Content Centric Network (VCCN): A Survey and Research Challenges
Vehicular Content Centric Network (VCCN): A Survey and Research Challenges
Syed Hassan Ahmed
 
Adaptive Beaconing Schemes in VANETs: Hybrid Approach
Adaptive Beaconing Schemes in VANETs: Hybrid ApproachAdaptive Beaconing Schemes in VANETs: Hybrid Approach
Adaptive Beaconing Schemes in VANETs: Hybrid Approach
Syed Hassan Ahmed
 
Self-Organized e-Health Application using IEEE 11073: An Experimental Appro...
Self-Organized e-Health Application using IEEE 11073: An Experimental Appro...Self-Organized e-Health Application using IEEE 11073: An Experimental Appro...
Self-Organized e-Health Application using IEEE 11073: An Experimental Appro...
Syed Hassan Ahmed
 
Reducing Scanning Latency in WiMAX Enabled VANETs
 Reducing Scanning Latency in WiMAX Enabled VANETs Reducing Scanning Latency in WiMAX Enabled VANETs
Reducing Scanning Latency in WiMAX Enabled VANETs
Syed Hassan Ahmed
 
Energy Aware Error Control in Cooperative Communication in Wireless Sensor Ne...
Energy Aware Error Control in Cooperative Communication in Wireless Sensor Ne...Energy Aware Error Control in Cooperative Communication in Wireless Sensor Ne...
Energy Aware Error Control in Cooperative Communication in Wireless Sensor Ne...
Syed Hassan Ahmed
 
EENC: Energy Efficient Nested Clustering in Underwater Acoustic Sensor Network
EENC: Energy Efficient Nested Clustering in Underwater Acoustic Sensor NetworkEENC: Energy Efficient Nested Clustering in Underwater Acoustic Sensor Network
EENC: Energy Efficient Nested Clustering in Underwater Acoustic Sensor Network
Syed Hassan Ahmed
 
Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...
Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...
Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...
Syed Hassan Ahmed
 
Vehicular Delay Tolerant Network (VDTN): Routing Perspectives
Vehicular Delay Tolerant Network (VDTN):Routing PerspectivesVehicular Delay Tolerant Network (VDTN):Routing Perspectives
Vehicular Delay Tolerant Network (VDTN): Routing Perspectives
Syed Hassan Ahmed
 

More from Syed Hassan Ahmed (8)

Vehicular Content Centric Network (VCCN): A Survey and Research Challenges
Vehicular Content Centric Network (VCCN): A Survey and Research ChallengesVehicular Content Centric Network (VCCN): A Survey and Research Challenges
Vehicular Content Centric Network (VCCN): A Survey and Research Challenges
 
Adaptive Beaconing Schemes in VANETs: Hybrid Approach
Adaptive Beaconing Schemes in VANETs: Hybrid ApproachAdaptive Beaconing Schemes in VANETs: Hybrid Approach
Adaptive Beaconing Schemes in VANETs: Hybrid Approach
 
Self-Organized e-Health Application using IEEE 11073: An Experimental Appro...
Self-Organized e-Health Application using IEEE 11073: An Experimental Appro...Self-Organized e-Health Application using IEEE 11073: An Experimental Appro...
Self-Organized e-Health Application using IEEE 11073: An Experimental Appro...
 
Reducing Scanning Latency in WiMAX Enabled VANETs
 Reducing Scanning Latency in WiMAX Enabled VANETs Reducing Scanning Latency in WiMAX Enabled VANETs
Reducing Scanning Latency in WiMAX Enabled VANETs
 
Energy Aware Error Control in Cooperative Communication in Wireless Sensor Ne...
Energy Aware Error Control in Cooperative Communication in Wireless Sensor Ne...Energy Aware Error Control in Cooperative Communication in Wireless Sensor Ne...
Energy Aware Error Control in Cooperative Communication in Wireless Sensor Ne...
 
EENC: Energy Efficient Nested Clustering in Underwater Acoustic Sensor Network
EENC: Energy Efficient Nested Clustering in Underwater Acoustic Sensor NetworkEENC: Energy Efficient Nested Clustering in Underwater Acoustic Sensor Network
EENC: Energy Efficient Nested Clustering in Underwater Acoustic Sensor Network
 
Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...
Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...
Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...
 
Vehicular Delay Tolerant Network (VDTN): Routing Perspectives
Vehicular Delay Tolerant Network (VDTN):Routing PerspectivesVehicular Delay Tolerant Network (VDTN):Routing Perspectives
Vehicular Delay Tolerant Network (VDTN): Routing Perspectives
 

Recently uploaded

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 

Recently uploaded (20)

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 

Cyber Physical System: Architecture, Applications and Research Challenges

  • 1. S Y E D H A S S A N A H M E D , G W A N G H Y U N K I M A N D D O N G K Y U N K I M . h a s s a n @ m o n e t . k n u . a c . k r M O N E T W I R E L E S S L A B O R A T O R Y K Y U N G P O O K N A T I O N A L U N I V E R S I T Y S O U T H K O R E A . Cyber Physical System: Architecture, Applications and Research Challenges
  • 2. Contents  Key Trends in Systems.  CPS Applications.  Proposed Architecture.  Dynamic Communications.  CPS Integration.  Open Research Challenges. 3/9/2015CPS@Wireless Days 2013 2 Source: www.cs.binghamton.edu
  • 3. Key Trends in Systems 3/9/2015CPS@Wireless Days 2013 3  System complexity  Increasing functionality  Increasing integration and networking interoperability  Growing importance and reliance on software  Increasing number of non-functional constraints  Nature of tomorrow’s systems  Dynamic, ever-changing, dependable, high-confidence  Self-*(aware, adapting, repairing, sustaining) Cyber-Physical Systems  Everywhere, used by everyone, for everything  Expectations: 24/7 availability, 100% reliability, 100% connectivity, instantaneous response, remember everything forever, ...  Classes: young to old, able and disabled, rich and poor, literate and illiterate, ...  Numbers: individuals, special groups, social networks, cultures, populations, ...
  • 4. CPS Applications 3/9/2015CPS@Wireless Days 2013 4  Healthcare  Medical devices  Health management networks  Transportation  Automotive electronics  Vehicular networks and smart highways  Aviation and airspace management  Avionics  Railroad systems  Process control  Large-scale Infrastructure  Physical infrastructure monitoring and control  Electricity generation and distribution  Building and environmental controls  Defense systems  Tele-physical operations  Telemedicine  Tele-manipulation
  • 5. Architecture Contents  Sensing Module:  Data collection from physical world through sensors.  Data Management Module(DMM):  Consists of the computational devices and storage media.  Next Generation Internet:  Enabling applications to select the path, or paths that their packets take between the source and destination.  Service Aware Modules (SAM):  Sensed data is being recognized and sent to the services available.  Application Module (AM):  Services are deployed and interact with NGI.  Info is saved on database for QoS support. [NoSQL]  Sensors and Actuators:  Actuator receives the commands from the Application Module, and executes. 3/9/2015CPS@Wireless Days 2013 5
  • 6. Security Assurance 3/9/2015CPS@Wireless Days 2013 6 How can we provide people and society with cyber-physical systems that they can trust their lives on? Trustworthy: Reliable, Secure, Privacy- preserving, Usable, etc.
  • 7. Security for CPS 3/9/2015CPS@Wireless Days 2013 7  Safety, Security and Privacy  Primary aim of all CPS design  Ensure no harm comes to the underlying physical process  Ensuring security/privacy crucial for safety  CPS are deployed in missions critical settings  Collect sensitive data and can actuate changes in the physical process  Composing individually secure systems into a composed system might not be good enough  Computation and Energy limitations .  Utilizing properties from underlying physical process might be a way to proceed
  • 9. Dynamic Communications 3/9/2015CPS@Wireless Days 2013 9 NGI DMM Service Aware Module Application Module S1 S1 S1 S1A1 S1A1 AM S1A1 SAM S1 S1A1 1st Time, S1 Similar Data Physical Devices Actuators. IoT WSN Wired M2M
  • 10. CPS Integration  Vehicular Scenario:  Service aware modules make communication and control efficient by providing the best application in different services to a single car.  Agriculture Scenario:  Greenhouse: After receiving a configuration of greenhouse by consumer, here our feedback awareness makes network efficient to control different services like watering, humidity, plant health monitoring etc. with real time control.  Health Scenario:  Hospital: Real time monitoring and control can be achieved by Data Management Module and Service awareness module which also plays an important role in order to provide QoS monitoring. While designing a system for hospital, sensitive applications are queued on the top priority. 3/9/2015CPS@Wireless Days 2013 10
  • 11. Open Challenges & Future Work… 3/9/2015CPS@Wireless Days 2013 11  QoS-Aware Communication Protocols:  Identification of application requirement of each type of traffic.  Efficiency.  Resource Management:  Huge amount of dynamic data.  Auto Management Techniques are required.  QoS-Aware Power Management:  In CPS, dynamic computing demands much CPU energy. Minimization can be proposed by exploiting dynamic voltage technology.  Simulation Tools:  Simulation models dealing with dynamic communications.  Future Work:  Implementing Proposed Architecture in Simulated/Test-bed Environments.  Smart/Unifying Routing Schemes are required for Real Time sensing/actuating devices.
  • 12. Q/A Session… 3/9/2015CPS@Wireless Days 2013 12 MoNeT Wireless Lab, Kyungpook National University, South Korea. http://monet.knu.ac.kr THANK YOU