Cyber Physical Systems

Slides:



Advertisements
Similar presentations
KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS JOHNSON C.LEE, VICTOR C.M.LUENG, KIRK H.WONG, JIANNANO CAO, HENRY C.B. CHAN Presented By Viplavi.
Advertisements

Is There Light at the Ends of the Tunnel? Wireless Sensor Networks for Adaptive Lighting in Road Tunnels IPSN 2011 Sean.
Denial of Service in Sensor Networks Szymon Olesiak.
How to Design Wireless Security Mechanisms Manel Guerrero Zapata Mobile Networks Laboratory Nokia Research Center.
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Agent-Based Acceptability-Oriented Computing International Symposium on Software Reliability Engineering Fast Abstract by Shana Hyvat.
Research Directions for the Internet of Things Supervised by: Dr. Nouh Sabry Presented by: Ahmed Mohamed Sayed.
Wireless Video Sensor Networks Vijaya S Malla Harish Reddy Kottam Kirankumar Srilanka.
Physical and Cyber Attacks1. 2 Inspirational Quote Country in which there are precipitous cliffs with torrents running between, deep natural hollows,
Frequently asked questions about software engineering
Lecture 1.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Chapter 1- Introduction
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Control Over WirelessHART Network S. Han, X. Zhu, Al Mok University of Texas at Austin M. Nixon, T. Blevins, D. Chen Emerson Process Management.
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
Layered Approach using Conditional Random Fields For Intrusion Detection.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
X-Road – Estonian Interoperability Platform
CSC8320. Outline Content from the book Recent Work Future Work.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Time Triggered Networks: use in space 2015 CCSDS spring SOIS Plenary 23 March 2015 Glenn Rakow/NASA-GSFC.
Research Interest overview and future directions Mina Guirguis Computer Science Department Texas State University – San Marcos CS5300 9/16/2011.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Section 2.1 Distributed System Design Goals Alex De Ruiter
IS3220 Information Technology Infrastructure Security
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
In the name of God.
CS457 Introduction to Information Security Systems
CompSci 280 S Introduction to Software Development
Chapter 12: Architecture
Chapter 6: Securing the Cloud
TIM 58 Chapter 11: Physical Architecture Layer Design
MOBILE NETWORKS DISASTER RECOVERY USING SDN-NFV
Data and database administration
Albert M. K. Cheng Embedded Real-Time Systems
Chapter 1- Introduction
Cyber Physical Attack Detection
Outline Introduction Characteristics of intrusion detection systems
Key Management Techniques in Wireless Sensor Networks
Physical Architecture Layer Design
Introduction to Wireless Sensor Networks
Frequently asked questions about software engineering
Failure recovery and Checkpointing in Distributed Systems
Consistency in Distributed Systems
CIS 599 Competitive Success/snaptutorial.com
CIS 599Competitive Success/tutorialrank.com
CIS 599C Education for Service-- tutorialrank.com.
Vision Facilitation Template
Mobile edge computing Report by Weiqing huang.
Storage Systems for Managing Voluminous Data
NET 311 Information Security
Distributed Shared Memory
Content Dissemination Systems Including Streaming Systems
Lecture 1: Foundation of Network Security
Chapter 12: Physical Architecture Layer Design
How to Mitigate the Consequences What are the Countermeasures?
Naman shah Harshil shah Priyank BambhrOLIA
Process Migration Troy Cogburn and Gilbert Podell-Blume
Replication and Availability in Distributed Systems
Knowing When to Stop: An Examination of Methods to Minimize the False Negative Risk of Automated Abort Triggers RAM XI Training Summit October 2018 Patrick.
GENI Global Environment for Network Innovation
Maintaining order and safety in a city is no small task
Self-Managed Systems: an Architectural Challenge
Distributed Graph Algorithms
Presentation transcript:

Cyber Physical Systems Adam Dettenwanger, Charlie Carlton, Scott Williams CS 455: Introduction to Distributed Systems Computer Science Department, Colorado State University

Why are Cyber Physical Systems Important? Most of us interact with a CPS every day Example: the modern vehicle Creation of complex systems with new capabilities Systems that wouldn’t be feasible without CPS CPS has major economic implications Advanced manufacturing techniques - economic advantage Efficiently managed civil infrastructure (power grid, traffic control)

Problem Characterization The CPS feedback loop Network of sensors transmit current state of the system to controller Controller uses system modeling algorithms to decide next state Controller sends control signals to the appropriate actuators Actuators modify state of the physical system The cycle repeats Implementation Controllers are often embedded systems Can communicate over private or public networks

Trade-off Space for Solutions Inherently multidisciplinary Specialized systems on top of specialized embedded hardware require professional knowledge from a variety of fields Diversity vs. Homogeneity Balancing ease of use and system impenetrability Security vs. Performance Encryption & Gaussian Noise Hard real-time obligations

Dominant Approaches: Part 1 Analyzing continuous, analog reality with discrete computation Sampling at set intervals Event-driven, self-triggering Resiliency Redundancy System diversity Partitioning Least privilege Intrusion detection System monitoring Strategic information sharing, gossip

Dominant Approaches: Part 2 Contracts Simplified standards for node behavior Assumption and Guarantee Specified time quantum or message content Breach of contract leads to defensive behavior from node holding assumption Standards, protocols, and best practices Necessary for the growth and success for any new technology Law enforcement and physical protection of highly critical nodes

Insights Gleaned CPSs face network problems Balance performance and security No easy solution for synchronization issue Suggested solutions Traditional redundancy encryption (may not be feasible in all cases) network security best practices CPS face the same core issues that networks and other distributed systems face today: 1. Protecting the system against attack 2. Ensuring the confidentiality, integrity, and authenticity of data 3. The need for efficient communication protocols 4. Require resiliency in the system Need to be able to handle the loss/malfunction of a single/group of sensors Need to be able to cope with the loss of the computing layer As with any network, there is an inherent balance that must be struck between the robustness of your security apparatus and the efficient performance of the system. We saw that the issue of time/synchronization can be huge is CPS. The solutions of interval sampling, and “event” driven sampling sacrifice data and autonomy, for some level of synchronization. The suggested solutions to the problems we investigated were ones that we’re all already familiar with: 1. Resiliency - redundancy of sensors, and computational systems 2. Security encryption of data, may not be feasible for sensors with no computational component i. New idea - gaussian noise solution b. use network security best practices i. isolation, least privilege, authentication

The Future Problem Space of CPS Cyber Physical Highway System Pressures Population, roadway congestion, safety Layers Intra-vehicle, inter-vehicle, highway control layer Challenges Security Resiliency We modeled our future problem space around a hypothetical Cyber Physical Highway System. We thought this system may be viable because of the recent interest and research into autonomous or assisted driving vehicles as well as these societal factors: population growth roadway congestion - cost of continuous lane expansions roadway safety The Cyber Physical Highway system is a CPS within a CPS within a CPS. Intra-vehicle: your car itself inter-vehicle: car to car highway control layer: traffic pattern analysis and decision making After considering this system we decided on two major problems that would need to be addressed: security: at every layer resiliency: how to make each layer robust, as well as how the system reacts to failures

Trade-off Space and Future Solutions Similar to Present Day Resiliency Redundancy Security Isolation Encryption Gaussian numerical noise The problem space that we defined overlaps the problem space that present day CPSs face. Resiliency Redundancy at layer of the system: intracar: -redundant sensors monitor all of the vehicles critical components -like the namenode/secondary namenodes we used in our hadoop clusters have a similar system setup for the onboard controller - establish an emergency protocol when systems/sensors fail intercar: -alway have a backup communication module -emergency failure protocols highway controller: -redundant onsite system, as well as geographically separated system -emergency protocols Security intracar: -isolate the sensors from any external network intercar: -wireless communication by necessity -encryption/gaussian noise -wired networks where possible -again use encryption/gaussian noise where possible