Extending Traditional Algorithms for Cyber-Physical Systems Sumeet Gujrati and Gurdip Singh Kansas State University.

Slides:



Advertisements
Similar presentations
Distributed Algorithm for a Mobile Wireless Sensor Network for Optimal Coverage of Non-stationary Signals Andrea Kulakov University Sts Cyril and Methodius.
Advertisements

Topological Reasoning between Complex Regions in Databases with Frequent Updates Arif Khan & Markus Schneider Department of Computer and Information Science.
Distributed Algorithms for Mobile Sensor Networks Chelsea Sanders Ben Tullis.
Robot Sensor Networks. Introduction For the current sensor network the topography and stability of the environment is uncertain and of course time is.
1 Sensor Deployment and Target Localization Based on Virtual Forces Y. Zou and K. Chakrabarty IEEE Infocom 2003 Conference, pp ,. ACM Transactions.
Coverage Estimation in Heterogeneous Visual Sensor Networks Mahmut Karakaya and Hairong Qi Advanced Imaging & Collaborative Information Processing Laboratory.
Fuzzy immune PID neural network control method based on boiler steam pressure system Third pacific-asia conference on circuits,communications and system,
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
Decentralized Coordination in Emergency Management Situations Silvia Nittel Spatial Information Science & Engineering University of Maine, USA.
GridFlow: Workflow Management for Grid Computing Kavita Shinde.
Causality Interface  Declares the dependency that output events have on input events.  D is an ordered set associated with the min ( ) and plus ( ) operators.
ATSN 2009 Towards an Extensible Agent-based Middleware for Sensor Networks and RFID Systems Dirk Bade University of Hamburg, Germany.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
Energy-efficient Self-adapting Online Linear Forecasting for Wireless Sensor Network Applications Jai-Jin Lim and Kang G. Shin Real-Time Computing Laboratory,
RFID Object Localization Gabriel Robins and Kirti Chawla Department of Computer Science University of Virginia
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
CS 712 | Fall 2007 Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua. National University.
1 Chalermek Intanagonwiwat (USC/ISI) Ramesh Govindan (USC/ISI) Deborah Estrin (USC/ISI and UCLA) DARPA Sponsored SCADDS project Directed Diffusion
Chapter 14: Artificial Intelligence Invitation to Computer Science, C++ Version, Third Edition.
Real-Time Human Posture Reconstruction in Wireless Smart Camera Networks Chen Wu, Hamid Aghajan Wireless Sensor Network Lab, Stanford University, USA IPSN.
On the Construction of Data Aggregation Tree with Minimum Energy Cost in Wireless Sensor Networks: NP-Completeness and Approximation Algorithms National.
Event Stream Processing for Intrusion Detection in ZigBee Home Area Networks Sandra Pogarcic, Samujjwal Bhandari, Kedar Hippalgaonkar, and Susan Urban.
Exposure In Wireless Ad-Hoc Sensor Networks Seapahn Meguerdichian Computer Science Department University of California, Los Angeles Farinaz Koushanfar.
Decentralized Scattering of Wake-up Times in Wireless Sensor Networks Amy L. Murphy ITC-IRST, Trento, Italy joint work with Alessandro Giusti, Politecnico.
4.5 DISTRIBUTED MUTUAL EXCLUSION MOSES RENTAPALLI.
Network Kernel Architectures and Implementation ( ) Network Architecture Chaiporn Jaikaeo Department of Computer Engineering.
Rate-based Data Propagation in Sensor Networks Gurdip Singh and Sandeep Pujar Computing and Information Sciences Sanjoy Das Electrical and Computer Engineering.
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
A service-oriented middleware for building context-aware services Center for E-Business Technology Seoul National University Seoul, Korea Tao Gu, Hung.
Towards a Formal Model of Context Awareness Mikkel Baun Kjærgaard Jonathan Bunde-Pedersen Department of Computer Science University of Aarhus.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
Doc.: IEEE /540 Submission July 2003 Arunesh Mishra, Min-ho Shin, William Arbaugh, Insun Lee, Kyunghun Jang. Fast handoffs using Fixed Channel.
Locating Mobile Agents in Distributed Computing Environment.
Multi-Resolution Spatial and Temporal Coding in a Wireless Sensor Network for Long-Term Monitoring Applications You-Chiun Wang, Member, IEEE, Yao-Yu Hsieh,
Distributed Systems and Algorithms Sukumar Ghosh University of Iowa Spring 2011.
How to Read Research Papers? Xiao Qin Department of Computer Science and Software Engineering Auburn University
Workshop on Future Learning Landscapes: Towards the Convergence of Pervasive and Contextual computing, Global Social Media and Semantic Web in Technology.
1 M. Tudruj, J. Borkowski, D. Kopanski Inter-Application Control Through Global States Monitoring On a Grid Polish-Japanese Institute of Information Technology,
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
Lightweight Consistency Enforcement Schemes for Distributed Proofs with Hidden Subtrees Adam J. Lee, Kazuhiro Minami, and Marianne Winslett University.
Presentation of Wireless sensor network A New Energy Aware Routing Protocol for Wireless Multimedia Sensor Networks Supporting QoS 王 文 毅
REED: Robust, Efficient Filtering and Event Detection in Sensor Networks Daniel Abadi, Samuel Madden, Wolfgang Lindner MIT United States VLDB 2005.
Cognitive Radio: Next Generation Communication System
University “Ss. Cyril and Methodus” SKOPJE Cluster-based MDS Algorithm for Nodes Localization in Wireless Sensor Networks Ass. Biljana Stojkoska.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
KAIS T On the problem of placing Mobility Anchor Points in Wireless Mesh Networks Lei Wu & Bjorn Lanfeldt, Wireless Mesh Community Networks Workshop, 2006.
Cooperative Location- Sensing for Wireless Networks Authors : Haris Fretzagias Maria Papadopouli Presented by cychen IEEE International Conference on Pervasive.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Ching-Ju Lin Institute of Networking and Multimedia NTU
Adaptive Tracking in Distributed Wireless Sensor Networks Lizhi Yang, Chuan Feng, Jerzy W. Rozenblit, Haiyan Qiao The University of Arizona Electrical.
Using Adaptive Tracking To Classify And Monitor Activities In A Site W.E.L. Grimson, C. Stauffer, R. Romano, L. Lee.
Localized Low-Power Topology Control Algorithms in IEEE based Sensor Networks Jian Ma *, Min Gao *, Qian Zhang +, L. M. Ni *, and Wenwu Zhu +
Fast SLAM Simultaneous Localization And Mapping using Particle Filter A geometric approach (as opposed to discretization approach)‏ Subhrajit Bhattacharya.
Smart Sleeping Policies for Wireless Sensor Networks Venu Veeravalli ECE Department & Coordinated Science Lab University of Illinois at Urbana-Champaign.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
Distributed-In/Distributed-Out: Intelligent Sensor Networks for Coordination Constantine (Dean) Christakos Viral Communications
Efficient Point Coverage in Wireless Sensor Networks Jie Wang and Ning Zhong Department of Computer Science University of Massachusetts Journal of Combinatorial.
Control-Theoretic Approaches for Dynamic Information Assurance George Vachtsevanos Georgia Tech Working Meeting U. C. Berkeley February 5, 2003.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
COGNITIVE APPROACH TO ROBOT SPATIAL MAPPING
Institute for Cyber Security
Algorithms for Big Data Delivery over the Internet of Things
Pervasive Data Access (PDA) Research Group
Towards a Location-Aware Role-Based Access Control Model
Remah Alshinina and Khaled Elleithy DISCRIMINATOR NETWORK
Backbone Traffic Engineering
Collaborative Smart House Environment Computer Science Department University of Cyprus Contact: Christodoulou Eleni.
RFID Object Localization
Presentation transcript:

Extending Traditional Algorithms for Cyber-Physical Systems Sumeet Gujrati and Gurdip Singh Kansas State University

Problem Statement Define mutual exclusion, predicate detection, and global state recording problems over physical systems (PhyS), and implement the solutions over a cyber-infrastructure (CyS) which monitors the PhyS (thus forming a CPS), and maintains the state of PhyS. Define a spatial model of PhyS, and then define the model of CPS. Define an event model for CPS. Device techniques so that CyS maintains a consistent state of PhyS, as inconsistencies may arise due to sensing delays, missing sensor data, and limited sensing range of sensors. Device an approach to model user behaviors, as users are not passive entities. Perform detailed simulation of proposed algorithms.

Related Work The field of CPS is inspired by WSN. The facts that the algorithm must adapt itself depending on user’s behavior, and the algorithm manipulating user’s behavior (by helping him) are missing. The problem of resource detection (e.g., detecting free parking spaces [6]) has been widely studied, with their own limitations. Space models such as [3] are suitable for our work with few modifications. Space and time aware predicates have been studies, such as in [3,4,1], but they have their own shortcomings. [5] discusses constructing snapshots for a smart construction site. It is more focused towards interpreting missing sensor data.

Proposed Idea We define an hierarchical spatial model of the PhyS. We define a graph based model of CPS. We define user behaviors in terms of their capabilities. We define an event model for CPS. We define mutual exclusion and predicate detection algorithms (which are implemented in CyS) for different types of user behavior. For example, a disciplined user will always follow CyS instructions, whereas, a complete random user will act on his own. The algorithms we propose make sure that they adapt themselves to the user behavior, and at the same time, try to manipulate user behavior.

Initial Results We have performed extensive simulation study [2] of our proposed mutual exclusion algorithms. We came up with three types of user behaviors: 1) disciplined, 2) random, 3) random with CyS helping. In the figure NoCS corresponds to the results when there is no CyS support. Users act on their own. SPRA represents three user behaviors. Np is the number of users. AT is acquire time (difference between time when the user send a request, and the time at which the user acquires the resource). This experiment models physical system as a grid of 8X8 locations, and number of resources are constant (3).A user takes 3 seconds to move from a location to other.

Future Plans Immediate goal is to simulate predicate detection and global state recording algorithms.

Open Problems Currently, we investigated CPSs which operate inside a physical system such as a hospital or a factory. One can study CPSs which are combination of multiple such CPSs, such as, a series of hospitals. Middleware to coordinate among multiple CPSs is required to be studied. The mutual exclusion problem we studied required CyS to locate one resource for a user. In a more complex scenarios, users may need to reserve multiple resources, and in that case, CyS should be able to reserve those resources such that the users movements are minimized. The simulation we developed is very naïve. Though it adequately simulates our algorithms, it can be made more robust by providing functionality, so that one can design the layout of PhyS, place users in desired locations, change capabilities of users, algorithms on CyS and so on.

References [1] A. D. Kshemkalyani. Immediate detection of predicates in pervasive environments. Journal of Parallel and Distributed Computing, 72(2):219 – 230, [2] S. Gujrati and G. Singh, “Mutual exclusion in cyber-physical systems,” in 1st International Conference on Sensor Networks, February [3] S. Chandran and J. Joshi, “Lot-rbac: A location and time-based rbac model,” in Web Information Systems Engineering WISE 2005, vol. 3806, pp. 361–375. [4] C. A. Ardagna, M. Cremonini, E. Damiani, S. D. C. di Vimercati, and P. Samarati, “Supporting location-based conditions in access control policies,” in Proceedings of the 2006 ACM Symposium on Information, computer and communications security. ACM, 2006, pp. 212–222. [5] V. Rajamani and C. Julien, “Blurring snapshots: Temporal inference of missing and uncertain data,” in Proceedings of the IEEE International Conference on Pervasive Computing and Communications, [6] Lee, S.; Yoon, D.; Ghosh, A.;, "Intelligent parking lot application using wireless sensor networks," Collaborative Technologies and Systems, CTS International Symposium on, vol., no., pp.48-57, May 2008

Following slides are backup slides.

TDS vs CPS

CyS Search Path to WC1 Fig. 1: CyS superimposed on a hospital. 1. N1 requests for a WC. Motivational Example : Mutual Exclusion Request 2. CyS finds nearest WC 3. CyS sends path to WC1. 4. N 1 moves to WC1.

Alert CyS Motivational Example : Predicate Detection – Patient moved to other location without a nurse being accompanied. 1. N 1 starts moving patient to Room3. 2. N 1 moves away from patient. 3. CyS generates alert.

Mutual Exclusion Algo WC1: Free, WC2: Free, WC3: Free Request Path to WC1 Res Where is WC? Challenges 1. N 1 sends a request to search WC. 2. CyS finds and reserves WC1. 3. CyS sends path to WC1 to N N 1 moves towards WC1. 4. N 6 takes WC1 to some other location.

Global State Recording NS1.N={N1,N2} ICU1.N={} ICU1.P={P1} R3.WC={WC2} Where are WC1 and N1? Challenges

Spatial Model Logical vs physical areas Fine grained vs coarse grained areas Contains relation Parent child relation Reachability edges Path between two areas Shortest path between two areas Distance between two areas PAT: a tree structure of the physical system

Event Model