• Title/Summary/Keyword: CPS(Cyber Physical System)

Search Result 86, Processing Time 0.02 seconds

태양 에너지 수집형 무선 센서 네트워크의 연구 이슈

  • No, Dong-Geon
    • Information and Communications Magazine
    • /
    • v.29 no.10
    • /
    • pp.74-82
    • /
    • 2012
  • 무선 센서 네트워크(WSN, Wireless Sensor Network)는 최근 주목 받고 있는 가상-물리 시스템 (CPS, Cyber-Physical System)의 입력을 담당하는 부분으로써 CPS를 구성하는 주요한 부분 중 하나이다. 본고에서는 기존의 배터리 기반 WSN의 짧은 수명 및 높은 유지관리 비용을 극복하기 위하여 최근 활발히 연구되고 있는 태양 에너지 기반 무선 센서 네트워크(SP-WSN, Solar-powered WSN)의 연구 동향과 이슈들을 살펴보고자 한다.

사이버물리시스템의 개요 및 통신망 관련 이슈 분석

  • Park, Gyeong-Jun;Gang, Mi-Seon;Son, Seong-Hwa
    • Information and Communications Magazine
    • /
    • v.29 no.5
    • /
    • pp.98-105
    • /
    • 2012
  • 본 논문에서는 최근 융합연구분야에서 많은 주목을 받고 있는 사이버물리시스템(Cyber-Physical System, CPS)에 관하여 살펴본다. 사이버 물리시스템은 전통적인 연구분야인 통신, 제어, 그리고 컴퓨팅을 아우르는 새로운 패러다임으로 전자공학 및 컴퓨터과학 내 다양한 연구분야들의 융합을 위한 토대를 제공하리라 예상된다. 특히 통신망의 관점에서 사이버 물리시스템에 관하여 살펴보도록 한다.

An Adaptive Goal-Based Model for Autonomous Multi-Robot Using HARMS and NuSMV

  • Kim, Yongho;Jung, Jin-Woo;Gallagher, John C.;Matson, Eric T.
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.16 no.2
    • /
    • pp.95-103
    • /
    • 2016
  • In a dynamic environment autonomous robots often encounter unexpected situations that the robots have to deal with in order to continue proceeding their mission. We propose an adaptive goal-based model that allows cyber-physical systems (CPS) to update their environmental model and helps them analyze for attainment of their goals from current state using the updated environmental model and its capabilities. Information exchange approach utilizes Human-Agent-Robot-Machine-Sensor (HARMS) model to exchange messages between CPS. Model validation method uses NuSMV, which is one of Model Checking tools, to check whether the system can continue its mission toward the goal in the given environment. We explain a practical set up of the model in a situation in which homogeneous robots that has the same capability work in the same environment.

Throughput-aware real-time scheduling based on resource relocation (자원 재배치를 통한 처리율 기반 실시간 스케줄링 기법)

  • Jeong, Haegeon;Ahn, Jemin;Kang, Kyungtae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.337-338
    • /
    • 2018
  • 본 논문에서는 개발자가 범용 리눅스 운영체제에서 유연하게 시스템의 실시간성 향상을 이뤄낼 수 있도록 자원재배치 모듈을 통한 스케줄링 기법을 제안한다. 제안하는 방법은 범용 리눅스 운영체제 기반이기 때문에 기존의 Cyber-Physical System (CPS)에 쉽게 적용이 가능하며, 실시간성을 필요로 하는 새로운 CPS 프로젝트의 개발 속도 향상시킬 것으로 예상된다. 또한, 실험결과 자원 재배치를 진행한 애플리케이션의 평균 처리율이 20%이상 증가한 것을 알 수 있다. 추후 메모리, I/O장치 등 다양한 자원에 대하여 모니터링을 진행하고 자원을 재배치 할 수 있는 플랫폼으로 확장할 예정이다.

  • PDF

Technology and Issue on Embodiment of Smart Factory in Small-Medium Manufacturing Business (중소제조업 스마트공장 기술 동향과 이슈)

  • Park, Jong-man
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2491-2502
    • /
    • 2015
  • Main issue for embodiment of smart factory in small-medium manufacturing business(SMMB) is to whether might be successful or not in achieving a goal, exact materializing for smart factory related technology, and in seeking possible solutions for limited capacity to invest and develop technology. It is required for effective driving of manufacturing innovation 3.0 paradigm that ensures expertise to push forward technology policy based on value chain level of SMMB, and ensures detailed action plans by investment priority and development of core technology against global trend. This paper focuses to suggest countermeasure strategy and task through analysis of advanced technology and patent trend about industrial IoT(IIoT) and cyber physical system(CPS), and support embodiment of smart factory in underlying manufacturing innovation 3.0 scheme.

Exploring the dynamic knowledge structure of studies on the Internet of things: Keyword analysis

  • Yoon, Young Seog;Zo, Hangjung;Choi, Munkee;Lee, Donghyun;Lee, Hyun-woo
    • ETRI Journal
    • /
    • v.40 no.6
    • /
    • pp.745-758
    • /
    • 2018
  • A wide range of studies in various disciplines has focused on the Internet of Things (IoT) and cyber-physical systems (CPS). However, it is necessary to summarize the current status and to establish future directions because each study has its own individual goals independent of the completion of all IoT applications. The absence of a comprehensive understanding of IoT and CPS has disrupted an efficient resource allocation. To assess changes in the knowledge structure and emerging technologies, this study explores the dynamic research trends in IoT by analyzing bibliographic data. We retrieved 54,237 keywords in 12,600 IoT studies from the Scopus database, and conducted keyword frequency, co-occurrence, and growth-rate analyses. The analysis results reveal how IoT technologies have been developed and how they are connected to each other. We also show that such technologies have diverged and converged simultaneously, and that the emerging keywords of trust, smart home, cloud, authentication, context-aware, and big data have been extracted. We also unveil that the CPS is directly involved in network, security, management, cloud, big data, system, industry, architecture, and the Internet.

Detecting Malware in Cyberphysical Systems Using Machine Learning: a Survey

  • Montes, F.;Bermejo, J.;Sanchez, L.E.;Bermejo, J.R.;Sicilia, J.A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.1119-1139
    • /
    • 2021
  • Among the scientific literature, it has not been possible to find a consensus on the definition of the limits or properties that allow differentiating or grouping the cyber-physical systems (CPS) and the Internet of Things (IoT). Despite this controversy the papers reviewed agree that both have become crucial elements not only for industry but also for society in general. The impact of a malware attack affecting one of these systems may suppose a risk for the industrial processes involved and perhaps also for society in general if the system affected is a critical infrastructure. This article reviews the state of the art of the application of machine learning in the automation of malware detection in cyberphysical systems, evaluating the most representative articles in this field and summarizing the results obtained, the most common malware attacks in this type of systems, the most promising algorithms for malware detection in cyberphysical systems and the future lines of research in this field with the greatest potential for the coming years.

Design and Implementation of IoT Chatting Service Based on Indoor Location (실내 위치기반 사물인터넷 채팅 서비스 설계 및 구현)

  • Lee, Sunghee;Jeong, Seol Young;Kang, Soon Ju;Lee, Woo Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.10
    • /
    • pp.920-929
    • /
    • 2014
  • Recently, embedded system which demand is explosively increasing in the fields of communication, traffic, medical and industry facilities, expands to cyber physical system (CPS) which monitors and controls the networked embedded systems. In addition, internet of things(IoT) technology using wearable devices such as Google Glass, Samsung Galaxy Gear and Sony Smart Watch are gaining attention. In this situation, Samsung Smart Home and LG Home Chat are released one after another. However, since these services can be available only between smart phones and home appliances, there is a disadvantage that information cannot be passed to other terminals without commercial global messaging server. In this paper, to solve above issues, we propose the structure of an indoor location network based on unit space, which prevents the information of the devices or each individual person from leaking to outside and can selectively communicate to all existent terminals in the network using IoT chatting. Also, it is possible to control general devices and prevent external leakage of private information.

A Transformation Method of Polygon Data for Visualization of Height Map in SEDRIS (SEDRIS에서 높이맵의 가시화를 위한 폴리곤 데이터 변환 방법)

  • Son, Hyun-Seung;Kim, Young-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.135-140
    • /
    • 2015
  • The Cyber-Physical Systems (CPS) complexly perform modeling and simulation (M&S) for the various embedded systems. In this case, due to use diverse formatted models, we suggest to apply with the SEDRIS to systematically manage the different formatted data on M&S. The SEDRIS can reduce time and cost with reusing and interoperating environment data developed in the specific domain. To do this, we should input the data transformed the height map for terrain representation in a simulator into raster data of SEDRIS for which interoperate between the existed simulator and the SEDRIS. To solve the problem, we propose the transformation method to transfer the polygon data from RAW file used in terrain representation. With the proposed method, we can provide two advantages. First, it can possibly express the environment data into SEDRIS. Second, we can see the terrain like an image file through a viewer. Therefore, even non-expert easily constructs the terrain environment data.

Derivation of Security Requirements of Smart Factory Based on STRIDE Threat Modeling (STRIDE 위협 모델링에 기반한 스마트팩토리 보안 요구사항 도출)

  • Park, Eun-ju;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1467-1482
    • /
    • 2017
  • Recently, Interests on The Fourth Industrial Revolution has been increased. In the manufacturing sector, the introduction of Smart Factory, which automates and intelligent all stages of manufacturing based on Cyber Physical System (CPS) technology, is spreading. The complexity and uncertainty of smart factories are likely to cause unexpected problems, which can lead to manufacturing process interruptions, malfunctions, and leakage of important information to the enterprise. It is emphasized that there is a need to perform systematic management by analyzing the threats to the Smart Factory. Therefore, this paper systematically identifies the threats using the STRIDE threat modeling technique using the data flow diagram of the overall production process procedure of Smart Factory. Then, using the Attack Tree, we analyze the risks and ultimately derive a checklist. The checklist provides quantitative data that can be used for future safety verification and security guideline production of Smart Factory.