• Keine Ergebnisse gefunden

Advanced Topics

N/A
N/A
Protected

Academic year: 2021

Aktie "Advanced Topics"

Copied!
62
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Advanced Topics

Cyber-Physical Systems in

Jack Stankovic

BP America Professor

Department of Computer Science University of Virginia

Fall 2011

(2)

Outline (first 2 classes)

• Course Logistics/Goals

• Intro to Cyber Physical Systems (CPS)

– Nothing less than the future!!!

• Motivating Exemplars of Required Research

• Proposed approach: *-aware solution

(3)

Lament from Industry

• …we can’t hire students trained in the

multi-disciplinary areas we require …

mainly control, SP, and CS

(4)

Class Structure

• Part I

– Introduction/Background

• Part II

– Medical Applications

– Energy-Based Applications

• Part III

– Run Time Validation – Anomaly Detection

– Role of Control Theory

(5)

Reading Assignments

• Part I - Introduction

– 2 background papers on CPS

• Part II - Applications

– 7 papers on WH and BSN – 6 papers on Saving Energy

• Part III – Technology Topics

– 4 papers on Runtime Validation – 2 papers on Anomaly Detection

– 4 papers on Role of Control Theory

(6)

Grading

• Selected Reading Summaries – 25%

• Paper Presentation – 50%

• Class Participation – 25%

(7)

Course Goals

• Basis for improved CPS understanding and research

• Capability to simultaneously address multiple issues

• Significant exposure to advanced topics

in a new research area

(8)

Prerequisites

• Recommended

– Computer Networking

• Questions for Class

– OS?

– Computer Architecture?

– Control Theory?

– Real-time?

– Sensors?

– WSNs?

(9)

Intro - Outline

• What are Cyber Physical Systems?

• Exemplars of Required Research

– Components

– Lightweight Security

– Robustness and Diversity – Systems of Systems

• *-aware solution approach

(10)

Acknowledgements/Info

• CPS Program (3 years in the making)

– Core of about 10 people

– Expanded to more than 30 researchers – Expanded to 100s of researchers

– NSF CPS ($30,000,000 per year)

– PCAST 2007 report: #1 priority for Federal Investment

– Expanding to other agencies

– European Union - $7B (ARTEMIS)

(11)

Definition

• CPS is the co-joining of computation and communication with physical processes.

• Functionality and salient system

characteristics are realized through the coordination and interaction of networked physical and computational objects.

• CPS exhibits an intimate coupling between the cyber and physical that manifests itself from the nano world to large-scale wide-area systems of systems.

(12)

Computing in Physical Systems

Body Networks

Road and Street Networks

Battlefield Networks

Vehicle Networks

Industrial Networks

Building Networks Environmental

Networks

Heterogeneous

Wireless Networks with

Sensors and Actuators

(13)

Important?

• US Auto - $500B in annual revenue

– By 2015 40% of auto value in CPS

• Aerospace - $125B

• Medical – 20% of US economy by 2020

• Energy, infrastructures (electric power

grid, defense, agriculture, …)

(14)

What is a CPS?

• Isn’t is just an embedded system?

• Not the main question

• Simply parsing “CPS” -> Many systems are CPS, but that is not the issue

• REALLY INTERESTED IN

– New research needed for the next generation of physical-cyber systems

(15)

Confluence of Key Areas

Real-Time

Control Cost

Form Factor

Severe Constraints Small Scale

Closed

Scheduling

Fault Tolerance Wired networks Level of

Uncertainty

Noisy C.

Sensing Scale

Real-Time/Actuation Open

Wireless Sensor Networks Embedded Systems

Linear Adaptive Distributed Decentralized Open

Human Models Architecture Principles

(16)

What’s New

• Scale

• Systems of systems

• Confluence of physical, wireless and computing

• Human Participation in Loop

• Open

Level of Uncertainty

(17)

Question

• Define “open”

(18)

CPS

• Are CPS simply embedded systems on steroids?

– Interact with the physical world

– Constraints on cpu, power, cost, memory, bandwidth, …

– Control actuators

(19)

• Is the Internet just a LAN on steroids?

• Confluence of the right technologies at the right time can result in

– Fundamental paradigm shift – Totally new systems

– Revolutionize business, science, entertainment, …

– Transform how we interact with the physical world

(20)

More Areas

• Signal Processing

• AI

• Data Mining

• Robotics

• Security and Privacy

• Formal Methods

• Software Engineering

(21)

Physical Affects Cyber

• Can we develop a science?

• Examples?

(22)

1. An unmanned plane (UAV) deploys motes

2. Motes establish an sensor network with power management

3. Sensor network detects vehicles and wakes up the sensor nodes

Zzz...

Energy Efficient Surveillance System

Ad-Hoc Network Neighbor

Discovery Time

Synchronization Parameterization Sentry Selection Coordinate Grid Data Aggregation Data Streaming Group Management Leader Election Localization

Network Monitor Power management Reconfiguration Reliable MAC Leader Migration Scheduling

State

Synchronization

……

Sentry

(23)

What Physical Things Affect the Cyber?

• In the sensing?

• In the wireless?

• In the environment?

(24)

Tracking Example (1)

• Sensing:

– Magnetic sensor takes 35 ms to stabilize

• affects real-time analysis

• affects sleep/wakeup logic

– Physical properties of targets affect algorithms and time to process

(uncertainty fundamental)

• Use shape, engine noise, …

• Environmental factors must be addressed such as wind, obstacles, …

(25)

Tracking Example (2)

• Sensor Fusion:

– Sensor fusion to avoid false alarms

• power management may have sensors in sleep state (affects fusion algorithms and real-time analysis)

– Location of nodes, target properties and environmental conditions affect fusion algorithms

• Target itself might block messages needed for fusion algorithms

(26)

Tracking Example (3)

• Wireless:

– Missing and delayed control signals alters FC loops; impossibility results for hard

real-time guarantees

(new notions of guarantees)

• Humans:

– Don’t follow nice trajectories; active avoidance in tracking examples

– Social models, human models

(27)

Realistic (Integrated) Solutions

• CPS must tolerate

– Failures – Noise

– Uncertainty – Imprecision

– Security attacks

– Lack of perfect synchrony – Disconnectedness

– Scale

– Openness

– Increasing complexity – Heterogeneity

R O B U S T N E E S

(28)

Research Ideas/Exemplars

1. New Components/Compositional Theory

2. Lightweight, Adaptive, Reactive Security

3. Robustness and Diversity

4. Systems of Systems

(29)

Component-Based (today - mostly)

Component

Reuse

Modularity Portability Reconfigure

Beginning to consider performance

(30)

Component-Based (Tomorrow)

Component Sensors

Actuators

Reflective Information Support for

cross cutting performance security

mobility

dependability costs

real-time power dynamics openness

Support for control

(31)

Component Architecture

(32)

Component Architecture 2

Non-traditional OS (yet standard)

Cyber Physical Hardware Abstraction Layer

Radio Sensors CPU Mem Power

RAM Flash Application

Wireless Stack

Optional Middleware Cross

Layering

(33)

Tasks in Architecture

Robust Scheduling

1 2 3

1 2 3

Tasks Deadlines

TIME Algorithm

EDF

Schedulable Yes

Order 1,2,3

How robust?

CF=1

(34)

Robust Scheduling For Real World CPS

1 2 3

1 2 3

Tasks Deadlines

TIME Algorithm

EDF

Schedulable Yes

Order 1,2,3

How robust?

1.8 CF

(1.8)

(35)

Required

• Robust, Real-Time, Dynamic, Open,

Heterogeneous Compositional Theory

– Based on underlying physical realities

– Real-Time scheduling is dynamic (based on current instances of CPS constraints)

(36)

1. An unmanned plane (UAV) deploys motes

2. Motes establish a sensor network with power management

3. Sensor network detects vehicles and wakes up the sensor nodes

Zzz...

Security - VigilNet

Sentry

(37)

VigilNet Architecture

(38)

Security Issues

• Every one of the 30 services can be attacked

• Too expensive to make every service attack- proof

• Attacks will evolve anyway

• Cannot collect, re-program, and re-deploy

MICAz mote:

8 MHz 8-bit uP 128 MB code 4 KB data mem 250 Kbps radio

(39)

Security Approach

• Operate in the presence of security attacks

– Robust decentralized protocols

– Runtime control of security vs. performance tradeoffs

• Self-healing architecture

• Evolve to new, unanticipated attacks

– Recall – open system!

• Lightweight solutions required due to severe constraints

(40)

Self-Healing Architecture

(41)

Aspect Oriented Programming (AOP)

Functional Modules

Aspects

Logging Encryption Power Control RT

(42)

SIGF: Secure Routing

• The SIGF family provides incremental steps between stateless and shared-state protocols.

• SIGF allows efficient operation when no

attacks are present, and good enough security when they are.

(43)

Robustness and Diversity

• Good for security

• Good for real world systems

• Good for uncertainties of physical

interactions

(44)

Example Problem

Accurate Node Location in

Complex Environments

(45)

GPS

- Not Cost Effective

- Line of Sight

(46)

Range Free

Centroid

- High Anchor Density - Inaccurate

-Large Areas without anchors

APIT

(47)

Range Free

DV-Hop

Inaccurate

(48)

Low Cost - Accurate

(X1, Y1, R1)

(X1, Y1, R1) at T1

(X2, Y2, R2)

(X2, Y2, R2) at T2

Spotlight

Line of Sight

(49)

Hierarchical Framework

Choose best / Weighted average If not localized – try another algorithm

All nodes have a location at this point.

(50)

Evaluation

• TOSSIM

– 400 nodes in 300x300ft2 – 200x200ft2

obstructed area – 50ft radio range – 10% nodes have

GPS

– 15% nodes in open area can’t be localized

(51)

Evaluation

(52)

Evaluation

All nodes are localized

(53)

Zzz...

System of Systems

Sentry

(54)

Systems of Systems

• Example of Openness

• Control loops across systems

• RT constraints across systems

• Human Participation

(55)

Adaptive/Decentralized Control

• Missing messages

• Delayed messages

• Wrong messages

• Real-time constraints

(56)

System Architecture

Internet

Local Transport

Protocol

Local Transport

Protocol

Programming Station

Server Server

Nodes Nodes

(57)

System Architecture

Internet

Local Transport

Protocol

Local Transport

Protocol

Programming Station

Server Server

Nodes Nodes

Information about Services, Interfaces

Location

(58)

System Architecture

Internet

Programming Station

Server Server

Nodes Nodes

Local Transport

Protocol

Local Transport

Protocol

High level Programming

Language

EXE

High Level Virtual Machine

High Level Virtual Machine

Low Level Virtual Machine

Low Level Virtual Machine

(59)

System Architecture

RT Internet

Local Transport

Protocol

Local Transport

Protocol

Programming/

Control

Server Server

Nodes Nodes

Responsible for

Resource management User access rights

Cross System Control Cross System RT

Beyond Best Effort

(60)

Correct Architecture?

• 6LoWPAN based

• WEB services based

(61)

CPS - Enabler for Dramatic Innovation

• New global-scale, personal medical delivery systems

• New paradigms for scientific discovery

• Smart (Micro) Agriculture

• Towards the end of terrorism

• Wireless Airplanes

• Next Generation Internet

(62)

Key Point

• Connection to the physical world will be

so pervasive that systems will be open

even if you think they are not

Referenzen

ÄHNLICHE DOKUMENTE

FERAL represents each ECU by a number of event based simulation components that integrate AUTOSAR applications, as well as simulated basic services and complex device drivers.. When

Ultimately, the data is made available to consumers (data analysts, report recipients, domain experts, etc.) in different formats: this ensures that all users are independent in

The laser guided mining (LGM) uses uncertainty weighted multi-source sensor fusion to facilitate a compact hardware design for a large-scale optical position sensitive detector

Hence, fail safety of a MCPS cannot be achieved within a single component or layer — neither the software layer nor any other isolated layer —, but requires an interdisciplinary

Ein wesentlicher Unterschied vieler Modelle der physikalischen Realität zu den Modellen der Informatik besteht darin, dass Modelle der Informatik inhärent diskret und abstrakt

Then, in case the source and target components meet the membership condition of an ensemble, the execution environment updates the belief of the target

In various robotics projects we have developed MontiArcAutomaton (code) generators for EMF Ecore 1 for graphical editing within Eclipse, Mona [EKM98] theories for verification

 Plattform als SaaS für Angestellte der Produktion auf Smart Devices.  Selbstorganisierte Personaleinsatzplanung