Cyber-Physical Systems: Aspects as a Basis for Robustness and Openness John A. Stankovic Department of Computer Science University of Virginia March 2009.

Slides:



Advertisements
Similar presentations
Security and Sensor Networks By Andrew Malone and Bryan Absher.
Advertisements

1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Communications Research Centre (CRC) Defence R&D Canada – Ottawa 1 Properties of Mobile Tactical Radio Networks on VHF Bands Li Li & Phil Vigneron Communications.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Distributed Assignment of Encoded MAC Addresses in Sensor Networks By Curt Schcurgers Gautam Kulkarni Mani Srivastava Presented By Charuka Silva.
Is There Light at the Ends of the Tunnel? Wireless Sensor Networks for Adaptive Lighting in Road Tunnels IPSN 2011 Sean.
1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Introduction to Wireless Sensor Networks
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
MPAC 2004Rae Harbird 1 RUBI Adaptive Resource Discovery for Ubiquitous Computing Rae Harbird Stephen Hailes
PERFORMANCE MEASUREMENTS OF WIRELESS SENSOR NETWORKS Gizem ERDOĞAN.
Cross Layer Design in Wireless Networks Andrea Goldsmith Stanford University Crosslayer Design Panel ICC May 14, 2003.
IEEE INFOCOM 2005, Miami, FL RID: Radio Interference Detection in Wireless Sensor Networks Gang Zhou, Tian He, John A. Stankovic, Tarek F. Abdelzaher Computer.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Power saving technique for multi-hop ad hoc wireless networks.
Achieving Long-Term Surveillance in VigilNet Pascal A. Vicaire Department of Computer Science University of Virginia Charlottesville, USA.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
Wireless Sensor Networks Self-Healing Professor Jack Stankovic University of Virginia 2005.
SMUCSE 8344 Term Paper Topics (Always Incomplete).
Project Introduction 이 상 신 Korea Electronics Technology Institute.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
University of Virginia Wireless Sensor Networks August, 2006 University of Virginia Jack Stankovic.
Gathering Data in Wireless Sensor Networks Madhu K. Jayaprakash.
Stochastic sleep scheduling (SSS) for large scale wireless sensor networks Yaxiong Zhao Jie Wu Computer and Information Sciences Temple University.
Mobile Ad hoc Networks Sleep-based Topology Control
Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications Chien-Liang Fok, Gruia-Catalin Roman, Chenyang Lu
NEST 1 NEST System Working Group Meeting #1 Jack Stankovic University of Virginia September 2001 Boeing Huntington Beach, CA.
Optimal Power Control, Rate Adaptation and Scheduling for UWB-Based Wireless Networked Control Systems Sinem Coleri Ergen (joint with Yalcin Sadi) Wireless.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
Designing Routing Protocol For Mobile Ad Hoc Networks Navid NIKAEIN Christian BONNET EURECOM Institute Sophia-Antipolis France.
SENSOR NETWORKS BY Umesh Shah Mayuresh Patil G P Reddy GUIDES Prof U.B.Desai Prof S.N.Merchant.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
College of Engineering Anchor Nodes Placement for Effective Passive Localization Karthikeyan Pasupathy Major Advisor: Dr. Robert Akl Department of Computer.
Systems Wireless EmBedded Wireless Sensor Nets Turning the Physical World into Information David Culler Electrical Engineering and Computer Sciences University.
Achieving Long-Term Surveillance in VigilNet Tian He, Pascal Vicaire, Ting Yan, Qing Cao, Gang Zhou, Lin Gu, Liqian Luo, Radu Stoleru, John A. Stankovic,
Networking Algorithms Mani Srivastava UCLA [Project: Dynamic Sensor Nets (ISI-East)]
Tufts Wireless Laboratory Tufts University School Of Engineering Real-Time Data Services for Cyber Physical Systems Zhong Zou.
University of Virginia Self-Organizing Wireless Sensor Networks in Action A Case Study Computer Science University of Virginia Jack Stankovic.
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
A Grid-enabled Multi-server Network Game Architecture Tianqi Wang, Cho-Li Wang, Francis C.M.Lau Department of Computer Science and Information Systems.
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
Self-stabilizing energy-efficient multicast for MANETs.
Wireless sensor and actor networks: research challenges
EM-MAC: A Dynamic Multichannel Energy-Efficient MAC Protocol for Wireless Sensor Networks ACM MobiHoc 2011 (Best Paper Award) Lei Tang 1, Yanjun Sun 2,
Wireless Sensor Networks
University of Virginia Full Life Cycle Analysis for Wireless Sensor Networks January 10, 2007 Computer Science University of Virginia Jack Stankovic.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Adaptable and Reactive Security for Wireless Sensor Networks John A. Stankovic Department of Computer Science University of Virginia.
University of Virginia Wireless Sensor Networks Sept. 12, 2007 University of Virginia Jack Stankovic.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Towards Optimal Sleep Scheduling in Sensor Networks for Rare-Event Detection Qing Cao, Tarek Abdelzaher, Tian He, John Stankovic Department of Computer.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
In the name of God.
Overview of Wireless Networks:
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
A Novel Framework for Software Defined Wireless Body Area Network
CS294-1 Reading Aug 28, 2003 Jaein Jeong
Towards Next Generation Panel at SAINT 2002
Providing Robustness in Cyber Physical Systems
Presentation transcript:

Cyber-Physical Systems: Aspects as a Basis for Robustness and Openness John A. Stankovic Department of Computer Science University of Virginia March 2009

Outline What are Cyber Physical Systems (CPS) Aspects in CPS (cross cutting concerns) –Logging –(Reactive) Security –Robust Localization –Power Management –Feedback Control

Acknowledgments/Info CPS Program (3 years in the making) –Initiated with core of about 10 people –Expanded to more than 30 researchers –Expanded to 100s of researchers –NSF CPS CFP ($30,000,000 year 1) –PCAST 2007 report: #1 priority for Federal Investment –Expanding to other agencies –European Union - $7B

Definition CPS is the co-joining of computation and communication with physical processes. CPS exhibits an intimate coupling between the cyber and physical that manifests itself from the nano world to large-scale wide-area systems of systems.

Computing in Physical Systems Body Networks Road and Street Networks Battlefield Networks Vehicle Networks Industrial Networks Building Networks Environmental Networks Heterogeneous Wireless Networks with Sensors and Actuators

Whats New Scale Systems of systems Confluence of physical, wireless and computing Human Participation Open

CPS Are CPS simply embedded systems on steroids? –Interact with the physical world –Constraints on cpu, power, cost, memory, bandwidth, … –Control actuators

Is the Internet just a LAN on steroids? Confluence of the right technologies at the right time can result in –Fundamental paradigm shift –Totally new systems –Revolutionize business, science, entertainment, … –Transform how we interact with the physical world

Confluence of Four Key Areas Real-Time Control Cost Form Factor Severe Constraints Small Scale Closed Open Degree of Uncertainty Scheduling Fault Tolerance Wired networks Wireless Degree of Uncertainty Noisy C. Sensing Scale Real-Time/Actuation Open Wireless Sensor Networks Embedded Systems Linear Adaptive Distributed Decentralized Open Human Models ArchitecturePrinciples

Motivating Example Cyber – Physical Interactions –Influence on each other –Cross disciplinary

1. An unmanned plane (UAV) deploys motes 2. Motes establish an sensor network with power management 3.Sensor network detects vehicles and wakes up the sensor nodes Zzz... Energy Efficient Surveillance System Ad-Hoc Network Neighbor Discovery Time Synchronization Parameterization Sentry Selection Coordinate Grid Data Aggregation Data Streaming Group Management Leader Election Localization Network Monitor Power management Reconfiguration Reliable MAC Leader Migration Scheduling State Synchronization …… Sentry

Tracking Example (1) Sensing: –Magnetic sensor takes 35 ms to stabilize (affects real-time analysis) (affects sleep/wakeup logic) –Physical properties of targets affect algorithms and time to process (uncertainty fundamental) Use shape, engine noise, … Sensor Fusion: –Sensor fusion to avoid false alarms, but power management may have sensors in sleep state (affects fusion algorithms and real-time analysis) –Location of nodes, target properties and environmental conditions affect fusion algorithms

Tracking Example (2) Wireless: –Missing and delayed control signals alters FC loops –Impossibility results for hard real-time guarantees (new notions of guarantees) Humans: –Dont follow nice trajectories; active avoidance attempts –Social models, human models

Realistic (Integrated) Solutions CPS must tolerate –Failures –Noise –Uncertainty –Imprecision –Security attacks –Lack of perfect synchrony –Disconnectedness –Scale –Openness –Increasing complexity –Heterogeneity ROBUSTNEESROBUSTNEES

Aspects in CPS Logging (Reactive) Security Robust Localization Power Control FC Loops

Themes Requirements of Robustness and Openness –Minimal capacity devices Adaptive Systems (Dynamic Aspects) Produce Consistent Changes Across –Protocols –Nodes –Control Loops

1. An unmanned plane (UAV) deploys motes 2. Motes establish a sensor network with power management 3. Sensor network detects vehicles and wakes up the sensor nodes Zzz... VigilNet Sentry

VigilNet Architecture

Dynamic Aspect Architecture

Logging Open and noisy/uncertain environments Limited storage and energy (must be selective) Examples: –Activate (logging) advice at all MAC and routing protocol entries when E2E comm. performance drops –Activate periodically to assess state of system

Logging Surprising performance –Routes used? –Congestion and why? –Current topology? –Hotspots? –How much traffic generated by a node? –… Turn on/off –Coordinated across CPS to get coverage –By area

1. An unmanned plane (UAV) deploys motes 2. Motes establish a sensor network with power management 3. Sensor network detects vehicles and wakes up the sensor nodes Zzz... Security - VigilNet Sentry

VigilNet Architecture

Security Issues Every one of the 30 services can be attacked Too expensive to make every service attack- proof Attacks will evolve anyway Cannot collect, re-program, and re-deploy MICAz mote: 8 MHz 8-bit uP 128 MB code 4 KB data mem 250 Kbps radio

Security Approach Operate in the presence of security attacks –Robust decentralized protocols –Runtime control of security vs. performance tradeoffs Self-healing architecture Evolve to new, unanticipated attacks Lightweight solutions required due to severe constraints

Self-Healing Architecture

SIGF: Secure Routing The SIGF family provides incremental steps between stateless and shared-state protocols. SIGF allows efficient operation when no attacks are present, and good enough security when they are.

Dynamic Aspects Mechanism for implementing the right defense at the right time strategy –Switch consistently –Choose the correct keys

Other Security Issues Encrypt all control messages when attack suspected –Time sync, localization, power management Across nodes: Double the key lengths and increase message size

Robust Localization Accurate Node Location in Complex Environments

GPS - Not Cost Effective - Line of Sight

Range Free Centroid - High Anchor Density - Inaccurate -Large Areas without anchors APIT

Range Free DV-Hop Inaccurate

Low Cost - Accurate (X 1, Y 1, R 1 ) (X 1, Y 1, R 1 ) at T 1 (X 2, Y 2, R 2 ) (X 2, Y 2, R 2 ) at T 2 Spotlight Line of Sight

CPS Complex physical properties of environments render individual solutions brittle

Hierarchical Framework Choose best / Weighted average If not localized – try another algorithm All nodes have a location at this point.

Evaluation TOSSIM –400 nodes in 300x300ft2 –200x200ft 2 obstructed area –50ft radio range –10% nodes have GPS –15% nodes in open area cant be localized

Evaluation

All nodes are localized

Dynamic Aspects Weave in new localization protocols as required

Power Management Power Management in the Small –Individual protocols: MAC, Routing, Clock Sync, Localization Power Management in the Large –Overarching protocols for additional power savings Sentry Service Tripwire Management Service Duty Cycle Differential Surveillance

Sentry Duty-Cycle Scheduling A common period p and duty-cycle β is chosen for all sentries, while starting times T start are randomly selected Non-sentries Sentries Target Trace A B C D E A B C D E t t t t t Awake Sleeping p02p

Differentiated Surveillance Solution DOC = 1DOC = 2 DOC = Degree of Coverage Dynamic

Aspects Sets of coordinated changes (pointcuts in) –In MAC –In Routing –In Clock Sync –For duty cycle –Turn off/on tripwire section

Feedback Control Node Level Neighborhood Level System Level Systems of Systems Level Explicit and Implicit Interactions Across FC loops

Component-Based (today - mostly) Component Reuse Modularity Portability Reconfigure Beginning to consider performance

Component-Based (Tomorrow) Component Sensors Actuators Reflective InformationSupport for cross cutting performance security mobility dependability costs real-time power dynamics openness Support for control; reflect the physical

Interaction Among FC Loops n controllers increase/decrease control parameter in same direction –overshooting n controllers fight each other –Change parameters in opposite directions

Examples Real-Time: monitor E2E delay –Change sleep cycle (PM), backoff times (MAC), congestion thresholds (Routing), packet aggregation amounts (Middleware), sensing rates (SP), … Power Control: monitor voltage –Change duty cycle, coverage, sector policy, message rates

Final Thoughts (1) CPS - Enabler for Dramatic Innovation –New global-scale, personal medical delivery systems –New paradigms for scientific discovery –Smart (Micro) Agriculture –Towards the end of terrorism –(Mostly) Wireless Airplanes –Next Generation Internet

Final Thoughts (2) Connection to the physical world will be so pervasive that systems will be open even if you think they are not Degree of uncertainty is high Flexibility offered by (Dynamic) AOP has great potential