• Title/Summary/Keyword: Cyber physical systems

Search Result 183, Processing Time 0.02 seconds

The Design of Remote Monitoring and Warning System for Dangerous Chemicals Based on CPS

  • Kan, Zhe;Wang, Xiaolei
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.632-644
    • /
    • 2019
  • The remote monitoring and warning system for dangerous chemicals is designed with the concept of the Cyber-Physical System (CPS) in this paper. The real-time perception, dynamic control, and information service of major hazards chemicals are realized in this CPS system. The CPS system architecture, the physical layer and the applacation layer, are designed in this paper. The terminal node is mainly composed of the field collectors which complete the data acquisition of sensors and video in the physical layers, and the use of application layer makes CPS system safer and more reliable to monitor the hazardous chemicals. The cloud application layer completes the risk identification and the prediction of the major hazard sources. The early intelligent warning of the major dangerous chemicals is realized and the security risk images are given in the cloud application layer. With the CPS technology, the remote network of hazardous chemicals has been completed, and a major hazard monitoring and accident warning online system is formed. Through the experiment of the terminal node, it can be proved that the terminal node can complete the mass data collection and classify. With this experiment it can be obtained the CPS system is safe and effective. In order to verify feasible, the multi-risk warning based on CPS is simulated, and results show that the system solves the problem of hazardous chemicals enterprises safety management.

Issues and Tasks of Personal Information Protection Liability Insurance (개인정보 손해배상책임 보장제도의 쟁점과 과제)

  • Lee, Suyeon;Kwon, Hun-Yeong
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.37-53
    • /
    • 2020
  • Today, our society is exposed to cyber threats, such as the leakage of personal information, as various systems are connected and operated organically with the development of information and communication technology. With the impact of these cyber risks, we are experiencing damage from the virtual world to the physical world. As the number of cases of damage caused by cyber attacks has continued to rise, social voices have risen that the government needs to manage cyber risks. Thus, information and telecommunication service providers are now mandatory to have insurance against personal information protection due to amendment of "the Act on Promotion of Information and Communication Network Utilization and Information Protection". However, the insurance management system has not been properly prepared, with information and communication service providers selecting the service operators based on sales volume rather than selecting them based on the type and amount of personal information they store and manage. In order for the personal information protection liability insurance system to be used more effectively in line with the legislative purpose, effective countermeasures such as cooperation with the government and related organizations and provision of benefits for insured companies should be prepared. Thus, the author of this study discuss the current status of personal information protection liability insurance system and the issues raised in the operation of the system. Based on the results of this analysis, the authors propsoe tasks and plans to establish an effective personal information protection liability insurance system.

Development of field programmable gate array-based encryption module to mitigate man-in-the-middle attack for nuclear power plant data communication network

  • Elakrat, Mohamed Abdallah;Jung, Jae Cheon
    • Nuclear Engineering and Technology
    • /
    • v.50 no.5
    • /
    • pp.780-787
    • /
    • 2018
  • This article presents a security module based on a field programmable gate array (FPGA) to mitigate man-in-the-middle cyber attacks. Nowadays, the FPGA is considered to be the state of the art in nuclear power plants I&C systems due to its flexibility, reconfigurability, and maintainability of the FPGA technology; it also provides acceptable solutions for embedded computing applications that require cybersecurity. The proposed FPGA-based security module is developed to mitigate information-gathering attacks, which can be made by gaining physical access to the network, e.g., a man-in-the-middle attack, using a cryptographic process to ensure data confidentiality and integrity and prevent injecting malware or malicious data into the critical digital assets of a nuclear power plant data communication system. A model-based system engineering approach is applied. System requirements analysis and enhanced function flow block diagrams are created and simulated using CORE9 to compare the performance of the current and developed systems. Hardware description language code for encryption and serial communication is developed using Vivado Design Suite 2017.2 as a programming tool to run the system synthesis and implementation for performance simulation and design verification. Simple windows are developed using Java for physical testing and communication between a personal computer and the FPGA.

An ETRI CPS Modeling Language for Specifying Hybrid Systems (하이브리드 시스템을 명세하기 위한 ETRI CPS 모델링 언어)

  • Yoon, Sanghyun;Chun, In-geol;Kim, Won-Tae;Jo, Jaeyeon;Yoo, Junbeom
    • Journal of KIISE
    • /
    • v.42 no.7
    • /
    • pp.823-833
    • /
    • 2015
  • Hybrid system is a dynamic system that is composed of both a continuous and discrete system, suitable for automobile, avionic and defense systems. Various modeling languages and their supporting tools have been proposed and used in the hybrid system. The languages and tools have specific characteristics for their purpose. Electronics and Telecommunications Research Institute (ETRI) proposed a hybrid system modeling language, ECML (ETRI CPS Modeling Language). ECML extends DEV&DESS (Differential Event and Differential Equation Specified System) formalism with consideration of CPS (Cyber-Physical System), which supports modeling and simulation. In this paper, we introduce ECML and suggest a formal definition. The case study specifies a simple vehicle model using the suggested formal definition.

Demystifying the Definition of Digital Twin for Built Environment

  • Davari, Saman;Shahinmoghadam, Mehrzad;Motamedi, Ali;Poirier, Erik
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.1122-1129
    • /
    • 2022
  • The concept of Digital Twin (DT) has been receiving an increasing amount of attention in the construction management and building engineering research domains. Although the benefits of DT are evident, confusion with regards to the concept of DTs and its relationship with others such as Cyber-Physical Systems (CPS), Building Information Modelling (BIM) and Internet of Things (IoT) remains. This paper aims to help allay this confusion through an in-depth analysis of the definition of DT and its unique characteristics. As such, a review of the past and current definitions of DT and CPS in various domains is performed. An analysis is then conducted to identify the overlaps between the definition of DT with CPS, as well as with BIM and IoT. Finally, given the relatively closer resemblances between DT and CPS, a set of four distinct dimensions enabling their comparative analysis and highlighting their shared and unique characteristics is discussed. This paper contributes to the existing literature by exploring the definition of DT and presenting two original conceptualizations that help further refine the concept of DT in the construction and management and building engineering domain.

  • PDF

Design of Smart City Considering Carbon Emissions under The Background of Industry 5.0

  • Fengjiao Zhou;Rui Ma;Mohamad Shaharudin bin Samsurijan;Xiaoqin Xie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.903-921
    • /
    • 2024
  • Industry 5.0 puts forward higher requirements for smart cities, including low-carbon, sustainable, and people-oriented, which pose challenges to the design of smart cities. In response to the above challenges, this study introduces the cyber-physical-social system (CPSS) and parallel system theory into the design of smart cities, and constructs a smart city framework based on parallel system theory. On this basis, in order to enhance the security of smart cities, a sustainable patrol subsystem for smart cities has been established. The intelligent patrol system uses a drone platform, and the trajectory planning of the drone is a key problem that needs to be solved. Therefore, a mathematical model was established that considers various objectives, including minimizing carbon emissions, minimizing noise impact, and maximizing coverage area, while also taking into account the flight performance constraints of drones. In addition, an improved metaheuristic algorithm based on ant colony optimization (ACO) algorithm was designed for trajectory planning of patrol drones. Finally, a digital environmental map was established based on real urban scenes and simulation experiments were conducted. The results show that compared with the other three metaheuristic algorithms, the algorithm designed in this study has the best performance.

A Study on Application of Systems Engineering Approach to Design of Smart Manufacturing Execution System (스마트 제조 실행 시스템 기본설계를 위한 시스템 엔지니어링 적용 방법에 대한 연구)

  • Jeon, Byeong-woo;Shin, Kee-Young;Hong, Dae-Geun;Suh, Suk-Hwan
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.11 no.2
    • /
    • pp.95-105
    • /
    • 2015
  • Manufacturing Execution System(MES) is in charge of manufacturing execution in the shop floor based on the inputs given by high level information such as ERP, etc. The typical MES implemented is not tightly interconnected with shop floor control system including real (or near real) time monitoring and control devices such as PLC. The lack of real-time interfaces is one of the major obstacles to achieve accurate and optimization of the total performance index of the shop floor system. Smart factory system in the paradigm of Industry 4.0 tries to solve the problems via CPS (Cyber Physical System) technology and FILS (Factory In-the-Loop System). In this paper, we conducted Systems Engineering Approach to design an advanced MES (namely Smart MES) that can accommodate CPS and FILS concept. Specifically, we tailored Systems Engineering Process (SEP) based on an International Standard formalized as ISO/IEC 15288 to develop Stakeholders' Requirements (StR), System Requirements (SyR). The deliverables of each process are modeled and represented by the SysML, UML customized to Systems Engineering. The results of the research can provide a conceptual framework for future MES that can play a crucial role in the Smart Factory.

Ontology Based-Security Issues for Internet of Thing (IoT): Ontology Development

  • Amir Mohamed Talib
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.168-176
    • /
    • 2023
  • The use of sensors and actuators as a form of controlling cyber-physical systems in resource networks has been integrated and referred to as the Internet of Things (IoT). However, the connectivity of many stand-alone IoT systems through the Internet introduces numerous security challenges as sensitive information is prone to be exposed to malicious users. In this paper, IoT based-security issues ontology is proposed to collect, examine, analyze, prepare, acquire and preserve evidence of IoT security issues challenges. Ontology development has consists three main steps, 1) domain, purpose and scope setting, 2) important terms acquisition, classes and class hierarchy conceptualization and 3) instances creation. Ontology congruent to this paper is method that will help to better understanding and defining terms of IoT based-security issue ontology. Our proposed IoT based-security issue ontology resulting from the protégé has a total of 44 classes and 43 subclasses.

XML Converter Design and Implementation for OCIL based Security Level Evaluation (OCIL기반 보안수준평가를 위한 XML Converter 설계 및 구현)

  • Kim, Jongmin;Kim, Sang-Choon
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.29-35
    • /
    • 2020
  • The cyber attacks targeting the systems of national and public organizations in the front line of cyber security have been advanced, and the number of cyber attacks has been on the constant rise. In this circumstance, it is necessary to develop the security evaluation technology to prevent cyber attacks to the systems of national and public organizations. Most of the studies of the vulnerability analysis on the information systems of national and public organizations almost focus on automation. In actual security inspection, it is hard to automate some parts. In terms of security policies for threats, many different plans have been designed and applied in the managerial, physical, and technical fields, giving particular answers no matter how they are subjective or situational. These tendencies can be standardized in OCIL(Open Checklist Interactive Language), and partial automation can be achieved. Therefore, this study tries to implement XML Converter in order for OCIL based security level evaluation with typical evaluation questions.

A Leverage Strategy of the Cyber warfare Security Policy Based on systems Thinking (시스템 사고를 이용한 사이버전 보안 정책 레버리지 전략 연구)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Park, Ho-Kyun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.77-83
    • /
    • 2013
  • As the network composed of numerous sensor nodes, sensor network conducts the function of sensing the surrounding information by sensor and of the sensed information. The concept of the battlefield is also changing to one that includes not only physical spaces but all areas including the networks of the nation's key industries and military facilities, energy facilities, transportation, and communication networks. In light of the changing warfare in terms of how it is conducted and what form it takes, the Korea military has to seek ways to effectively respond to threats of cyber warfare. In the past, although partial strategies on cyber warfare were studied, no research was done through the overall system flow. In this paper, key variables related to cyber warfare security are classified into personnel, management, and technology. A simple model and an extended model are suggested for each area, and based on the technology area of the extended model, formal methods are used to verify the validity and a detailed response strategy is suggested according to the identified leverage.