首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 125 毫秒
1.
走向社会信息物理生产系统   总被引:2,自引:1,他引:1  
景轩  姚锡凡 《自动化学报》2019,45(4):637-656
随着信息物理系统(Cyber-physical system,CPS)融合深度和融合广度的不断增加,信息物理生产系统(Cyber-physical production system,CPPS)呈现出显著的社会化趋势.通过对信息物理生产系统相关技术的研究,分析了信息物理生产系统的社会化演进历程,建立了社会信息物理生产系统(Social cyber-physical production system,SCPPS)模型;根据人与智能体的信息物理交互行为差异,基于对人类社会行为特点的分析,类比研究了智能体社会与人类社会融合的广义互联社会特点;归纳出信息物理系统的七种交互模式及其在社会信息物理生产系统中的应用;总结出社会信息物理生产系统面临标准化、人性化和安全化的挑战问题.  相似文献   

2.
信息物理系统(CPS)是一个集成计算、通信和物理过程的混成系统,在智慧城市中占据至关重要的地位,其安全问题面临许多挑战.本文首先建立信息物理系统安全威胁分析模型,给出CPS各个组成部件的安全威胁,然后提出了信息物理系统的威胁关联分析方法,并以智能电网为例给出实验测试结果.结果表明,该方法能实现快速大规模安全威胁建模和自动化分析,为智慧城市中的关键信息基础设施提供技术支撑.最后,本文总结了智慧城市中信息物理系统的安全威胁研究进展和未来研究方向.  相似文献   

3.
信息物理融合系统行为是一种由离散计算过程与连续物理动态过程深度融合并紧密交互的混成行为.在CPS设计早期对信息系统实体的信息实体的关键监控参数、实时指标,以及物理系统设施的连续行为规律进行综合评估,是这类系统进一步设计与实现的基础.基于扩展DPN语义,以某智能车CPS系统自主行进紧急避障过程为研究对象,建立了其信息物理混成行为的Petri网模型,以融合并集中体现各关键参数和指标的时序协作效应;通过对该模型的仿真运行,实现了CPS行为的在线观测与综合评估.该方法为CPS子系统关键设计指标的综合合理性评估及其组合设计提供了一种解决途径.  相似文献   

4.
电力系统安全仿真是面向电力系统自身故障或外部攻击等安全威胁,通过仿真实验或借助数值计算研究系统行为的技术.随着自动控制、网络通信、人工智能等信息技术的广泛应用,电力系统已发展成为物理系统与信息系统深度耦合的信息物理融合系统.物理破坏或网络攻击产生的故障在电力系统中相互关联,可跨域传播,产生新的安全威胁形态.电力系统安全...  相似文献   

5.
信息物理系统技术综述   总被引:11,自引:2,他引:9  
信息物理系统(Cyber-physical system,CPS)将计算、通信与控制技术紧密结合,实现了计算资源与物理资源的结合与协调.CPS是当前自动化领域的前沿研究方向,已经引起了学术界和工业界的广泛关注.本文对CPS进行了简要介绍,根据技术的应用特点对CPS的现有研究成果进行了分类,综述了各个研究方向的意义和研究进展,给出了CPS的两个典型实际案例,探讨了CPS研究中亟待解决的问题以及未来可能的研究方向.  相似文献   

6.
信息-物理融合系统若干关键问题综述   总被引:14,自引:0,他引:14  
信息-物理融合系统(Cyber-Physical System,CPS)集成了计算系统与物理系统,并通过嵌入式计算机与网络实现了两者之间的协作和融合,将对人们的生产和生活方式产生重要影响.CPS是一个全新的研究领域,利用现有基础理论和技术设计CPS时面临着众多问题.介绍了CPS的概念、特点和体系结构,分析了与嵌入式系统、网络的关联,从计算系统、网络系统和控制系统3个方面概括了CPS设计面临的主要挑战,并着重探讨了当前一些可用于CPS设计的理论和技术以及CPS研究的最新进展,指出CPS当前的发展应以解决系统抽象层次设计、系统建模、体系结构设计、数据传输和管理、子系统集成方面的问题作为其下一步发展主要的研究方向,并提出了一些可行的解决办法,可为相关研究提供参考.  相似文献   

7.
信息物理融合系统(Cyber-Physical systems,CPS)是由信息系统和物理系统融合而成,从而引入了信息系统中普遍存在的安全隐患.传统信息系统的入侵检测算法专注于检测的准确率而忽略算法的复杂度和实时性,不适用于CPS.为了解决CPS入侵检测的实时性问题,提出一种结合相关性特征选择的堆叠极限树集成算法(CFS-SET).针对CPS中数据特征众多的特点,使用基于相关性的特征选择算法(Correlation-based Feature Subset Selection,CFS),去除不相关和冗余特征.采用堆叠极限树算法,进行入侵行为检测.基于Power System Dataset进行实验,结果表明,CFS-SET算法在保证分类准确率的同时,可以节省训练和预测计算时间,满足CPS对实时性的要求.  相似文献   

8.
面向电力信息物理系统的虚假数据注入攻击研究综述   总被引:12,自引:0,他引:12  
王琦  邰伟  汤奕  倪明 《自动化学报》2019,45(1):72-83
随着电力信息通信技术的发展与应用,电力流与信息流深度融合,共同实现对系统的全景状态感知与控制决策,电力系统转变成典型的信息物理系统(Cyber physical system,CPS).开放的通信环境与复杂的信息物理耦合交互过程,使得信息安全风险成为影响电力系统安全稳定运行的重要因素.其中,虚假数据注入攻击(False data injection attack,FDIA)通过破坏网络数据完整性以干扰控制决策,是一种典型的网络攻击方式.本文针对面向电力CPS的虚假数据注入的攻击过程和防御手段进行了分析与总结.从攻击者视角分析了FDIA的攻击目标、策略及后果;从防御者视角总结了保护与检测环节中的各类方法;最后基于联合仿真技术,提出了针对虚假数据攻防过程建模和评估的电力CPS联合攻防平台.  相似文献   

9.
2017年3月1日,工信部信软司指导中国电子技术标准化研究院,联合国内相关单位编撰发布《信息物理系统白皮书(2017)》.白皮书对信息物理系统(CPS)的技术内涵做了全面归纳与系统阐释.白皮书提出了一套支撑两化深度融合的综合技术体系,定义了智能制造最核心的CPS概念,并提出了CPS的目标,为国内工业化和信息化深度融合以及智能制造发展指出了方向.  相似文献   

10.
王寿光  赵玉美  尤丹  冉宁 《控制与决策》2022,37(8):1934-1944
信息物理系统(cyber physical system, CPS)由受控对象、传感器、执行器、监控器和通信网络组成,通信网络的使用增加了信息物理系统面临外部攻击的风险.鉴于此,综述基于离散事件系统框架处理信息物理系统攻击问题的相关研究工作.首先对信息物理系统进行简要介绍;然后对信息物理系统中的攻击进行分类;最后重点阐述信息物理系统中攻击策略的设计、攻击的检测与防御以及攻击鲁棒性监控器设计的研究现状.  相似文献   

11.
In this paper we comprehensively survey the concept and strategies for building a resilient and integrated cyber–physical system (CPS). Here resilience refers to a 3S-oriented design, that is, stability, security, and systematicness: Stability means the CPS can achieve a stable sensing-actuation close-loop control even though the inputs (sensing data) have noise or attacks; Security means that the system can overcome the cyber–physical interaction attacks; and Systematicness means that the system has a seamless integration of sensors and actuators. We will also explain the CPS modeling issues since they serve as the basics of 3S design. We will use two detailed examples from our achieved projects to explain how to achieve arobust, systematic CPS design: Case study 1 is on the design of a rehabilitation system with cyber (sensors) and physical (robots) integration. Case Study 2 is on the implantable medical device design. It illustrates the nature of CPS security principle. The dominant feature of this survey is that it has both principle discussions and practical cyber–physical coupling design.  相似文献   

12.
IEC 61850, an international standard for communication networks, is becoming prevalent in the cyber–physical system (CPS) environment, especially with regard to the electrical grid. Recently, since cyber threats in the CPS environment have increased, security matters for individual protocols used in this environment are being discussed at length. However, there have not been many studies on the types of new security vulnerabilities and the security requirements that are required in a heterogeneous protocol environment based on IEC 61850. In this paper, we examine the electrical grid in Korea, and discuss security vulnerabilities, security requirements, and security architectures in such an environment.  相似文献   

13.
The comprehensive integration of instrumentation, communication, and control into physical systems has led to the study of Cyber-Physical Systems (CPSs), a field that has recently garnered increased attention. A key concern that is ubiquitous in CPS is a need to ensure security in the face of cyber attacks. In this paper, we carry out a survey of systems and control methods that have been proposed for the security of CPS. We classify these methods into three categories based on the type of defense proposed against the cyberattacks: prevention, resilience, and detection & isolation. A unified threat assessment metric is proposed in order to evaluate how CPS security is achieved in each of these three cases. Also surveyed are the risk assessment tools and the effect of network topology on CPS security. Furthermore, an emphasis has been placed on power and transportation applications in the overall survey.  相似文献   

14.
基于Petri网的CPS系统安全量化分析模型   总被引:1,自引:0,他引:1  
随着信息物理融合系统(CPS)的广泛应用,安全性已成为其研究的核心问题。由于CPS离散计算过程和连续物理世界交织的特性,传统的安全分析方式不能直接适用。通过将博弈理论和Petri网建模方法进行结合,提出一种GHPN方法对CPS系统建立量化的安全分析模型,该模型既能适用CPS离散连续混合结构的模型刻画,又可合理模拟系统攻防双方行为,基于最终生成的模型从系统可靠性、脆弱性、风险后果等方面进行安全分析。通过对飞机空中避撞系统的实例研究,表明该模型和分析方法的有效性。  相似文献   

15.
Recent years have witnessed increasing cyber and physical attacks against encrypted cyber‐physical system (CPS) and the ensuing catastrophic consequences. A modified security signaling game (MSSG) model is proposed for capturing attack‐defense interactions and analyzing the cross‐layer security of encrypted CPS. Cyber real‐time performance and physical control performance are both considered in cross‐layer utility function. Theorems concerning the existence of pure‐strategy and mixed‐strategy perfect Bayesian Nash equilibrium (PBNE) are provided, based on which a cross‐layer security design algorithm is proposed for defender's optimal strategy against potential attacks. A numerical case is studied with the effectiveness of our method being proved.  相似文献   

16.
In this paper, the cross-layer security problem of cyber-physical system (CPS) is investigated from the game-theoretic perspective. Physical dynamics of plant is captured by stochastic differential game with cyber-physical influence being considered. The sufficient and necessary condition for the existence of state-feedback equilibrium strategies is given. The attack-defence cyber interactions are formulated by a Stackelberg game intertwined with stochastic differential game in physical layer. The condition such that the Stackelberg equilibrium being unique and the corresponding analytical solutions are both provided. An algorithm is proposed for obtaining hierarchical security strategy by solving coupled games, which ensures the operational normalcy and cyber security of CPS subject to uncertain disturbance and unexpected cyberattacks. Simulation results are given to show the effectiveness and performance of the proposed algorithm.  相似文献   

17.
Cyber-physical systems (CPS) represent a new class of information system that also takes real-world data and effects into account. Software-controlled sensors, actuators and smart objects enable a close coupling of the cyber and physical worlds. Introducing processes into CPS to automate repetitive tasks promises advantages regarding resource utilization and flexibility of control systems for smart spaces. However, process execution systems face new challenges when being adapted for process execution in CPS: the automated processing of sensor events and data, the dynamic invocation of services, the integration of human interaction, and the synchronization of the cyber and physical worlds. Current workflow engines fulfill these requirements only to a certain degree. In this work, we present PROtEUS—an integrated system for process execution in CPS. PROtEUS integrates components for event processing, data routing, dynamic service selection and human interaction on the modeling and execution level. It is the basis for executing self-healing model-based workflows in CPS. We demonstrate the applicability of PROtEUS within two case studies from the Smart Home domain and discuss its feasibility for introducing workflows into cyber-physical systems.  相似文献   

18.
Typically, Cyber-Physical Systems (CPS) involve various interconnected systems, which can monitor and manipulate real objects and processes. They are closely related to Internet of Things (IoT) systems, except that CPS focuses on the interaction between physical, networking and computation processes. Their integration with IoT led to a new CPS aspect, the Internet of Cyber-Physical Things (IoCPT). The fast and significant evolution of CPS affects various aspects in people’s way of life and enables a wider range of services and applications including e-Health, smart homes, e-Commerce, etc. However, interconnecting the cyber and physical worlds gives rise to new dangerous security challenges. Consequently, CPS security has attracted the attention of both researchers and industries. This paper surveys the main aspects of CPS and the corresponding applications, technologies, and standards. Moreover, CPS security vulnerabilities, threats and attacks are reviewed, while the key issues and challenges are identified. Additionally, the existing security measures are presented and analyzed while identifying their main limitations. Finally, several suggestions and recommendations are proposed benefiting from the lessons learned throughout this comprehensive review.  相似文献   

19.
A cyber physical system (CPS) is a complex system that integrates sensing, computation, control and networking into physical processes and objects over Internet. It plays a key role in modern industry since it connects physical and cyber worlds. In order to meet ever-changing industrial requirements, its structures and functions are constantly improved. Meanwhile, new security issues have arisen. A ubiquitous problem is the fact that cyber attacks can cause significant damage to industrial systems, and thus has gained increasing attention from researchers and practitioners. This paper presents a survey of state-of-the-art results of cyber attacks on cyber physical systems. First, as typical system models are employed to study these systems, time-driven and event-driven systems are reviewed. Then, recent advances on three types of attacks, i.e., those on availability, integrity, and confidentiality are discussed. In particular, the detailed studies on availability and integrity attacks are introduced from the perspective of attackers and defenders. Namely, both attack and defense strategies are discussed based on different system models. Some challenges and open issues are indicated to guide future research and inspire the further exploration of this increasingly important area.   相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号