ACM Transactions on

Cyber-Physical Systems (TCPS)

Latest Articles

Physical Layer Key Generation: Securing Wireless Communication in Automotive Cyber-Physical Systems

Modern automotive Cyber-Physical Systems (CPS) are increasingly adopting wireless communications for Intra-Vehicular, Vehicle-to-Vehicle (V2V), and Vehicle-to-Infrastructure (V2I) protocols as a promising solution for challenges such as the wire harnessing problem, collision detection, and collision avoidance, traffic control, and environmental... (more)

Tradeoffs in Neuroevolutionary Learning-Based Real-Time Robotic Task Design in the Imprecise Computation Framework

A cyberphysical avatar is a semi-autonomous robot that adjusts to an unstructured environment and... (more)

TORUS: Scalable Requirements Traceability for Large-Scale Cyber-Physical Systems

Cyber-Physical Systems (CPS) contain intertwined and distributed software, hardware, and physical components to control complex physical processes. They find wide application in industrial systems, such as smart grid protection systems, which face increasingly complex communication and computation needs. Due to the scale and complexity of the... (more)

Anonymous, Fault-Tolerant Distributed Queries for Smart Devices

Applications that aggregate and query data from distributed embedded devices are of interest in many settings, such as smart buildings and cities, the... (more)

Inferring Smart Schedules for Dumb Thermostats

Heating, ventilation, and air conditioning (HVAC) accounts for over 50% of a typical home’s energy usage. A thermostat generally controls HVAC usage in a home to ensure user comfort. In this article, we focus on making existing “dumb” programmable thermostats smart by applying energy analytics on smart meter data to infer... (more)

Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach

Cyber-physical Systems of Systems (SoSs) are large-scale systems made of independent and autonomous cyber-physical Constituent Systems (CSs) which may interoperate to achieve high-level goals also with the intervention of humans. Providing security in such SoSs means, among other features, forecasting and anticipating evolving SoS functionalities,... (more)


CFP: Special Issue on Time for CPS
Timing is crucial for safety, security, and responsiveness of Cyber-Physical System (CPS). This special issue invites manuscripts that study any aspect of the interaction of CPS and its timing. For more information, visit the Special Issue webpage.

CFP: Special Issue on User-Centric Security and Safety for Cyber-Physical Systems
This special issue focuses on user-centric security and safety aspects of cyber-physical systems (CPS), with the aims of filling gaps between the user behaviour and the design of complex cyber-physical systems. For more information, visit the Special Issue webpage.

CFP: Special Issue on Human-Interaction-Aware Data Analytics for Cyber-Physical Systems
This special issue focuses on fundamental problems involving human-interaction-aware data analytics with future CPS. The aim of this special issue is to provide a platform for researchers and practitioners from academia, government and industry to present their state-of-the-art research results in the area of human-interaction-aware data analytics for CPS. For more information, visit the Special Issue webpage.

CFP: Special Issue on Self-Awareness in
Resource Constrained Cyber-Physical Systems

This special issue seeks original manuscripts which will cover recent development on methods, architecture, design, validation and application of resource-constrained cyber-physical systems that exhibit a degree of self-awareness. For more information, visit the Special Issue webpage.

CFP: Special Issue on Real-Time aspects in Cyber-Physical Systems
This special issue invites original, high-quality work that report the latest advances in real-time aspects in CPSs. Featured articles should present novel strategies that address real-time issues in different aspects of CPS design and implementation, including theory, system software, middleware, applications, network, tool chains, test beds, and case studies. For more information, visit the Special Issue webpage.

CFP: Special Issue on Transportation Cyber-Physical Systems
The aim of this special issue will be to feature articles on new technologies that will impact future transportation systems. They might span across vehicular technologies – such as autonomous vehicles, vehicle platooning and electric cars, communication technologies to enable vehicle-to-vehicle and vehicle-to-infrastructure communication, security mechanisms, infrastructure-level technologies to support transportation, as well as management systems and policies such as traffic light control, intersection management, dynamic toll pricing and parking management. In addition to terrestrial transportation, traffic control and autonomous management of aerial vehicles and maritime ships are also of interest. For more information, visit the Special Issue webpage.

About TCPS

Cyber-Physical Systems (CPS) has emerged as a unifying name for systems where the cyber parts, i.e., the computing and communication parts, and the physical parts are tightly integrated, both at the design time and during operation. Such systems use computations and communication deeply embedded in and interacting with physical processes to add new capabilities to physical systems. These cyber-physical systems range from miniscule (pace makers) to large-scale (a national power-grid). There is an emerging consensus that new methodologies and tools need to be developed to support cyber-physical systems.  READ MORE

Forthcoming Articles
Social Taxi Sharing: A Cyber-Physical Approach for Efficient Urban Transportation Service

Vehicular cyber-physical systems are implemented to share taxi resource eciently using intensive algorithms running on telematics devices. However, due to the lack of social interactions, conventional systems are hard to improve user experience without considering passengers inner connections. In this paper, we propose an optimization scheme for these vehicular cyber-physical systems which integrate social interaction with real time street data to improve the sharing eciency and user experience. To answer the sharing requirement from potential passengers, our system allocates the taxi resource under the trade-o‚ between cost and social interactions. We state and solve the sharing arrangement problem by computing a heuristic algorithm called SONETS to satisfy overwhelming requests from streets with limited taxi resource in peak time. Œe simulation results show that our algorithm can increase the integrated bene€t than other solutions.

Model-based quantitative evaluation of repair procedures in gas distribution networks

Technological and market evolution motivates investigation into quantitative evaluation of performability of gas distribution networks. This paper proposes an approach for assessing the impact of multi-phased repair procedures, capturing time-variable load profiles for different classes of users, suspension of activities during non-working hours, and random execution times depending on topological, physical, and geographical characteristics of the network. The method interleaves fluid-dynamic analysis of the gas behavior and stochastic analysis of the time spent in the repair procedure, decoupling complexities and making stochastic analysis almost insensitive to the network size and topology, thus making application feasible for real scale cases. Moreover, by encompassing general (non-Markovian) distributions, the approach enables effective fitting of durational properties as emerging in each specific application context.

A Predictive Framework for Dynamic Heavy-Duty Vehicle Platoon Coordination

This article describes a system to facilitate dynamic en route formation of truck platoons with the goal of reducing fuel consumption. Safe truck platooning is a maturing technology which leverages modern sensor, control, and communication technology to automatically regulate the inter-vehicle distances. Truck platooning has been shown to reduce fuel consumption through slipstreaming by up to ten percent under realistic highway conditions. In order to further benefit from this technology, a platoon coordinator is proposed, which interfaces with fleet management systems and suggests how platoons can be formed in a fuel-efficient manner over a large region. The coordinator frequently updates the plans to react to newly available information. This way, it requires a minimum of information about the logistic operations. We discuss the system architecture in detail and introduce important underlying methodological foundations. Plans are derived in computationally tractable stages optimizing fuel savings from platooning. The effectiveness of this approach is verified in a simulation study. It shows that the coordinated platooning system can improve over spontaneously occurring platooning even under the presence of disturbances. A real demonstrator has also been developed. We present data from an experiment in which three vehicles were coordinated to form a platoon on public highways under normal traffic conditions. It demonstrates the feasibility of coordinated en route platoon formation with current communication and on-board technology. Simulations and experiments support that the proposed system is technically feasible and a potential solution to the problem of using truck platooning in an operational context.

Accounting for Reliability in Unacknowledged Time-Constrained WSNs

Wireless sensor networks (WSNs) typically consist of nodes that collect and transmit data periodically. In this context, we are concerned with unacknowledged communication, i.e., where data packets are not confirmed upon successful reception. This allows reducing traffic on the communication channel --- neither acknowledgments nor retransmissions are sent --- and results in less overhead and less energy consumption, which are meaningful goals in the era of Internet of Things (IoT). On the other hand, packets can be lost and, hence, we do not know how long it takes to convey data from one node to another, which hinders any form of real-time operation and/or quality of service. To overcome this problem, we propose a medium access control (MAC) protocol, which consists in transmitting each packet at a random instant, but within a specified time interval from the last transmission. In contrast to existing approaches from the literature, the proposed MAC can be configured to meet reliability requirements --- given by the probability that at least one data packet reaches its destination within a specified deadline --- in the absence of acknowledgments. We illustrate this and other benefits of the proposed approach based on an detailed OMNeT++ simulation.

Looking Under the Hood of Z-Wave: Volatile Memory Introspection for the ZW0301 Transceiver

Z-Wave is a proprietary Internet of Things substrate providing distributed home and office automation services. The proprietary nature of Z-Wave devices make it difficult to determine the security aptitude of these devices. While there are a variety of open source tools for analyzing Z-Wave frames, inspecting non-volatile memory, and disassembling firmware, there are no dynamic analysis tools allowing one to inspect the internal state of a Z-Wave transceiver while it is running. In this work, a memory introspection capability is developed for the ZW0301, a Z-Wave transceiver device component found on many Z-Wave devices. The firmware image of a Z-Wave door lock is modified to include the memory introspection capability, allowing both volatile and non-volatile memory of the transceiver module to be remotely extracted over the Z-Wave communication protocol. The memory introspection capability is applied to several reverse engineering activities requiring access to volatile memory. The stack memory is analyzed to determine the sequence of function calls leading up to the introspection code. The buffers used for holding incoming and outgoing Z-Wave communication frames are identified. By combining memory introspection with static analysis, several algorithms used by the Z-Wave security layer are revealed and validated. The memory locations of several encryption keys are also located in memory.

All ACM Journals | See Full Journal Index

Search TCPS
enter search term and/or author name