Cyber-Physical Systems: A Comprehensive Guide
- Length: 252 pages
- Edition: 1
- Language: English
- Publisher: Chapman & Hall
- Publication Date: 2022-04-25
- ISBN-10: 103206546X
- ISBN-13: 9781032065465
- Sales Rank: #0 (See Top 100 Books)
Cyber-Physical Systems: A Comprehensive Guide explores the complete sys-tem perspective, underlying theories, modelling, and the applications of Cyber Physical Systems (CPS). It aims to cover all topics ranging from discussion of ru-diments of the system, efficient management, to recent research challenges and issues. Editors aim to present the book in a self-sufficient manner and to achieve this, the book has been edited to include all the aspects of CPS. The book fo-cuses on the concept map of CPS including latest technological interventions; issues, challenges, and the integration of CPS with IoT & Big Data Analytics. This aims to bring together unique contributions on cyber-physical systems research and education with applications in industrial, agriculture, and medical domains. The main aim of the book is to provide a roadmap to the latest advancements to provide optimal solutions in the field of CPS.
Features
- Coverage of rudiments of the subject
- Discussion of recent advancements in the associated field
- Considers an audience of diverse domains
- Suitable for students (both UG and PG level) and researchers in the field of CPS
This book aims to present the emergence of Cyber Physical Systems in response to revolutionary advancements in IoT. While discussing the associated challenges, it also endeavors to devise efficient models which are competent to address these challenges. This book aims to cater to researchers and academicians working in the related field of CPS.
Cover Half Title Series Page Title Page Copyright Page Contents Preface Editors Contributors 1. Applications of Artificial Intelligence in Cyber-Physical Systems 1.1 Introduction 1.2 Cyber-Physical System 1.3 Artificial Intelligence 1.4 Applications of Cyber-Physical Systems 1.4.1 Biomedical and Healthcare Systems 1.4.2 Next-Generation Air Transportation Systems and Smart Cars 1.4.3 Renewable Energy and Smart Grid 1.4.4 Cyber Manufacturing System 1.4.5 CPS Security 1.5 Conclusion References 2. Enhancement of the Healthcare Sector and the Medical Cyber-Physical System with the Help of Blockchain Technology 2.1 Introduction 2.2 Literature Review 2.3 Data Analysis 2.4 Proposed Model Theory 2.5 Required Software 2.6 Design Flow and Architecture Design 2.7 Implementation and Working 2.7.1 Deploying Smart Contract on JavaScript Virtual Machine (VM) 2.7.2 Deploying a Smart Contract on a Rinkeby Environment 2.7.3 Deploying a Smart Contract on a Ganache Blockchain Using Web3 Provider 2.8 Conclusion 2.9 Future Research Directions References 3. Applications of Cyber-Physical Systems for Industry 4.0: A Comprehensive Review 3.1 Introduction: Industry 4.0 and the Cyber-Physical System 3.2 Industry 4.0 3.2.1 Benefits of Industry 4.0 3.3 Cyber-Physical System (CPS) 3.3.1 Cyber-Physical Systems in Industry 4.0 3.3.2 Features of the CPS 3.3.3 CPS Architecture for Industry 4.0 3.3.4 Need for the CPS in Industry 4.0 3.4 Applications of the CPS in Industry 3.5 CPS-Enabled Use Cases 3.6 CPS in Health Care: A Case Study 3.6.1 Applications 3.6.2 Controlled 3.6.3 Architecture 3.6.3.1 Data Requirements 3.6.3.2 Composition 3.6.4 Sensing 3.6.4.1 Methods 3.6.4.2 Parameters 3.6.5 Data Management 3.6.5.1 Data Integration 3.6.5.2 Data Storage 3.6.5.3 Data Processing 3.6.6 Computation 3.6.6.1 Modeling 3.6.6.2 Monitoring 3.6.7 Communication 3.6.7.1 Scheduling 3.6.7.2 Protocols 3.6.8 Security 3.6.8.1 Privacy 3.6.8.2 Encryption 3.6.9 Control/Actuation 3.6.9.1 Decision Making 3.6.9.2 Mechanisms 3.7 Conclusion References 4. A Theoretical Framework for Deep Neural Networks over CPS: Vision, Application, Challenges 4.1 Introduction to CPS 4.2 Need for DL-Enabled CPS 4.3 Deep Learning Models 4.3.1 Feed Forward Neural Network 4.3.2 Convolutional Neural Network 4.3.3 Recurrent Neural Network 4.3.4 Autoencoders 4.3.5 Restricted Boltzmann Machines 4.3.6 Deep Belief Network 4.4 CPS with Deep Learning Components 4.4.1 CPS in Production 4.4.2 CPS in Health Care 4.4.3 CPS in Transportation 4.4.4 CPS in Farming 4.4.5 CPS in Buildings 4.5 Challenges in Establishing Deep Learning in the CPS 4.5.1 Data Management 4.5.2 Hyperparameter Tuning 4.5.3 Apprehension of DL Model 4.5.4 Resource Management 4.5.5 Standardization 4.5.6 Generalization 4.6 Proposed Framework 4.7 Future Research Directions 4.7.1 Redundancy and Understandability of DL Models 4.7.2 Adjusting to Dynamic Environments 4.7.3 Security and Privacy 4.7.4 Advanced Analytics 4.7.5 Convergence of CPS and IoT 4.7.6 CPS Application Domain 4.8 Conclusion References 5. Hybrid Model for Software Fault Prediction 5.1 Introduction 5.2 Related Work 5.3 Proposed Approach for Efficient Fault Detection 5.3.1 Data Preparation 5.3.1.1 Data Gathering 5.3.1.2 Data Pre-processing 5.3.2 Training Base, Ensemble, and Hybrid Learner Model 5.3.3 Comparison and Analysis of Results 5.4 Design and Implementation 5.4.1 Data Set Elucidation 5.4.1.1 PC 5.4.2 Measures for Evaluating the Performance of Trained Models 5.4.3 Insights of Implementation 5.4.3.1 First Phase of Data Pre-Processing 5.4.3.2 Second Phase of Data Pre-Processing 5.4.3.3 Training of Base Learners and Ensemble Models 5.4.3.3.1 AdaBoosting 5.4.3.3.2 Bagging 5.4.3.4 Training of Hybrid Model 5.5 Deduced Results 5.6 Comparative Analysis 5.6.1 Comparison of Bagging, Boosting, and Base Learner 5.6.2 Comparison of Base Learner and Neural Network Classification Models 5.6.3 Comparison of Hybrid Model, Voting, and Base Learner 5.6.4 Comparison of Hybrid Model and Boosted and Bagged Learner 5.7 Conclusion References 6. I-ACTIVE: A Low-Cost, Efficient, End-to-End Cyber-Physical System for Ubiquitous Real-Time Human Activity Recognition 6.1 Introduction 6.2 Background and Motivation 6.3 Related Works 6.4 The Proposed I-ACTIVE System 6.4.1 Components 6.4.2 Operational Framework 6.5 Experimental Results 6.6 Conclusion References 7. Efficient Compression Algorithms for Bandwidth- and Memory-Constrained Cyber-Physical Systems 7.1 Introduction 7.2 Motivation and Contribution 7.3 How Much Compression Is Needed? 7.4 Coding Principle 7.5 Image Transforms 7.5.1 Discrete Cosine Transform 7.5.2 Discrete Wavelet Transform 7.6 Entropy Coding 7.7 Transform-Based Image Coding Algorithms 7.7.1 DCT-Based Algorithms 7.7.2 DWT-Based Algorithms 7.8 Image Coders for Cyber-Physical Systems 7.8.1 SPECK-Based Image Coders for CPS 7.8.1.1 Listless SPECK 7.9 Zero-Memory SPECK 7.9.1 SPIHT-Based Image Coders for CPS 7.9.1.1 State Table-Based SPIHT 7.9.1.2 Wavelet Block Tree Coding 7.9.1.3 Low-Memory Block Tree Coding 7.9.1.4 Low-Complexity Block Tree Coding 7.10 Results and Discussion 7.10.1 Compression Efficiency 7.10.2 Memory Utilization 7.10.3 Computational Complexity 7.11 Conclusion References 8. Novel Encryption Framework: HEA for IoT and Fog Network Data Transmission 8.1 Introduction 8.1.1 Issues and Challenges 8.1.2 Fog Computing 8.1.3 Motivation for Research 8.2 Literature Review 8.3 Proposed Methodology 8.3.1 Section I: Encryption Phase 8.3.2 Section II: Decryption Phase 8.4 Algorithms 8.4.1 Encryption Algorithms 8.4.2 Decryption Algorithms 8.5 Results and Discussions 8.6 Comparison with Existing Algorithms 8.7 Conclusion References 9. Security Issues and Challenges for Cyber-Physical Systems 9.1 Introduction 9.1.1 Characteristics of Cyber-Physical Systems 9.1.2 Cyber-Physical System Security and Privacy 9.1.3 Security Overview for CPS (Cyber-Physical Systems) 9.2 Types of Attacks on Cyber-Physical Systems 9.3 Security Issues and Challenges 9.3.1 Cyber-Physical System Security Issues 9.3.2 Cyber-Physical System Threats and Attacks [16,17] 9.3.2.1 Smart Device Security 9.3.2.1.1 Boot Process Vulnerability 9.3.2.1.2 Hardware Exploitation 9.3.2.1.3 Encryption and Hash Functions 9.3.2.1.4 Software Exploitation 9.3.2.2 Hardware Security in Cyber-Physical Systems 9.3.2.2.1 Stealing a Cryptographic Key 9.3.2.2.2 Stealing an Identity 9.3.2.2.3 Physical Tampering of System Elements 9.3.3 Security Challenges 9.3.4 Strategies to Overcome Security Issues and Challenges 9.3.5 Privacy Issues and Challenges 9.4 CPS Deployment Challenges 9.5 Conclusions and Future Scope References 10. Security Vulnerabilities of Cyber-physical Systems: Autonomous Vehicles Perspective 10.1 Introduction 10.2 CPS Application Domains 10.2.1 Smart Manufacturing 10.2.2 Agriculture 10.2.3 Intelligent Transportation 10.2.4 Health Care 10.2.5 Smart City/Home 10.3 CPS Characteristics 10.3.1 Complexity/Heterogeneity/Interoperability 10.3.2 Flexibility and Modularity 10.3.3 Realtime 10.3.4 Intelligent 10.4 Challenges in a CPS 10.4.1 Security 10.4.2 Complexity 10.4.3 Scalability 10.4.4 Interoperability 10.4.5 Reliability 10.4.6 Accuracy 10.5 Autonomous Vehicles as Cyber-physical Systems 10.5.1 Security Requirements, Possible Attacks, and Counter Measures 10.5.1.1 Confidentiality 10.5.1.2 Integrity 10.5.1.3 Authenticity 10.5.1.4 Availability 10.5.2 Attacks on Confidentiality 10.5.2.1 Passive Eavesdropping 10.5.3 Attacks on Authenticity 10.5.3.1 Sybil Attack 10.5.3.2 GPS Spoofing Attack 10.5.3.3 Masquerading Attack 10.5.3.4 Timing Attacks 10.5.4 Attacks on Integrity/Trust 10.5.4.1 Replay Attack 10.5.4.2 False Information Attack 10.5.4.3 Message Alteration Attack 10.5.5 Attacks on Availability 10.5.5.1 Distributed Denial of Service Attack 10.5.5.2 Communication Channel Jamming Attack 10.5.4.3 Flooding Attack 10.5.4.4 Blackhole and Greyhole Attacks 10.6 Conclusion References 11. Employment of Cyber-Physical Systems Towards Smart Healthcare Assistance 11.1 Introduction 11.2 Background and Related Works 11.3 Emerging Medical Device Systems 11.4 MCPS, Social Network, and Big Data Platforms 11.5 Challenges Faced by the Medical CPS 11.6 Conclusion References 12. A Road Map Towards Industrial Transformation Using the Cyber-Physical System 12.1 Introduction 12.2 Scope of the CPS in Industry 4.0 12.3 Key Features of the CPS and IoT 12.4 CPS Applications in Industries 12.5 Technical Challenges and Standardizations Faced by CPS Applications 12.6 Research Trends 12.7 Conclusion References 13. UAV-Based Cyber-Physical Systems: Concepts, Applications, and Issues 13.1 Introduction 13.2 Basic Concepts Related to UAV Networks 13.2.1 UAVs Classification 13.2.2 Architecture of UAV Networks 13.2.3 Communication in UAV Networks 13.3 Cyber-Physical Systems 13.4 UAV-Enabled CPS 13.4.1 Sensing 13.4.2 Communication 13.4.3 Computation 13.4.4 Control Unit 13.5 Potential Usage of UAVs in CPS Applications 13.5.1 Transportation 13.5.2 Disaster Management 13.5.3 Surveillance 13.5.4 Construction 13.5.5 Smart Grid 13.5.6 Precision Agriculture 13.6 Conclusion References 14. An AI-Based Cyber-Physical System for 21st-Century-Based Intelligent Health Care 14.1 Introduction 14.1.1 Medical Cyber-Physical Systems (MCPSs) 14.1.1.1 Crucial Medical Devices Behaviour 14.1.1.2 MCPS Architecture 14.1.1.3 MCPS Applications 14.1.1.3.1 Infusion Pump 14.1.1.3.2 DOA Monitoring 14.1.1.3.3 Ambient-Intelligence Compliant Objects (AICOs) 14.1.1.3.4 Wireless Identification and Sensing Project 14.1.1.3.5 LiveNet 14.1.1.3.6 Fall Detection System 14.1.1.3.7 HipGuard 14.1.1.3.8 MobiHealth 14.1.1.3.9 CodeBlue 14.1.1.3.10 AlarmNet 14.1.1.4 Some Popular Attacks on MCPSs 14.1.1.4.1 Stuxnet 14.1.1.4.2 Distributed Denial of Services 14.1.1.4.3 Man-in-the-Middle Attack 14.1.1.4.4 Phishing Attack 14.1.1.4.5 Insider Attack 14.2 Review of Literature 14.3 Methodology and Experimental Results 14.3.1 Interconnection Issues 14.3.2 Perfect Difference Network 14.4 Conclusion References Index
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.