Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3093742.3095092acmconferencesArticle/Chapter ViewAbstractPublication PagesdebsConference Proceedingsconference-collections
extended-abstract

Cascading Data Corruption: About Dependencies in Cyber-Physical Systems: Poster

Published: 08 June 2017 Publication History

Abstract

CPS are interconnected systems that observe and manipulate real objects and processes. They allow dynamic extension and show emergent behavior which leads to dynamic decision-making processes that can change at runtime. They cannot always be easily understood because of the high number of components involved. If an error occurs in such a process, it is difficult to comprehend which component involved in the decision process is responsible for that error. The decision therefore has a high degree of dependency on the nodes involved in the process. Therefore, errors are not easily traceable to their original source. In this paper, we present the idea of dependency trees, which should help to identify error sources in the event of a fault.

References

[1]
David E. Culler and Hans Mulder. 2004. Smart sensors to network the world. Scientific American 290, 6 (June 2004), 84--91.
[2]
Z. Huang, C. Wang, A. Nayak, and I. Stojmenovic. 2015. Small Cluster in Cyber Physical Systems: Network Topology, Interdependence and Cascading Failures. IEEE Transactions on Parallel and Distributed Systems 26, 8 (Aug. 2015), 2340--2351.
[3]
Edward A. Lee. 2008. Cyber Physical Systems: Design Challenges. In 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing. 363--369.
[4]
S. M. Rinaldi, J. P. Peerenboom, and T. K. Kelly. 2001. Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Systems 21, 6 (Dec. 2001), 11--25.

Cited By

View all
  • (2023)Empowering Autonomy and Agency: Exploring and Augmenting Accessible Cyber-Physical SystemsAdjunct Proceedings of the 2023 ACM International Joint Conference on Pervasive and Ubiquitous Computing & the 2023 ACM International Symposium on Wearable Computing10.1145/3594739.3610770(263-266)Online publication date: 8-Oct-2023
  • (2023)A Survey on Cyber–Physical Systems SecurityIEEE Internet of Things Journal10.1109/JIOT.2023.328962510:24(21670-21686)Online publication date: 15-Dec-2023
  • (2023)Abusive adversarial agents and attack strategies in cyber‐physical systemsCAAI Transactions on Intelligence Technology10.1049/cit2.121718:1(149-165)Online publication date: 2-Feb-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
DEBS '17: Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems
June 2017
393 pages
ISBN:9781450350655
DOI:10.1145/3093742
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 June 2017

Check for updates

Author Tags

  1. CPS
  2. Cyber-Phyiscal System
  3. cascading data corruption
  4. cascading failures
  5. flow monitoring
  6. information dependencies

Qualifiers

  • Extended-abstract
  • Research
  • Refereed limited

Conference

DEBS '17

Acceptance Rates

DEBS '17 Paper Acceptance Rate 22 of 60 submissions, 37%;
Overall Acceptance Rate 145 of 583 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Empowering Autonomy and Agency: Exploring and Augmenting Accessible Cyber-Physical SystemsAdjunct Proceedings of the 2023 ACM International Joint Conference on Pervasive and Ubiquitous Computing & the 2023 ACM International Symposium on Wearable Computing10.1145/3594739.3610770(263-266)Online publication date: 8-Oct-2023
  • (2023)A Survey on Cyber–Physical Systems SecurityIEEE Internet of Things Journal10.1109/JIOT.2023.328962510:24(21670-21686)Online publication date: 15-Dec-2023
  • (2023)Abusive adversarial agents and attack strategies in cyber‐physical systemsCAAI Transactions on Intelligence Technology10.1049/cit2.121718:1(149-165)Online publication date: 2-Feb-2023
  • (2022)Cybersecurity Vulnerabilities in Off-Site ConstructionApplied Sciences10.3390/app1210503712:10(5037)Online publication date: 16-May-2022
  • (2022)Cyber Physical System—The Gen ZConvergence of Deep Learning In Cyber‐IoT Systems and Security10.1002/9781119857686.ch19(397-413)Online publication date: 4-Nov-2022
  • (2018)Developing a Convenient and Fast to Deploy Simulation Environment for Cyber-Physical Systems2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)10.1109/ICDCS.2018.00166(1551-1552)Online publication date: Jul-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media