Professional Documents
Culture Documents
1,2 1 2
1. 210093
2. 102205
CPS CPS
CPS
Abstract: The technology of Cyber-Physical System has attracted highly attention of academia, industry, and news media. There are
still many open issues in the definition, architectures system models, security architecture of Cyber-Physical System. Define
Cyber-Physical System and its meaning firstly, and then introduce the architecture and the progress of Cyber-Physical System research;
and also analysis security services of CPS based on the time and space scales; lastly put forward the CPS system security architecture
and detailed analysis of the layers of security threats and discuss along with possible solutions.
Cyber- Physical
SystemCPS[1]
[2]
CPS
1.1 CPS
CPS [3] CPS
[4] CPS
Helen Gill [5] CPS
[6] CPS
[2,7] CPS
Deeply embedded system [8, 9][10] CPS
[11] CPS
[12] CPS
SJIE Apr. 2012 Vol.2 No.2 PP.36-45 www.sjie.org 2011 American V-King Scientific Publishing, LTD | 36
CPS
CPS CPS
1.2 CPS
[9,13-15] CPS CPS
CPS CPS
1
...
CPS
...
...
CPS
...
CPS
CPS
CPS
CPS
WSNWMSN
AdHOCWLANWi-Fi
WiMAX CPS
CPS
...
CPS
...
1 CPS
1
CPS
CPS
37 | SJIE Apr. 2012 Vol.2 No.2 PP.36-45 www.sjie.org 2011 American V-King Scientific Publishing, LTD
2
CPS
CPS QoS
3
RFID RFID
1.3 CPS
CPS
[1,9,16-18][16]
[18]
[19] CPS [20]
[21]IBM CPS
[22][23]
CPS CPS [24] CPS
CPS 1
1.4 CPS
CPS CPS
2006 CPS 2007 CPS PCAST
[28]2008 CPS CPS
CPS [23]2008 IBM
[21]
[25]
[26]
[27]
CPS
CPS
CPS [32]
2.1 CPS
CPS CPS
1CPS
2CPS
3CPS
39 | SJIE Apr. 2012 Vol.2 No.2 PP.36-45 www.sjie.org 2011 American V-King Scientific Publishing, LTD
CPS
1
2
3
4
5
678
9
1011
1CPS
2
CPS
5 CPS
6CPS
CPS
8 CPS
CPS
10CPS
11CPS
SJIE Apr. 2012 Vol.2 No.2 PP.36-45 www.sjie.org 2011 American V-King Scientific Publishing, LTD | 40
2.2 CPS
CPS
CPS
1
CPS
2CPS
CPS
DoS/DDoS
3CPS CPS
CPS
CPS
CPS
CPS CPS CPS
3
2
CPS CPS
CPSs
...
2 CPS
3.1 CPS
CPS RFID
41 | SJIE Apr. 2012 Vol.2 No.2 PP.36-45 www.sjie.org 2011 American V-King Scientific Publishing, LTD
GPS
2
2
Sybil
3.2 CPS
CPS 3
3.3 CPS
CPS
4
2 4 CPS
CPS
SJIE Apr. 2012 Vol.2 No.2 PP.36-45 www.sjie.org 2011 American V-King Scientific Publishing, LTD | 42
3 CPS
DoS
Sybil
Sinkhole
Wormhole
Routing loop
HELLO
4 CPS
43 | SJIE Apr. 2012 Vol.2 No.2 PP.36-45 www.sjie.org 2011 American V-King Scientific Publishing, LTD
CPS
CPS
CPS
[1]
LIN Feng, SHU Shaolong. A Review on Cyber Physical Systems. JOURNAL OF TONG JI UNIVERSITY (NATURAL SCIENCE), 2010,
38(8): 1243-1248.
[2]
Wayne Wolf. Georgia Tech. cyber-physical systems. EMBEDDED COMPUTING, 2009: 88-89.
[3]
Edward A.Lee. Cyber-Physical Systems-Are Computing Foundations Adequate, NSF Workshop on Cyber-Physical Systems: Research
Motivation, Techniques and Roadmap, 2006: 16-17.
[4]
Borzoo Bonakdarpour. Challenges in transformation of existing real-time embedded systems to cyber-physical systems, January, 2008,
SIGBED Review.
[5]
Helen Gill. From Vision to Reality, Cyber-Physical Systems, HCSS National Workshop on New Research, Directions for High Confidence
Transportation CPS: Automotive, Aviation, and Rail, November 2008.
[6]
Ji Eun Kim, Daniel Mosse. Generic Framework for Design, Modeling and Simulation of Cyber Physical System, SIGBED Review, Jan.,
2008.
[7]
SHA Lui, GOPALAKRISHNAN S, LIU Xue, et al. Cyber Physical Systems: A New Frontier, http://2008 IEEE International Conference
on Sensor Networks, Ubiquitous and Trustworthy Computing (sutc2008) June 2008.
[8]
EASWARAN A, LEE In sup. Compositional schedulability analysis for cyber physical systems, SIGBED Review, 2008, 51: 11-12.
[9]
TAN Ying, GODDARD S, P REZL C. A Prototype Architecture for Cyber-physical Systems, SIGBED Review, 2008, 5(1): 51-52.
SJIE Apr. 2012 Vol.2 No.2 PP.36-45 www.sjie.org 2011 American V-King Scientific Publishing, LTD | 44
[22] http://www.ibm.com/cn.
[23] The CPS Steering Group. Cyber-Physical Systems Executive Summary. http://varma.Ece.com.edu/summit/CPS-Executive-Summary. pdf.
[2008-10-25].
[24] Zhang Quansheng. On the Construction of a Bridge Safety and Health Sensing System in the Era of the Internet of Things, MUNICIPAL
ENGINEERING TECHNOLOGY, 2010, 28(3).
[25] Victor P, Plessky, Leonhard M, Reindl. Review on SAW RFID Tags, IEEE Transactions on Ultrasonics, Ferroelectrics and Frequency
Control, 2010, 57(3): 654-668.
[26] Roy, S., Jandhyala, V., Smith, J.R. et al. RFID: From Supply Chains to Sensor Nets, Proceedings of the IEEE, 2010, 98(9): 1583-1592.
[27] Michael, K.; Roussos, G.; Huang, G.Q. et al. Planetary-Scale RFID Services in an Age of Uberveillance, Proceedings of the IEEE, 2010,
98(9): 1663-1671.
[28] Presidents Councilof Advisorson Science and Technology, Leader ship Under Challenge, Information Technology R&D in a Competitive
World, An Assessment of the Federal Networking and Information Technology R&D Program, [2007208230]. http://ostp.gov/pdf-/nitrd_
review.pdf.
[29] PCAST, Design of the digital future federally funded research and development of network and information technology, [2010-12-16].
http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-nitrd-report-2010.pdf.
[30] Alvaro A.Cardenas, SaurabhAmin, ShankarSastry, Secure Control Towards Survivable Cyber-Physical Systems, The 28th International
Conference on Distributed Computing Systems Workshops, 2008: 495-500.
[31] DING Chao, YANG Li-jun, Research on Security Architecture and Key Technologies in Cyber-Physical Systems, JOURNAL OF
NANJING UNIVERSITY OF POSTS AND TELECOMMUNICATIONS (NATURAL SCIENCE), 2010, 30(4).
[32] Chris Codella, Arun Hampapur, Chung-Sheng Li, et al. Continuous Assurance for Cyber Physical System Security, http://cimic.rutgers.
edu/positionPapers/CPSSW09%20_IBM.pdf, 2011.
1985-
Email:juandon8525@yahoo.com.cn
45 | SJIE Apr. 2012 Vol.2 No.2 PP.36-45 www.sjie.org 2011 American V-King Scientific Publishing, LTD