Defense mechanisms against network-level attacks are commonly based on the use of cryptographic techniques, such as lengthy message authentication codes (MAC) that provide data integrity guarantees. However, such mechanisms require significant resources (both computational and network bandwidth), which prevents their continuous use in resource-constrained cyber-physical systems (CPS). Recently, it was shown how physical properties of controlled systems can be exploited to relax these stringent requirements for systems where sensor measurements and actuator commands are transmitted over a potentially compromised network; specifically, that merely intermittent use of data authentication (i.e., at occasional time points during system execution), can still provide strongmore »
Timing Debugging for Cyber-Physical Systems
This paper is concerned with the following question:
Given a set of control tasks that are not schedulable, i.e., their
required timing properties cannot be satisfied, what should be
changed? While the real-time systems literature proposes many
different schedulability analysis techniques, it surprisingly provides almost no guidelines on what should be changed to make
a task set schedulable, when it is not. We show that when the
tasks in question are control tasks, this timing debugging question
in the context of cyber-physical systems (CPS) may be answered
by exploiting the dynamics of the physical systems that these
control tasks are expected to influence. Towards this, we study a
very simple setup, viz., when a set of periodic tasks with implicit
deadlines is not schedulable, by how much should the periods be
changed in order to make the task set schedulable? Among the
many ways in which the periods can be modified, our proposed
strategy is to change the periods in a manner such that while the
task set becomes schedulable, the poles of the closed-loop system
experience the minimal shift. Since the poles influence the closed
loop dynamics of the system, we thereby ensure that we obtain
a system with the desired timing properties whose dynamics is
very similar to the dynamics of the original (non-schedulable)
system. We formulate this more »
- Award ID(s):
- 1837337
- Publication Date:
- NSF-PAR ID:
- 10205882
- Journal Name:
- 2021 Design, Automation Test in Europe Conference Exhibition (DATE)
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Obeid, I. ; Selesnik, I. ; Picone, J. (Ed.)The Neuronix high-performance computing cluster allows us to conduct extensive machine learning experiments on big data [1]. This heterogeneous cluster uses innovative scheduling technology, Slurm [2], that manages a network of CPUs and graphics processing units (GPUs). The GPU farm consists of a variety of processors ranging from low-end consumer grade devices such as the Nvidia GTX 970 to higher-end devices such as the GeForce RTX 2080. These GPUs are essential to our research since they allow extremely compute-intensive deep learning tasks to be executed on massive data resources such as the TUH EEG Corpus [2]. We use TensorFlow [3]more »
-
Existing design techniques for providing security guarantees against network-based attacks in cyber-physical systems (CPS) are based on continuous use of standard cryptographic tools to ensure data integrity. This creates an apparent conflict with common resource limitations in these systems, given that, for instance, lengthy message authentication codes (MAC) introduce significant overheads. We present a framework to ensure both timing guarantees for real-time network messages and Quality-of-Control (QoC) in the presence of network-based attacks. We exploit physical properties of controlled systems to relax constant integrity enforcement requirements, and show how the problem of feasibility testing of intermittently authenticated real-time messages canmore »
-
We present a framework for deformable object manipulation that interleaves planning and control, enabling complex manipulation tasks without relying on high-fidelity modeling or simulation. The key question we address is when should we use planning and when should we use control to achieve the task? Planners are designed to find paths through complex configuration spaces, but for highly underactuated systems, such as deformable objects, achieving a specific configuration is very difficult even with high-fidelity models. Conversely, controllers can be designed to achieve specific configurations, but they can be trapped in undesirable local minima owing to obstacles. Our approach consists ofmore »
-
Physical interaction with tools is ubiquitous in functional activities of daily living. While tool use is considered a hallmark of human behavior, how humans control such physical interactions is still poorly understood. When humans perform a motor task, it is commonly suggested that the central nervous system coordinates the musculo-skeletal system to minimize muscle effort. In this paper, we tested if this notion holds true for motor tasks that involve physical interaction. Specifically, we investigated whether humans minimize muscle forces to control physical interaction with a circular kinematic constraint. Using a simplified arm model, we derived three predictions for howmore »