skip to main content


Title: The cyber-consciousness of environmental assessment: how environmental assessments evaluate the impacts of smart, connected, and digital technology
Abstract

Digitally enabled technologies are increasingly cyber-physical systems (CPSs). They are networked in nature and made up of geographically dispersed components that manage and control data received from humans, equipment, and the environment. Researchers evaluating such technologies are thus challenged to include CPS subsystems and dynamics that might not be obvious components of a product system. Although analysts might assume CPS have negligible or purely beneficial impact on environmental outcomes, such assumptions require justification. As the physical environmental impacts of digital processes (e.g. cryptocurrency mining) gain attention, the need for explicit attention to CPS in environmental assessment becomes more salient. This review investigates how the peer-reviewed environmental assessment literature treats environmental implications of CPS, with a focus on journal articles published in English between 2010 and 2020. We identify nine CPS subsystems and dynamics addressed in this literature: energy system, digital equipment, non-digital equipment, automation and management, network infrastructure, direct costs, social and health effects, feedbacks, and cybersecurity. Based on these categories, we develop a ‘cyber-consciousness score’ reflecting the extent to which the 115 studies that met our evaluation criteria address CPS, then summarize analytical methods and modeling techniques drawn from reviewed literature to facilitate routine inclusion of CPS in environmental assessment. We find that, given challenges in establishing system boundaries, limited standardization of how to evaluate CPS dynamics, and failure to recognize the role of CPS in a product system under evaluation, the extant environmental assessment literature in peer-reviewed journals largely ignores CPS subsystems and dynamics when evaluating digital or digitally-enabled technologies.

 
more » « less
Award ID(s):
1931980
NSF-PAR ID:
10361080
Author(s) / Creator(s):
; ;
Publisher / Repository:
IOP Publishing
Date Published:
Journal Name:
Environmental Research Letters
Volume:
17
Issue:
1
ISSN:
1748-9326
Page Range / eLocation ID:
Article No. 013001
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Owing1 to an immense growth of internet-connected and learning-enabled cyber-physical systems (CPSs) [1], several new types of attack vectors have emerged. Analyzing security and resilience of these complex CPSs is difficult as it requires evaluating many subsystems and factors in an integrated manner. Integrated simulation of physical systems and communication network can provide an underlying framework for creating a reusable and configurable testbed for such analyses. Using a model-based integration approach and the IEEE High-Level Architecture (HLA) [2] based distributed simulation software; we have created a testbed for integrated evaluation of large-scale CPS systems. Our tested supports web-based collaborative metamodeling and modeling of CPS system and experiments and a cloud computing environment for executing integrated networked co-simulations. A modular and extensible cyber-attack library enables validating the CPS under a variety of configurable cyber-attacks, such as DDoS and integrity attacks. Hardware-in-the-loop simulation is also supported along with several hardware attacks. Further, a scenario modeling language allows modeling of alternative paths (Courses of Actions) that enables validating CPS under different what-if scenarios as well as conducting cyber-gaming experiments. These capabilities make our testbed well suited for analyzing security and resilience of CPS. In addition, the web-based modeling and cloud-hosted execution infrastructure enables one to exercise the entire testbed using simply a web-browser, with integrated live experimental results display. 
    more » « less
  2. Abstract Environmental merits are a common motivation for many urban agriculture (UA) projects. One powerful way of quantifying environmental impacts is with life cycle assessment (LCA): a method that estimates the environmental impacts of producing, using, and disposing of a good. LCAs of UA have proliferated in recent years, evaluating a diverse range of UA systems and generating mixed conclusions about their environmental performance. To clarify the varied literature, we performed a systematic review of LCAs of UA to answer the following questions: What is the scope of available LCAs of UA (geographic, crop choice, system type)? What is the environmental performance and resource intensity of diverse forms of UA? How have these LCAs been done, and does the quality and consistency allow the evidence to support decision making? We searched for original, peer-reviewed LCAs of agricultural production at UA systems, and selected and evaluated 47 papers fitting our analysis criteria, covering 88 different farms and 259 production systems. Focusing on yield, water consumption, greenhouse gas emissions, and cumulative energy demand, using functional units based on mass of crops grown and land occupied, we found a wide range of results. We summarized baseline ranges, identified trends across UA profiles, and highlighted the most impactful parts of different systems. There were examples of all types of systems—across physical set up, crop type, and socio-economic orientation—achieving low and high impacts and yields, and performing better or worse than conventional agriculture. However, issues with the quality and consistency of the LCAs, the use of conventional agriculture data in UA settings, and the high variability in their results prevented us from drawing definitive conclusions about the environmental impacts and resource use of UA. We provided guidelines for improving LCAs of UA, and make a strong case that more research on this topic is necessary to improve our understanding of the environmental impacts and benefits of UA. 
    more » « less
  3. The resource distribution strategies of trees and plants in the forest are applied here as inspiration for the development of a blueprint for transactive, hybrid solar and storage microgrids. We used the Biomimicry Institute’s Biomimicry Spiral and their toolbox as a design methodology to inform the structural and functional characteristics of this peer-to-peer microgrid energy market and propose its utility in addressing some of the challenges associated with grid integration of distributed energy resources (DERs). We reviewed literature from the ecological domain on mycorrhizal networks and biological market theory to extract key insights into the possible structure and function of a transactive energy market modeled after the mutualism between trees and mycorrhizae. Our process revealed insights into how overlapping, virtual energy markets might grow, contract, adapt, and evolve through a dynamic network-based protocol to compete and survive in rapidly changing environments. We conclude with a discussion of the promise and limitations involved in translating the derived conceptual blueprints into a cyber-physical system and its potential for deployment in the real world as a novel energy market infrastructure.

     
    more » « less
  4. Most cyber–physical systems (CPS) encounter a large volume of data which is added to the system gradually in real time and not altogether in advance. In this paper, we provide a theoretical framework that yields optimal control strategies for such CPS at the intersection of control theory and learning. In the proposed framework, we use the actual CPS, i.e., the ‘‘true" system that we seek to optimally control online, in parallel with a model of the CPS that is available. We then institute an information state for the system which does not depend on the control strategy. An important consequence of this independence is that for any given choice of a control strategy and a realization of the system’s variables until time t, the information states at future times do not depend on the choice of the control strategy at time t but only on the realization of the decision at time t, and thus they are related to the concept of separation between estimation of the state and control. Namely, the future information states are separated from the choice of the current control strategy. Such control strategies are called separated control strategies. Hence, we can derive offline the optimal control strategy of the system with respect to the information state, which might not be precisely known due to model uncertainties or complexity of the system, and then use standard learning approaches to learn the information state online while data are added gradually to the system in real time. We show that after the information state becomes known, the separated control strategy of the CPS model derived offline is optimal for the actual system. We illustrate the proposed framework in a dynamic system consisting of two subsystems with a delayed sharing information structure. 
    more » « less
  5. null (Ed.)
    Cyber-Physical Systems (CPS) connected in the form of Internet of Things (IoT) are vulnerable to various security threats, due to the infrastructure-less deployment of IoT devices. Device-to-Device (D2D) authentication of these networks ensures the integrity, authenticity, and confidentiality of information in the deployed area. The literature suggests different approaches to address security issues in CPS technologies. However, they are mostly based on centralized techniques or specific system deployments with higher cost of computation and communication. It is therefore necessary to develop an effective scheme that can resolve the security problems in CPS technologies of IoT devices. In this paper, a lightweight Hash-MAC-DSDV (Hash Media Access Control Destination Sequence Distance Vector) routing scheme is proposed to resolve authentication issues in CPS technologies, connected in the form of IoT networks. For this purpose, a CPS of IoT devices (multi-WSNs) is developed from the local-chain and public chain, respectively. The proposed scheme ensures D2D authentication by the Hash-MAC-DSDV mutual scheme, where the MAC addresses of individual devices are registered in the first phase and advertised in the network in the second phase. The proposed scheme allows legitimate devices to modify their routing table and unicast the one-way hash authentication mechanism to transfer their captured data from source towards the destination. Our evaluation results demonstrate that Hash-MAC-DSDV outweighs the existing schemes in terms of attack detection, energy consumption and communication metrics. 
    more » « less