Key Features of Cyber-Physical Systems
Key Features of Cyber-Physical Systems
Cyber-Physical Systems (CPS) integrate computa onal elements with physical processes. They are
designed to provide efficient, real- me monitoring and control by combining cyber capabili es
(computa on and communica on) with physical capabili es (sensing and actua on). Here are the
key features:
o CPS seamlessly integrates computa onal elements (data processing and analysis),
communica on networks (data exchange), and control mechanisms (actuators).
o CPS con nuously monitors physical processes using sensors and immediately adjusts
opera ons through actuators, ensuring op mal performance.
3. Feedback Loops:
o CPS u lizes feedback loops where data from sensors is processed, and control
ac ons are executed to influence the physical system. These loops enable self-
correc on and adaptability.
o Devices and components in CPS are designed to interact with and control physical
processes, providing precise and efficient opera ons.
o CPS can operate autonomously using advanced algorithms and ar ficial intelligence,
making decisions based on real- me data.
6. Interconnec vity:
CPS is applied in various domains, each leveraging its capabili es to enhance efficiency, safety, and
func onality. Here are some main domains:
2. Healthcare:
o CPS enhances pa ent care through remote monitoring, robo c surgery, and smart
medical devices that provide real- me health data and automated responses.
3. Transporta on:
o CPS manages energy distribu on, integrates renewable energy sources, and ensures
efficient and reliable power supply through real- me monitoring and control.
5. Environmental Monitoring:
o CPS monitors and responds to environmental changes, such as air and water quality,
weather pa erns, and natural disasters, providing mely interven ons.
6. Agriculture:
CPS plays a crucial role in modern technology by driving innova on and efficiency across various
sectors. Here’s why CPS is important:
1. Enhanced Efficiency:
2. Improved Safety:
o CPS enhances safety in cri cal applica ons like healthcare, transporta on, and
industrial automa on by providing precise control and mely interven ons.
o CPS can adapt to changing condi ons and scale to accommodate growing demands,
making it suitable for dynamic and complex environments.
o CPS bridges the gap between the physical and digital realms, allowing for seamless
interac on and control over physical processes through digital interfaces.
CPS is characterized by its ability to integrate hardware and so ware components, enabling real- me
data analysis and control. Here’s how CPS is characterized in different domains:
1. Manufacturing:
o Example: Telemedicine pla orms and wearable health devices that monitor pa ent
vitals and provide real- me feedback to healthcare providers.
3. Transporta on:
o Example: Self-driving cars that use sensors, cameras, and AI to navigate and
communicate with other vehicles and traffic systems.
4. Energy:
o Characteris cs: Smart grids, renewable energy integra on, real- me energy
distribu on, and demand response.
o Example: A smart grid system that monitors energy consump on pa erns and
adjusts distribu on to op mize efficiency and reduce outages.
Q. 5: How would you apply CPS principles to improve a smart grid system?
To improve a smart grid system using CPS principles, the following steps can be taken:
o Implementa on: Deploy sensors throughout the grid to monitor energy flow,
demand, and genera on. Use actuators to control switches, transformers, and other
grid components.
o Benefit: Provides real- me data on grid performance and enables precise control
over energy distribu on.
o Implementa on: Develop and deploy algorithms for load forecas ng, demand
response, and fault detec on.
o Benefit: Op mizes energy distribu on, reduces losses, and enhances grid reliability.
o Implementa on: Use robust and secure communica on networks to facilitate data
exchange between grid components, control centers, and users.
o Implementa on: Use data analy cs to monitor the health of grid components and
predict failures before they occur.
o Benefit: Reduces down me, lowers maintenance costs, and extends the lifespan of
grid infrastructure.
o Implementa on: Use CPS to manage the integra on of renewable energy sources
like solar and wind into the grid.
o Benefit: Balances supply and demand, ensures stable energy output, and promotes
the use of clean energy.
A real-world example of CPS in healthcare is the use of robo c surgery systems, such as the da Vinci
Surgical System:
Func onality:
o Surgeons control the robo c arms through a console, which translates their hand
movements into precise ac ons by the robo c instruments.
o Real- me feedback from sensors and cameras provides surgeons with enhanced
visibility and control.
Benefits:
o Precision: Enables highly accurate and controlled movements, reducing the risk of
human error.
o Minimally Invasive: Smaller incisions, less blood loss, and reduced recovery me for
pa ents.
Q. 7: Analyze the differences between CPS applica ons in the automo ve and healthcare domains.
CPS applica ons in the automo ve and healthcare domains differ in their specific objec ves,
processes, and outcomes:
1. Automo ve Domain:
o Outcomes: Improved road safety, reduced traffic conges on, and enhanced driving
experience.
2. Healthcare Domain:
Q. 8: What are the common challenges faced in CPS implementa on across different domains?
o Protec ng CPS from cyber-a acks and ensuring the privacy of sensi ve data.
2. Interoperability:
o Adhering to industry standards and promo ng compa bility across pla orms.
3. Scalability:
4. Reliability:
o Ensuring consistent and accurate opera on of CPS, especially in cri cal applica ons.
o Sensors and data analy cs ensure consistent product quality by detec ng and
addressing defects early in the produc on process.
3. Increasing Flexibility:
4. Enhancing Safety:
o Real- me monitoring of machinery and worker safety reduces the risk of accidents
and ensures compliance with safety standards.
con nue
Cyber-Physical Systems (CPS) can significantly impact data security and privacy. While CPS offers
numerous benefits, including enhanced efficiency, improved safety, and innova on, it also introduces
new challenges in terms of securing data and protec ng privacy. Here are some key impacts:
o Sensi ve Data: CPS o en collects and processes sensi ve data, such as personal
health informa on in healthcare systems or loca on data in transporta on systems.
o Privacy Risks: Unauthorized access to this data can lead to privacy breaches, iden ty
the , and other malicious ac vi es.
3. Security Measures:
o Authen ca on and Authoriza on: Ensuring that only authorized users and devices
can access the system through robust authen ca on mechanisms.
o Regular Updates and Patches: Keeping systems up-to-date with the latest security
patches and updates to address vulnerabili es.
4. Regulatory Compliance:
o Data Protec on Laws: Ensuring compliance with data protec on regula ons, such as
GDPR (General Data Protec on Regula on) and CCPA (California Consumer Privacy
Act), to protect user data and privacy.
1. What are the primary communica on channels used in mul agent systems?
Mul agent systems (MAS) rely on a variety of communica on channels to enable interac on,
collabora on, and coordina on among agents. The primary communica on channels include:
o Descrip on: Agents communicate directly with specific peers using predefined
protocols such as TCP/IP (wired or wireless), Bluetooth, or ZigBee.
o Advantages:
o Descrip on: Messages are transmi ed to all agents in the network, o en without
specifying recipients.
o Advantages:
o Challenges:
o Advantages:
Suitable for systems where all agents operate on the same pla orm (e.g.,
parallel compu ng).
o Challenges:
o Use Case: Mul -threaded mul agent systems in high-performance compu ng.
o Examples:
o Advantages:
o Challenges:
5. Middleware Frameworks:
o Descrip on: Middleware solu ons abstract communica on complexi es, enabling
efficient messaging and coordina on (e.g., ROS [Robot Opera ng System], JADE [Java
Agent Development Framework], DDS [Data Distribu on Service]).
o Advantages:
o Challenges:
2. Explain how communica on channels impact the performance of mul agent systems.
The choice of communica on channels directly influences key aspects of a mul agent system's
performance:
1. Latency:
o Delays in data exchange can reduce the responsiveness of the system, cri cal in real-
me applica ons (e.g., autonomous driving).
2. Reliability:
3. Scalability:
o Communica on channels with limited bandwidth can restrict the system’s scalability.
6. Security:
3. How would you implement a robust communica on channel in a mul agent system?
o Use coding techniques like Hamming codes, CRC (Cyclic Redundancy Check), or
Reed-Solomon codes to ensure data integrity.
o Example: UAVs in adverse environments can use error correc on to maintain reliable
communica on.
o Example: Mesh networks where drones have alterna ve paths to communicate with
peers.
o Protocols adjust frequency, power, or rou ng based on real- me condi ons (e.g.,
So ware-Defined Networking).
o Example: IoT systems switching between Wi-Fi and cellular networks based on
interference.
o Secure data exchanges with encryp on (e.g., TLS, AES) to prevent unauthorized
access.
6. Middleware Usage:
o Use pla orms like DDS, which support QoS guarantees for latency, throughput, and
reliability.
Consensus control refers to the process by which agents in a mul agent system achieve agreement
on a shared state or variable through distributed coordina on. Examples include:
6. Describe the role of consensus algorithms in achieving coordinated behavior in mul agent
systems.
1. Synchroniza on: Agents align their states (e.g., velocity, posi on).
Examples:
Steps:
1. State Defini on: Posi on, velocity, and heading angles of drones.
3. Consensus Algorithm:
4. Simula on and Tes ng: Validate in simula on (e.g., MATLAB, Gazebo) before deployment.
8. Analyze the challenges faced in achieving consensus in a network with dynamic topology.
In a dynamic topology, agents' connec ons and posi ons change over me, crea ng significant
challenges for consensus algorithms. These challenges include:
o Problem: Nodes (agents) may frequently join or leave the network due to mobility or
failures, causing intermi ent communica on.
o Impact: Algorithms relying on sta c topologies may fail to converge as neighbor sets
dynamically evolve.
o Solu on: Use adap ve consensus algorithms that tolerate dynamic graph structures,
such as event-triggered or me-varying graph models.
o Impact: Delays lead to asynchronous updates, poten ally destabilizing the system or
slowing convergence.
o Problem: Connec ons between agents may break temporarily due to obstacles,
interference, or agent mobility.
o Solu on: Use weighted consensus methods to assign importance based on agent
capacity.
o Problem: Noise in transmi ed data or packet loss can result in inaccurate states
being propagated.
9. What are the basic principles of control theory and informa on theory?
Control Theory:
Control theory deals with the behavior of dynamic systems and aims to ensure desired system
performance. Its key principles include:
1. Stability:
o Ensures the system's output remains bounded and converges to a steady state under
given inputs.
2. Controllability:
o The ability to drive a system from any ini al state to a desired state using appropriate
inputs.
3. Observability:
o Determines if the system's internal states can be inferred from its outputs.
4. Feedback:
o Adjus ng the system's input based on observed outputs to correct devia ons.
Informa on Theory:
Informa on theory focuses on efficient and reliable communica on. Its principles include:
1. Entropy:
o Example: Random events have high entropy, while predictable ones have low
entropy.
2. Channel Capacity:
o The maximum rate at which informa on can be transmi ed over a channel with
negligible error.
3. Data Compression:
10. Explain how control theory and informa on theory interact in the context of distributed
systems.
Control theory and informa on theory intersect in distributed systems to ensure efficient opera on
under constraints.
Interac on Mechanisms:
o Control theory demands frequent updates for accuracy, but informa on theory limits
communica on capacity.
o Solu on: Event-triggered control communicates only when necessary, reducing
bandwidth usage.
4. Decentralized Decision-Making:
11. Applying: How would you use informa on theory to op mize control strategies in a mul agent
system?
o Example: Share unexpected events like obstacle detec on rather than periodic
updates.
o Apply error-correc ng codes to improve the reliability of control signals over noisy
channels.
o Example: UAVs in a swarm use high bandwidth for urgent tasks but switch to low-
bandwidth channels during rou ne opera ons.
o Example: In a robot convoy, only the lead robot sends updates when it changes
speed or direc on.
12. Analyze the trade-offs between control accuracy and communica on overhead in distributed
control systems.
o Downside: High bandwidth consump on, increased energy usage, and network
conges on.
o Example: Con nuous sensor updates in autonomous vehicles for collision avoidance.
o Example: Periodic updates in a UAV swarm may fail to maintain forma on.
Solu ons:
1. Event-Triggered Control:
o Transmit data only when significant devia ons occur, balancing accuracy and
overhead.
3. Predic on Models:
Cross-layer design involves integra ng and op mizing across different system layers (e.g., physical,
network, and applica on layers) to achieve overall performance goals.
Key Features:
Example:
In a drone network:
14. Describe the benefits of cross-layer design for resource alloca on in distributed control
systems.
Key Benefits:
3. Scalability:
4. Resilience:
UNIT 3
Q1. (a) Explain the key proper es of Infinitesimal Perturba on Analysis (IPA)
o IPA is a method for es ma ng the sensi vity of a system's performance metrics with
respect to certain parameters.
o Sensi vi es are derived from observing how infinitesimally small perturba ons to
system parameters affect performance.
o IPA evaluates sensi vi es directly from system trajectories (sample paths) without
requiring detailed knowledge of the system's probability distribu ons.
3. Real-Time Applicability:
o Since IPA relies on observed system behavior, it can be used in real- me applica ons
for adap ve decision-making and op miza on.
4. Causality:
o IPA captures the causal rela onship between small changes in input parameters and
system outputs. It iden fies how perturba ons propagate through the system.
5. Unbiased Es ma on:
o Under specific condi ons (e.g., smooth system dynamics, no discon nui es), IPA
provides unbiased sensi vity es mates.
Applica ons:
Q1. (b) Demonstrate the role of Model Predic ve Control (MPC) in online control for CPSs
o MPC uses a model of the system to predict its future behavior over a finite me
horizon.
2. Op miza on in Real-Time:
o MPC op mizes a control input sequence to minimize a cost func on (e.g., energy,
tracking error) while respec ng constraints (e.g., safety, physical limits).
3. Feedback Mechanism:
4. Constraint Handling:
o MPC is highly effec ve in CPSs because it can handle complex constraints, such as
collision avoidance in drones or power limits in smart grids.
o Large-scale CPSs generate massive amounts of real- me data. Processing and storing
such volumes is computa onally challenging.
2. Communica on Constraints:
o Data comes from diverse sources (e.g., sensors, edge devices) with different formats
and resolu ons, requiring significant preprocessing.
4. Energy Efficiency:
Solu ons:
1. Communica on Delays:
2. Resource Constraints:
o Hybrid CPSs combine con nuous (physical) and discrete (digital) dynamics,
complica ng real- me control.
1. Iden fy Dependencies:
o Establish causal rela onships between input parameters and system performance
metrics.
o Analyze how these perturba ons affect downstream system states, such as network
latency or throughput.
Q4. (a) Describe the data harves ng problem in Cyber-Physical Systems (CPS)
Data harves ng in CPS refers to the collec on, transmission, processing, and storage of data
generated by distributed sensors and devices embedded in physical systems. It plays a cri cal role in
monitoring, control, and op miza on of CPS applica ons like smart grids, smart transporta on, and
healthcare systems.
o Example: Smart grids generate data about energy usage from millions of households,
requiring efficient data collec on and processing pipelines.
2. Real-Time Constraints:
o Timely decision-making in CPSs demands that data be harvested and processed with
minimal latency.
3. Communica on Constraints:
o Bandwidth limita ons and interference in wireless communica on networks pose
challenges for data transmission.
4. Energy Efficiency:
o Diverse devices with different protocols and formats generate heterogeneous data.
Harmonizing these data streams is complex.
o Process data locally on edge devices to reduce communica on overhead and latency.
o Example: Analyzing images on drones before transmi ng cri cal informa on.
2. Compressed Sensing:
o Focus on harves ng cri cal data while depriori zing redundant or low-impact data.
Q4. (b) What is a hybrid system in the context of Cyber-Physical Systems (CPS)?
Defini on:
A hybrid system is a Cyber-Physical System that combines con nuous dynamics (e.g., physical
processes governed by differen al equa ons) with discrete transi ons (e.g., decisions made by
so ware or logic controllers).
o Discrete states change based on events or condi ons (e.g., a traffic light switching).
o The physical and digital components interact, affec ng each other's behavior.
3. Modeling Requirements:
o Hybrid systems are typically modeled using hybrid automata, which combine state
machines with differen al equa ons.
Examples in CPS:
1. Smart Grids:
o Con nuous dynamics include energy flow, while discrete components involve grid
control systems switching loads.
2. Robo cs:
Challenges:
Modeling Complexity: Accurately modeling the interac ons between con nuous and
discrete components is difficult.
Control and Analysis: Designing controllers that handle both types of dynamics is
computa onally intensive.
Q5. (a) Evaluate the trade-offs between centralized control versus decentralized control in large-
scale CPSs, such as a smart grid. Which is more suitable for scalability and why?
Centralized Control:
In centralized control, a single en ty collects data from all agents and makes global decisions for the
en re system.
1. Advantages:
o Global Op miza on: Centralized control has access to all system data, enabling
globally op mal decisions.
2. Disadvantages:
3. Use Cases:
o Suitable for smaller systems where global op miza on is cri cal and scalability is not
a concern.
Decentralized Control:
In decentralized control, decisions are made locally by mul ple controllers that coordinate to achieve
global objec ves.
1. Advantages:
o Scalability: Decentralized systems can grow with minimal overhead, as decisions are
distributed.
2. Disadvantages:
o Subop mality: Without global knowledge, local controllers may make decisions that
are subop mal at the global level.
3. Use Cases:
o Ideal for large-scale CPSs where scalability, resilience, and real- me response are
cri cal.
o The system’s sample paths must be con nuous and differen able with respect to the
parameter of interest.
3. Perturba on Independence:
o The perturba on introduced must not influence the occurrence of other events in
the system.
o The system dynamics should not have abrupt changes caused by small perturba ons.
o The es mated gradients will no longer represent the true effect of the parameter
changes, leading to subop mal op miza on results.
o Systems relying on IPA for real- me op miza on may experience reduced efficiency
or increased delays.
Mi ga on Strategies:
Use smoothed approxima ons of the system to eliminate discon nui es.
Human actors interact with CPS through interfaces and devices that enable monitoring, control, and
feedback in real- me. These interac ons occur in various forms:
o Example: In smart homes, residents control ligh ng, hea ng, and security systems
through smartphones or voice assistants.
2. Supervisory Control:
o Humans act as supervisors, intervening when the CPS deviates from its desired state.
o CPSs provide feedback to humans via alarms, no fica ons, or visual displays.
o Example: A smart thermostat displays energy usage pa erns and suggests energy-
saving adjustments.
Humans and CPSs communicate using natural language processing (NLP) for verbal
instruc ons and feedback.
Example: Voice assistants like Alexa or Google Home interpret spoken commands and
execute tasks like turning off lights or se ng reminders.
Symbolic communica on involves graphical symbols, gestures, or coded signals that convey
meaning.
Example:
o Traffic lights in smart transporta on systems use color signals (red, yellow, green) to
communicate ac ons.
o A smart factory dashboard uses icons and graphs to indicate machine performance
and alert statuses.
Q2. (a) Explain different rela onships of coopera on between human and technological actors
with real- me example
o Humans supervise the CPS while the system executes tasks autonomously.
o Example: A driver assistance system alerts the driver to obstacles or automa cally
applies emergency braking.
o Humans teach CPSs new tasks or improve system performance through interac on.
o Example: In robo c process automa on, operators train robots to perform custom
workflows.
Impact on System Performance:
1. Efficiency: Machine-based decision-making is faster and improves system efficiency but lacks
contextual adaptability.
2. Reliability: Machines eliminate human errors caused by fa gue but may fail under condi ons
not accounted for during design.
3. Innova on: Human crea vity and adaptability are essen al for long-term system
improvements.
Q3. (a) List and explain various challenges of interac on between human and technological actors
1. Interface Usability:
o Lack of trust in CPS can lead to underu liza on, while overtrust can cause
complacency.
3. Communica on Barriers:
4. Workload Balancing:
o Interac ons must ensure data security and protect user privacy, especially in
sensi ve systems like healthcare CPS.
3. Efficient Coordina on: It supports the coordina on between humans and CPSs, especially in
environments where speed and precision are cri cal, like manufacturing or emergency
response scenarios.
o How it works: The human actor performs a gesture (such as poin ng or direc ng the
robot's arm) and the robot recognizes this gesture as an instruc on to carry out a
task.
o Benefits: This interac on minimizes the need for verbal instruc ons and reduces
delays in task execu on. The robot can an cipate or react to human ac ons
immediately, allowing for smoother workflows in assembly lines or warehouses.
Intui ve: Humans naturally understand physical ac ons, so no complex instruc ons are
needed.
Q4. (a) How could a human operator u lize a Cyber-Physical System to op mize the efficiency of a
smart factory?
2. Predic ve Maintenance:
o Operators can guide cobots for repe ve or precision tasks, reducing fa gue and
errors.
In CPSs, an cipatory communica on ensures that the system adapts to changing condi ons and user
needs without wai ng for explicit instruc ons. It is not just about reac ng to events, but an cipa ng
the future and ac ng accordingly.
3. Dynamic Adapta on: The system con nuously adjusts its ac ons based on real- me data or
sensor inputs, op mizing the overall system performance.
Autonomous Vehicles:
In autonomous driving systems, communica on through an cipa on is vital. The vehicle's
sensors and algorithms con nuously monitor the surroundings, including the behavior of
nearby vehicles, pedestrians, and road condi ons. When an autonomous vehicle detects that
a car in front is slowing down or stopping, it an cipates the need to reduce speed or even
stop without needing explicit instruc ons. The vehicle adjusts its speed preemp vely to
avoid a collision or ensure smooth traffic flow.
o How it works: Using sensors like cameras, radar, and LIDAR, the autonomous vehicle
con nuously collects data about the environment and predicts the movement of
other vehicles or obstacles. Based on this predic on, it adjusts its own speed or
posi on to ensure safety.
Smart Grids:
A smart grid system can communicate through an cipa on by predic ng energy demand
pa erns based on historical data, weather forecasts, and consump on trends. The system
an cipates spikes in demand (e.g., during a heatwave) and adjusts energy distribu on
proac vely, poten ally diver ng power from certain areas to handle the load.
o How it works: The system analyzes data over me, such as weather pa erns,
holidays, and me of day, to predict when electricity usage will peak. An cipa ng
high demand, the grid may op mize the distribu on of energy resources, turning off
or adjus ng non-essen al systems in advance.
o Benefit: By an cipa ng changes in energy demand, the smart grid reduces the risk of
overloads and blackouts, while maintaining efficient energy distribu on without
wai ng for a spike to occur.
Healthcare Systems:
In healthcare, communica on through an cipa on is used in wearable health devices, such
as smartwatches or fitness trackers. These devices an cipate user needs by monitoring vital
signs (heart rate, blood pressure, etc.) and no fying the user of poten al health issues
before they manifest in a serious condi on.
Reduces Reac on Time: Proac vely addressing poten al issues minimizes the delay between
sensing a problem and responding to it.
Increased Efficiency: Systems that an cipate needs or changes in the environment can
op mize performance, energy use, and decision-making.
Challenges:
Predic ve Accuracy: The system must be highly accurate in predic ng future events. Poor
predic ons can lead to inappropriate ac ons, such as unnecessary slowdowns or wrong
resource alloca on.
Data Dependency: Communica on through an cipa on relies heavily on data quality, sensor
precision, and the system’s ability to learn pa erns effec vely.
Q5. (a) Assess the advantages and disadvantages of increased automa on in CPS for human actors
in terms of safety and job sa sfac on
Advantages:
1. Safety:
2. Efficiency:
o Automated systems handle repe ve tasks, reducing human fa gue and increasing
produc vity.
3. Skill Enhancement:
4. Consistency:
Disadvantages:
2. Over-Reliance:
o Excessive reliance on automa on can result in skill degrada on, making humans less
effec ve in cri cal situa ons requiring manual interven on.
3. Trust Issues:
Increased automa on enhances safety but must be balanced with measures to ensure job
sa sfac on, such as upskilling programs and collabora ve roles.
Designing automa on to complement human capabili es rather than replace them is key to
achieving both safety and job sa sfac on.
UNIT 5
Cyber-Physical Systems (CPS) combine the physical world (sensors, actuators) with cyber
systems (computers, networks) to monitor, control, and op mize physical processes. As CPS
are deeply integrated with cri cal infrastructure and daily life, ensuring their security and
privacy is vital.
1. Security Approaches in CPS: Security in CPS primarily focuses on protec ng both the
physical and cyber components from a acks that could compromise their opera on, safety,
or data integrity.
Ensures that only authorized users or devices can access CPS resources.
Example: In a smart factory, access control mechanisms ensure that only authorized
personnel can modify produc on schedules or machine configura ons.
Protects sensi ve informa on in transit and at rest using encryp on methods (e.g., AES, RSA)
to prevent unauthorized access.
Example: Encryp ng data from IoT sensors that monitor cri cal infrastructure like power
grids to prevent tampering.
Example: A CPS controlling traffic signals may use IDS to detect anomalies in data pa erns
that indicate a malicious a ack on the system.
CPS employs secure communica on protocols such as TLS (Transport Layer Security) to
protect data exchanges between devices.
Example: In smart grids, secure protocols ensure that communica on between smart meters
and control centers is resistant to eavesdropping.
2. Privacy Approaches in CPS: Privacy focuses on safeguarding individuals' personal data that
may be collected by CPS, especially as these systems interact with sensi ve areas such as
healthcare or home automa on.
Collect only the necessary data to perform the required tasks and avoid excessive data
collec on.
Example: In a smart home, a system should only collect data relevant to user preferences,
such as temperature se ngs, and not con nuously track users' movements.
Example: In healthcare CPS, pa ent data could be anonymized when used for analysis or
research to prevent iden fica on of individual pa ents.
Ensure that only authorized individuals or systems can access sensi ve personal data.
Example: In a smart healthcare system, only authorized medical personnel or systems should
have access to a pa ent's health data.
Ensures that data collected by CPS is not tampered with and can be trusted. Non-repudia on
ensures that data origins cannot be denied.
Example: A digital signature might be used in medical CPS to verify the integrity of pa ent
records.
Q1. (b) Demonstrate about Cyber Infrastructure Threats in CPS
Cyber infrastructure threats in CPS target the digital infrastructure that supports the
opera on of physical systems. Given the increasing interdependence between the physical
and cyber worlds, these threats can have severe implica ons.
Example: Ransomware could lock access to cri cal control systems in a manufacturing plant,
hal ng produc on un l a ransom is paid.
Example: In a smart grid, a DDoS a ack could flood control servers with traffic, causing
delays in power distribu on and outages.
Hackers may alter data communicated between CPS components, leading to incorrect
decisions or unsafe behaviors in the physical system.
CPS components o en rely on third-party suppliers for hardware and so ware, and
vulnerabili es within these components can be exploited.
Example: A malicious firmware update in a cri cal sensor could compromise the safety of an
en re industrial control system.
Side-Channel A acks:
Example: An a acker may infer encryp on keys from the power consump on pa erns of a
CPS device.
Insider Threats:
Employees or trusted individuals with access to the system may inten onally or
uninten onally compromise the security of CPS.
Example: A disgruntled worker might alter the se ngs of a smart grid to cause outages or
damage.
Physical A acks:
Cyber threats can also target physical infrastructure. A acks on the physical devices that
sense and control systems (e.g., sensors, actuators) can cause malfunc ons.
Q2. (a) Explain the Segmenta on Approach in CPS
Segmenta on in CPS refers to the par oning of a large system into smaller, more
manageable segments or subsystems, each of which can be independently controlled,
secured, and monitored. Segmenta on improves system scalability, resilience, and security
by isola ng cri cal components from less sensi ve parts of the system.
Security: Isola ng sensi ve components (e.g., control systems) from less cri cal systems
helps prevent unauthorized access and contain poten al breaches.
Fault Tolerance: If a segment fails or is compromised, the rest of the system can con nue
func oning without interrup on.
Example:
In a smart grid, different subsystems (genera on, transmission, distribu on) may be
segmented. A cybera ack on the distribu on network would be contained, and the power
genera on and transmission could con nue to operate normally.
Applica ons:
Network Segmenta on: Dividing a network into subnetworks to ensure that if one part of
the network is a acked, the damage doesn't spread to the en re system.
Func onal Segmenta on: Dividing func ons of a CPS, such as sensor data collec on,
processing, and actua on, into separate modules for easier management and increased
security.
Q2. (b) Key Differences Between Defense in Depth and Defense in Breadth Approach in CPS
Defense in Depth and Defense in Breadth are two different cybersecurity strategies
employed in CPS to safeguard systems from a acks.
1. Defense in Depth:
This strategy focuses on mul ple layers of security controls to protect the system, ensuring
that if one layer is compromised, other layers will s ll provide protec on.
Approach: Implements several layers of security measures that complement each other.
These may include network firewalls, intrusion detec on systems, access control
mechanisms, encryp on, and physical security.
Benefits:
Redundancy: If one security measure fails, others will s ll protect the system.
2. Defense in Breadth:
This strategy focuses on expanding security coverage across all system components at once,
emphasizing uniform protec on across the en re infrastructure. The idea is to apply security
measures widely, o en at the system level, without a focus on deep layers.
Approach: Secures all components of a system, such as endpoints, network traffic, and data
storage, but without the redundancy or layering of defense.
Benefits:
Simplicity: Easier to implement as it involves applying the same security measures across the
system.
Example: Applying a single encryp on scheme across all communica on channels and
ensuring all devices in a smart grid use the same security protocol.
Q3. (a) Write a Short Note on Data Collec on, Pa ern Obfusca on, End-to-End Security,
Tamper Security/Detec on
Data collec on in CPS involves gathering real- me data from sensors and devices to monitor
and control physical systems. This data is essen al for making decisions, op mizing
processes, and ensuring system stability.
Example: A smart city system collects traffic data to op mize traffic light ming and improve
flow.
Pa ern obfusca on is the process of hiding or altering data pa erns to prevent unauthorized
access or misuse. This is especially important in systems where personal or sensi ve data is
involved.
Example: In smart healthcare systems, obfusca ng pa ent data ensures that personal details
are hidden while maintaining data integrity for analysis.
End-to-End Security:
End-to-end security ensures that data remains secure from the point of collec on to the final
des na on. It protects the confiden ality, integrity, and authen city of data, o en through
encryp on and secure communica on protocols.
Example: In industrial CPS, tamper detec on systems can iden fy if sensors have been
physically altered or hacked to provide false readings.