Cover
Cover
Cyber Physical Systems
Cyber physical system (CPS) is an integration of computation, networking, and physical
processes: the combination of several systems of different natures whose main purpose is
to control a physical process and, through feedback, adapt itself to new conditions in real
time. Cyber Physical System: Concepts and Applications includes in-depth coverage of the lat-
est models and theories that unify perspectives.
It expresses the interacting dynamics of the computational and physical components of
a system in a dynamic environment.
Key Features
This book is primarily aimed at advanced undergraduates and graduates of computer sci-
ence. Engineers will also find this book useful.
Chapman & Hall/CRC Cyber-Physical Systems
SERIES EDITORS:
Edited by
Anupam Baliyan, Kuldeep Singh Kaswan,
Naresh Kumar, Kamal Upreti, and Ramani Kannan
First edition published 2023
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742
© 2023 selection and editorial matter, Anupam Baliyan, Kuldeep Singh Kaswan, Naresh Kumar, Kamal Upreti and
Ramani Kannan; individual chapters, the contributors
Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot
assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have
attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright hold-
ers if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged
please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or
utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including pho-
tocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission
from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.com or contact the
Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. For works that are not
available on CCC please contact mpkbookspermissions@tandf.co.uk
Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for iden-
tification and explanation without intent to infringe.
Names: Baliyan, Anupam, 1976- editor. | Kaswan, Kuldeep Singh, editor. | Kumar, Naresh, 1983- editor. |
Upreti, Kamal, editor. | Kannan, Ramani, editor.
Title: Cyber physical systems: concepts and applications / edited by Anupam Baliyan, Kuldeep Singh Kaswan,
Naresh Kumar, Kamal Upreti, Ramani Kannan. Other titles: Cyber physical systems (CRC Press: 2023)
Description: First edition. | Boca Raton : Chapman & Hall/CRC Press, 2023. | Series: Chapman & Hall/CRC
cyber-physical systems | Includes bibliographical references and index. |
Identifiers: LCCN 2022041539 (print) | LCCN 2022041540 (ebook) | ISBN 9781032116044 (hardback) | ISBN
9781032420653 (paperback) | ISBN 9781003220664 (ebook)
Subjects: LCSH: Cooperating objects (Computer systems).
Classification: LCC TJ213 .C8845 2023 (print) | LCC TJ213 (ebook) | DDC 006.2/2--c23/eng/20221116
LC record available at https://lccn.loc.gov/2022041539
LC ebook record available at https://lccn.loc.gov/2022041540
DOI: 10.1201/9781003220664
Typeset in Palatino
by Deanta Global Publishing Services, Chennai, India
Contents
Preface............................................................................................................................................. vii
About the Editors............................................................................................................................ix
List of Contributors.........................................................................................................................xi
Index.............................................................................................................................................. 177
v
Preface
vii
About the Editors
Kuldeep Singh Kaswan is a Professor in the School of Computing Sciences and Engineering,
Galgotias University, Uttar Pradesh. He received a doctorate in Computer Science under the
Faculty of Computer Science at Banasthali Vidyapith, Rajasthan. He obtained his master’s in
Computer Science and Engineering from Choudhary Devi Lal University, Sirsa (Haryana).
He is also a member of the Computer Science Teacher Association (CSTA), New York, USA;
International Association of Engineers (IAENG), Hong Kong; International Association of
Computer Science and Information Technology (IACSIT), USA; professional member of
Association of Computing Machinery, USA, and IEEE; and life member of Computer Society
of India, India. His areas of interest include IoT, machine learning, and soft computing. He
has a number of publications in international/national journals and conferences to his credit.
ix
x About the Editors
He has obtained 30+ patents and published 30+ books, 32+ magazine issues, and 40+
research papers in various international conferences and reputed journals. His areas of
interest are physics, cyber security, machine learning, wireless networking, embedded
system, and cloud computing. He has years of experience in corporate and teaching expe-
rience in engineering colleges.
He worked with HCL, NECHCL, The Hindustan Times, Dehradun Institute of Technology,
and Delhi Institute of Advanced Studies, with more than 15+ years of enriching experience
in research, academics, and corporate sector. He also worked with NECHCL in Japan in the
project “Hydrastore,” funded by a joint collaboration between HCL and NECHCL. Upreti
worked on a government project—“Integrated Power Development Scheme (IPDS)”—
launched by the Ministry of Power, Government of India, with the objective of strengthen-
ing the sub-transmission and distribution network in the urban areas. He has served as
a session chairperson at national, international conferences and as a keynote speaker in
various platforms such as skill-based training, corporate trainer, guest faculty, and fac-
ulty development programs. He has been awarded with the titles of the best teacher, best
researcher, extra-academic performer, and was also a gold medalist in his MTech program.
He has published patents, books, magazine issues, and research papers in various
national, international conferences and peer-reviewed journals. His research area includes
cyber security, data analytics, wireless networking, embedded system, neural network,
and artificial Intelligence.
Ramani Kannan obtained his PhD in power electronics and drives, Anna University,
Chennai; ME in power electronics and drives, Anna University; and BE in electronics and
communication, Bharathiyar University, Coimbatore.
Kannan has teaching, administration, and research experience in the past decade work-
ing in K.S. Rangasamy College of Technology, Tiruchengode, Tamil Nadu. He is currently
working in Department of Electrical and Electronics Engineering at Universiti Teknologi
PETRONAS, Perak, Malaysia.
Career Achievements:
• Career Award for Young Teachers (CAYT) from AICTE, New Delhi in the year
2013–2014
• Best Teacher Award (2010–2011) at K.S. Rangasamy College of Technology,
Tiruchengode
• Outstanding Teacher Award for 100% results produced: 13 times in university and
end semester results
• Outside Interaction Editor-in-Chief, Journal of Asian Scientific Research (Online
ISSN: 2223-1331 Print ISSN: 2226-5724); REGIONAL EDITORS SOUTH-ASIA
International Journal of Computer Aided Engineering and Technology, Inderscience
publisher (Scopus index) ISSN online: 1757-2665
List of Contributors
xi
1
Digital Flow-Based Cyber-Physical
Microfluidic Biochips
CONTENTS
1.1 Introduction............................................................................................................................. 1
1.2 What Is Microfluidics.............................................................................................................2
1.2.1 Significance of Microfluidic Biochips......................................................................3
1.2.2 Intelligent Control Cyber-Physical Integration...................................................... 3
1.2.3 Techniques of CAD..................................................................................................... 4
1.2.4 Level of Design............................................................................................................4
1.2.5 Applications of Microfluidics.................................................................................... 5
1.3 Manipulation of DMFB Encapsulation................................................................................ 6
1.3.1 Electro Wetting-On-Dielectric-Based Microfluidic Chips....................................6
1.3.2 Generation of High Complexity in Microfluidics.................................................. 7
1.3.3 Error Recovery in Microfluidic Chips...................................................................... 7
1.3.4 Direct Addressing in DMFBs.................................................................................... 8
1.3.5 Commercialization of Digital Microfluidic Technology....................................... 8
1.3.6 Open-Source DMFB Synthesis.................................................................................. 8
1.4 Large Scale of Flow-Based Microfluidic Biochips..............................................................9
1.4.1 Model of Biochip......................................................................................................... 9
1.4.2 Building Block of Microvalves................................................................................ 10
1.4.3 Fully Programmable Flow of Valve Arrays.......................................................... 10
1.4.4 Protocols of Routing Crossbars............................................................................... 10
1.4.5 Commercialization of Microfluidic Technologies................................................ 11
1.5 Conclusion............................................................................................................................. 11
References........................................................................................................................................ 11
1.1 Introduction
A cyber-physical microfluidic biochip (CPMB) is essentially a fluid handling system at its
heart. Microfluidic refers to the existence of microliters or smaller fluid sizes. Microfluidics
apply more generally to various methods used to manipulate such small-scale fluids. Such
developments are multidisciplinary and encompass, for one thing, the areas of polymer
science, mechanics, electro-technology, biotechnology, and computer design. Microfluidic
fluid processing is also called a “biochip” or a “microfluidic framework.” “Microfluidic
device” refers to electronic components, while “bio” refers to biochemical applications.
Cyber physical system occurs when detectors, transducers, and controls are included
to expand microfluidic biochip technologies significantly. All of this may together be
DOI: 10.1201/9781003220664-1 1
2 Cyber Physical Systems
1.2 What Is Microfluidics
Just the size of the controlled fluids is the literal description of microfluidics. The word in
terms of application specifics is also vague since various technologies can conduct fluid
manipulation on a small scale. The limitless advantages of the scale guided the invention
of microfluidics into the sub-microliters field by conventional clinical laboratories:
• Sample and reagent use decreased: Several systems test samples or manipulate
them with many reagents. The reduction in fluid intake to lower volumes inevita-
bly reduces. This is appealing because ingredients can be hard to acquire and even
more challenging to substitute samples.
• Improved output: A high-volume surface-to-area ratio allows greater temperature
control, which results in increased resolution and sensitivity performance [1].
• Low power consumption: Low mass ensures that the movement of fluids needs
less force. Tools configured for compact and remote operation or operation with
low power consumption gain also enables a closer integration of the physical
device, as it means less cell heating and less energy transfer. Surplus heating can
also conflict with the testing process.
• Transportation: Another small-scale natural by-product. Unfortunately, the por-
tability bottleneck has proven to be the supporting hardware for the microfluidic
biochip operation [2].
• Physical impacts: Fluids in small sizes are subject to laminar flow instead of tur-
bulent flow. This is to the benefit of the microfluidic biochip builder since fluid
movements can be predicted and monitored more effectively. Surface/interface
stress, capillary pressures, and fluid movement across channels dominate in the
microscale [3].
• Automation: Typical lab practices require comprehensive human workflow inter-
ference, including installation and movement of measurements and reagents
between different instruments. Scaling enables the convergence of several other
device elements into one substratum, reducing the need for human interaction
while still allowing increasingly sophisticated protocols to be implemented.
The important point [4] is about how molecular research, biodefense, molecular genetics,
and microscopy applied to microfluidics as we know it today, from the fascinating topic of
Cyber-Physical Microfluidic Biochips 3
view of the growth of microfluidics. The fluid processing methods are substantially dif-
ferent, such as document [5] droplets and auditory activation, reaction kinetics [7]. These
developments do not feature in this paper. Despite all this diversity, the subjects of the rest
of this segment can still be discussed in the type of information system.
For example, many compute clusters use humans to pipette them into a cartridge and load
them into an automatic processing system. Computer operating systems may have hybrid
properties. The main subject of this book is microfluidic biochips that are involved. In
some cases, we study them as they already exist now, but in others, we intend them to be
completely self-contained structures into eventual deployment.
for the manufacture of silicon-borrowed microfluidics are now widely used in PDMS and
low-cost PCB production of polydimethylsiloxane.
1.2.3 Techniques of CAD
1.2.4 Level of Design
FIGURE 1.1
Design level of microfluidic biochips.
equipment. The hardware supplier offers production details such as the specific
rules for gravure of electrodes, tubes, valves, pumps, and fluids, which can be
comfortably regulated on the device. The hardware vendor serves the same pur-
pose as the foundry in the IC design process and will provide the biochip designer
with a product development package.
The vendor of CAD instruments writes a program for synthesis which transforms the
test data into indications on biochip hardware. The concept is produced, installed, and
submitted to the verification tester and the end customer. After the evaluation is com-
pleted, the unit must be collected in the plant that takes biological waste for handling and
recovery since its useful life has been surpassed. An implementation biochip design flow
is identical, but before being supplied to the manufacturing plant, design details should be
sequenced by the biochip manufacturer.
1.2.5 Applications of Microfluidics
Medical diagnosis: The capacity to quickly diagnose disorders and multichannel assays
can boost holistic care and better quality of treatment, located in poor settings from out-
side medical clinics. In the sense of protection and confidence, we will review several of
these implementations in the following paragraphs.
6 Cyber Physical Systems
0rV2
2γd
While θ is the oscillating angle and is the static contact angle of μL and the substratum,
±0 is the static pressure difference without stress, r is the dynamic dielectric viscosity, V
is the voltage, μ is the filling media surface tension, and d is the dielectric thickness. The
touch angle can be modified, and activities such as the supplying, transportation, mixing,
and sweating of droplets can be performed by changing the voltage level and controlling
the output of the DMFB. Subject to complicated biosensors, including in-vitro and random
mutagenesis biosynthesis, these operations may be applied [28, 31]. In reality, industrial
device designers describe the fundamental mechanics of EWOD droplet motion without
affecting efficiency or functionality in any aspect directly. In general, a grid of electrodes
is sufficient for a controller to transmit rising or falling voltage levels. The application
guides particle migration to a dropstick electrode of lower power and the adjacent elec-
trodes of high voltage. Application components are known as switching devices used to
FIGURE 1.2
Encapsulation of digital microfluidic biochips.
Cyber-Physical Microfluidic Biochips 7
perform bioassay. The electronic circuits which are logically high (1) and conceptually low
(0) can be delivered from the digital microcontroller to the DMFB through the right level
charging facilities (as DMFBs usually need hundreds of voltage regulators almost always!).
Applications of the DMFB are constrained in terms of the mechanics of the acceleration of
the droplet and are in the order of hours to thousands of hertz in standard systems [28].
• For even reasonable simplicity tests on small DMFB arrays, the difficulty of pro-
ducing actuating sequences is unaffordable. To cope with this strain, the idea of
high-level proliferation was introduced early from VLSI [11]. Generally, high-level
DMFB flow begins with a bioassay requirement to be performed on chip. The
figurative language of this requirement is highly detailed and is translated to the
process synthesis applications. In the general case, three problems with NP-hard
specialization are resolved.
• The planning shall determine the scientific method to meet the requirements
of precedent resources [11]. Installations are the distribution for activity, such as
combining physical biochip resources [13]. There are two different methods: free
positioning, using FPGA floors scheduling algorithms [32], and virtual topology
positioning [33, 34], which presupposes those operations can include only those
chip areas. In terms of compact size and profitability, virtual topography also con-
tributes to better quality performance.
• Droplet transfer routes from their dispatch ports to running modules must be
determined and then to a waste port or an output terminal. VLSI scheduling algo-
rithms, such as a Soukup labyrinth router [35], may be implemented, and multi-
droplet routing can be compressed to simultaneous occurrence [36].
• The goal of automation is usually a time of fulfillment, efficiency, and testing [11,
37]. The same resources for compilation and routing within a DMFB are common
for both of those steps to their VLSI equivalents. In VLSI fabrication, semiconduc-
tors and switches are employed to perform logic, whereas lines are used for inter-
connection. DMFBs utilize conductors both for the processing and transmission of
liquids. It has been suggested to address alternative synthesis flows continuously
in all transitions, often with higher effects of performance optimization [17, 38, 39].
the most significant correlation. The association of a single droplet after the picture has
been cropped to a certain point. While CCD scanning is versatile and reliable, it may not
be used to test luminous reagents. As has recently been seen with reliability-hardening,
we also notice that different findings suggest they can execute safety control signals.
• The authors know only of two commercial offers which are based on microfluid
science, all of which have been stopped:
• The oldest is the late Illumina NeoPrep Library System, developed and
improved at its publication by Dartmouth College and is based on Advanced
Liquid Logic. Nonetheless, this technology is a longtime perfect representative
of renowned DMFB systems but is mainly mentioned in papers for research-
ers in digital microfluidics. The DMFB for the viewing is Baebies SEEKER and
reproduction of infant lysosomal conditions from the King University. This
platform is appealing since it has been given FDA clearance for an interesting
standard medical program.
• A technology still being developed is the Oxford Nanopore VolTRAX, with sev-
eral prototypes published to a specific community. According to company docu-
mentation, it seems like this system will be a USB interface for the preparation
of samples and connectivity with Oxford’s other technology. This device’s light-
weight shape factor, which will allow remote analysis, is a distinctive feature.
• The role of digital microfluidics is on the rise. There are currently two experimen-
tal frameworks and one DMFB synthesis software application.
• Bordeaux Open Drop is an easy-to-achieve technology channel for dynamic digi-
tally based on DC, PCB, and is reasonably affordable. It has little funding at pres-
ent and whether the development will proceed is unclear.
• The Wheeler DropBot has an AC actuator and includes various prescriptions
describing its application in real-life circumstances (including a field trial in
Kenya). Initially, costly external lab infrastructure was required to work, but
the platform is constantly enhanced in version 3.0. Also available is a biochip
Cyber-Physical Microfluidic Biochips 9
1.4.1 Model of Biochip
The microfluidic circulation systems, borrowed from the semiconductor industry [4], were
made using silicon and glass substrates. Polydimethylsiloxane (PDMS) is generally the
leading commodity due to its simplicity and relatively precise manufacturing, elasticity,
and physicochemical characteristics. Biochips of PDMS are manufactured using the soft
lithography multilayer process: The biochip structure is modeled using lithography and
used as molds on silicon wafers. There is a thin coating of PDMS on the chips using an
elastomer. The input and output points for the fluid and vibration origins are introduced.
FIGURE 1.3
Generation of DMFBs.
10 Cyber Physical Systems
FIGURE 1.4
Structure of model chips.
Multiple levels may be configured and bundled in a dynamic channel, but only two layers
are most commonly utilized, as shown in Figure 1.4.
1.5 Conclusion
The basic functioning concepts and their development, design, and advancement in the
commercial exploitation of digital and flow-based microfluidics are discussed in this chap-
ter. In all these inventions, the perfect microfluidic biochip can be realized. Microfluidic
biochips can be successfully implemented in design automation, which significantly
reduces the development time and improves usability. This suggests the safety and trust-
worthiness of these systems, like the rest of this book shows.
References
1. S. Pennathur, C. Meinhart, H. Soh. How to exploit the features of microfluidics technology. Lab
Chip Vol. 8(1). pp. (20–22). (2008).
2. C.M. Klapp. Erich, microfluidic diagnostics: Time for industry standards. Expert Rev. Med.
Devices Vol. 6(3). pp. (211–213). (2014).
3. T.M. Squires, S.R. Quake. Microfluidics: Fluid physics at the nanoliter scale. Rev. Mod. Phys.Vol.
77(3). pp. (977–985). (2005).
4. G.M. Whitesides. The origins and the future of microfluidics. Nature Vol. 442(7101). pp. (368–
373). (2006).
5. Y. Xia, J. Si, Z. Li. Fabrication techniques for microfluidic paper-based analytical devices and
their applications for biological testing: A review. Biosens. Bioelectron. Vol. 77. pp. (774–789).
(2016).
6. S.-Y. Teh, R. Lin, L.-H. Hung, A.P. Lee. Droplet microfluidics. Lab Chip Vol. 8(2). pp. (198–220).
(2008).
7. B. Hadimioglu, R. Stearns, R. Ellson. Moving liquids with sound: The physics of acoustic drop-
let ejection for robust laboratory automation in life sciences. J. Lab. Autom. Vol. 21(1). pp. (4–18).
(2016).
8. M. Boyd-Moss, S. Baratchi, M. Di Venere, K. Khoshmanesh. Self-contained microfluidic sys-
tems: A review. Lab Chip Vol. 16(17). pp. (3177–3192). (2016).
12 Cyber Physical Systems
9. D. Grissom, C. Curtis, P. Brisk. Interpreting assays with control flow on digital microfluidic
biochips. ACM J. Emerg. Technol. Comput. Syst. Vol. 10(3). pp. (24–36). (2014).
10. Y. Luo, K. Chakrabarty, T.-Y. Ho. Error recovery in cyber physical-digital microfluidic biochips.
IEEE Trans. Comput. Aided Des. Integer. Circuits Syst. Vol. 32(1). pp. (59–72). (2013).
11. F. Su, K. Chakrabarty. High-level synthesis of digital microfluidic biochips. ACM J. Emerg.
Technol. Comput. Syst. Vol. 3(4). pp. (1–10). (2008).
12. M. Alistar, P. Pop, J. Madsen. Synthesis of application-specific fault-tolerant digital microflu-
idic biochip architectures. IEEE Trans. Comput. Aided Des. Integer. Circuits Syst. Vol. 35(5). pp.
(764–777). (2016).
13. F. Su, K. Chakrabarty. Module placement for fault-tolerant microfluidics-based biochips. ACM
Trans. Des. Autom. Electron. Syst. Vol. 11(3). pp. (682–710). (2006).
14. P. Pop, M. Alistar, E. Stuart, J. Madsen. Design methodology for digital microfluidic biochips.
In Fault-Tolerant Digital Microfluidic Biochips: Compilation and Synthesis (Springer, Cham). pp.
(13–28). (2016).
15. T. Xu, K. Chakrabarty. Parallel scan-like test and multiple-defect diagnosis for digital micro-
fluidic biochips. IEEE Trans. Biomed. Circuits Syst. Vol. 1(2). pp. (148–158). (2007).
16. T.A. Dinh, S. Yamashita, T.-Y. Ho, K. Chakrabarty. A general testing method for digital
microfluidic biochips under physical constraints. In Proceedings of the IEEE International Test
Conference. China. pp. (1–8). (2015).
17. C.C.-Y. Lin, Y.-W. Chang. ILP-based pin-count aware design methodology for microfluidic bio-
chips. IEEE Trans. Comput. Aided Des. Integer. Circuits Syst. Vol. 29(9). pp. (1315–1327). (2010).
18. K. Hu, F. Yu, T.-Y. Ho, K. Chakrabarty. Testing of flow-based microfluidic biochips: Fault mod-
elling, test generation, and experimental demonstration. IEEE Trans. Comput. Aided Des. Integer.
Circuits Syst. Vol. 33(10). pp. (1463–1475). (2014).
19. S. Bhattacharjee, A. Banerjee, B.B. Bhattacharya. Sample preparation with multiple dilutions
digital microfluidic biochips. IET Comput. Digit. Tech. Vol. 8(1). pp. (49–58). (2014).
20. S. Bhattacharjee, S. Poddar, S. Roy, J.-D. Huang, B.B. Bhattacharya. Dilution and mixing algo-
rithms for flow-based microfluidic biochips. IEEE Trans. Comput. Aided Des. Integer. Circuits
Syst. Vol. 36(4). pp. (614–627). (2017).
21. D. Mitra, S. Roy, S. Bhattacharjee, K. Chakrabarty, B.B. Bhattacharya. On-chip sample prepa-
ration for multiple targets using digital microfluidics. IEEE Trans. Comput. Aided Des. Integer.
Circuits Syst. Vol. 33(8). pp. (1131–1144). (2014).
22. S. Roy, B.B. Bhattacharya, S. Ghoshal, K. Chakrabarty. Low-cost dilution engine for sample
preparation in digital microfluidic biochips. In Proceedings of the International Symposium on
Electronic System Design. India. pp. (203–207). (2012).
23. V. Ananthanarayanan, W. Thies. Biocoder: A programming language for standardizing and
automating biology protocols. J. Biol. Eng. Vol. 4(1). pp. (1–11). (2010).
24. G. Chen, Y. Lin, J. Wang. Monitoring environmental pollutants by microchip capillary electro-
phoresis with electrochemical detection. Talanta Vol. 68(3). pp. (497–503). (2006).
25. J.C. Jokerst, J.M. Emory, C.S. Henry. Advances in microfluidics for environmental analysis.
Analyst Vol. 137(1). pp. (24–34). (2012).
26. S. Neethirajan, I. Kobayashi, M. Nakajima, D. Wu, S. Nandagopal, F. Lin. Microfluidics for
food, agriculture and biosystems industries. Lab Chip.Vol. 11(9). pp. (1574–1586). (2011).
27. J. Wang. Microchip devices for detecting terrorist weapons. Anal. Chim. Acta. Vol. 1. pp. (3–10).
(2004).
28. K.S. Kaswan, L. Gaur, J.S. Dhatterwal, R. Kumar. “AI-based natural language processing for
meaningful generation information Electronic Health Record (EHR) data” accepted in Taylor
Francis, CRC Press for “advanced artificial intelligence techniques and its applications in bio-
informatics”. ISBN No. 9781003126164. (2021).
29. R.B. Fair. Digital microfluidics: Is a true lab-on-a-chip possible? Microfluid. Nanofluid. Vol. 3(3).
pp. (245–281). (2007).
30. M. Pollack, A. Shenderov, R. Fair. Electrowetting-based actuation of droplets for integrated
microfluidics. Lab Chip Vol. 2(2). pp. (96–101). (2002).
Cyber-Physical Microfluidic Biochips 13
31. H.-H. Shen, S.-K. Fan, C.-J. Kim, D.-J. Yao. EWOD microfluidic systems for biomedical applica-
tions. Microfluid. Nanofluid. Vol. 16(5). pp. (965–987). (2014).
32. K. Bazargan, R. Kastner, M. Sarrafzadeh. Fast template placement for reconfigurable comput-
ing systems. IEEE Des. Test Comput. Vol. 17(1). pp. (68–83). (2000).
33. D. Grissom, P. Brisk. Fast online synthesis of generally programmable digital microfluidic
biochips. In Proceedings of the IEEE/ACM/IFIP International Conference on Hardware/Software
Codesign and System Synthesis. UK. pp. (413–422). (2012).
34. D.T. Grissom, P. Brisk. Fast online synthesis of digital microfluidic biochips. IEEE Trans.Comput.
Aided Des. Integer. Circuits Syst. Vol. 33(3). pp. (356–369). (2014).
35. J.S. Dhatterwal, K.S. Kaswan, Preety. “Intelligent agent-based case base reasoning systems
build knowledge representation in Covid-19 analysis of recovery infectious patients” in a book
entitled “application of AI in COVID 19” Accepted in Springer series: Medical Virology: From
Pathogenesis to Disease Control. ISBN No. 978-981-15-7317-0 (e-Book), 978-981-15-7316-3 (Hard
Book). DOI: 10.1007/978-981-15-7317-0. (2020).
36. T.-W. Huang, T.-Y. Ho. A fast reputability- and performance-driven droplet routing algorithm
for digital microfluidic biochips. In Proceedings of the IEEE International Conference on Computer
Design. India. pp. (445–450). (2009).
37. K. Chakrabarty. Design automation and test solutions for digital microfluidic biochips. IEEE
Trans. Circuits Syst. Vol. 57(1). pp. (4–17). (2010).
38. T. Xu, K. Chakrabarty. Integrated droplet routing and defect tolerance in the synthesis of digi-
tal microfluidic biochips. ACM J. Emerg. Technol. Comput. Syst. Vol. 4(3). pp. (11–25). (2008).
39. P.-H. Yuh, C.-L. Yang, Y.-W. Chang. Bioroute: A network-flow-based routing algorithm for the
synthesis of digital microfluidic biochips. IEEE Trans. Comput. Aided Des. Integer. Circuits Syst.
Vol. 27(11). pp. (1928–1941). (2008).
40. H. Singh, K.S. Kaswan. Clinical decision support systems for heart disease using data mining
approach. IJCSSE Vol. 5(2). pp. (19–23). (2016).
2
Reliability Driven and Dynamic Re-synthesis
of Error Recovery in Cyber-Physical Biochips
CONTENTS
2.1 Introduction........................................................................................................................... 15
2.1.1 Related Work............................................................................................................. 16
2.2 What Are Cyber-Physical Biochips.................................................................................... 17
2.2.1 Sensing Systems of Digital Microfluidic Biochips............................................... 18
2.2.2 Digital Chip Software.............................................................................................. 20
2.2.3 Biochip Software....................................................................................................... 21
2.3 Ease of Error Recovery.........................................................................................................22
2.3.1 Planning of Error Recovery.....................................................................................22
2.3.2 Ensure Reliable Error Recovery.............................................................................. 24
2.3.3 Difference among Numbers of Sensing Schemes................................................ 25
2.4 Physical-Aware Sensor Software........................................................................................ 26
2.4.1 Offline Data Preparation.......................................................................................... 26
2.4.2 Online Monitoring Microfluidics Chip................................................................. 27
2.4.2.1 Step 1: Detecting of Error.......................................................................... 27
2.4.2.2 Step 2: Updating Structure of Graph....................................................... 27
Steps of Graph Sequences............................................................................................................. 28
2.4.2.3 Step 3: Concept of Proper Handling....................................................... 28
2.5 Compilation of Sensing Scheme Optimization................................................................ 30
2.5.1 Developing of Plasmid DNA...................................................................................30
2.5.2 Interpolating Protein Dissolve................................................................................ 31
2.6 Conclusion............................................................................................................................. 32
References........................................................................................................................................ 32
2.1 Introduction
In this segment, we introduce a “physical-aware” device restructuring approach that
uses sensor data at intermediary crossings to dynamically rearrange the biochip, based
on recent developments in digital microfluidics cybernetic implants in the application of
sensor networks [1]. The differences in electrode action are recalled with the computerized
maintenance management re-synthesis process, which produces new results in module
placement, droplet navigation pathway, and global markets through minimal effect on the
time-to-response.
DOI: 10.1201/9781003220664-2 15
16 Cyber Physical Systems
2.1.1 Related Work
Digital microfluidics’ simplification of operating system configuration and monitoring
sparked exploration into different areas of automatic semiconductor manufacturing and
microprocessor implementations. A variety of techniques for architecture and design
propagation [3], the placement of the device, and the drop of water [1–4] are published.
A method, on the other hand, neglects the functional complexities and domain-specific
limitations that come with attempting to perform biological functions and microfluidic
operational activities on an electronic chip.
Predictive modeling and precision monitoring are difficult to achieve due to the dynamic
and random numerous contributions that are common in biological/chemical reactions
[5, 6]. Various errors can occur during the operation of a bacterial genome, in addition to
manufactured flaws. For example, DNA fouling can cause several electrodes in a biochip
to malfunction, and an improper acceleration voltage added to an electrode can cause elec-
trode degradation and charged trap [7–9]. These flaws are difficult to diagnose a priori,
but they do exist in some bioassays [9]. Despite this intrinsic variability, many scientific
trials, such as therapeutic antibodies and drug production, necessitate highly reliable and
detailed fluid-handling functions. For the concentration and volume of raindrops, each
phase in a biochemical experiment procedure has an “acknowledgment range.” The pH of
the solution used in preparing plasmid DNA materials, for example, should be much less
than 8.0 to prevent a major decrease in the lysozyme’s performance [10]. If an accidental
mistake happens during the procedure or the antibacterial activity protocol’s conditions
are not followed, the results of the whole procedure will be erroneous. To fix the mistake,
all of the measures of the procedure must be replicated [11, 12]. Experimentation is repeated
again and again, wasting costly reagents and difficult-to-find specimens. The following
issues arise as a result of the repeated implementation of on-chip laboratory experiments:
device to check the accuracy of necessary and proper clause droplets at different stages
of the on-chip procedure. When a sensor detects a malfunction, the resulting droplet is
eliminated if the droplet’s density or strength is below or above the measured distance
necessary. The procedure is resumed when an investigation’s production does not fulfill
the consistency specifications resulting from sensor calibration. To substitute the under-
qualified droplet, new product droplets will be formed.
The original sequence diagram of a bacterial genome that works as a sensor evaluates
the outputs of each administering, combining, and separating process. The machine will
re-execute the related administering and combining procedures if a mistake occurs at
operation. It displays the latest error-recovery sequencing table, which includes the new
material particles manufactured in activities 12, 13, and 14. In [11] there are some vulner-
abilities in the exclusion of the detection and correction method “physical-aware” moni-
toring systems:
FIGURE 2.1
Framework of a cyber-physical digital microfluidic system.
will obtain input from the sensing mechanism about the result (error-free/erroneous) of
fluid-handling procedures. The monitoring system will correctly modify the microfluidic
biochip based on sensor input. The different phases of the bioassay are then carried out
based on substrate results and real-time reporting. Figure 2.1 shows each aspect of a cyber-
physical network on the microfluidic basis. A feedback signal is sent from the monitoring
system to the microfluidic biochip and a sensor on the chip tracks the effects of liquid
functioning practices. The results are related to the “expected values,” or pre-determined
cutoffs. If the reference findings show a warning message saying that the monitoring sys-
tem gets a “repeating command” and that it can execute again the following operation in
which the problem occurs. This is the way to fix the error.
å(x - x) i ( y - y)
i i
cor = i =1
,
N N
å(x - x) i å( y - y)
2 2
i i
i =1 i =1
Error Recovery in Cyber-Physical Biochips 19
FIGURE 2.2
Structure of the template matching image.
FIGURE 2.3
Structure of the microfluidic coplanar digital chip.
where xN and yN are the prototype image’s and clipped sub-image’s average gray levels,
respectively. A similar procedure cor has a spectrum of values around 1 and C1. A higher
absolute value of a correlation factor indicates a greater relation between different pic-
tures, according to the concept of correlation.
The relationship diagram between both the prototype and the initial input image is
obtained after deriving considerations of differentiation for all potential roles of absolute
biosensor composition. Assume the biochip has droplets. Apposition of droplets can be
calculated by looking at the correlation chart with the highest correlation variables. Figure
2.2[17] shows an example.
The original input signal of the entire chip and the pattern image with the best cor-
responding positions, i.e., the droplet coordinations derived from the control program,
as (77, 107), (77, 147), (77, 147), and (76, 208), respectively. As a result, the control program
locates the droplets on its own. The dimensions and wavelengths of raindrops can be stud-
ied further using the picture. After analyzing the image captured by the CCD sensor, the
amounts and distributions of droplets can be obtained in this method. Instead of scanning
the entire picture for droplets to see if the drops were moved to their correct positions, we
use data modeling.
The following procedures are used to carry out this procedure:
Before beginning the experiment, several calibrations are performed. We select a wide
number of sub-images both with and without raindrops and calculate their n design rela-
tionship. We find an appropriate proportion for the correlation index (Cth) based on the
estimation results: if the similarity is greater than Cth, we infer that the clipped thread has
a goblet; therefore, the short and mid would not have a raindrop. We trimmed the short and
mid, closed the projected places of the particles, and quantified the appropriate association
indexes while the antibacterial activity works to determine the absence/presence of particles.
TABLE 2.1
Comparative Analysis of the Camera Sensing System CCD and the Sensing System Dependent on
Detectors
CCD camera-based scheme CCD camera-based scheme
outputs failed to fulfill quality specifications due to sensor configuration are re-executed
to correct the problem. To allow recovery, the discarded intermediary substance drop-
lets must be deposited in specifically specified positions on the chips. For error recovery,
supplementary droplets of substances and materials must be distributed from reservoirs.
The technique for dependability error recovery as well as the algorithm for develop-
mental effects of error recovery will be implemented based on the error-recovery process
suggested in [11].
2.2.3 Biochip Software
The cyber-physical connection here between the microfluidic platform’s control operat-
ing systems is then defined. For cyber-physical coupling, two frameworks are required.
The CPU receives the data transfer from the first equipment when the investigation is
complete, and uses that information to decode the sensor values. The second interface
converts the feedback information of the control program to voltage signals which can be
implemented on the electrodes of the biochip.
The cyber-physical structure is depicted schematically in Figure 2.4. A machine, a
peripheral circuit, a separate microcontroller, and a biochip are all part of the device. The
program on the machine sends a command signal to the biochip during the implementa-
tion of a bacterial genome. Via the solitary microcontroller, the software simultaneously
provides input from the biochip’s sensing mechanism. Based on sensor inputs, the control
program recalculates the timetable of fluidic activities, module positioning, and droplet
waterways. The key idea is to have an on-chip sensor to coordinate experimental regu-
lation related to restructuring. When the on-chip system detects an error, the irregular
droplet is immediately discarded, preventing experimental error.
Cyber-physical microfluidics’ closed-loop incorporation can also be used to monitor the
time it takes for biosensors to complete. Serum samples must be thoroughly combined
with an enzyme-mediated reagent when evaluating glucose in blood, for instance [18]. A
droplet’s state is tracked by an imaging system and during the mixing process. Through
studying and contrasting photographs of the droplet, the degree to which blending has
FIGURE 2.4
Flow of biochip software.
22 Cyber Physical Systems
been achieved can be determined. As a result, the biochip’s control program would cause
it to keep mixing until the input data indicates that the droplets are properly blended. As
a result, even without understanding the exact mixer execution time ahead, the combin-
ing procedure can be accurately regulated, and the on-chip glucose concentration results
obtained can be as accurate as those obtained by a traditional materials scientist bench-top
analysis tool [18].
• If only one of the separating operation’s output particles the other (superfluous)
drop of water was used as a reference for its eventual successor’s replacement in
case of a mistake at a later time. Operation, for example, is a separating operation
that produces two output droplets. The fluid management of each cycle is used
in the series diagram procedure, and only one of these two droplets is used as
the input of installation. In the sequencing table, the discarded droplets are not
visible.
• All discharge procedures are planned for implementation as quickly as practical
and their output particles are deposited on the biochip if an error occurs. We also
leave any droplets on the table as a buffer for any future error-recovery proce-
dures. Those discarded contingency droplets will be returned to their accompany-
ing reservoirs after performing the assay.
Error Recovery in Cyber-Physical Biochips 23
When a renal artery stenosis operation fails, the control program first scans to see if con-
tingency raindrops stored on a biochip will sustain the operations of the organization. If
the reaction is yes, then the time expense of the organization will be reduced. Anything
other than that during error repair, further operations will be performed. According to the
number of tests and droplet overconsumption in their error-recovery methods, the activi-
ties in the bioassay can be separated into three groups based on the above analysis. The
below are the formal classifications for fluidic-handling operations:
Both irreversible operations fall into this category. If a mistake happens, they will easily
be re-executed.
Category II operations are those that are nonreversible and with which basic under-
standing may have contingency droplets.
Category III: This takes a couple of nonreversible procedures for which the immediately
responsible forerunners are unable to supply contingency droplets.
Each node in a provided decoding diagram indicates an operation. The in-number of a
procedure the quantity of raindrops and the quantity of particles is specified a procedure
is defined as the number of output particles. Any activity optk can be classified based on
its in-number and out-number values, as listed below:
According to the categorization result for opti, the collection of its error-recovery opera-
tions, Ri, can be deduced. Since the input droplets for Category I and II procedures are
retained on the chip, they can easily be re-executed if an error happens. However, the
inputs to Category III operations come from the outputs of predecessor’s procedures, and
we have no protection for these particles. As a result, if an error happens in a Category III
operation, we must not only re-run the procedure but also backtrace to its counterparts.
Suppose opte is the error procedure, and that optp1 and optp2 are its immediate succes-
sors. If these basic understandings are Category I or II processes, we will re-execute optp1,
optp2, and then opte for error recovery, resulting in Ri D foptp1; optp2; opteg. If optp1 and
optp2’s understandings regarding are not in Category I or II, we would try to expand Ri
by including their nearest neighbors. This backtracing and augmentation process must be
replicated before we hit predecessor procedures which provide replacement raindrops to
feed the outputs of error procedures. The trace and expansion of all the above Ri set can be
summed up as follows. We define predatory to beginning with opti/ as a mapping from
opti to a collection of opti’s immediate predecessors in the sequencing graph.
We characterize the operator Pr as follows for a series of operations O D
fopto1;opto2;:::;optok g:
Pr : O ® ∪
i = o1 , o2 ,... ok
{opti , opt j | opt j Î pred ( opti ) ,"j}
The method can be used to extract the set of error-recovery procedures Ri for any opera-
tion opti. According to the foregoing section, we may extract the set of recovery efforts Ri
for any process opti.
We can add edge among activities in the set Ri describing the relationship between pro-
cedures in the initial sequence graph, and thus extract the error-recovery graph GRei for
opti. We can re-execute procedures in GRei for error recovery if an error happens in opti.
It’s worth noting that certain electrodes on the biochip have been purposefully left unused
and are being used to store backup droplets. Storage cells are dedicated and reserved for
all electrodes on the chip’s boundary. As a result, replacement particles can be delivered
on a cybernetic implant safely.
• Let’s pretend that Electrode 1 has stuck charge in its dielectric insulator plate, but
Electrodes 2 and 3 don’t. Excitation current and voltage are connected to Electrode
1 and Electrode 3 in order to perform a splitting process. The electrowetting power
would be weakened by the voltage trapping on Electrode 1. Inequitable forces will
break the raindrop, and the two raindrops that arise can have different amounts.
Additional errors can occur if we merely re-execute the separating process while
continuing to use Electrode 1. Worse, the charge trapping mechanism has the
potential to permanently degrade the electrode’s dielectric properties [7, 8]. As a
result, if an error is observed, the electrode at which the problem happened must
no longer be used to introduce fluid-handling operations in order to maintain the
biochip’s reliability.
Error Recovery in Cyber-Physical Biochips 25
• Droplets comprising macromolecules (such as DNA) have the potential to foul the
electrode surfaces [20]. As a consequence, the distribution of droplets can shift in
unfavorable ways. Other droplets can become infected while these infected interfaces
manage to be used. The region of the decontamination of DNA is a member of the
mixture combining operation’s output droplets which could have odd concentration.
• To achieve maintainability error recovery, we employ a basic technique. Where an
error is observed, the bioassay’s execution is modified as follows:
• The protocol with the fault is restarted. In future procedures, the instruments
that can lead to errors are not used. The servo controller monitors what more stor-
age is used by each operation. The field where the mistake happens will then be
returned, based on the error raindrop. Both electrodes in this area are considered
to be suspect for defects. As a result, these electrodes would be circumvented.
ReRe = Pr (Ri )
S = {Mopt
*
1
*
, Mopt 2
*
,...Mopt n
}
*
where Mopti
,1 £ i £ n is the synthesis output for the ith operation opti. The element Mopt
*
i
can
be viewed as an ordered 6-tuple:
*
Mopti
=< ts ( opti ) , te ( opti ) , x ( opti ) , col ( opti ) , row ( opti ) >
where ts and te are the organization’s start and stop times, including both; x and y are the
service module x- and y-coordinates; and col (row) is the number of columns (rows) repre-
sented by the process in the sequence.
Several suggested algorithms for solving this optimization technique have previously
been released for digital microfluidic biochip computer-aided design and development.
For instance, PRSA-based propagating techniques may be utilized to quickly provide opti-
mum outcomes of synthesizing [23].
Because after optimum summary findings are received, another off-data acquisition
stage is done. Antioxidant activity is then carried out based on the initial propagation
result, followed by droplet monitoring in real time.
Error Recovery in Cyber-Physical Biochips 27
• Other processes must be prevented from interrupting. Take the example below.
For bioassay with transcription, an error-recovery procedure at particular instant
10 should be activated. The Mix 1 procedure is introduced when the error-recov-
ery mechanism is initiated. In order to prevent disruption, the results of the re-
synthesis shall be the same in the previous studies of the synthesis.
• In the findings of the re-synthetic analysis, electrodes at which the mistake was, it
is sometimes considered that it should be circumvented.
We suggest two re-synthesis methods for complex re-synthesis to fulfill these criteria. First,
a local greedy algorithm, and secondly, a multi-objective optimization algorithm based on
PRSA [3]. The first step is determining all operations for the greedy algorithm that has to
conform to the outcome of re-synthesis. These include: the error-recovery diagram pro-
cedures, incorrect procedures, and corresponding operational processes to be carried out
on electrodes with defects in the original propagation result. The original product of the
synthesis will be used for further operations.
As a module positioning with challenges challenge, dynamic recon synthesis on the
microfluidic array can be designed as formulation outcomes for certain procedures are
defined. The procedures that are carried out a priori as “obstacles” are here determined by
the initial synthesis outcome, and other surgeries needed for regeneration are re-synthe-
sized and inserted greedily in the remaining biochip region accessible. The following are
thorough measures. The following.
First, the control program puts all activities that will need to be replanted in a list of
priorities, depending on the quantum mechanical sort outcome for the procedures. These
procedures include error repair operations and all error descendants. For each process
on the queue, the program then gives priority. The lowest priority is given to the stored
procedure operations, i.e., the complete competence at the topographical level, whereas the
assignment of scarce in the queue is the “bassiest” operation (top of the topological sort).
Then on-chip resources are allocated to these procedures in the control program. R var-
ies with the time t in the on-chip resource package. In order for the current process to be
the primary concern, the control program would look for appropriate tools. For example,
if a mixing procedure is the process with the top importance, the machine will look for
Error Recovery in Cyber-Physical Biochips 29
an accessible mn subarray of the electrode that has not been controlled from time to t C
4t. Time to t here 4t is the time necessary for activation of the mn subset of sensors. If suf-
ficient vacant opportunities are distributed, resource coupling will be successful, and the
new schedule will be taken into account. Instead, the surgery will be deferred for supplies.
If the multi-resource possibilities are delivered concurrently, the software will choose one
and link it to a matching activity. The procedure will be withdrawn from the priority
queue after the commodity is bonded and the start/stop time determined. Be aware that
the above measures can also be used to produce re-synthesis results where many errors
are observed at the same time. In this case, several recovered procedures are enabled
simultaneously and a priority queue for every rehabilitation process is created by the con-
trol program. After these priority queues have been combined, the control program gives
a topologically dependent priority to each feature. Finally, with any combined priority
queue process, the control program calculates different synthesizing performance.
There are challenges in finding appropriate instruments for use in a microfluidic biochip
using a computer system with just a limited number of MN and P terminals. This algo-
rithm of re-synthesis is “O” (i.e., “The whole vacant rectangles”) (MN C P). Each electrode
surface port in the array is scanned and monitored extensively by software. Since there
might be a purpose in optimizing the amount of distribution channels and the techniques
for big arrays, the worse condition is O (MN). Computing cost is O in some sections of the
algorithm (1). The completion of the re-synthesis method is thus O (MN).
It displays the scheduling that matches the graph scheduling and both display the sched-
uling that matches the graph numbering. We present only the timetable for combining
procedures in order to be clear. This is the timeline obtained with the algorithm of [11]
error recovery.
We can observe that Mixture 1 has been paused ten times during data transmission.
Around 18-time places and 28-time places raise the minimum traditional statistics which
could be recognized for only certain conditions. The related complex planning outcome
is if the error is found in Mix 3 at 10; the current Mix 1 process will be performed on the
basis of the initial outcome of propagation. It is expected that the computing benefit of
implementing the previous phone is 1 time slot. The calculating time is really smaller than
the liquid organizational processes reduction in time at least in an astronomical amount.
At the latest date 11, a re-synthesis result will be produced based on the revised Mix 1,
and 12 will be completed without interruption. At time 18, the experiment is completed.
Throughout these bioassays, no time penalty or obstruction of other activities is executed
“seamlessly.”
A PRSA-based optimization algorithm approach from [3] is also used to solve the re-
synthesis problem. The inputs and limitations of the issue with re-synthesis vary from the
original problem with synthesis. Assume that the re-synthesis dilemma operation set is
P0 and the limitations set is C 0. P0 and C 0 can be derived based on the added P and C.
On the set P, we identify first a constructor T. T is a projection from the set to the sequence
of steps currently begun instantly at t.
30 Cyber Physical Systems
1. R1: Alkaline lysis Solution I [50mM glucose, 25mM Tris-HCl (pH 8.0), 10 mM EDTA
(pH 8.0)].
2. R2: Alkaline lysis Solution II [0.2N NaOH, 1% SDS (w/v)].
3. R3: Alkaline lysis Solution III (5M sodium acetate, glacial acetic acid).
The required concentration of the mixture is 0.22% of R1, 0.44% of R2, and 0.34% of R3,
56 28 44
which can be approximated as ReRe = Pr (Ri ) of R1, of R2, and of R3.
128 128 128
The processing diagram in mixing R1, R2, and R3 to achieve the necessary concentra-
tions is obtained. This bioassay is converted to an electrical array and is used to store all
electrode at the array border. When mistakes are observed, the cyber physical microfluid
system’s error-recovery capacity may be assessed on the basis of the completion period of
Error Recovery in Cyber-Physical Biochips 31
the bioassay. Even during bioassay, the errors are uniformly inserted into the chip and the
timeframe of both sensor systems is comparable. In this case, the fulfillment time comes
from the implemented optimization method. The findings are on balance ten times the
obtained values by repeating the tests. For this (no error recovery), where an error happens
during the bioassay, the final result of the whole procedure is wrong. In order to correct the
mistake, it is necessary to remove the biochip and to replicate the experiment on a new bio-
chip. If we conclude that the procedure is effective, the lifetime of the bacterial genome in
the defect-free case will be twice as long. Based on these data, error recovery can minimize
the completion period for bioassay and can also reduce the use of biochemical substances.
In data transmission based on performance, in other procedures, electrodes that are con-
sidered to have a defect are not used. However, the area in which the mistake occurs will
continue to be employed in following procedures during the rehabilitation process of per-
forming problems [15], where an accident happened throughout implementation. These
defective electrodes will lead to additional failures. The following approximation is devel-
oped for comparison of performance and dependability detection and correction of vital
operational durations. Completely at random, we pick one choice as the first instance of
the error in the implementation of the bacterial genome in the reliability-obvious error
recovery. Optfe-based electrodes are alluded to as “default electrodes.” We conclude that
there is a Pfail risk that this experiment will fail, when another operation is performed
again on these defective electrodes. We run the simulation 15 times for reliability-informed
error detection for a fixed value of Pfail and detect typical execution time.
Then we choose another procedure as optfe arbitrarily and display the results again.
Optfe’s electronics now include an effort exerted. We found that in the event of further
electrons being unreliable, the total duration for reliability-recovery errors is greater. The
reliability-based issue healing process doesn’t rely and preserves minimal time complex-
ity on the source of the semiconductor failure.
Although the PRSA solution is less appealing to decision-making in real time, the gold-
based algorithm offers a valuable calibration point and demonstrates that it is efficient
for prompt phylogenetic analysis completion. In addition, the PRSA-based approach can
be used as the basis for alternative techniques of route discovery by pre-calculating and
pre-loading retrieval timelines. We equate the power consumption for the maintainabil-
ity and reliability-obvious error-recovery strategies with the exponential dilution protocol
implemented in [11]. First, we pick arbitrarily one optfe operation as the first instances of
failure in the bioassay, where optfe is a 14 electrode subarray dilution procedure. We then
initialized Pfail to reflect the likelihood that further actions on this deficient antenna struc-
ture would also fail. Then we execute the experiments 15 times according to any value
of Pfail and draw the average reliability-obligeable error-recovery project duration. The
faulty electrodes are, by comparison, sidestepped with the error recovery due to durabil-
ity. Thus, the time duration is separate from Pfail for the serviceability error recovery. At
the same time, we prevent the dilemma that any collection of faulty electrodes will lead
to repeated failures, thus reducing the number of mistakes in the bioassay and improving
the investigation’s quality. The cost of the procedure is minimized when less reagents/
samples are collected.
2.6 Conclusion
We’ve seen in this chapter how recent progress can be used in integrating a sensing device
into a biochip for digital microfluidics to render biochips error resistant. For the reconfigu-
ration of the “physical-aware” framework, we have introduced a cyber-physical solution,
using sensor data at intermediary control points to automatically reconfigure the biochip.
Real-time monitoring techniques were considered dependent on combined optical detec-
tors and CCD cameras. In order to dynamically create new timelines, module placing, and
droplet routing routes for the bacterial genome with minimal effect on response time, two
separate sensor-driven re-synthesis technologies have been developed. These two meth-
ods were analyzed and compared with the time required for re-synthesis bioassays and
CPUs. The synchronization of the control program of the physiological and microfluidic
biochip makes it possible to use sensor data as input to decide full operations, improve
electrode acceleration sequencing for subsequent processing, and reorganize the biochip
dynamically. Four selected protein biosensors have shown the feasibility of the proposed
solution by simulations.
References
1. T.-W. Huang, C.-H. Lin, and T.-Y. Ho. “A contamination aware droplet routing algorithm for
the synthesis of digital microfluidic biochips”. IEEE Transactions on Computer-Aided Design of
Integrated Circuits and Systems. Vol. 29(11). pp. 1682–1695. (2010).
2. E. Maftei, P. Pop, and J. Madsen. “Routing-based synthesis of digital microfluidic biochips”. In
Proceedings of the International Conference on Compilers, Architectures and Synthesis for Embedded
Systems. England. pp. 41–50. (2010).
Error Recovery in Cyber-Physical Biochips 33
3. K. Chakrabarty, and F. Su. Digital Microfluidic Biochips: Synthesis, Testing and Reconfiguration
Techniques. Boca Raton, FL: CRC Press. (2006).
4. T.-W. Huang, and T.-Y. Ho. “A two-stage ILP-based droplet routing algorithm for pin-con-
strained digital microfluidic biochips”. IEEE Transactions on Computer-Aided Design of Integrated
Circuits and Systems. Vol. 30(2). pp. 215–228. (2011).
5. M. Iyengar, and M. McGuire. “Imprecise and qualitative probability in systems biology”.
International Conference on Systems Biology. (2007). pp. 1–24. DOI: 10.1007/978-3-319-56255-1_1
6. K.S. Kaswan, L. Gaur, J.S. Dhatterwal, and R. Kumar. “AI-based natural language process-
ing for generation meaningful information Electronic Health Record (EHR) data” accepted in
Taylor Francis, CRC Press for “advanced artificial intelligence techniques and its applications
in bioinformatics”. Taylor & Francis Group. (2021).
7. J. Verheijen, and M. Prins. “Reversible electrowetting and trapping of charge: Model and
experiments”. ACS Journal Langmuir. Vol. 15. pp. 6616–6620. (1999).
8. J. Park, S. Lee, and L. Kanga. “Fast and reliable droplet transport on single-plate electrowetting
on dielectrics using nonfloating switching method”. Biomicrofluidics. Vol. 4(2). pp. 1–8. (2010).
9. E. Welch, Y.-Y. Lin, A. Madison, and R. Fair.“Picoliter DNA sequencing chemistry on an elec-
trowetting-based digital microfluidic platform”. Biotechnology Journal. Vol. 6(2). pp. 165–176.
(2011).
10. S. Kotchoni, E. Gachomo, E. Betiku, and O. Shonukan. “A homemade kit for plasmid DNA
mini-preparation”. African Journal of Biotechnology. Vol. 2. pp. 88–90. (2003).
11. Y. Zhao, T. Xu, and K. Chakrabarty. “Integrated control-path design and error recovery in
digital microfluidic lab-on-chip”. ACM JETC. Vol. 3. pp. 11–20. (2010).
12. C. Mein, B. Barratt, M. Dunn, T. Siegmund, A. Smith, L. Esposito, S. Nutland, H. Stevens, A.
Wilson, M. Phillips, N. Jarvis, S. Law, M. Arruda, and J. Todd. “Evaluation of single nucleotide
polymorphism typing with invader on PCR amplicons and its automation”. Genome Research.
Vol. 10(3). pp. 330–343. (2000).
13. H. Singh, and K.S. Kaswan. “Clinical decision support systems for heart disease using data
mining approach”. International Journal of Computer Science and Software Engineering. Vol. 5(2).
pp. 19–23. (2016).
14. J.S. Dhatterwal, K.S. Kaswan, and Preety. “‘Intelligent agent based case base reasoning sys-
tems build knowledge representation in Covid-19 analysis of recovery infectious patients’ in
book entitled ‘application of AI in COVID 19’ accepted in Springer series: Medical virology:
From pathogenesis to disease control”. ISBN No. 978-981-15-7317-0. (2020). (e-Book), 978-981-15-
7316-3 (Hard Book). https://doi.org/10.1007/978-981-15-7317- 0.
15. R. Evans.“Optical detection heterogeneously integrated with a coplanar digital microfluidic
lab-on-a-chip platform”. In Proceedings IEEE Sensors Conference. America. pp. 423–426. (2007).
16. N. Jokerst, L. Luan, S. Palit, M. Royal, S. Dhar, M. Brooke, and T. Tyler. “Progress in chip-scale
photonic sensing”. IEEE Transactions on Biomedical Circuits and Systems. Vol. 3(4). pp. 202–211.
(2009).
17. Y. Luo, K. Chakrabarty, and T.-Y. Ho. “A cyberphysical synthesis approach for error recovering
digital microfluidic biochips”. Proceedings Date. Spain. pp. 1239–1244. (2012).
18. Y. Zhao, and K. Chakrabarty. “Digital microfluidic logic gates and their application to built-
in self-test of lab-on-chip”. IEEE Transactions on Biomedical Circuits and Systems. Vol. 4(4). pp.
250–262. (2010).
19. R. Fair. “Digital microfluidics: Is a true lab-on-a-chip possible?” Microfluidics and Nanofluidics.
Vol. 3(3). pp. 245–281. (2007).
20. B. Hadwen, G. Broder, D. Morganti, A. Jacobs, C. Brown, J. Hector, Y. Kubota, and
H.Morgan.“Programmable large area digital microfluidic array with integrated droplet sens-
ing for bioassays”. Lab on a Chip. Vol. 5. pp. 3305–3313. (2012).
21. M. Jebrail, and A. Wheeler. “Let’s get digital: Digitizing chemical biology with microfluidics”.
Current Opinion in Chemical Biology. Vol. 14(5). pp. 574–581. (2012).
22. U. Resch-Genger, M. Grabolle, S. Cavaliere-Jaricot, R. Nitschke, and T. Nann.“Quantum dots
versus organic dyes as fluorescent labels”. Nature Methods. Vol. 3. pp. 763–775. (2008).
34 Cyber Physical Systems
23. R. Sedgewick. Algorithms in C: Graph Algorithms. Boston, MA: Addison-Wesley. Vol. 23. pp.
25–36. (2001).
24. S. Kirkpatrick, C. Gelatt, and M. Vecchi. “Optimization by simulated annealing”. Science, Vol.
220(4598). pp. 671–680. (1983).
25. Y.-L. Hsieh, T.-Y. Ho, and K. Chakrabarty. “A reagent-saving mixing algorithm for prepar-
ing multiple-target biochemical samples using digital microfluidics”. IEEE Transactions on
Computer-Aided Design of Integrated Circuits and Systems. Vol. 31. pp. 1656–1669. (2012).
3
Online Decision-Making-Based Cyber-
Physical Optimization in PCR Biochips
CONTENTS
3.1 Introduction........................................................................................................................... 35
3.2 Online Strategic Planning Cyber-Physical Biochip......................................................... 37
3.2.2 IA-Optimized DNA Amplifying Statistical Modeling....................................... 39
3.3 Optimizing Immediately Adjacent Positioning of Resources........................................ 40
3.3.1 Device-Proximity Constraints on a PCR Biochip................................................. 40
3.3.1.1 Separation Constraints.............................................................................. 40
3.3.2 Goal Equipment Localization Functionality........................................................ 41
3.3.3 Positioning of Equipment on a Biochip PCR........................................................ 41
3.3.4 Machine Positioning Parameter Optimization....................................................42
3.3.4.1 Listing All Conceivable Gadget Arrangements.....................................42
3.3.4.2 Deployment of Computer Simulation Ring-Based Devices.................43
3.4 Deployment of PCR Biosensor Immunoassay Reservoirs..............................................44
3.4.1 Low-Cost Biosensor Electrolytic Rings.................................................................44
3.4.2 Low-Cost PCR Biosensor Particle Sequencing..................................................... 45
3.4.3 Deployment of Virtual Screening Reservoirs....................................................... 45
3.5 Particle Localization Accessibility...................................................................................... 47
3.6 Cyber-Physical and Layout-Aware PCR Biochip.............................................................. 48
3.6.1 Polymerase Chain Probability Monitoring........................................................... 48
3.6.2 PCR Bioelectronics Design and Structure............................................................. 48
3.6.3 PCR Biochip Designing Deficiency Compatibility.............................................. 49
3.7 Conclusion............................................................................................................................. 50
References........................................................................................................................................ 50
3.1 Introduction
A significant constraint for a wide range of genomic bioanalysis is the quantity of physiol-
ogy sample [1–4], namely deoxyribonucleic acid (DNA). For example, during the analysis
of gene quantities of tumor DNA by functional genomic crossbreeding, the procedure
takes hundreds of nanograms of DNA strands to identify the fluorescence. [2]. A signifi-
cant number of DNA strands straight from organic materials is challenging to acquire. The
PCR algorithm is utilized to multiply (faithfully recreate) the original DNA strands [2, 3, 5]
as the first step in this bioanalysis to address this difficulty. The genomic optimization algo-
rithm may be split into three distinct phases based on the kinds of activities involved [6].
DOI: 10.1201/9781003220664-3 35
36 Cyber Physical Systems
One stage is the development of PCR samples. The second stage is an enhancement of
DNA furrows. Following DNA amplification, a third stage involves mixing the DNA fur-
rows with other droplets to detect the amplified furrows’ absorption and hybridization [4].
The second phase consists of the amplification of the DNA furrows.
Digital microfluidic biochips (DMFBs) are widely utilized for economic evaluation and
are feasible for biomolecular interactions. The systems for controlling many PCR processes
on a single chip control system [3]. Droplets on a DMFB may be manipulated by employing
an electrode effect [3, 7, 8], a two-dimensional electrode array. A direct measurement for
the droplet and response time in the investigation may be accomplished with microflu-
idic system sensors like photodetectors and immunofluorescence microscopes [3, 9]. The
DMFB platform offers numerous benefits in implementing PCR in comparison to older
equipment and testers. The whole PCR technique may be implemented smoothly and react
to reduced usage. Short-term results include quick cooling/heating rates and various inte-
gration of processing modules [5, 10]. The complete PCR system may also be decreased in
size and electricity usage.
This is a perfect example. A heater creates a “hot” area and a “cooled” region. Typically,
94ı and 65ı are placed in the heated and chilled areas.
First, “PCR mix” is created on the biochip and is kept in a reservoir, including dNTPs
and MgCl2 Taq template DNA and aqueous reactions buffers. The “PCR mix” droplets are
then combined with the target DNA sequences sampled. The gutter can then be mixed
alternately [3, 7]. There are two stages to each thermal cycle: one to heat the droplet, divid-
ing into two strands of the double-stranded DNA inside the droplet known as “DNA
melting,” and the other to cool the droplet. Every strand of the DNA recognition site for
manufacturing “primary annealing” of new DNA strands. This allows for millions of cop-
ies of the original DNA strands [3]. As fluorophores mark the amplified DNA strands in
the droplets, the target DNA strands may be generated by monitoring their fluorescence
intensity at each PCR cycle using the assistive technologies of microfluids [4–6].
Some biochips are integrated with the detecting electrodes (DEs). [11–14] to allow on-
chip hybridization of amplified DNA. The surface of these DEs is manufactured using
golden sensors with various immobilized DNA samples [11, 13]. The droplets containing
the DEs are left immobile in expanded nucleotide bases following the PCR process. DNA
hybridization happens when complementing strands are the PCR amplification strands
and the samples are immobilized on the detectors. DNA fragments can therefore be exam-
ined in the amplified DNA strands.
Despite several advantages, there are four limitations in the earlier work on PCR imple-
mentation for DMFBs:
• The function modules utilized in the PCR three-stage process are created in all
previous works by themselves [3, 7], and the same design cannot be combined
effectively. This inability of the three steps often influences the accuracy and effec-
tiveness of the entire immunoassay.
• Bioanalysis is not regarded to be inherently random and complicated. When the
droplet is delivered to the biochip, the droplet cannot contain enough PCR DNA
(called a “vacuum droplet”) [15]. The biochips built for earlier work cannot control
the presence of empty droplets; therefore, the wasteful execution of the PCR can-
not be stopped.
• In earlier work, there was no consideration of interference (electric, thermal,
optical, fluid) with biochip devices arising because of the nearness effects. High
Cyber-Physical Optimization in PCR Biochip 37
temperatures surrounding the heater, for example, can lead to biological sample
degradation in a reservoir [16]. Therefore, they cannot be positioned too near each
other for the heater and the pool.
• The mixing schedule is unknown for the previously developed PCR biochips [6].
In combining procedures, this might cause excessive transport of droplets during
the PCR reaction, adversely influencing the biochip’s performance and speed.
It offers the first design technique, which optimizes the cyber-physical, digital biochip
PCR method to resolve the short remarks mentioned previously. This work has the follow-
ing significant contributions:
• A statistical model for gene delivery is utilized to detect if the droplet contains
enough DNA strands to perform the PCR to solve the challenge of empty droplet
detection. The luminous intensity measured by photodetectors (PDs) [17–19] or by
a fluorescence microscope is retrieved by the system online in order to determine
whether the heat cycles can be continued or not. This enables us to develop an
effective PCR biochip for cyber-physics on a DMFB platform.
• Suggestion for developing a technique of designing, which includes reservoirs,
sensors, and thermal units, taking the interference between the on-chip parts into
account. A heuristic approach reduces the biochip size and electrode count and
meets proximity requirements.
• The positioning of modules considers the time costs of the transit of droplets and
the PCR biochip fault tolerance. The total mixing/mixing/dilution duration is
adjusted for a particular bioassay, and a droplet routing mechanism is devised
to circumvent electrode errors. Table 3.1 presents the timeline for the historical
development of biosensors.
The visibility of outlets for cyber-physical biochips in the sensor module is explored.
Mixing is planned to guarantee that the sensor system can monitor the droplets from top
and side perspectives in real time.
TABLE 3.1
Development of Biosensors in Different Timelines
Year Development of biosensor
1906 M. Cramer observed electric potential arising between parts of the fluid [20]
1909 Soren Sorensen developed the concept of pH and pH scale [21]
1909 Griffin and Nelson were the first to demonstrate the immobilization of the enzyme invertase on
aluminum hydroxide and charcoal [4, 22]
1922 W.S. Hughes discovered a pH measurement electrode [23]
1956 Leland C. Clark, Jr invented the first oxygen electrode [8]
1962 Leland C. Clark, Jr et al. experimentally demonstrated an amperometric enzyme electrode for
detecting glucose [9]
1967 Updike and Hicks realized the first functional enzyme electrode based on glucose oxidase
immobilized onto an oxygen sensor [10]
1969 Guilbault and Montalvo demonstrated and reported the first potentiometric enzyme electrode-based
sensor for detecting urea [11]
1970 Discovery of ion-sensitive field-effect transistor (ISFET) by Bergveld [24]
1973 Guilbault and Lubrano defined glucose and a lactate enzyme sensor based on hydrogen peroxide
detection at a platinum electrode [12]
1974 K. Mosbach and B. Danielsson developed an enzyme thermistor [13]
1975 D.W. Lubbers and N. Opitz demonstrated fiber-optic biosensors for carbon dioxide and oxygen
detection [14]
1975 First commercial biosensor for glucose detection by YSI [25, 26]
1975 Suzuki et al. first demonstrated a microbe-based immunosensor [27]
1976 Clemens et al. demonstrated the first bedside artificial pancreas [15]
1980 Peterson demonstrated the first fiber-optic pH sensor for in vivo blood gases [28]
1982 Fiber-optic biosensor for glucose detection by Schultz [29]
1983 Liedberg et al. observed surface plasmon resonance (SPR) immunosensors [19]
1983 Roederer and Bastiaans developed the first immunosensor based on piezoelectric detection [30]
1984 First mediated amperometric biosensor: ferrocene used with glucose oxidase for glucose
detection [18]
1990 SPR-based biosensor by Pharmacia Biacore [28]
1992 Handheld blood biosensor by i-STAT [28]
1999 Poncharal et al. demonstrated the first nano biosensor [31]
2018 S. Girbi et al. demonstrated a nerve-on-chip-type biosensor for assessment of nerve impulse
conduction [32]
density of the DNA strands in the biological sample. The number of DNA strands in a
droplet is therefore obtained from [15, 20]:
lk
P ( Xc = k ) » e -l
k!
Where k is the quantity of droplet nucleotide bases, and the overall amount of droplet
DNA strands is obtained [15, 20].
The process of PCR cannot be adequately performed when a droplet exceeds a modest
boundary amount of DNA strands [21]. Droplets containing low DNA strands are called
“empty droplets.” If after the PCR completion, empty droplets are identified, the time spent
operating the heat cycles is squandered. The output signals from the sensors included in
the biochip may be used to investigate this issue to decide online if the droplet is empty.
In the course of the PCR, as stated in [6, 7], on-chip detectors can assess the strength of
Cyber-Physical Optimization in PCR Biochip 39
photoluminescence in the droplets. If the chance of “the droplet being blank” is high, the
droplets will be rejected. A fresh droplet for PCR amplification will then be delivered onto
the biochip.
The next part provides prediction algorithms for PCR bioassay to develop an online
decision-making system.
P ( G ∩ Ak ) = Õ (1 - p ) × P (G )
i =1
i
If at the kth thermal cycle, no signal is detected, the posterior distribution of “the excellent
droplet” (represented as P.G jAk/) will be set as a quotient with G and Ak joint probabili-
ties and Ak likelihood:
P ( G∩ Ak )
P ( G | Ak ) =
P ( Ak )
P ( G∩ Ak )
=
P ( G∩ Ak ) + P Gc ∩ Ak ( )
k
where P ( G∩ Ak ) = Õ (1 - p ) × P (G ) and P (G ∩ A ) = P (G ) = 1 - P (G ) .
i =1
i
c
k
c
Therefore, we have:
Õ (1 - p ) × P (G ) i
P ( G | Ak ) = k
i =1
Õ (1 - p ) × P (G ) + 1 - P (G )
i =1
i
1 - P (G )
(
P Gc | Ak = ) k
.
Õ (1 - p ) × P (G ) + 1 - P (G )
i =1
i
40 Cyber Physical Systems
3.3.1.1 Separation Constraints
• Restoration tank: The segregation connecting the two tanks should not be smaller
than an LRR [22] threshold to prevent fluidic leaking among them. A typical LRR
value is four times the circuit length on the DMFB [4].
• DE to DE disconnection: If the DEs are too near together, the immobile droplets
may have unwanted intercontamination. The separation from two DEs should
thus not be smaller than the maximum LDD value. A standard LDD value is the
dielectric quantity of four times the size of the DMFB.
• DE separation reservoir: Fluids put into repositories may have luminous labels,
affecting precision in the microscope when evaluating the concentration of the lumi-
nous DE [11]. Furthermore, the droplets sprayed from the reservoir may destroy
crops to the surfaces of the DE if a DE and a pool are positioned near together. The
distance between them should thus not be smaller than an LRD threshold. A stan-
dard LRD value is five times the conductor length on the DMFB [18].
• Heater separation tank: As heating can degenerate the tissue material and the
reagents placed into tanks [16], no less than a criterion LRH should have been the
length between that and storage and the burner. A standard LRH value is five
times the electrode length on the DMFB [3].
• DE for separating heaters: The heaters on the cybernetic implants cannot intersect
with a DE on the biochip due to the manufacturing process limitation [23]. The
distance from the DE to the heater must thus not fall short of the electrode length.
The spacing from a DE to a heater must be LDH 1.
For simplicity, we create an operator C, which corresponds to the necessary base station
between a pair of gadgets randomly chosen (represented as da and db):
For example, if DE is represented by da, and a heater is represented by db, then C ( da , db ) = LDH .
For instance, if the dais DE and the DB heaters are C.da;db/D LDH.
Cyber-Physical Optimization in PCR Biochip 41
In a PCR biochip configuration for all the components (written as: x1;y1/, X2;y2/;::,.xn
;yn/), we shall define the parameters of ::;..xn;yn/ in order to define the configuration.
( xi - x j ) + ( y i - y j ) ³ C ( di , d j ) , "i, j.
2 2
• The maximum deviation between the heater and the biochip containers. As the heater
has a positive temperature coefficient, the specimens in the reservoirs might degrade.
If the limitation on the base station between the storage tanks and the heater is not
broken, the liquid can be overheated in the storehouses. But it is better to put the reser-
voir as far as feasible from the heaters to further protect the integrity of the physiologi-
cal samples in the reservoir. Assuming that all Nr repositories may be marked as xr1;
yr1/,xr2;yr2/;::;xrNr; year/ in dimensions for a particular gadget deployment result G,
and the heater co-ordinates are Xh;yh/. The defined distance here between the heater
and the tanks may therefore be calculated as follows:
Nr 1
å é( x r - x h ) 2 + ( y r - y h ) 2 ù 2
êë i i úû
Davg = i =1
.
Nr
The mathematical formulation for biochip design optimization (F.G/) may be calculated as
follows for the given equipment placing outcome G:
b
F ( G ) = aArea +
Davg ( G )
Where alignment and alternate weighting are user-determined characteristics that may
be modified to take into account the comparative value of each measure. If F.G1/<F.G2/,
G1 shall be seen as positive performance in two device deployment outcomes, G1 shall be
regarded for G1 and G2.
• Commonly, the design of an e-fluidic digital biochip design and a 2D range with
the same electrodes. We may thus assume that the electronics and electrodes
remain at integer data points alone.
42 Cyber Physical Systems
As each gadget pair might have a different limitation on the separating pacing of each
device, the entire computational complexity may be vast, and we assume that it’s an
NP-hard issue to discover a minimal area layout [24]. This part proposes a greedy approach
based on an iterative process for developing our design tool.
The PCR pattern should be created on a “digital plane” with all coordinated integer points.
The digital planes can be numerically expressed as Z2, where Z is an arithmetic setting. A
“digital point” in Z2 is believed to be positioned in the middle of each portable computer.
When DA and DB are put on the chip for connected devices, we draw a circle with C.da;
DB/ radius centering da. The area inside the ring is described da as the “forbidden area”
of DB. All electrodes, which overlap permanently or temporarily with the prohibited area
of DB, are denoted as O.da; DB. Note that in a collection of visual points, the O.da; DB/
may be seen as the “digital object” in Z2 [25]. The digital item that matches the heating is
indicated.
In other words, when the reservoir is located on the body or outside the physical prod-
uct of the heater, the appropriate separation requirement is fulfilled for the pools and the
heating element. All components must be positioned as near as possible to reduce the chip
area. An example of a correct and compacted positioning of R2 in the vicinity of H, DE D1,
and R1. This is a digital object with the isostatic convex envelope fiction of three prohibited
areas (H, D1, and R1, respectively, regarding R2). Please note that the R2 tank should not be
placed in this item for the proper context; it should be positioned as carefully as possible
for its compaction to reduce the whole surface area of the chip, including all of the compo-
nents. All PCR biochip equipment are included in the ready queue, Qdev, during the first
step of device installation. Device stacking is random in Qdev.
This technique for placing a device is shown in Figure 5.3b, where a new R2 reservoir
may be appropriately positioned in the context of an H, DE D1, and an R1 pool. We also sup-
pose that the heater is the first step in our algorithms at the beginning of the construction.
We selected the gadget from the head of the resource provisioning Dev. for every suc-
cessive stage. In all previous versions, the gadget has been well positioned in terms of its
capabilities.
• The results of placing in a particular sequence may be determined from the placer
of the devices that fulfill all the limitations on the closeness of the instrument.
Suppose we have no distinctive reservoirs, no distinctive DEs, and Nh heaters.
The amount of feasible job scheduling including all equipment (i.e., the number
of decision variables for PCR biological chip deployment) is therefore shown by:
( N r + N d + N h )! .
Nr ! Nd ! Nh !
• We may use two different techniques to pick the “best” option based on the pro-
vided objective functions.
• As a result of its high manufacturing costs, just a few EDs are incorporated into a
biochip, and only a single refrigerating module is enough. In a standard mixing
Cyber-Physical Optimization in PCR Biochip 43
The sampling number from Œ0;1 is where n is the instrument size to be adjusted and the
genes i/ I’ve been 1 to n). The device i’s precedence value is set to Pdev.i/D gene.i/.
The focus on process thinking lists all devices generated by sorting the priority values.
The placer of the device then introduces a work placement that can be created using any
chromosome to meet the nearness restrictions.
4n chromosomes are produced haphazardly at the commencement of the GA-based
method. The heuristic method takes into account the following techniques called:
• Reproduction. The chromosome that matches the lowest cost value is transmitted
to the following generation.
• Crossover. Two-parent chromosomes are selected randomly from the aging pop-
ulation during the crossover operation. In the following manner, the offspring
chromosome is produced. The gene of the chromosome’s offspring can be either
replicated from the parent chromosomal gene. The likelihood of gene inheritance
i/ in the father and mother is determined by P and 1 P correspondingly. The chro-
mosomes of the future generation’s kids are being examined by the civilization
breeding them.
• Mutation. The population’s new chromosome is haphazardly produced to ensure
population variety.
The set of chromosomes in each generation remains 4n in the GA-based heuristic. In the
evolutionary process, the n best chromosomes are replicated into the next generation, the
chromosome equivalent to the most minor and cost density function. In the initial demo-
graphics, the original population developed 2n chromosome, and unpredictable media
generated an additional n genetic material. This % can be further enhanced by testing.
After multiple decades of development, the lowest-cost chromosome is selected from the
final subpopulation. The solution for positioning the gadgets is built using the chromo-
somal set. In the framework of a specific PCR procedure, we discuss how to improve drop-
lets’ transit and mingling.
44 Cyber Physical Systems
FIGURE 3.1
Working of PCR biosensor.
Cyber-Physical Optimization in PCR Biochip 45
pathways, and the two drops must be combined. The travel trajectories of these two
droplets are transformed when a fault exists on the pattern. Therefore, the PCR bio-
chip may perform bioassays with an alternate droplet travel path, notwithstanding the
defect.
Definition 1. Suppose a set of pools is present, SR D fRn1, Rn2, Rn3, Rnk g, and they
are all arranged on a circle of electrodes. Pairs Rni and Rnj (n1 ni < nj nk), where
the electrode route P.Rni; Rnj / travels through the Ri and Rj output ports, have
“relatives” in the SR, and on this cathode route, there is no output port of other SR
reservoir configured.
Definition 2. Rnj will be the “neighbor counterclockwise” of Rni if you move from
Rni to Rnj along the P.rni; Rnj/electrode route in a clockwise manner. Rnj is the
“neighbor” against the clock in Rni, otherwise.
The following is an example. The histogram may be broken down into five major groups
of mixing. An indifference curve can indicate the link between these mixing groups. A
reservoir symbolizes each node in the network; when the same cluster has two pools,
the edge between node pairs matching those of storage tanks is provided. In the related
unspoken graph, each gout contains two alternative routing instructions, like low-cost bio-
chips’ electrode ring. If there are two fundamental mixing groupings in a reservoir, drop-
lets that have been discharged from the storage tank cannot be employed simultaneously
in all these clusters during mixing. Therefore, the undirected graph removes a portion of
the connections such that every node has no more than two parameters. The following
guess is as follows: Conjecture 5.1. Suppose that GC reflects the mixing ratio of the clusters
in a bioassay, but partial derivatives are in each node in GC. Then we can always position
the reservoir on the ring of the electrodes so that every pair of pools among them may be
placed next door.
When there is a rim between them, we position Rni as the neighbor of Rnj for two reser-
voirs Rni and Rnj. As mentioned above, there are two neighbors for each reservoir on the
electrode rings: clockwise, outwards, and anti-clockwise. If another pool is in Rnj’s nearby
places (e.g., clockwise neighbor), we place Rni in an empty location. Notice that each edge
is not beyond two borders; therefore, no additional reservoirs occupy both neighboring
areas of Rnj.
Operational planning: The sequencing of activities may be established based on the
sequenced network once the storage allocation phase has been finished. As activities may
take place locally without long-distance transfer in each core mixing cluster, transactions
can be done simultaneously in several groups. The planning of activities within the depen-
dency among outputs and inputs might be predicated on the same clustering [28].
At the beginning of the bioassay, procedures included with the fundamental blending
groups are conducted. After the blending cluster activities are done, more operations are
performed. For example, M1 and M3 are in the entire cluster’s mixture in Figure 5.4 R1;
R4/. After cluster procedure. R1; R4/ when done, one of the clusters. R1; R4/output droplets
are mixed with M8-Droplet R2, cluster output droplets. Cluster R1; R4/. In operation, M9,
R2, R4/ will be combined. The programming of all the hydraulic steering action may be
obtained from this technique in the sequencing graph.
Cyber-Physical Optimization in PCR Biochip 47
ì0, if i < N
ï
ï
pi = í p * ´2i - N , if N £ i £ N - log 2 p *
ï
ïî1, if N - log 2 p* < i
For each PCR biochip, a non-catastrophic flaw is randomly inserted into the biochip, and
the measurement duration is then calculated. The defective insertion simulation has been
carried out for all potential non-catastrophic faults in the layout—the accurate tempera-
ture and confidence interval for the performance of bioassays on defective biochips. The
tm value is set to 0.1. The proportion of electrodes with disastrous faults ranges from 33.3%
to 52.3% from the table. The PCR biochip may be employed by graceful degradation with
27.267% increase in the execution duration of bioassay with just the existence of a single
non-catastrophic flaw.
3.7 Conclusion
These chapters have shown that fundamental in liquid operations, such as supply and
temperature cycling, notwithstanding the uncertainties, cyber-physical connectivity in
digital microfluidics may be employed for reliable bioassay on the chip. In response to data
provided by sensors, the suggested design method allows dynamic, informed decisions
online for the ending of heat cycles. We have also launched new device arrangements and
arrangement designs to protect the array from undesired device noise and interference,
minimize conflicts in droplets’ routing, and decrease bioassay runtime. Droplet transpar-
ency is also addressed during the planning of liquid activities in the monitoring program.
The simulated data from lab procedures show that the suggested design approach may
obtain significant dependability and fault tolerance with reduced chip sizes and electrode
counts.
References
1. Y. Luo, B. Bhattacharya, T.-Y. Ho, and K. Chakrabarty. “Optimization of a polymerase chain
reaction on a cyber physical-digital microfluidic biochip”. In Proceedings IEEE/ACM International
Conference on Computer-Aided Design. pp. 622–629. (2013).
2. J. Lage, J. Leamon, T. Pejovic, S. Hamann, M. Lacey, D. Dillon, R. Segraves, B. Vossbrinck, A.
González, D. Pinkel, D.G. Albertson, J. Costa, and P.M. Lizardi. “Whole-genome analysis of
genetic alterations in small DNA samples using hyperbranched strand displacement amplifi-
cation and array-GH”. Genome Research. Vol. 13(2). pp. 294–307. (2003).
3. J. Berthier. Micro-Drops and Digital Microfluidics. Norwich, NY: William Andrew. Vol. 6. pp.
633–640. (2008).
4. I. Erill, S. Campoy, J. Rus, L. Fonseca, A. Ivorra, Z. Navarro, J. Plaza, J. Aguilo, and J. Barbe.
“Development of a CMOS-compatible PCR chip: Comparison of design and system strategies”.
Journal of Micromechanics and Microengineering. Vol. 14(11). pp. 1–10. (2004).
5. C. Zhang, and D. Xing. “Miniaturized PCR chips for nucleic acid amplification and analysis:
Latest advances and future trends”. Nucleic Acids Research. Vol. 35(13). pp. 4223–4237. (2007).
6. D. Brassard, L. Malic, C. Miville-Godin, F. Normandin, and T. Veres. “Advanced EWOD-
based digital microfluidic system for multiplexed analysis of biomolecular interactions”. IEEE
International Conference on Micro Electro Mechanical Systems (MEMS). Vol. 3. pp. 153–156. (2011).
7. D. Jary, A. Chollat-Namy, Y. Fouillet, J. Boutet, C. Chabrol, G. Castellan, D. Gasparutto, and C.
Peponnet. “DNA repair enzyme analysis on EWOD fluidic microprocessor”. Proceedings of the
NSTI-Nanotechnologies Conference. Vol. 2. pp. 554–555. (2006).
Cyber-Physical Optimization in PCR Biochip 51
8. K. Chakrabarty, and F. Su. Digital Microfluidic Biochips: Synthesis, Testing, and Reconfiguration
Techniques. Boca Raton, FL: CRC Press. (2006).
9. Y. Luo, K. Chakrabarty, and T.-Y. Ho. “Dictionary-based error recovery in cyber-physical digi-
tal-microfluidic biochips”. In Proceedings IEEE/ACM International Conference on Computer-Aided
Design. pp. 369–376. (2012).
10. R. Liu, J. Yang, R. Lenigk, J. Bonanno, and P. Grodzinski. “Self-contained, fully integrated bio-
chip for sample preparation, polymerase chain reaction amplification, and DNA microarray
detection”. Analytical Chemistry. Vol. 76. pp. 1824–1831. (2004).
11. L. Malic, T. Veres, and M. Tabrizian. “Detection of DNA hybridisation on a configurable digital
microfluidic biochip using SPR imaging”. International Conference on Miniaturized Systems for
Chemistry and Life Sciences. Vol. 5. pp. 829–831. (2008).
12. L. Malic, T. Veres, and M. Tabrizian. “Two-dimensional droplet-based surface plasmon res-
onance imaging using electrowetting-on-dielectric microfluidics”. Lab on a Chip. Vol. 9. pp.
473–475. (2009).
13. J.S. Dhatterwal, K.S. Kaswan, and Preety. “Intelligent agent-based case base reasoning systems
build knowledge representation in Covid-19 analysis of recovery infectious patients” in a book
entitled “application of AI in COVID 19” accepted in Springer series: Medical virology: From
pathogenesis to disease control. (2020). (e-Book), 978-981-15-7316-3 (Hard Book). https://doi.org
/10.1007/978-981-15-7317- 0.
14. S. Koster, F. Angile, H. Duan, J. Agresti, A. Wintner, C. Schmitz, A. Rowat, C. Merten,
D.Pisignano, A. Griffiths, and D. Weitz. “Drop-based microfluidic devices for encapsulation of
single cells”. Lab on a Chip. Vol. 8(7). pp. 1110–1115. (2008).
15. R. Daniel, M. Dines, and H. Petach. “The denaturation and degradation of stable enzymes at
high temperatures”. Biochemical Journal. Vol. 317(1). pp. 1–11. (1996).
16. F. Ji, M. Juntunen, and I. Hietanen. “Evaluation of electrical crosstalk in high-density photodi-
ode arrays for X-ray imaging applications”. Nuclear Instruments and Methods in Physics Research.
Vol. 610(1). pp. 28–30. (2009).
17. R. Evans. “Optical detection heterogeneously integrated with a coplanar digital microfluidic
lab-on-a-chip platform”. Proceedings IEEE Sensors Conference. Vol. 9. pp. 423–426.
18. S. Koester, L. Schares, C. Schow, G. Dehlinger, and R. John. “Temperature-dependent analy-
sis of Ge-on-SOI photodetectors and receivers”. In IEEE International Conference on Group IV
Photonics. Vol. 6. pp. 179–181. (2007). (2006).
19. C. Zhang, and D. Xing. “Single-molecule DNA amplification and analysis using microfluid-
ics”. Chemical Reviews. Vol. 110(8). pp. 4910–4947. (2010).
20. D. Woide, A. Zink, and S. Thalhammer. “Technical note: PCR analysis of minimum target amount
of ancient DNA”. American Journal of Physical Anthropology. Vol. 142(2). pp. 321–327. (2010).
21. J. Webster, M. Burns, D. Burke, and C. Mastrangelo. “Monolithic capillary electrophoresis device
with integrated fluorescence detector”. Analytical Chemistry. Vol. 73(7). pp. 1622–1626. (2001).
22. U.-C. Yi, and C.-J. Kim. “Soft printing of droplets pre-metered by electrowetting”. Sensors and
Actuators Part A: Physical. Vol. 114(2–3). pp. 347–354. (2004).
23. M. Garey, and D. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness.
W.H. Freeman & Company. Vol. 12. pp. 45–60. (1979).
24. P. Bhowmick, A. Biswas, and B. Bhattacharya. “ICE: The convex aesthetic envelope of a digital
object”. In International Conference on Computing: Theory and Applications. pp. 219–223. (2007).
25. S. Roy, B. Bhattacharya, P. Chakrabarti, and K. Chakrabarty. “Layout-aware solution prepara-
tion for biochemical analysis on a digital microfluidic biochip”. In Proceedings IEEE International
Conference on VLSI Design. pp. 171–176. (2011).
26. Y. Luo, K. Chakrabarty, and T.-Y. Ho. “Design of cyber-physical digital-microfluidic bio-
chips under completion-time uncertainties in fluidic operations”. In Roc. IEEE/ACM Design
Automation Conference. pp. 44–50. (2013).
27. Y.-L. Hsieh, T.-Y. Ho, and K. Chakrabarty. “Design methodology for sample preparation on
digital microfluidic biochips”. In IEEE International Conference on Computer Design. pp. 189–194.
(2012).
52 Cyber Physical Systems
28. P. Paik, V. Pamula, and R. Fair. “Rapid droplet mixers for digital microfluidic systems”. Lab on
a Chip. Vol. 3(4). pp. 253–259. (2003).
29. P. Paik, V. Pamula, M. Pollack, and R. Fair. “Electrowetting-based droplet mixers for microflu-
idic systems”. Lab on a Chip. Vol. 3(1). pp. 28–33. (2003).
30. E. Bolton, G. Sayler, D. Nivens, J. Rochelle, S. Ripp, and M. Simpson. “Integrated CMOS photo-
detectors and signal processing for very low-level chemical sensing with the bioluminescent
bioreporter integrated circuit”. Sensors and Actuators Part B, Chemical. Vol. 85(1–2). pp. 179–185.
(2002).
31. Preety, K.S. Kaswan, and J.S. Dhatterwal. “Securing big data using big data mining”. In Data
Driven Decision Making Using Analytics. UK: Taylor Francis, CRC Press, 2021.
32. Y.-L. Hsieh, T.-Y. Ho, and K. Chakrabarty. “A reagent-saving mixing algorithm for prepar-
ing multiple-target biochemical samples using digital microfluidics”. IEEE Transactions on
Computer-Aided Design of Integrated Circuits and Systems. Vol. 31. pp. 1656–1669. (2012).
4
Security and Privacy Aspects of
Cyber Physical Systems
Chhavi Sharma
CONTENTS
4.1 Introduction........................................................................................................................... 53
4.2 Characteristics of CPS..........................................................................................................54
4.2.1 Embedded Systems...................................................................................................54
4.2.2 Real-Time Systems.................................................................................................... 55
4.2.3 Network Protocol...................................................................................................... 55
4.3 General Architecture of Cyber Physical Systems............................................................. 56
4.4 Defining Security and Privacy............................................................................................ 56
4.4.1 Cyber Security and Privacy..................................................................................... 57
4.4.2 Physical Security and Privacy................................................................................. 57
4.5 CPS Vulnerabilities, Threats, Attacks, and Failure.......................................................... 57
4.5.1 CPS Security Threats................................................................................................ 57
4.5.1.1 Cyber Threats............................................................................................. 58
4.5.1.2 Physical Threats......................................................................................... 59
4.5.1.2.2 Loss.............................................................................................................. 59
4.5.2 CPS Vulnerabilities................................................................................................... 60
4.5.2.1 Reasons of Vulnerabilities........................................................................ 60
4.6 Generalized Attacker and Attack Models for Cyber Physical Systems........................ 61
4.6.1 Limitations of Cyberattack Models........................................................................ 62
4.7 Security and Privacy in CPSs.............................................................................................. 62
4.7.1 Privacy in Cyber Physical Systems.........................................................................63
4.7.2 Security in Cyber Physical Systems.......................................................................63
4.8 Conclusion.............................................................................................................................63
References........................................................................................................................................64
4.1 Introduction
Cyber physical systems (CPS-type receptor) play an important role in the sector of the
Internet of Things (IoT) and Industry-v4.0. The CPS allow intelligent application and ser-
vices, in order to properly function, in real time. The integration of cyber physical systems
for the exchange of different types of data and the confidentiality of the information in real
time [1]. The CPS receiver is a network of in-house systems. This is a network of internal
systems, which interact with the physical inputs and outputs. The CPS-type receiver has
three main components: sensors, collectors, and actuators. The CPS is the backbone of
DOI: 10.1201/9781003220664-4 53
54 Cyber Physical Systems
TABLE 4.1
CPS Description and Classification
Naming Classification Description
the patient's ability to respond to new conditions. The CPS-type receivers, the system can
bring the environment to adapt to and monitor the physical world [2–, 13] (Table 4.1).
The CPS-type receiver systems are widely used in many fields [photo 1]. The CPS-type
receiver systems, communication systems, for example, the power transmission sys-
tems, communication systems, agricultural/environmental management systems, mili-
tary systems [7, 8], and the autonomic system (the system for unmanned aerial vehicles,
robotics, autonomous vehicles, etc.) [9, 10]. The CPS-type receiver can be used in the
health care system in order to improve the quality of health care [11], and a supply chain
management system is to provide an eco-friendly, reversible, cost-efficient, and safe pro-
duction process.
The CPS receiver system is heterogeneous in nature. The CPS-receiver systems, the con-
fidence of a personal and confidential information. The CPS-type receiver system has a
wide range of locations. The system is subjected to physical security threats, attacks, and
challenges.
4.2 Characteristics of CPS
The recipient of the CPS type consist of in-house systems, real-time systems, networks,
and control theory.
4.2.1 Embedded Systems
The internal systems of several computers to interact directly with the physical world (sen-
sors, actuators, or actuators) need the CPS-type receiver system with limited resources.
They don’t have the total computational power of classical computers. In some of our inter-
nal systems, while work experience is not running, the operating system, but it is just that
you are working inside the program. The firmware may not be modified or deleted by the
end user without the need to use special programs and remains in the unit, irrespective of
whether it is on or off.
Cyber physical systems, which allow for the monitoring and control of complex physical
processes with the help of a computer and the IoT technology are becoming increasingly
relevant in the major application areas, including manufacturing automation and smart
cities.
Security and Privacy Aspects of CPS 55
4.2.2 Real-Time Systems
Real-time systems is that the system is real-time, which means that the system is subjected
to real time, that is, the answer is, they can’t guarantee that, within a specified time, the
system needs to comply with the time limit referred to in it. For example, flight control
system, real-time displays, etc.
4.2.3 Network Protocol
A formal language is compulsory for the communication between the transmitter. For
speech, in order to be effective, it is important to agree on a common language between the
two of communicating with people. This means that language is an important part that
will give the necessary rules of social communication.
The task is to turn on the unit, the unit of communication, that is, the general provisions
laid down in the series and to the feedback. This is where some of the protocols come into
play. It defines a set of rules that are required for the communication to work as expected
(Figure 4.1).
FIGURE 4.1
CPSs are used in multiple domains.
56 Cyber Physical Systems
FIGURE 4.2
Architecture of cyber physical systems [12].
Security and Privacy Aspects of CPS 57
4.5.1.1 Cyber Threats
The information technology threats: The main focus is in the area of industrial security on
the internet was to focus on cyber threats, rather than a natural hazard.
Cyber security can’t be assessed; however, we can analyze it from different points of
view, as shown in Tables 4.2and Table 4.3.
Some of the threats in the context of CPS, the type of recipients include:
TABLE 4.2
Different Perspectives of Evaluating Cyber Security
Cyber security perspectives Description
Centering information Requires protecting the data flow during the storage phase, the transmission
phase, and even the processing phase.
Oriented function Requires integrating the cyber-physical components in the overall CPS.
Oriented threat Impacts data confidentiality, integrity, availability, and accountability.
TABLE 4.3
Different Threats in CPSs
Wireless exploitation It requires knowledge of the system’s structure, and thus, exploiting its wireless
capabilities to gain remote access or control over a system or possibly disrupt the
system’s operations. This causes collision and/or loss of control.
Jamming In this case, attackers usually aim at changing the device’s state.
Reconnaissance This results in violating data confidentiality due to the limitation of traditional
defenses.
Disclosure of Hackers can disclose any private/personal information through the interception of
information communication traffic using wireless hacking tools violating both privacy and
confidentiality.
Unauthorized access Attackers try to gain an unauthorized access through either a logical or physical
network breach and to retrieve important data, leading to a privacy breach.
Interception Hackers can intercept private conversations through the exploitation of already
existing or new vulnerabilities leading to another type of privacy and
confidentiality breach.
GPS exploitation Hackers can track a device or even a car by exploiting (GPS) navigation systems,
resulting in a location privacy violation.
Information gathering Software manufacturers covertly gather files and audit logs stored on any given
device in order to sell this huge amount of personal information for marketing
and commercial purposes in an illegal manner.
Security and Privacy Aspects of CPS 59
FIGURE 4.3
Threats associated with CPSs.
3. Service disruption or denial: Uninterrupted or error-free, that the store will attack
the physical can affect the device to the break of work, the services, or to modify
the configuration. These are serious consequences, especially in the case of medical
applications.
4. Tracking: Due to the nature of the device is a physical person can receive in this unit,
and/or even their age (Figure 4.3).
4.5.1.2 Physical Threats
Recently developed industries, the emergence of Innovative Metering Infrastructure (s),
and the Country Network (Finance), as well as the storage yards of the monitoring and
management, the dependability of the CPS, type of receiving antenna to the branch offices
[13] all contribute to the widespread adoption of the CPS-type receiver. In fact, the natural
hazards can be classified into the following three main factors:
4.5.1.2.1 Physical Damage
A variety of systems like the power grid, power station, base station are well-operated
and well-protected, to implement a security mechanism that is based on access control,
authorization, and authentication mechanisms, for example, the username and password,
and maps, in the field of biometrics and video surveillance. Stations, which are the power
lines, are the target of sabotage, attacks, and disruptions. The smart meter, and the delicate
hot-sensors [11]. It’s hard to get involved with the smart meter. Smart meters need to be
constantly hacking the fullest possible information. Physical disruption of the peace and
larceny on the side of the combatants, and not only to carry out. There are ways to lessen
the blow of the danger; however, the impact of the risk can be reduced.
4.5.1.2.2 Loss
Aggressive, toxic threat in the event of a power substation failure is that there is a possibil-
ity of a complete shutdown of the large major cities, and within a few hours, the intelligent
network is severely degraded [12].
4.5.1.2.3 Repair
The repair may be based on a self-healing process [14]. A self-healing process, which is
based on the strength or sensation, interference with, or failure to isolate the issue and
to alert the appropriate system to auto-configure the backup resources in a continuous
60 Cyber Physical Systems
4.5.2 CPS Vulnerabilities
In this section, we are going to present you the most important vulnerabilities of the CPS
receiver, which may be the subject of the above-mentioned threats. Frankly speaking, it
refers to the inability to fight against the enemies of the environment.
Analysis involves the identification and analysis of the weak points of the system
that make the use of the CPS receiver. It also includes the identification of appropri-
ate corrective and preventive measures to reduce, mitigate, or eliminate any potential
vulnerabilities [15].
Table 4.4 gives a brief description of the vulnerability of the CPS receiver.
4.5.2.1 Reasons of Vulnerabilities
The vulnerabilities occur for many reasons:
Assumption and isolation: Probably also in the system, the challenge is to create a
reliable and secure operating system, with a view for the implementation of any
necessary service, provided that there is a system in isolation from the rest of the
world.
Increasing connectivity: Increasing the connection, the receiver, as the CPS is now
more connected to each other, and there is no guarantee that the software on these
devices is a free vulnerabilities that could be exploited by a hacker. In most of the
cases, the users and manufacturers address the CPS-type receiver connectivity,
which is “install and forget” devices, which makes the potential security vulner-
abilities in software accessible to the internet for many, many years to come. This
is a type of risk which increases the risk that the system will have to be a victim to
safety and security breaches.
Heterogeneity: Heterogeneity of the components of the third-party sites is cooked
and presented in the CPS, the type of recipients for the creation of applications,
TABLE 4.4
Brief Description of CPS Vulnerabilities
Category Description Examples
the CPS, the type of recipients. This diversity, in the end, it will increase the attack
surface of the smart grid, and possibly increase vulnerability. Each of the hetero-
geneity of the components is subject to various security issues.
USB usage: Usage of USB is the main reason for the vulnerability of the CPS receiver.
Anyone who knowingly distributes USB flash drives infected with malware that
monitors a user’s file system and network activity. Any gamer using a CPS system
is vulnerable to the infection. Consequently, the thought, in and to the USB port.
Then it was wired into a hub, from which it branched out to other devices for
usage and duplication.
Bad practice: A bad experience in the first place because of the lack of encryption/
knowledge, which causes the execution of a code in an endless loop will be very
easy to modify to an attack.
Spying: The receiver, which the CPS is under the attack of the spying/espionage, pri-
marily, the use of spyware (malware) forms secretly enter and remain undetected
for many years, and it is the most important task for the interception, theft, and a
collection of proprietary/confidential information.
Homogeneity: For example, this is the kind of cyber physical systems, the suffering,
alone, and at the same vulnerabilities, that is, when they are abused, it can affect
all of the devices in its vicinity.
Suspicious employees: Suspicious-employed, they can be intentional or uninten-
tional loss or damage to the receiver, which is a CPS unit, acts of sabotage, and to
change the encoding of the language, or to provide remote access to hackers, to
open a closed port, or attach an infected USB drive.
TABLE 4.5
Various Types of Attack Models
Attack models Attacks occurring
There are different types of attacks that CPS systems have to defend against. Existing
attack models can be used for defending against an attack or a new one can also be
designed. Various of attack models are shown in Table 4.5.
The receiver system is the CPS that is used for infrastructure, water treatment, smart
networks, and transportation, and in smaller systems, such as a pacemaker or an insulin
pump. You will have the possibility of cyberattacks in such a system. It is essential to
develop detection and protection mechanisms to prevent the attack on the receiver, as the
CPS. The attacks could be a cyber or physical. In a “cyberattack,” there is an impact on the
network, and in this context, a “physical attack” as a violation of the physical components
of a CPU, such as motors, generators, pumps, and so on.
To whom does the CPS-type technology need to provide protection, and against what
kinds of attacks? Defending against an assault is possible with the modeling at your dis-
posal, and you can even utilize these models to create new defenses (Table 4.5).
Various attack models are indicated in Table 4.5.
it is only in one part of the system, where both of them at the same time, the domain (s) that
is to be protected, is indeed to be protected.
These CPSs can have a variety of points of attack, security, and privacy, such as:
4.8 Conclusion
In this chapter, we have defined the security and integrity, the application of the classical
definition, both in the digital and physical worlds, and the development in the area of the
CPSs. We have illustrated the various security and privacy issues between the infrastruc-
ture and the individual CPSs and shown how the communication between the systems is
affected, that is to say, the need for security and integrity of the network infrastructure. A
number of examples showing what happens when a part of the security and the integrity
is neglected have been presented, and we have also discussed the methodology in order to
ensure that the system has been designed and has been used in a wrong way. Finally, we
discuss the current challenges faced by consumers and the industry, as everywhere, the
spread of the CPSs is on its way to becoming the new norm.
64 Cyber Physical Systems
FIGURE 4.4
Various attack points in CPSs.
That is, as the number of devices that are connected to the computer, such as the CPSs, is
continuing to grow at an exponential rate, safety, security, and privacy needs to be taken
seriously. Attention should be given to both and the physical dimensions of the CPSS, as
well as their interaction. Also, there is a serious concern, and the risk of substance abuse
can be decreased by the existence of these devices is on the formulation of the project,
or the general arrangement is adopted, the costs and benefits should be considered. The
central committee of the CPSU, is it forever, and their presence is going to have a greater
impact on the daily lives of billions of people around the world. So, the security and the
privacy of individuals is incalculably important in the development, promotion, manage-
ment, operation, and replacement of the CPSs.
References
1. Lee, J., Bagheri, B., & Kao, H. A. (2015b). A Cyber-Physical Systems Architecture for Industry
4.0-Based Manufacturing Systems. Manufacturing Letters, 3, 18–23. https://doi.org/10.1016/j
.mfglet.2014.12.001
2. Lu, Y. (2017b). Industry 4.0: A Survey on Technologies, Applications and Open Research Issues.
Journal of Industrial Information Integration, 6, 1–10. https://doi.org/10.1016/j.jii.2017.04.005
3. Lee, J., Lapira, E., Yang, S., & Kao, A. (2013b). Predictive Manufacturing System - Trends of
Next-Generation Production Systems. IFAC Proceedings Volumes, 46(7), 150–156. https://doi.org
/10.3182/20130522-3-br-4036.00107
4. Heeg, R. (2014). The Future is Wide Open: Stefan Lindegaard on Open Innovation. Research
World, 46(46), 57–60. https://doi.org/10.1002/rwm3.20105
5. Lee, E. K., Viswanathan, H., & Pompili, D. (2015). Distributed Data-Centric Adaptive Sampling
for Cyber-Physical Systems. ACM Transactions on Autonomous and Adaptive Systems, 9(4), 1–27.
https://doi.org/10.1145/2644820
6. Kang, S., Chun, I., Park, J., & Kim, W. (2012b). Model-Based Autonomic Computing Framework
for Cyber-Physical Systems. IEMEK Journal of Embedded Systems and Applications, 7(5), 267–275.
https://doi.org/10.14372/iemek.2012.7.5.267
Security and Privacy Aspects of CPS 65
7. Rad, C. R., Hancu, O., Takacs, I. A., & Olteanu, G. (2015b). Smart Monitoring of Potato Crop: A
Cyber-Physical System Architecture Model in the Field of Precision Agriculture. Agriculture
and Agricultural Science Procedia, 6, 73–79. https://doi.org/10.1016/j.aaspro.2015.08.041
8. Zahid, F., Tanveer, A., Kuo, M. M. Y., & Sinha, R. (2021). A Systematic Mapping of Semi- Formal
and Formal Methods in Requirements Engineering of Industrial Cyber-Physical Systems.
Journal of Intelligent Manufacturing. Published. https://doi.org/10.1007/s10845- 021- 01753-8
9. Chaganti, R., Gupta, D., & Vemprala, N. (2021). Intelligent Network Layer for Cyber-Physical
Systems Security. International Journal of Smart Security Technologies, 8(2), 42–58. https://doi.org
/10.4018/ijsst.2021070103
10. Yaacoub, J. P. A., Noura, M., Noura, H. N., Salman, O., Yaacoub, E., Couturier, R., &
Chehab, A. (2020b). Securing Internet of Medical Things Systems: Limitations, Issues and
Recommendations. Future Generation Computer Systems, 105, 581–606. https://doi.org/10.1016/j
.future.2019.12.028
11. Mahmoud, M. S., Hamdan, M. M., & Baroudi, U. A. (2020). Secure Control of Cyber Physical
Systems Subject to Stochastic Distributed DoS and Deception Attacks. International Journal of
Systems Science, 51(9), 1653–1668. https://doi.org/10.1080/00207721.2020.1772402
12. Xu, Y., & Singh, C. (2014). Power System Reliability Impact of Energy Storage Integration with
Intelligent Operation Strategy. IEEE Transactions on Smart Grid, 5(2), 1129–1137. https://doi.org
/10.1109/tsg.2013.2278482
13. Maknouninejad, A., & Qu, Z. (2014). Realizing Unified Microgrid Voltage Profile and Loss
Minimization: A Cooperative Distributed Optimization and Control Approach. IEEE
Transactions on Smart Grid, 5(4), 1621–1630. https://doi.org/10.1109/tsg.2014.2308541
14. Chopade, P., & Bikdash, M. (2016b). New Centrality Measures for Assessing Smart Grid
Vulnerabilities and Predicting Brownouts and Blackouts. International Journal of Critical
Infrastructure Protection, 12, 29–45. https://doi.org/10.1016/j.ijcip.2015.12.001
15. Amin, S., Litrico, X., Sastry, S., & Bayen, A. M. (2013b). Cyber Security of Water SCADA Systems—
Part I: Analysis and Experimentation of Stealthy Deception Attacks. IEEE Transactions on
Control Systems Technology, 21(5), 1963–1970. https://doi.org/10.1109/tcst.2012.2211873
16. Venkatraman, S., & Venkatraman, R. (2019). Big Data Security Challenges and Strategies. AIMS
Mathematics, 4(3), 860–879. https://doi.org/10.3934/math.2019.3.860
17. Adepu, S., & Mathur, A. (2021c). Distributed Attack Detection in a Water Treatment Plant:
Method and Case Study. IEEE Transactions on Dependable and Secure Computing, 18(1), 86–99.
https://doi.org/10.1109/tdsc.2018.2875008
18. Palleti, V. R., Adepu, S., Mishra, V. K., & Mathur, A. (2021). Cascading Effects of Cyber-Attacks
on Interconnected Critical Infrastructure. Cybersecurity, 4(1). https://doi.org/10.1186/s42400
-021- 00071-z
19. Adepu, S., Shrivastava, S., & Mathur, A. (2016). Argus: An Orthogonal Defense Framework to
Protect Public Infrastructure against Cyber-Physical Attacks. IEEE Internet Computing, 20(5),
38–45. https://doi.org/10.1109/mic.2016.104
20. Hahn, A., Ashok, A., Sridhar, S., & Govindarasu, M. (2013). Cyber-Physical Security Testbeds:
Architecture, Application, and Evaluation for Smart Grid. IEEE Transactions on Smart Grid, 4(2),
847–855. https://doi.org/10.1109/tsg.2012.2226919
21. Franze, G., Tedesco, F., & Lucia, W. (2019b). Resilient Control for Cyber-Physical Systems Subject
to Replay Attacks. IEEE Control Systems Letters, 3(4), 984–989. https://doi.org/10.1109/lcsys.2019
.2920507
22. Liu, Y., Ning, P., & Reiter, M. K. (2011). False Data Injection Attacks against State Estimation in
Electric Power Grids. ACM Transactions on Information and System Security, 14(1), 1–33. https://
doi.org/10.1145/1952982.1952995
23. Lee, J., Bagheri, B., & Kao, H. A. (2015c). A Cyber-Physical Systems Architecture for Industry
4.0-Based Manufacturing Systems. Manufacturing Letters, 3, 18–23. https://doi.org/10.1016/j
.mfglet.2014.12.001
24. Lu, Y. (2017b). Industry 4.0: A Survey on Technologies, Applications and Open Research Issues.
Journal of Industrial Information Integration, 6, 1–10. https://doi.org/10.1016/j.jii.2017.04.005
66 Cyber Physical Systems
25. Lee, J., Lapira, E., Yang, S., & Kao, A. (2013c). Predictive Manufacturing System - Trends of
Next-Generation Production Systems. IFAC Proceedings Volumes, 46(7), 150–156. https://doi.org
/10.3182/20130522-3-br-4036.00107
26. Gao, L. S., & Iyer, B. (2009). Value Creation Using Alliances within the Software Industry.
Electronic Commerce Research and Applications, 8(6), 280–290. https://doi.org/10.1016/j.elerap
.2009.04.009
27. Wang, P., Ma, M., & Chu, C. H. (2018). Long-Term Event Processing over Data Streams in Cyber-
Physical Systems. ACM Transactions on Cyber-Physical Systems, 2(2), 1–23. https://doi.org/10.1145
/3204412
28. Kang, S., Chun, I., Park, J., & Kim, W. (2012c). Model-Based Autonomic Computing Framework
for Cyber-Physical Systems. IEMEK Journal of Embedded Systems and Applications, 7(5), 267–275.
https://doi.org/10.14372/iemek.2012.7.5.267
29. Rad, C. R., Hancu, O., Takacs, I. A., & Olteanu, G. (2015c). Smart Monitoring of Potato Crop: A
Cyber-Physical System Architecture Model in the Field of Precision Agriculture. Agriculture
and Agricultural Science Procedia, 6, 73–79. https://doi.org/10.1016/j.aaspro.2015.08.041
30. Venmani, D., Lagadec, Y., Lemoult, O., & Deletre, F. (2018). Phase and Time Synchronization for
5G C-RAN: Requirements, Design Challenges and Recent Advances in Standardization. EAI
Endorsed Transactions on Industrial Networks and Intelligent Systems, 5(15), 155238. https://doi.org
/10.4108/eai.27- 6-2018.155238
31. Gunduz, M. Z., & Das, R. (2020b). Cyber-Security on Smart Grid: Threats and Potential
Solutions. Computer Networks, 169, 107094. https://doi.org/10.1016/j.comnet.2019.107094
32. Yaacoub, J. P. A., Noura, M., Noura, H. N., Salman, O., Yaacoub, E., Couturier, R., &
Chehab, A. (2020c). Securing Internet of Medical Things Systems: Limitations, Issues and
Recommendations. Future Generation Computer Systems, 105, 581–606. https://doi.org/10.1016/j
.future.2019.12.028
5
Challenges in the Taxonomy of Cyber-
Physical Security and Trust
CONTENTS
5.1 What Is Security and Trust?................................................................................................ 67
5.2 Classification of Attacks....................................................................................................... 68
5.2.1 Attacking Area.......................................................................................................... 69
5.2.2 IP Attack Modeling................................................................................................... 70
5.2.3 Difficult Prediction................................................................................................... 70
5.3 Intrusion Outcomes.............................................................................................................. 71
5.3.1 Modifying Sensors................................................................................................... 71
5.3.2 Attack on Services.................................................................................................... 71
5.3.3 Altering Function...................................................................................................... 71
5.3.4 Designing Robbery................................................................................................... 72
5.3.5 Leakage of Sensitive Data........................................................................................ 72
5.4 Malicious Modification in Signals...................................................................................... 73
5.4.1 Quantifying and Amplifying Nucleic Acids in a DNA Sample........................ 73
5.4.2 Attacks on Multiple Small Reaction Chambers................................................... 73
5.4.3 Operating Principles of dPCR................................................................................. 74
5.4.4 Simulation Process in dPCR.................................................................................... 74
5.4.5 Detection Capabilities.............................................................................................. 75
5.4.6 Fabricating Data........................................................................................................ 75
5.5 Challenges of Microfluidic Security.................................................................................. 75
5.5.1 Privacy in Medical Diagnostics.............................................................................. 75
5.5.2 Capability of Public Safety...................................................................................... 76
5.5.3 Basic Research Integrity Tool..................................................................................77
5.5.4 Blood Testing Platform.............................................................................................77
5.5.5 Drug Performance.................................................................................................... 78
5.5.6 DNA Fingerprinting Techniques............................................................................ 79
5.6 Conclusion............................................................................................................................. 79
References........................................................................................................................................ 81
DOI: 10.1201/9781003220664-5 67
68 Cyber Physical Systems
deported. Although it is true today that every system designer would do well
to examine the safety ramifications of their work, we also emphasize additional
important reasons for considering cyber-physical microfluidic biochip (CPMB)
security:Untrusted supply networks: Transnational distribution channels in the
contemporary production of semiconductor products result in a complex web of
players with diverse capacity and motive for harmful actions such as hardware
insertion from Trojan [4] and piracy for property rights (IP) [5]. Commercial micro-
fluidic devices of the next generations should adapt to the sophistication of manu-
facturing processes and will therefore be subject to the same assaults [6].
• In addition to being a boon to developing secure and reliable systems, cyber-
physical integration also poses a severe safety problem for a number of reasons.
Firstly, it involves the presence of a digital control unit. This controller usually
is built with a single circuit board or an off-shelf microcontroller and can add
several new potential vulnerabilities such as a network interface. Second, an
intruder may exploit the physical features of the system to tremendous advan-
tage; the data is not just the only thing in danger, but physical properties can
also now be altered and destroyed. By exploiting the app’s physical weaknesses,
scientists may learn more about the application’s inner workings and exposing it
to possible threats.
• Increased adoption rate: Microfluidics literature has repeatedly shown that this
technique still has to be marketed on a wide scale [7]. Security and confidence are
elements that may be developed and automatically converted into CPMBs and
which provide a high degree of protection. In contrast to macrolabs, training con-
formity with regulations and audits is the norm under human supervision. The
security-centric design might eventually lead to viable solutions for general imple-
mentation using microfluidics from mostly academic studies.
• Prevention: After the fact, the computing sector is seeing the adoption of safety
measures. A response-oriented strategy guarantees that genuine issues prompt
solutions but at a significant expense for the people involved. Microfluidics is still
a new technology that offers few motivating examples. But this is essentially why
microfluidics provides an opportunity since the architecture of safety and confi-
dence can first and foremost prevent such events.
• Amazing: Microfluidic technology can be pretty convenient for safety-centered
design. The designers can construct security networks naturally using unique
microfluidic characteristics. For example, in general, the complexities of technolo-
gies such as these are smaller than that in VLSI [8], and time scales are frequently
less than those in the semiconductors in microfluidic systems [9]. In addition,
standards have to be released as scientists continue to investigate new notions of
design and study fundamental physics and materials [7]. Thus, there is a chance
to include safety in standards development.
5.2 Classification of Attacks
Here, we present an integral classification of potential vulnerabilities, threat models, and
motives that may affect CPMBs. We notice that while hypothetical, this categorization is
Cyber-Physical Security and Trust 69
based entirely on ideas and instances from other fields. The categorization emphasizes
elements that are unique to microfluidics as much as practicable.
5.2.1 Attacking Area
• A surface for an assault is a possible entry point for an offensive attack. According
to the following taxonomies, the attacking regions can have:
• Indirect physical access: unintentional usage of IP address and port number to
perform an attack. This would include uncovered USB and Internet jackets ini-
tially used to maintain or transfer information and the unloading of cartridge
trays for biochips. In addition, some microfluidic systems are built on ordinary,
in-shelf processors and accessible to a variety of underutilized physical ports.
• Direct physics access: Many developers aim to develop a fully portable, autono-
mous lab-on-one chip. This offers numerous practical advantages but physically
renders the platform insecure. For example, a gadget for pollution management
installed in remote areas would readily be manipulated. Fault injecting through
power or clock smoking and exploiting controllers, samples, or chemicals may be
feasible in intrusive, direct physical attacks, in particular, in susceptible environ-
ments. This also implies the privacy of wearable sensors, as signal tracks may be
picked off.
• Network access: Network-enabled cyber-physical connectivity offers a robust
assassination surface for malevolent opponents seeking distant attacks. Zero-day
feats, intelligence agency hacking tools, uncached systems, and social technology
contribute to networked computer vulnerability. It complicates the reality that
CPMBs are typically implemented in environments that cannot be maintained
regularly either because of costs or inaccessibility. The only method to avoid net-
work interfaces being misused is to eliminate them, but the utility of the CPMB
would be significantly limited.
• Wireless access: The convenient way to transfer data, especially to smartphone
applications integrated with mobile terminals, such as wirelessly and using
Zigbee. This offers the possibility for a microfluidic platform for attackers nearby
but not necessarily in possession.
• Documentation of the configuration: The knowledge needed to make a foundation
for the microfluid might consist of circuitry schemes, procedures for biochemical
testing, or biochip layouts. System specification may be easily exploited for adding
capacity attacks in their raw form.
• Default interfaces: This refers to user experience, such as a touchpad or a chassis
cut-out, which is often required to observe the advancement of the test. If not cor-
rectly constructed, such connections may disclose protected information or allow
permissions to escalate. For example, damages may ensue if operational parame-
ters that the user may select are not safe from unauthorized or hazardous settings.
Or, by carefully constructing a collection of liquids that can signal the blending
sequence, an attacker may try to revise a protocol.
• Side-channel attacks utilize physical phenomena that were initially not consid-
ered in system design. Insecurity literature, microwave radiation, and power
side channels were primarily investigated and proven to be effective in disrupt-
ing unprotected cryptography algorithm hardware implementations [10]. CPMBs
70 Cyber Physical Systems
• Based on the criteria provided forth in, we classify an enemy country tactical and
operational capability [11]. Technical skills represent an attacker’s understanding
of how the microfluidic platform operates and its ability to obtain this experi-
mentally based intelligence. Operations skills define the way an opponent may
use or inject the type of malware, for example, I/O ports on a microflow platform,
while an IP assault implies the assailant has access to an installation. Note that
because we include IP-based attacks, our concepts of security and reliability are
more comprehensive than those mentioned in [11]. We offer possible threat models
categorized by attacker sites for researchers to determine.
• The untrusted supply chain is responsible for generating threat models. Biochip
platform developers should deal with components from different suppliers and
combine them. These suppliers might be situated abroad, and many suppliers
can be employed simultaneously. These parties would probably wish to carry out
IP-related assaults and have considerable technical and operational skills since
vital design information is supplied.
• Once the microfluidic technology is implemented and functioning, field risks
occur. Opponents might include malevolent end users wishing to change the
operation of a technology and distant adversaries involved in data or natural
facilities being compromised. Those opponents can have excellent technologi-
cal skills, especially remotely parties, which can be found globally and sup-
ported by national governments. They have limited operating skills, as their
ability to attack is constrained by the accessible equipment and software attack
vectors.
5.2.3 Difficult Prediction
There is a wide range and challenging prediction of human incentives to compromise
cyber physical systems; however, based on various relevant disciplines, we may list several
typical motives that are likely to drive the assault.
• Financial gain: All IP assaults are motivated. There is plenty of evidence that IC
products are counterfeit, over the manufacture, and reverse engineering. Other
assaults may be driven by malware, ID theft, and sales of user data. Intriguing and
recent phenomena are unethical marketing attacks, which can reveal a security
weakness and lead to significant changes in the market value of a firm. This has
occurred recently with the surprising revelation of numerous vulnerabilities in
AMD processors [12].
• Revenge: Disgruntled workers have reported some of the most prominent safety
violations in recent years [13]. These assailants are incorporated in an organiza-
tion, and after they have been incorrect, they use the destructive effect from their
accessibility and expertise.
• Policy: The Stuxnet worm’s emergence in 2010 reassessed the actual scale of gov-
ernment-sponsored, politically driven cyber threats [14]. Engineers working on
Cyber-Physical Security and Trust 71
5.3 Intrusion Outcomes
• Due to this flow of architecture and the typical biochip building, many kinds of
assaults are conceivable. Depending on the success, we may generally rate attacks
as follows.
5.3.1 Modifying Sensors
5.3.2 Attack on Services
5.3.3 Altering Function
the fact that the device is now inoperable, it also continues to perform in an unan-
ticipated or degraded manner. The device is now functioning. A product that fails
to comply with specifications may cause frustrations for the end user and may
cause the producer to lose customers. We see abuse from the end user as a viable
place to target functional modifications; to attain an intended result, if an end user
wants to bend the microfluidic platform to him, it is a breach of the authenticity
of the assay. It violates the confidence in the applications in which the platforms
are implemented on a broader scale. A hostile end user poses a severe concern
because it is challenging to construct manipulative devices caused by physically
intrusive attacks [17].
5.3.4 Designing Robbery
cryptographic private keys. Since most of the ingredients and procedures used for manu-
facturing microfluidic devices immediately borrowed from the IC sector are also relevant,
microfluidics’ peculiar physics can lead to susceptible communication systems.
test with integrity, as the end user does not take any step from the sample preparation to
the final reading.
Suppose an attacker can disturb the activation of the microwave biochip. In that case, it
may be possible to skew the dispersion of DNA samples or stop the PCR process, resulting
in inaccurate estimations of the actual target DNA concentration. We have investigated a
marketable microfluidic platform that has been determined to reflect its architecture, as
illustrated accurately by an exposed attack surface on the USB, serial, and ethernet inter-
faces. An attacker can load computer viruses if these channels are unprotected. We found
out that a single board computer with bespoke software loaded into a CompactFlash (CF)
card is utilized on this specific platform off-the-shelf. The replacement of a CF card by
a malignant one might jeopardize a technically susceptible machine. An external entity
might use the connection to the internet to take over the device. An assailant might par-
tially cause the pneumatic actuators to malfunction when the microcontroller is affected.
The commands may be adjusted to shorten the start time or provide a transitional control
signal. The opening of elastomer valves has a linear response to pressure changes over
most of their operation [27]. Consequently, the sampling rate would be interrupted in all the
reaction chambers, and a Gaussian system with constant parameters would be breached.
Where H Ç is the affirmative chamber seen, and C is the total compartments [28].
Inconsistent receptacles and a non-random arrangement of molecules have, yet, restricted
the adoption of dPCR for clinical diagnostics [29] in their assessment of positive chambers.
dPCR methods have been loaned to microfluidic technology, which provides applications
like multiple genetic variability investigations and medicine processing. These devices are
presently being offered only for research, and diagnostic applications are likely to occur
only once the technology matures [26, 29].
5.4.5 Detection Capabilities
Differences in architectural repetition numbers (CNVs) in genomic segments are differ-
ences [30–32]. CNVs are different. CNVs have been researched by the sensitive and pre-
cise identification of techniques like dPCR, which have provided significant insight into
how minor variants play a role in genetic disorders such as autism and Crohn’s condi-
tion. Multiple genes ratios established during illness investigations may be affected by
the quantity of positive responses an attacker generates while undermining microfluid
frameworks for the performance of dPCR. Without the correct copy numbers, positive
connections between these genomic changes and illnesses are not possible. Worse, it may
be possible to create faulty connections. Spurious relationships will prevent therapies for
improvement.
5.4.6 Fabricating Data
Instead of entirely falsifying data to make more compelling proof that the experiments
have been performed, the attacker might be driven to interference with materials and
equipment. Attacks on parts required threaten to overturn recent orders to improve
research performance and repeatability. In particular, within the dPCR, many investiga-
tors were unaware of the technical, fundamental methods and pitfalls—starting from
an initial was result published in 2013 expressly to address those questions for posting
Mathematical Digital PCR Experimentation (Digital MIQE) guidelines [33]. However, an
investigator might cooperate fully with the norm and still produce unreproducible data.
Therefore, time and resources need to be squandered to discover these false outcomes.
Scientists or technicians in the laboratory are sometimes driven to create or strengthen
financial data. These breaches of research excellence can significantly affect everyday
individuals, apart from defecting scientific publications. Currently, dPCR is utilized in
research settings because of the cost of the technology involved and resource needs. dPCR
microfluidics technologies are predicted to mature to become an appealing diagnostic
platform. Hence, a PCR platform assault’s possible safety consequences may jeopardize
patients’ well-being. An attacker might affect a medical provider’s decision-making by
distorting the definitive diagnosis to the extent that they are within reach.
biochips with continuous flow, gates are computerized and may thus be tampered with
the same action. Then fluids can mix or produce early insufficiencies accidentally.
were confronted that erroneous laboratory tests determined their medical attention. The
technical specifics of the case of Monsanto are not known, but the compromising of a well-
used blood diagnosis test may be investigated: in vitro glucose measurement. Regular dia-
betes testing is required for appropriate monitoring of diabetic individuals. The amount
of insulin to be administered to the patient is decided dependent on the extent of glucose
levels. The smoothly conducted nightstand glucose tests with automatic microfluidic bio-
chips provide fast, low-cost, and effective measurement. A diagram represents the glucose-
measuring test, known as a sequenced network. This test usually evaluates the amount of
glucose in a blood sample by building a known concentration solution’s inoculating loop
of the glucose calibration curve. The X-axis shows the various concentrations of dilution
(mg/dL), and the Y-axis is the response rate measured by the change in the absorbance
grade expressed as AU/s (absorbance unit per second). This curve helps to interpolate the
concentrations of the glucose sample being tested, which is why it is necessary to achieve
maximum accuracy.
Two realistic result-manipulation assaults against glucose-based microfluidics have
been disclosed in Ali et al. The first attack (Attack 1) wants to mess with the test results
by altering the diabetic content in the sample. The heavy dotted lines represent sequence
graph modifications relative to the brilliant sequence graphs. The S3 buffer droplet W1
is combined with the I6 glucose outlet and diluted Dl10. Since hypoglycemia is halved in
intensity, the test result is incorrect. The user cannot understand the absorbance values
of the waste buffer droplets. A malformed calibration curve initiates the second attack
(Attack 2) by manipulating the sequence graphs on the reaction chains 2 and 4. For this
reason, the two D1 and S3 waste buffer droplets are utilized.
Intentionally destructive attack network was created by malicious attackers. The thick
lines represent the changes in the platinum plot. In reaction chain 1, the waste buffer gout
(after D1) is blended with glucose (the I2 droplet), diluting reaction chain 2. Concentration
levels of glucose solvents in reaction chain 2 are lowered to half of their platinum levels
(400, 200, 100, 50, 25, and 12.5 mg/dL). Similar effects may also be seen in chain 4 when the
S3 waste buffering droplet is combined with the I7 glucose solution droplets—the sharp
curve in the malignant Attack 2 calibration graph.
5.5.5 Drug Performance
Over the years, several high-profile situations have arisen that led to championships
being dropped and the tournament being suspended. Many of these drug doping charges
emerged after the test failed, and drug acceptance was revealed after that. In certain situa-
tions, doping is performed systematically on a massive scale, such as in East Germany and,
more recently, Russia. But how efficient these exams are is an unsettled topic. What’s the
wrong positive rate? What’s the false-negative rate? Is it possible to hack the organizations
and tools utilized in drug monitoring? And are the quantitative rationale for these drug
screenings problematic?
To handle general pro guidelines and legislation and to provide monitoring and train-
ing for athletes, the World Anti-doping Agency (WADA) was established in 1999. WADA
provides the ISTI, which outlines, among other things, protocols for the performance of
athlete communication for out-of-competing testing. WADA releases the ISTI. Practices for
the athletes have begun. The examination may be easier to schedule and less invasive if
POC diagnostic tools were available. Still, this type of use allows athletes and instructors
to manipulate equipment or even use samples that are not part of the athlete-under-test.
The ISTI also notes that “The certification organization for the specimen collection session
Cyber-Physical Security and Trust 79
concerned owns specimens from a participant.” This might raise a problem of property
and security because the drug testing method should only answer whether or not athletes
utilized prohibited substances. The prospect of identifying and disclosing irrelevant infor-
mation might enable the removal of whole specimens. The authenticity of sport and the
ease, convenience, and confidentiality of athletes might be benefited from a reliable POC
testing ground.
Change in features can be done via tampering, manufacture of falsified devices, or
neglect by an end user. The hardware or software elements can be modified at all stages
of a project round. A state involved in widespread doping fraud is likely to use its techni-
cal ability to change diagnostic equipment’s functioning. Powerful vulnerability scanners
will unavoidably demand security and trust approaches to such workloads.
5.6 Conclusion
The safety and confidentiality of CPMBs encompass new physical modalities and excit-
ing new areas of application, comprising classic hardware security components, automa-
tion, and control system safety and more conventional information security methods. Due
80
FIGURE 5.1
DNA fingerprinting technique.
Cyber Physical Systems
Cyber-Physical Security and Trust 81
TABLE 5.1
Example DNA Profiles Showing the STR Alleles for Each Sample and the Genotype Frequency of
Suspect B for Each STR Locus
Suspect B’s genotype frequency
STR locus Evidence sample Suspect A Suspect B for each STR
to the complex multidisciplinary structure of the system components, the challenges are
complex, yet those new characteristics create innovative countermeasures. In addition, we
argue that hardware security is required: the analysis of vulnerabilities resulting from the
decision to design hardware and the creation of remedies in both equipment and software.
It addresses various security problems that may arise on specified microfluidic platforms
produced, marketed, or provided under open-source licensing. This article is by no means
exhaustive; curious readers can instead consult up-to-date scholarly works to learn more
about the capabilities of today’s biochips. It gives examples of scenarios under various
attack surface and assault results. It has several distinctive features that microfluidic bio-
chips can be employed or exploited.
References
1. J. Tang, M. Ibrahim, K. Chakrabarty, R. Karri. Security trade-offs in microfluidic routing fab-
rics. In IEEE International Conference on Computer Design. New york. pp. (25–32). (2017).
2. K. Rosenfeld, E. Gavas, R. Karri. Sensor physical unclonable functions. In IEEE International
Symposium on Hardware-Oriented Security and Trust (HOST). London. pp. (112–117). (2010).
3. G. Zhang, C. Yan, X. Ji, T. Zhang, T. Zhang, W. Xu. DolphinAttack: Inaudible voice commands.
In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. USA. pp.
(103–117). (2017).
4. S. Bhunia, M.S. Hsiao, M. Banga, S. Narasimhan. Hardware Trojan attacks: Threat analysis and
countermeasures. Proc. IEEE. Vol. 102(8). pp. (1229–1247). (2014).
5. D. Shahrjerdi, J. Rajendran, S. Garg, F. Koushanfar, R. Karri. Proceedings of the 2014 IEEE/ACM
International Conference on Computer-Aided Design. (IEEE Press, Piscataway). pp. (170–174). (2014).
6. S.S. Ali, M. Ibrahim, J. Rajendran, O. Sinanoglu, K. Chakrabarty. Supply-chain security of digi-
tal microfluidic biochips. Computer. Vol. 49(8). pp (36–43). (2016).
82 Cyber Physical Systems
7. L.R. Volpatti, A.K. Yetisen. The commercialisation of microfluidic devices. Trends Biotechnol.
Vol. 32(7). pp. (347–350). (2014).
8. F. Su, K. Chakrabarty. High-level synthesis of digital microfluidic biochips. ACM J. Emerg.
Technol. Comput. Syst. Vol. 3(4). pp. (1–10). (2008).
9. T.M. Squires, S.R. Quake. Microfluidics: Fluid physics at the nanoliter scale. Rev. Mod. Phys.
Vol. 77(3). pp. (977–980). (2005).
10. D. Agrawal, B. Archambeault, J.R. Rao, P. Rohatgi. The EM side-channel(s). In B. S. Kaliski jr,
C. k. Koc, Christof Paar(eds.) International Workshop on Cryptographic Hardware and Embedded
Systems (Springer, Berlin). pp (29–45). (2002).
11. S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A.
Czeskis, F. Roesner, T. Kohno. Comprehensive experimental analyses of automotive attack sur-
faces. In Proceedings of the USENIX Security Symposium. (USENIX Association, San Francisco).
pp. (77–92). (2011).
12. S.S. Ali, M. Ibrahim, O. Sinanoglu, K. Chakrabarty, R. Karri. Microfluidic encryption of on-
chip biochemical assays. In IEEE Biomedical Circuits and Systems Conference (BioCAS) (IEEE,
Piscataway). pp. (152–155). (2016).
13. A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, S. Sastry. Challenges for securing cyber-
physical systems. In Proceedings of the Workshop on Future Directions in Cyber-physical Systems
Security. Berkeley. pp. (52–60). (2009).
14. R. Langner. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Sec. Prev. Vol. 9(3). pp. (49–51).
(2011).
15. N. Ferguson, B. Schneier, T. Kohno. Cryptography Engineering: Design Principles and Practical
Applications. Wiley, Hoboken. (2011).
16. T. Xu, K. Chakrabarty. Functional testing of digital microfluidic biochips. In IEEE International
Test Conference (IEEE, Piscataway). pp. (1–10). (2007).
17. R. Anderson, M. Kuhn. Tamper resistance—A cautionary note. Proceedings of the Second
USENIX Workshop on Electronic Commerce. Vol. 2. pp. (1–11). (1996).
18. D. Grissom, K. O’Neal, B. Preciado, H. Patel, R. Doherty, N. Liao, P. Brisk. A digital microfluidic
biochip synthesis framework. In IEEE/IFIP 20th International Conference on VLSI and System-on-
Chip (VLSI-SoC) (IEEE, Piscataway). pp. (177–182). (2012).
19. D. Grissom, C. Curtis, S. Windh, C. Phung, N. Kumar, Z. Zimmerman, O. Kenneth, J. McDaniel,
N. Liao, P. Brisk. An open-source compiler and PCB synthesis tool for digital microfluidic bio-
chips. Integer VLSI J. Vol. 51. pp (169–193). (2015).
20. M. Rostami, F. Koushanfar, R. Karri. A primer on hardware security: Models, methods, and
metrics. Proc. IEEE. Vol. 102(8). pp. (1283–1295). (2014).
21. H. Chen, S. Potluri, F. Koushanfar. BioChipWork: Reverse engineering of microfluidic bio-
chips. In IEEE International Conference on Computer Design (ICCD) (IEEE, Piscataway). pp. (9–16).
(2017).
22. M. Pollack, A. Shenderov, R. Fair. Electrowetting-based actuation of droplets for integrated
microfluidics. Lab Chip. Vol. 2(2). pp. (96–101). (2002).
23. S.S. Ali, M. Ibrahim, O. Sinanoglu, K. Chakrabarty, R. Karri. Security assessment of cyber-
physical, digital microfluidic biochips. IEEE ACM Trans. Comput. Biol. Bioinform. Vol. 13(3). pp.
(445–458). (2016).
24. Preety, K.S. Kaswan, and J.S. Dhatterwal. “Fog or edge-based multimedia data computing and
storage policies”. In book entitled “Recent advances in Multimedia Computing System and
Virtual Reality”, Published by Routledge Taylor & Francis Group, December 2021. ISBN No.
9781032048239.
25. P. Sykes, S. Neoh, M. Brisco, E. Hughes, J. Condon, and A. Morley. Quantitation of targets for
PCR by use of limiting dilution. Biotechniques. Vol. 13(3). pp. (444–449). (1992).
26. Preety, J.S. Dhatterwal, and K.S. Kaswan. “Securing big data using big data mining”. In the book
entitled “data-driven” published in Taylor Francis, CRC Press, 2021. ISBN No. 9781003199403.
27. M.A. Unger, H.-P. Chou, T. Thorsen, A. Scherer, S.R. Quake. Monolithic microfabricated valves
and pumps by multilayer soft lithography. Science. Vol. 288(5463). pp. (113–116). (2000).
Cyber-Physical Security and Trust 83
28. S. Dube, J. Qin, R. Ramakrishnan. Mathematical analysis of copy number variation in a DNA
sample using digital PCR on a nanofluidic device. PLOS ONE. Vol. 3(8). pp. (76–86). (2008).
29. J.F. Huggett, S. Cowen, C.A. Foy. Considerations for digital PCR as an accurate molecular diag-
nostic tool. Clin. Chem. Vol. 61(1). pp. (79–88). (2015).
30. M. Zarrei, J.R. MacDonald, D. Merico, S.W. Scherer. A copy number variation map of the
human genome. Nat. Rev. Genet. Vol. 16(3). pp. (172–180). (2015).
31. A.J. Lafrate, L. Feuk, M.N. Rivera, M.L. Listewnik, P.K. Donahoe, Y. Qi, S.W. Scherer, C. Lee.
Detection of large-scale variation in the human genome. Nat. Genet. Vol. 36(9). pp. (949–960).
(2004).
32. G. Wang, D. Teng, Y.-T. Lai, Y.-W. Lu, Y. Ho, C.-Y. Lee. Field-programmable lab-on-a-chip based
on microelectrode dot array architecture. IET Nanobiotechnol. Vol. 8(3). pp. (163–171). (2013).
33. M. Walker, M. Chi, N. Navin, R. Lucito, J. Healy, J. Hicks, K. Ye, A. Reiner, T.C. Gilliam, B. Trask,
N. Patterson, A. Zetterberg, M. Wigler. Large-scale copy number polymorphism in the human
genome. Science. Vol. 305(5683). pp. (525–528). (2004).
34. J.F. Huggett, C.A. Foy, V. Benes, K. Emslie, J.A. Garson, R. Haynes, J. Hellemans, M. Kubista,
R.D. Mueller, T. Nolan. The digital MIQE guidelines: Minimum information for quantitative
digital PCR experiments publication. Clin. Chem. Vol. 59(6). pp. (892–902). (2013).
35. K.S. Kaswan, L. Gaur, J.S. Dhatterwal, K. Rajesh. “‘AI-based natural language processing for
generation meaningful information Electronic Health Record (EHR) data’ published in Taylor
Francis, CRC Press for ‘advanced artificial intelligence techniques and its applications in bio-
informatics’”. (August 2021). ISBN No. 9781003126164J.
36. M.I. Tang, K. Chakrabarty, R. Karri. Securing digital microfluidic biochips by randomising
checkpoints. In Proceedings of the IEEE International Test Conference (ITC) (IEEE, Piscataway). pp.
(1–8). (2016).
37. G. Chen, Y. Lin, J. Wang. Monitoring environmental pollutants by microchip capillary electro-
phoresis with electrochemical detection. Talanta. Vol. 68(3). pp. (497–503). (2006).
38. J.C. Jokerst, J.M. Emory, C.S. Henry. Advances in microfluidics for environmental analysis.
Analyst. Vol. 137(1). pp. (24–34). (2012).
39. S. Neethirajan, I. Kobayashi, M. Nakajima, D. Wu, S. Nandagopal, F. Lin. Microfluidics for
food, agriculture and biosystems industries. Lab Chip. Vol. 11(9). pp. (1574–1586). (2011).
40. J. Wang. Microchip devices for detecting terrorist weapons. Anal. Chim. Acta. Vol. 507(1). pp.
(3–10). (2004).
6
Cyber Physical Systems in Supply
Chain Management
CONTENTS
6.1 Introduction........................................................................................................................... 86
6.2 Digitalization Transformation of Industry 4.0 of Supply Chain Management........... 86
6.3 What Is a Cyber Physical System?...................................................................................... 86
6.4 CPS Innovations.................................................................................................................... 87
6.4.1 Features of CPSs........................................................................................................ 87
6.5 Designing and Importance of Cyber Physical Systems.................................................. 89
6.6 What Is Supply Chain Management (SCM) 4.0?..............................................................90
6.7 Concepts of Supply Chain 4.0............................................................................................. 92
6.7.1 Logistics in Supply Chain Management............................................................... 92
6.7.2 Supply Chain 4.0 in Defense Combat Action....................................................... 93
6.7.3 Significance of Supply Chain 4.0............................................................................ 93
6.7.4 Dependencies on Supply Chain 4.0........................................................................ 95
6.7.5 Challenges of Modern Procurement Policy in the Defense Sector.................... 95
6.8 Modern Integration Systems of Supply Chain 4.0........................................................... 96
6.8.1 Connection of Supply Chain 4.0............................................................................. 96
6.8.1 Distribution of Supply Chain 4.0............................................................................ 97
6.8.2 Supply Chain Partners and Externalization 4.0................................................... 97
6.8.3 Vulnerability of Supply Chain 4.0.......................................................................... 98
6.9 Supply Chain 4.0 Risk Management.................................................................................. 99
6.9.1 Analysis of Risk........................................................................................................ 99
6.9.2 Models of Risk Management................................................................................. 100
6.9.3 Existing Technology of Risk Management Models........................................... 100
6.10 Latest Technological Models Used for Supply Chain 4.0.............................................. 101
6.10.1 Latest and Effective Wireless Communication Systems................................... 101
6.10.2 Threats in Wireless Communication Systems.................................................... 101
6.10.3 Emerging System in Wireless Communication Systems.................................. 102
6.11 Cloud Computing CPS Supply Chain Management..................................................... 102
6.11.1 Threats against Cloud Computing CPS Supply Chain Management............. 103
6.11.2 Strategies in CPS Supply Chain Management in Cloud Computing.............. 104
6.12 IoT and Industry 4.0 Systems in CPS Supply Chain Management.............................. 105
6.12.1 CPS Supply Chain Management Threats to IoT and Industry 4.0 Systems..........106
6.12.2 Decision-Making in IoT and Industry 4.0 CPS Supply Chain Management........106
6.13 Conclusion........................................................................................................................... 107
References...................................................................................................................................... 107
DOI: 10.1201/9781003220664-6 85
86 Cyber Physical Systems
6.1 Introduction
Individually tailored commodity requirements contribute to the difficulty of supply chain
preparation and management (SCs). Digitizing business processes is a crucial develop-
ment and a necessary prerequisite to achieving optimum flexibility and performance. In
particular, cyber physical systems (CPSs) are increasingly essential for the digital transfor-
mation of SCs. Industry 4.0 principles and innovations (I4.0) will become a central facilita-
tor. Implementing such technology also ensures that an enterprise may have disruptive
consequences so that management supports change processes. In this sense, the manage-
ment challenge to deal with improvements has grown increasingly, along with the con-
struction of digital systems’ features and functionalities. CPS can provide a wide range
of technological equipment and specifications for various applications. Support for the
design and development of CPSs in SCs is required [2].
also explains that they can communicate and thus collaborate as a core attribute of CPSs.
Nevertheless, the news does not have available communication capacity in the medium, as
has been popular in autonomous vehicles for computational mathematics systems for years,
in the form of multiple routes. Instead, the many CPS renewal builds relationships via open
and global communication technologies, especially the internet. Open and connected sys-
tems that connect with metric quantities—virtual reality with the actual operation world
is beginning to emerge. As a result, CPSs can start taking over management and execution
tasks in SCs while also reacting effectively through collaborative efforts in real time. Apart
from the descriptions, the dictionary diagram is valid and applied in the context of planning
and scheduling in SC: Socio-technical structures are a way of interacting with the various
systems; pushing to improve relations between internal and foreign clients in SC is possible
to lessen interface issues and to mitigate maximum interoperability issues.
6.4 CPS Innovations
Several technological elements and individual functions can challenge the development
of the CPS. These frequently rely on the scope and intent of the CPS. Not all innovations
should be sensibly used in preparation and control depending on the weather of a process.
Various potential solutions can also be developed according to the scheduling and control
mechanism specifications in the design of a CPS.
6.4.1 Features of CPSs
CPSs have procedure features and technological features. Given that CPSs are mostly
embedded with current organizational structures and are closely linked with the flow of
materials and knowledge, process features play a vital role throughout the design phase.
The categorization and systematizations presented are the basis of these characteristics.
Method planning and monitoring in SCs is distinguished by decisions that can be found
and followed in various manners. The development of CPSs means that the separation of
duty between humans and the system must be established. The first feature to be listed is
the source of protection for decision-making. The following terms may be rendered depen-
dent on humans, decentralized and machines.
Coordination is needed where there are interrelationships and interactions among
decision-making components of a structure, including functional levels and procedures,
which can be taken as a consequence of the division of work. It differentiates between
hierarchy and hierarchical collaboration and intermediary events. The maximum level
of self-regulation can be reached in hierarchical teamwork; in its work on physical sen-
sors, the individual components of a structure organize each other in decision-making
and develop this feature by separating vertically, together, geographically, between three
modes of synchronization.
Using technology, a CPS can execute different functions. This will help the manage-
ment and forecasting activities in SCs incredibly. Functional criteria characterizing the
behavioral and additional features of a device are decided by developing CPSs. Based on
the phylogenetic box taxonomy according to the distinctive skill of a CPS, time consump-
tion, data management, data gathering, data capturing, data provision, acting, decision-
making, networking are provided with the expresses of the stereotypical “function.”
88 Cyber Physical Systems
Environmental conditions can adversely affect the activity of a CPS. These can be largely
subjective depending upon the type of implementation and can significantly hinder the
incorporation or function of a CPS. Also, under dynamic environmental circumstances,
it must be assured that CPS works efficiently. External conditions include issues that can
affect the part of the system, especially in a positive relationship. The detrimental vari-
ables in this document were pointed to as the main characteristics of the negative effect on
a CPS in the system. Because CPS represents a mixture of digital and physical features, no
destructive force, material flux factor, or knowledge flux factor can be expressed.
The adverse impacts of a company’s supply chain are directly associated with the objects.
They are the simplest CPS methods. Many other physical artifacts, such as materials, struc-
tures, means of transport, manufacturing facilities, or logistics elements, are found in SC
processes and may thus be considered procedure CPS’s features. The scope is focused
on material items in the SC to minimize the available subjects. The main concern of such
artifacts is a CPS in terms of manufacturing and logistical capabilities. In addition, both
fixed and mobile artifacts can be used. The following expressions are given to the specific
“physical entity”: apparatus, work assistance, location, substance, and person.
The technical elements in the CPS are closely connected to the method features. These
technological advancement features allow individual functions to be performed with the
help in SC’s planning and control activities. There is no uniform description of the CPS,
and even the technical parts or features of such structures are not consistently specified.
Besides the Lee definition, the documentation also proposes several other CPS meanings.
Roy gives an outline of his work on different CPS concepts. A CPS literature review is
also performed to classify the most relevant technical elements of a CPS, based on further
descriptions of a CPS. There are additional phylogenetic features of the box. The essential
technical aspects of a CPS can be determined based on the meanings. A tangible entity
situated in the process setting constitutes the foundation of each CPS. These are comple-
mented by microcomputers, sensors, and drives and developed into embedded systems.
On that basis, it becomes a CPS through communication systems, such as the internet,
clouds, other subjects and techniques. Below are the technical features which reflect the
characteristics of the morphological box. Additional literature research shall be used to
define the quality.
The physical thing must be aware of its atmosphere and condition to equip an object
with information. Sensor technology provides the opportunity to monitor and measure
real-world parameters and translate them to electronic pulses. For I4.0, sensors are a vital
precondition for and above technological improvements. Sensors, embedded and intel-
ligent sensors, and wireless sensor networks may possess essential technical attributes:
identifying sensors.
Actuators allow interaction with the world and affect it. They will enable the reaction
of material things. Closing controller actuators are an essential feature for the automation
of operations. Their skills can differentiate them. Responses, physical activity, and user
engagement are included in the anatomical boxes of the following words.
The cognitive processes are another technological aspect of a CPS and hence a feature of
the morphologic box (see Figure 6.2). The measures required to manipulate a state variable
are generally decided in the construction of knowledge (VDI 2004). Their systematizations
discuss the place of knowledge discovery. Three types of data processing can then be
established: subcontracted, together, and incorporated.
Different humans and machines may interact with a CPS using a variety of physical
things. One term is the relationship with the complex organism. When functions and
procedures are increasingly complicated, appropriate technology must assist people.
Cyber-Physical in Supply Chain Management 89
However, virtual interfaces exist between other physical devices and information systems
because only connectivity and communication allow efficient CPS potential optimization.
The development of such an interface may be based on the following characteristics: con-
tact between the person and the computer and interaction between the machines. They are
linked in a network to allow physical structures, persons, or systems to communicate and
share data. The internet is a critical network in CPS communications. However, contacts do
not need to be carried out across a worldwide open network. Therefore, a wired, cellular,
mobile network would depend on the form and type of network link.
The CPS literature review indicates that clouds are often referred to in CPS contexts. A
shared interface allows local physical items to be connected globally with others. Cloud
computing facilitates connectivity between those artifacts through companies by offering
them technology, including applications, data storage, and services via data center links
like the internet open to users of these IT resources. Various operator models are expressed
as cloud-based: private, public, and mixed cloud. There are no different models available.
stage of processing, the structure begins its transitional storage by interacting with the
independent transport and crane system. Similarly, the downstream manufacturing unit
is responsible for the recovery of the required coil—this whole system is part dependent,
and operation and lateral coordination are based on machinery. Critical essential con-
nectivity usually occurs via a cell network, which can often contribute to issues with data
transmission quality in production halls. In addition, excellent physical and mechanical
stress is placed on steel belt manufacturing.
FIGURE 6.1
Framework of SCM 4.0.
Cyber-Physical in Supply Chain Management 91
The capacity of both the government and the non-national state continues to expand and
increase. Around the same time, Supply Chains 4.0, integrated and technologically enabled
[6], are getting ever slimmer. A significant field of study is created by the connection among
digital technologies with the ever-more militarized cyber area. Depending on computing
and information brains, the operation and accessibility of supply chain architectures are
changing. The disposition of a military supply chain by leveraging a weakness will lead to
economic implications and threaten human life [7]. As security materials are widely pro-
cured, the defensive surface for malicious actors is widening internationally, resulting in the
possible increase in the impact of a cyber assault on supply chain networks 4.0 [4].
Even more than before, broadband and action potential are critical to the global Supply
Chain 4.0. This reliance undermines their safety. Changes that have taken place in func-
tioning, architecture, and network administration reaffirm the need and future importance
of global value chains. The supply chain risk is classified as the unpredictable likelihood of
altering the macro or the supply chain systems, which influences any element of the sup-
ply chain operations (including IT and OST). Risk management, cyber threat forecasting,
and risk identification management frameworks to avoid or lessen its impact [8] assist in
showing a supply chain cyber risk evaluation 4.0. There are two analytical forms of vul-
nerabilities inside the supply chain: interruptions and service [9]. The risk of disruptions is
not reduced by any natural disaster, for instance, storms or floods. Operational risk, such
as cyber assaults, deals with failed production and consumption procedures in manufac-
turing or delivering finished goods.
Project management of security risk, agile technology, and risk control will help stan-
dardize the supply chain procedures 4.0 and mitigate mission success [10]. It also enables
technological innovations to be implemented safely, blockchain, the Internet of things
(IoT), artificial intelligence (AI), the cyber physical systems, etc., for example, the Internet of
things (CPS) [11] are providing companies with automatic and reliable resources, increas-
ing efficiency and supply chain flexibility 4.0. Models of mission assurance will alter the
response of the military and defense organizations. Themed technologies such as crown-
joy research, the methodology for high availability, online semantic models, operation
orchestration structures, and upgrading obsolete or deteriorated systems and procedures
can increase organizational task security. The technology world impacts how military
operations and competition in this area will provide challenges and opportunities for
the efficiency of operations in the military supply chain. As a result, defense companies
increasingly need to assess how emerging technology will influence their supply chains to
implement or counteract them as required.
This caption focuses on the singularity of how the armed forces function, focusing on Supply
Chain 4.0 and their stable assimilation with technological advances. The stress is less on their
information systems than on data they contain and customer data. They are supporting ele-
ments. It includes an extensive literature review on the link among cyber security, security,
Supply Chain 4.0, and semantic modeling. In this regard, this chapter describes:
• The proper business goals of the supply chain management army in light of the
developing world of interconnected forces;
• An analysis of the current condition of the chain management military and
defense networks;
• Logistical support;
• Various ways to measure the effect of emerging developments on the military
supply chain.
92 Cyber Physical Systems
It summarizes evolving Supply Chain 4.0 principles, connects them to emerging business
and the army demands, and outlines the need for semantical modeling to consider the
issues and problems in this space. Eventually, this work describes the core developments
and technology interactions with growing technical interconnectedness in this field.
of the supply chain enables supply chain operators with prompt and reliable information.
This increased availability to the system requires understanding and dynamic response
and improves the supply chain value stream, allowing waste to be reduced and efficacy to
be improved. Therefore, an integrated design of lean business models and skills is neces-
sary to efficiently and effectively operate global supply chains.
FIGURE 6.2
Supply Chain 4.0 in defense combat action.
94 Cyber Physical Systems
formally established to include new concepts, including the cloud network [19] and the use
of IoT platforms [20]. Processes to incorporate BPMN into combat actions and procedures
are increasing, though are not accessible at the time of this writing for peer review and
analysis. The Open Group Architectural Framework (TOGAF) [22] and the Department
of Defense Architecture Framework are alternatives to BPMN (DoDAF). These degrees of
complexity are higher than BPMN but generally agreed upon. During Industry 4.0, there
is no detailed updating phenomenology capturing this field, given the exponential growth
and rapid release schedules currently experienced [21]. Instead, one factor is based on most
formal methodologies and conceptual frameworks in this field.
including limiting specifications and restrictions on resources, cloud storage and process-
ing consequences, extensive data protection, and reduction in prices [26–28]. Though there
are obfuscation techniques for these potential threats, the efficiency, financing, interoper-
ability, required resources and flexibility, sophistication, and viability of the comprehen-
sive method will cost them [29–31]. The complexity of military supply chain networks and
technology poses considerable threats to their safety. Therefore, from the highest develop-
ment of specific networks and modules to the global environment, protection in the supply
chain must be established so that we don’t ignore any loophole that could have disastrous
implications for the militancy.
These programs have the greatest weakness to facilitate their usage and use: perfor-
mance. Natural monopolies and reliability in the management of businesses are greatly
appreciated, whether cost-cutting or the demand. As these networks face a surge of
automation that drives performance, threat actors may be more easily attacked. Stated:
hacking effectiveness is simple.
The working climate for tomorrow is also changing from emerging technology. Artificial
intelligence convergence (AI) and machine education systems enhance the success, with
Cyber-Physical in Supply Chain Management 97
emerging innovations being generated, transformed into Supply Chain 4.0 by drones and
robots, together with the ubiquity and effectiveness of the Internet of things (IoT). The
world’s supply chains will benefit from any such advancement forward. This is defined
as “the industry’s networking contribution to developing the natural foundation for AI
implementation and scaling that enhance the human constituents of global supply chains
that are strongly organized.” Such techniques pose their threats, making assailants more
vectors and possibly permitting hybrid cyber and movie offensive actions within a mili-
tary setting, AI services supporting attack tracking and speeding, and data armament.
Military weapons are mostly purchased from suppliers of diverse and non-transparent
supply chains, and parts are transited via the SoS before delivery to their ultimate desti-
nation. Accountability for the accuracy and credibility of each piece of goods will also be
hard to assess. Therefore, electronic system shipping can be undermined before reaching
the military Supply Chain 4.0. The incorporation of Supply Chains 4.0 is intended to allow
a mutually advantageous ecosystem capable of capturing the convergence of enterprise
applications between intra- and inter-entrepreneurs to maximize the general business
operation of the organization.
Those systems must ultimately be implemented to ensure efficient and viable supply chain
management methods. The most common factors impacting supply chain integration are
knowledge exchange, teamwork, confidence, readiness to work together, collaboration,
and shared business goals [34]. The armed force supply chains have four major risk cat-
egories; partner’s risk, hidden risk disclosures, interest risk dispute, and risk control. They
can be manifested by the lack of cooperation between organizations concerning cyber
security requirements, influencing civilian allies, contradicting their expectations of the
need to secure measures, and subcontracting the scattering of confidence.
Programmable interfaces for applications (APIs) that support program creation and
use are typically available for app developers beyond the product company to custom-
ize a program for their individual needs. This speaks volumes about both the platform’s
lack of API compatibility regulation. The disconnect between strategic and trade supply
chains can have different potential for weakness due to the mismatch of priorities with
organizational results and profits, respectively [1]. A military violation of protection will
have severe implications for civilians’ lives and national sovereignty. Conversely, the
events are expected to become more economically central in business activity. This is
shown by a data breach of the Australian Security Force in 2016, in which assailants
reached their targets by exploiting one of the ADF vendor vulnerabilities. The number
and positions of the many manufacturers needed to manufacture a product may also
threaten military supply chains. About 70% of foreign exchange contains semi-finished
goods undergoing final remodeling. In the world economy and global supply chains,
parts from various countries and suppliers may also be the most accessible goods. For
example, a 600-meter Dell Inspiron Notebook includes components made in more than
ten countries, including the Philippines, Malaysia. And the F-35 Strike Fighter, used by
countries such as the United States, Europe, and Australia, includes components from
all over the world and China.
and perhaps a large attack surface. Cyber security is similar to asymmetric combat, with
the malicious players only having to rely on a safe system’s weakest node.
Cyberattacks in trade areas often produce some kind of numerical result, either directly
or indirectly, like using industrial spying or encryption. The 2017 attacks by Winery
emphasize how financial insurgencies are motivated. The assault was thwarted by encryp-
tion to restrict access to data that could only be recovered after a monetary ransom was
paid. The car industry had recently substantially displayed another example of hacking
manual control systems with multiple integrated and perhaps internet-connected com-
puter controls. This introduces additional cyberattack mechanisms in physical networks
with no oversight or input into their function. There are no long-term effects on vehicles
that integrate major ITs.
Such hidden cyberattack interfaces are also present in the case of drones, robotics, and
other remote-controlled devices. In the future factory, cameras, drives, and autonomous
robots are generally controlled by complete military activities. A cyber assault on trans-
portation facilities could hypothetically affect activities, cause diversion of vital machin-
ery on the way, movement of machinery, compromise routes or disturb device activities,
and halt all flow of logistics.
Since essential facets of the potential supply chain are anticipated to be greatly simpli-
fied and cyberattackable, it is assumed that the safety perimeters have been broken for
many military structures. If data is damaged by a threat or a spontaneous mistake, sup-
portive logistics should be resilient and secure enough to ensure that data manipulation
is continued to be adequately supported. The capacity of an opposing party to control or
interrupt production lines are both of operational and supply chain financial capabilities
excellence paths if a physical and cyberattack is orchestrated.
6.9.1 Analysis of Risk
Structures for risk analysis help companies identify their possible vulnerabilities and eval-
uate how those vulnerabilities could impact the company and its processes. Analytical
approaches determine whether the network security priority of the enterprise is to avoid
an attack in a first case, to react when an intrusion occurs efficiently, or to both. The evolv-
ing scope of risk reduction has changed from the security of assets to business processes
or the safety of missions. The task goals for such evaluations affect evaluation weighting,
and these scores change criteria like the duration of the mission and the promptness. Risk
matrices may also be used for assessing the status and effect of possible threats within a
system. Traditional risk evaluation matrices classify risk with magnitude and frequency
and futile reasoning to expand the potential beyond such classifications.
Crown Jewel Analysis contributes to evaluating and informing more risk analyses in
kinetics, cyber, and supply chain, leveraging cyber assets that are mission-critical for the
process. The project goals for these evaluations affect the relative weight of the review,
with considerations like mission duration and directness change. Implementations for
100 Cyber Physical Systems
risk assessments help companies identify their potential weaknesses and determine their
potential impacts on the enterprise and its processes. The CSCRM is described as the orga-
nizational approach and programmatic practices used to evaluate and manage risks over
the whole IT supply chain, hardware and software supply chain processes. Testing strate-
gies involve deciding whether the network security objective of the enterprise is to avoid
an attack, respond appropriately when one occurs, or both.
The supply chain development responses of Pettit, Fiksel, and Croxton have three pos-
sible end states which decide that if a risk is unreasonable, the efficiency is enhanced, or
productivity degraded, based on the system’s potential risk situation. Capacity consider-
ations that may not always be numerical in military supply chains should be included in a
risk evaluation of factors such as reconstruction, capacity, versatility in procurement, and
total capacity that impact organizations.
Due to increasing cyber risk sophistication frameworks over the past decade, the threats
to the future of new cyber security incident management and harm risk mitigation
approaches and concepts are apparent. The transitions in technologies, processes, and net-
work configurations also need innovative strategies to resolve and minimize the influence
of cyber safety incidents. Unique, agile, and integrated market systems like supply chains
are not a marginal method or an active analysis area in current and evolving frameworks.
governments, and political areas, this is an ongoing field of research and development,
which adds more sophistication, visualization, and simulation required by cyber applica-
tion into these systems.
Existing network security management and supply chain management models are pri-
marily based on cyber security or Supply Chain 4.0. The models under discussion were
cross-compatible, but none directly established the strategic background of supply chains.
Although components of these frameworks will help explain how emerging technologies
can affect operational supply chains, they are not an overall solution, and the study gap
persists.
TABLE 6.1
Search about CPS Supply Chain Management
Year Image search: all category Web search: all category YouTube search: all category
1200
CPS-SCM
1000
800
600
400
200
0
2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020
Image Search: All Category Web Search : All Category
You tube Search: All Category
FIGURE 6.3
CPSSCM.
CPSSCM. CPCM-related concept was YouTube’s highest search in 2016 and was substan-
tially less searched in 2009. Image search on CPSSCM was highest in 2020 and significantly
less in 2013 as shown in Table 6.1.
Data set: Data is taken from Google Trends from 2008 to 2020 for 11 years for different
categories, as given in Table 6.1.
Figure 6.3 shows year-wise categories searched by users. The single type shows the
highest density compared to others.
innovative for a range of IoT wearable sensors, such Wirelesshart, ZigBee, IEEE 1451, and
6LOWPAN might differ across those protocols. One suggested approach for improving
the compatibility of various IoT sensors and devices is the intelligent gateways and the fog
computing architectural design; this is achieved by investing additional capital into IoT
color’s architecture.
Because cloud services combine large data stocks from various networks in a highly
virtualized environment, identity management is a significant obligation for providers.
Clouds are essentially resource sharing by multitenancy schemes, ensuring that multiple
users are not isolated at the hardware level. Multitenancy can create barriers to secrecy, as
records can be broken and divulged, and remains as allocations for information sharing
shift. One way to reduce computer characteristics is to protect messages and then delete
the passwords so they can’t be retrieved even though it’s accessed later.
Another cloud problem for IoT is its availability. IoT innovations using the cloud have to
have daily access to those resources for the provision and acquisition of data. Then the per-
formance of affected IoT devices could be reduced as clouds for IoT go offline or become
inaccessible. The design of cloud technology allows the generation of reliable failing pat-
terns challenging for unit commitment. That may mean unpredictable service drop-outs,
and several hours of accessibility can be prevented. Thanks to the omnipresent incorpora-
tion of modern IoT technologies into certain parts of society, IoT cloud interruption can
have a devastating impact on consumers, for example, by preventing them from commu-
nicating with protection or security systems.
Denial of service assaults pose a unique challenge to IoT-enabled cloud computing plat-
forms, as modern devices are increasingly embraced. While cloud servers are versatile
enough to change resource specifications, they cannot deny service attacks. Decentering
the cloud is one method of reducing network denials, but it may come at the cost of other
safety hazards like reduced resource elastic modulus and more specific attacks.
approaches outlined in the methodology are intended to have quantitative and diverse
implementations in different contexts. This research does not rely on the military or sup-
ply chain.
Tariq proposes a Hybrid Cloud Computers’ Agent-based Information Security Program
that serves as a decision-making mechanism to evaluate threats within a cloud infrastruc-
ture and respond to them. The job is highly risk-oriented and has no account of implica-
tions in this sense that goes beyond properties, risks, and vulnerabilities. The research
should not even concentrate on possibilities for the defense chain. The study results, how-
ever, help to determine the efficacy of various risk management approaches in the context
of taking into account risks to cloud service systems.
be modified more quickly and efficiently to its environmental requirements, and logisti-
cal assistance can be prepared more reliably. Industry 4.0 will transform how goods are
produced within the framework of the military supply chains. For Industry 4.0, future
dynamic network designs will include the durability and flexibility required to operate
the supply chain in agile military ecosystems. In addition, however, Industry 4.0 has some
possible security problems, and the systematic consequences of cyber protective action
violations are not well understood for Industry 4.0 deployments.
6.12.1 CPS Supply Chain Management Threats to IoT and Industry 4.0 Systems
The present challenges of IoT research include uniformity, safety problems, and the possi-
bility of data leakage. Obstacles to omnipresent internet connections, such as connections
security limits, operational considerations, and network abandonment, are susceptible to
seriously disrupting the conduct of armed forces, particularly in the field. Highly classi-
fied defense information is also a threat to IoT deployment, as it is likely that computers
will not capture security information without authorization. IoT adoption has many vari-
ables that minimize deployment viability in the military background and IoT adoption.
In armed force environments, IoT technology must be strategically applied and leveraged.
IoT devices depend on a network infrastructure outside of themselves, like analytical
platforms. This puts constraints on the isolation of military capabilities and resources
from commercial networks and thus enhances the military’s trust in third-party technol-
ogy service providers. Furthermore, these third parties and their control of existing infra-
structures will directly affect the service life of those systems used by armed services. This
raises further concerns regarding the competence of these devices as military assets and
the changes and contacts that third-party facilitator can make to them.
The integration of IoT and Industry 4.0 ecosystems of fog computing has both safety con-
sequences and can also improve the safety of military environments. There is no guaran-
tee of stable cloud connection; fog technologies may be deployed in locations where there
is little to no signal. However, some architectural advantages emerge, bringing additional
efficiency and safeguards. There are also solid semantical areas of research aimed at defin-
ing and contextualizing the field in this area and related areas.
The processing, owing to operational needs for in-house data and technical specifica-
tions for the external manufacturing process, filtering, and analytics (DPS) of the IoT sen-
sors and devices, often presents problems for the military. It is not practicable to gather
data and submit it to be stored abroad in some situations by providing it before restoring
the data to the original site. This needs reliance on multiple networks, both secure and
public, encryption across a dynamic sequence of events; confidence in the protection of
third parties; data storage and analysis for data mining. In designing products according
to the requirements, the interconnectedness of small production plants and the capacity
to reprogram and modify production and industrial products in real time also play a key
role. Interconnection and versatility are two essential characteristics of product growth
that affect product design in Industry 4.0. Production advantages on request and Industry
4.0 innovations have to be measured at a granular level.
safety conditions of a supply chain using graded parameters. The DEMATEL technology
was used to cover many situations in the supply chain, including the replacement parts
industry, environmentally sustainable supply chain management, and the rapid turn-
around of consumer items. This method also can be used in military supply chain situa-
tions with different technologies but is probably to take account of the particular features
of supply chain defense chains such as in tactical settings in a broader model. Cyber risk
evaluations for IoT products were often suggested as methods to measure the effect of IoT
technology on military supply chains.
6.13 Conclusion
A morphological box is presented in this chapter to design the CPS in SC planning and
control processes. A literature review to classify 11 traits of distinct expressions is carried
out for this reason. These are classified into the features of method and technology. In
addition, a steel manufacturing firm applied morphology in two usage cases. In brief, the
technological characteristics deal with the advancement in the structural architecture of a
CPS. In SC preparation and control systems, adding method features into the morphologi-
cal box also considers the criteria for these system solutions. The process owners also take
part in an early CPS design stage.
References
1. Sharma, A.; Jain, D.K. A Roadmap to Industry 4.0: Smart Production, Sharp Business and Sustainable
Development; Springer, Cham, Switzerland, 23–38. 2020.
2. Mentzer, J.T.; DeWitt, W.; Keebler, J.S.; Min, S.; Nix, N.W.; Smith, C.D.; Zacharia, Z.G. Defining
supply chain management. J. Bus. Logist. 22(2):1–25. 2001.
3. Frederico, G.F.; Garza-Reyes, J.A.; Anosike, A.; Kumar, V. Supply chain 4.0: Concepts, maturity
and research agenda. Supply Chain Manag. Int. J. 25(2):262–282. 2019.
4. Waters, D.; Rinsler, S. Global Logistics: New Directions in Supply Chain Management; Kogan Page
Publishers, London, UK, 100–127. 2014.
5. Ivanov, D.; Dolgui, A.; Sokolov, B. The impact of digital technology and industry 4.0 on the
ripple effect and supply chain risk analytics. Int. J. Prod. Res. 57(3):829–846. 2019.
6. Garrido-Hidalgo, C.; Olivares, T.; Ramirez, F.J.; Roda-Sanchez, L. An end-to-end internet of
things solution for reverse supply chain management in industry 4.0. Comput. Ind. 112:103–127.
2019.
7. Moustafa, N.; Adi, E.; Turnbull, B.; Hu, J. A new threat intelligence scheme for safeguarding
industry 4.0 systems. IEEE Access 6:32910–32924. 2018.
8. Salamai, A.; Hussain, O.K.; Saberi, M.; Chang, E.; Hussain, F.K. Highlighting the importance
of considering the impacts of external and internal risk factors on operational parameters to
improve supply chain risk management. IEEE Access 7:49297–49315. 2019.
9. Dhatterwal, J.S.; Kaswan, K.S.; Preety. “Intelligent agent-based case base reasoning systems
build knowledge representation in Covid-19 analysis of recovery infectious patients” in a book
entitled “application of AI in COVID 19” published in Springer series: Medical virology: From
pathogenesis to disease control, July 2020, ISBN No. 978-981-15-7317-0 (e-Book), 978-981-15-
7316-3 (Hard Book). https://doi.org/10.1007/978-981-15-7317- 0.
108 Cyber Physical Systems
10. Turnbull, B. Cyber-resilient supply chains: Mission assurance in the future operating environ-
ment. Aust. Army J. 14(2):41–56. 2018.
11. Keshk, M.; Sitnikova, E.; Moustafa, N.; Hu, J.; Khalil, I. An integrated framework for privacy-
preserving based anomaly detection for cyber-physical systems. IEEE Trans. Sustain. Comput.
6: 66–79. 2019.
12. Marsden, T.; Moustafa, N.; Sitnikova, E.; Creech, G. Probability risk identification-based intru-
sion detection system for SCADA systems. In International Conference on Mobile Networks and
Management; Springer, Berlin/Heidelberg, Germany, 353–363. 2017.
13. Martin, C.; Towill, D.R. Supply chain migration from lean and functional to agile and custom-
ised. Supply Chain Manag. 5(4):206–213. 2000.
14. Boyson, S. Cyber supply chain risk management: Revolutionizing the strategic control of criti-
cal IT systems. Technovation 34(7):342–353. 2014.
15. Xiao, Q.; Boulet, C.; Gibbons, T. RFID security issues in military supply chains. In S. Vyas, V.
K. Shukla (eds.) Proceedings of the Second International Conference on Availability, Reliability and
Security (ARES’07), Vienna, Austria, 599–605. 2007.
16. Hendricks, K.B.; Singhal, V.R. Association between supply chain glitches and operating per-
formance. Manag. Sci. 51(5):695–711. 2005.
17. Liya, J.; Tiening, W.; Ronghui, W. Risk evaluation of military supply chains based on the case
and fuzzy reasoning. In T. Sobb (ed.) Proceedings of the 2010 International Conference on Logistics
Systems and Intelligent Management (ICLSIM), Harbin, China, 1, 102–104. 2010.
18. Mei, M.M.; Andry, J.F. The alignment of business process in event organizer and enterprise
architecture using TOGAF. JUTI J. Ilm. Teknol. Inf. 17(1):21–29. 2019.
19. Zarour, K.; Benmerzoug, D.; Guermouche, N.; Drira, K.A. A BPMN extension for business
process outsourcing to the cloud. In World Conference on Information Systems and Technologies;
Springer, Berlin/Heidelberg, Germany, 833–843. 2019.
20. Srinivasan, S.; Singh, J.; Vivek, K. Multi-agent-based decision support system using data mining
and case-based reasoning. Int. J. Comput. Sci. Issues 8(4) No 2, July 2011.50 ISSN (Online): 1694-0814.
21. Scrapper, C.; Droge, G.N.; Xydes, A.L.; de la Croix, J.P.; Rahmani, A.; Vander Hook, J.; Lim,
G. Mission Modeling Planning, and Execution Module (M2PEM) Systems and Methods. US Patent
Appl. 16/403, 838. 2019.
22. Sampath Kumar, V.; Khamis, A.; Fiorini, S.; Carbonera, J.; Olivares Alarcos, A.; Habib, M.;
Olszewska, J.; Li, H.; Olszewska, J.I. Ontologies for industry 4.0. The Knowl. Eng. Rev. 34:E17.
2019. https://doi.org/10.1017/S0269888919000109.
23. Waters, G.; Blackburn, A.J. Australian Defence Logistics: The Need to Enable and Equip Logistics
Transformation; Kokoda Foundation Limited Publisher, Number 19: Balmain, Australia. 2014.
24. Wang, F.; Ge, B.; Zhang, L.; Chen, Y.; Xin, Y.; Li, X. A system framework of security manage-
ment in enterprise systems. Syst. Res. Behav. Sci. 30(3):287–299. 2013.
25. Flauzac, O.; González, C.; Hachani, A.; Nolot, F. SDN based architecture for IoT and improve-
ment of the security. In M. A. Abid (ed.) Proceedings of the 2015 IEEE 29th International Conference
on Advanced Information Networking and Applications Workshops, WAINA '15, Gwangju, Korea,
688–693. 2015.
26. Poudel, S. Internet of things: Underlying technologies, interoperability, and threats to privacy
and security. Berkeley Tech. L.J. 31:997–1022. 2016.
27. Seliem, M.; Elgazzar, K.; Khalil, K. Towards privacy-preserving IoT environments: A survey.
Wirel. Commun. Mob. Comput. 1032761. 2018.
28. Shon, T.; Cho, J.; Han, K.; Choi, H. Toward advanced mobile cloud computing for the internet
of things: Current issues and future direction. Mob. Netw. 19(3):404–413. 2014.
29. Pathan, A.S.K.; Lee, H.W.; Hong, C.S. Security in wireless sensor networks: Issues and chal-
lenges. In Proceedings of the 2006 8th International Conference Advanced Communication Technology;
Phoenix, Park, Korea, 44(2):1043–1048. 2006.
30. Aazam, M.; Huh, E.N. Fog computing and smart gateway-based communication for the cloud
of things. In MDPI and R. Mohmmad (ed.) Proceedings of the 2014 International Conference on
Future Internet of Things and Cloud, Barcelona, Spain, 464–470. 2014.
Cyber-Physical in Supply Chain Management 109
31. Singh, J.; Pasquier, T.; Bacon, J.; Ko, H.; Eyers, D. Twenty security considerations for cloud-
supported Internet of things. IEEE Internet Things J. 3(3):269–284. 2016.
32. Mendes, R.; Vilela, J.P.; Privacy-preserving data mining: Methods, metrics, and applications.
IEEE Access 5:10562–10582. 2017.
33. Saleh, M.; Khatib, I. Throughput analysis of WEP security in ad hoc sensor networks. In STM
Journal and B Balaji Bhanu's Proceedings of the Second International Conference on Innovations in
Information Technology (IIT’05), Dubai, UAE, 26–28. 2005.
34. Awasthi, A.; Grzybowska, K. Barriers of the supply chain integration process. In A. Awasthi
Logistics Operations, Supply Chain Management and Sustainability; Springer, Cham, Switzerland,
15–30. 2014.
7
Security and Privacy Aspects in
Cyber Physical Systems
CONTENTS
7.1 Introduction......................................................................................................................... 111
7.2 Literature Review............................................................................................................... 112
7.3 Architecture of Cyber Physical Systems.......................................................................... 114
7.4 Proposed Framework of Cyber Physical Systems in Transportation System............ 115
7.5 Security and Privacy Issues in Cyber Physical Systems along with Its
Countermeasures................................................................................................................ 116
7.5.1 Risk Assessment..................................................................................................... 116
7.5.2 CPS Security Analysis............................................................................................ 116
7.5.3 CPS Security Solutions........................................................................................... 117
7.5.3.1 Single-Layer-Based Solutions................................................................. 117
7.5.3.2 Multilayer-Based Solutions..................................................................... 117
7.6 Attacks on Cyber Physical Systems.................................................................................. 118
7.6.1 Network Attacks..................................................................................................... 118
7.6.2 Cryptographic Attacks........................................................................................... 118
7.6.3 Malicious Software................................................................................................. 118
7.6.4 Cyber Threats.......................................................................................................... 119
7.6.5 Cryptanalysis.......................................................................................................... 119
7.7 Advantages and Disadvantages of Cyber Physical Systems........................................ 120
7.7.1 Advantages of Cyber Physical Systems............................................................... 120
7.7.2 Disadvantages of Cyber Physical Systems.......................................................... 121
7.8 Applications of Cyber Physical Systems.......................................................................... 121
7.9 Conclusion........................................................................................................................... 122
References...................................................................................................................................... 123
7.1 Introduction
Cyber physical systems refers to modern systems with a combination of physical and com-
putational abilities which can interact with humans in a new way. Expanding and interact-
ing with the physical world by methods such as communication, control key, and computing
are the primary foci of current and future study [1]. And these research challenges include
design and implementation challenges. Engineering norms centered on technology and sup-
ported by solid mathematical assumptions form the basis of cyber physical systems. Both
the physical and digital components of pervasive computing may benefit from the notion of
privacy and security. Information assurance, information protection, and cyber security are
just a few examples of phrases that mean essentially the same thing but sound different. The
informational and non-physical aspects are crucial to the function of cyber physical systems.
Cyber physical system is a vast tree that includes Internet of Things, robotics, machine auto-
mation, process control system, industrial internet, and industrial control systems. The main
five principles for the nonphysical side of cyber physical systems are confidentiality, integ-
rity, availability, authorization, and nonrepudiation. There are so many methods available for
implementing these principles. In order to ensure that the data has not been tampered with,
for instance, an encrypted data and block cipher are utilized. Confidentiality, in this context,
is keeping sensitive information hidden via the use of cryptography and decryption methods.
The redundancy function is used to ensure that all necessary system components are always
up and running. The authentication principle ensures that only authorized users may get
access to a resource by using tools like passwords and certificates. The diabetes and diabetic
principle follows from the authorization concept and states that once a message has been sent
or an approved use of an item has taken place, neither may be revoked. Privacy is the word that
is related to the confidentiality principle. The interconnection of elements in the cyber physical
systems leads to regular inspection. Because the cyber physical systems is the combination of
both cyber and physical processes which means it gives the pathway to both the physical and
cyberattack. The vulnerabilities that may occur on the physical side and cyber side can’t be
added they are multiplied. To achieve a fully protected cyber physical system the protection is
to be done both on the cyber side and the physical side. Because protecting a single pathway
doesn’t protect the whole cyber physical system. Furthermore, the potential components may
be safeguarded by the usage of elements that are employed in both the physical and cyber
realms. In a cyber physical system assault, the attacker goes at the devices themselves, the
interconnection between them, the CPS’s supporting facilities, and the internet. The attacker
uses the ambiguity in the weak inter-protocol communications to their disadvantage. They
also make use of security flaws in the poor design and the implementation of Application
Program Interface (API) to trade off the components. They also monitor the communication
between the clients and the peer-to-peer communication between devices. So each of the vul-
nerabilities is covered by the security and also secures the components [2].
Aeronautics is one industry that makes extensive use of cyber physical systems for
things like aircraft landings, flight crew communications, and flight health monitoring.
Firefighters, farmers, and those who clean up after accidents like mudslides or chemical
spills at sea may all benefit from cyber physical systems. Cyber physical systems are also
used in the medical and transportation sectors.
Section 7.2 contains the literature review of eight papers. Section 7.3 presents the general
architecture of cyber physical systems. Section 7.4 presents the proposed framework of
cyber physical systems (CPS) in the transportation system. Section 7.5 contains the security
and privacy issues in cyber physical systems along with their countermeasures. Attacks on
the cyber physical systems are discussed in Section 7.6. Section 7.7 contains the advantages
and disadvantages of cyber physical systems. An application of cyber physical systems is
discussed in Section 7.8 and then Section 7.9 contains the conclusion of this chapter.
7.2 Literature Review
Jianuha shi, jiafu wan, and Hehua yan hui suno (2011) elaborate on the survey of cyber
physical systems. The cyber physical systems and its features are also elaborated on by the
Security and Privacy Aspects in Cyber Physical Systems 113
authors. The authors illustrate the layout of cyber physical systems and also discussed the
research process. The research processes include energy control, security control, manage-
ment and transmission, and model-based software design. The classic applications of the
cyber physical systems are also illustrated in this paper. The present condition is contrasted
to the traditional trend of features, and the characteristic research issue is examined [3].
Jairo Giraldo and Esha Sarkar et al. (2017) describe security and privacy issues in cyber
physical systems in a survey of studies. This paper elaborates the general cyber physical
systems diagram and the taxonomy related to CPS. The CPS security and privacy taxon-
omy which are domain, security, privacy, and defenses are also illustrated by the authors.
The authors also described the taxonomy-related work with the help of graphs to under-
stand which taxonomy is illustrated in which paper. The authors also gave the future
research direction and the recommendation in the future research area. The taxonomy-
related papers are selected and presented [4].
Abdul Malik Humayed et al. (2017) describe cyber physical systems security in a study.
The three coordinates of the cyber physical system security with the help of a framework
are described in this paper. These three coordinates are cyber physical systems, threats,
and possible vulnerabilities. The authors also presented the applications of the cyber phys-
ical systems with the help of diagram authors described all the applications. The threats
against the cyber physical systems that are illustrated in this paper are grid-related threats,
ICS-related threats, medical devices-related threats, and smart cars-related threats. The
vulnerabilities that lead to these threats illustrated above are also defined in this paper.
The authors also described the attacks on the CPS applications and also the security
controls related to them. The challenges related to the cyber physical systems are also
described in this paper [5].
K.P. Chow, Eric Ke Wang, Xiaofei Xu, S.M. Yiu, Yunming Ye, and L.C.K. Hui (2010) dis-
cuss the security issues and challenges for cyber physical systems. This paper presents the
basic workflow of cyber physical systems. The general workflow includes four steps which
are monitoring, actuation, networking, physical process, and computing. The confiden-
tiality, availability, integrity, and authenticity of security objectives are also described in
this paper. Important types of attacks are also defined in this paper and these attacks are
denial of service attack, key compromised attack, eavesdropping, and man-in-the-middle
attack. The authors also presented the importance of the context-related framework and
its working in this paper. The workflow of that framework is also illustrated in this paper
with the help of adversaries of the security [6].
Francesco Bullo, Fabio Pasqualetti, and Florian Dörfler (2013) elaborate on the attack
identification and detection in cyber physical systems. This paper presents a math-
ematical structure for attack identification, detection, and monitoring. The authors
also discussed the fundamental parameters and limitations regarding the monitoring
process. The graphical representation of classic and theoretical characteristics is also
presented in this paper. The authors also design the monitors for attack detection and
identification. With the help of the example, the result is validated and verified. The
basic monitoring limitations include system-based theoretical monitoring and graph-
based monitoring limitations. Certain examples for understanding the concept are
also presented in this paper [7].
Ragunathan (Raj) Rajkumar, insup lee et al. (2010) describe the cyber physical systems as
the next computing revolution. This paper elaborates on how the cyber physical systems
are used in companies nowadays. The grand challenges and the vision towards the future
are also discussed in this paper. The authors also illustrated the foundation and challenges
related to the scientific approach in cyber physical systems. The various problems in cyber
114 Cyber Physical Systems
physical systems are safety, robustness, composition, architecture, hybrid systems, compu-
tational transparency, and sensors. The authors also discussed the infrastructure and the
social impact of cyber physical systems [8].
Zhipeng Cai and Xu Zheng (2018) elaborate on the mechanism for uploading data in the
cyber physical systems. Firstly, the authors described the problem statement which con-
sists of functions like system input, utility, privacy, and the design objectives.
This article also presents a framework for uploading data, detailing the many processes
necessary to carry out this operation, including determining the operation’s difficulty, pro-
viding a comprehensive overview of the framework, and choosing a content-based algo-
rithm. This research also presents an examination of productivity while using a greedy
method with a trace opposite shoulder. All the performance analysis factors like time
complexity, effectiveness, and completeness are also calculated in this paper based on the
performance. The evaluation of the performance is also presented in this paper by taking
general performance and performance with the individual. With the help of the graph, all
the performance is shown in this paper [9].
Jinjun Chen, Muneeb Ul Hassan, and Mubashir Husain Rehmani (2019) elaborate on the
distinctive privacy issues in cyber physical systems. This paper presents comprehensive
privacy issues in cyber physical systems applications like transportation system, energy
systems, power grid, and healthcare systems. The comparison table based on the privacy
strategies like encryption, anonymization, and differential privacy is also presented in
this paper. A framework related to the differential privacy in cyber physical systems is
also presented in this paper. The authors also compare the design parameters of the cyber
physical systems with the help of a table so that it can be easily understood. The authors
basically taking the application one by one and then with the help of framework and dia-
gram they elaborates the whole process and then with the help of table and taking certain
parameters for the comparison for a single application of cyber physical systems [10].
FIGURE 7.1
Basic architecture of cyber physical system.
Security and Privacy Aspects in Cyber Physical Systems 115
The network layer generally provides the interconnection between controllers to the user.
The network layer is a part of the cyber part of the cyber physical systems. So it is a very
important layer in this architecture and most of the operation is done by that layer. The
fourth layer is a hardware and software control layer in which all the controlling related
information related to sensors and actuators is taken by this fourth layer hardware and
software control layer. It is the brain of the cyber physical systems because all the impor-
tant problems are processed by that layer.
FIGURE 7.2
Cyber physical system in transportation system.
116 Cyber Physical Systems
for the transportation system because here the protected data and unprotected data is
classified so that the main focus is to be done on the data which is more important. Some
privacy and security also added at the end of the cloud database so that the storage data
is found more protected by the analyst. Encryption and hashing is used during the com-
munication of vehicles and drivers so that the intruder does not take the advantage of that
particular communication channel.
7.5.1 Risk Assessment
Risk assessment is an essential element in the security aspects of CPS. With widespread
use, cyber physical systems (CPS) have become an easy target for hackers. There has to
be a shift in security’s primary focus, hazard identification, from the evaluation of indi-
vidual computers to that of whole networks. The primary goal of this strategy is to ensure
the safety of future cyber physical systems. The cyber physical system risk assessment
technique involves three steps, which are specifying what might occur to the systems,
estimating the chances of the incident, and assessing the results. There are three more
components while doing CPS risk assessment which are listed below:
1. Asset recognition
2. Threat recognition
3. Vulnerability recognition
design. Adding to the difficulty is the fact that further protections must be taken to protect
private information from the myriad of devices that may connect to the network at any one
time, regardless of their location. For avoiding challenges during designing, the designer
should include these three parameters in the mechanism that is detection, mitigation, and
prevention. There are some attackers who do not attack the direct vulnerability but try to
attack the layers vulnerability simultaneously. So some phase which might kept in mind
during the designing are listed below:
7.5.3.1 Single-Layer-Based Solutions
In order to improve encryption methods, a researcher suggested an identity-based dis-
tribution channels, while another author provides key management encryption [13]. So it
is illustrated that if the small key size is used then the computational process also takes
less time in the asymmetric key encryption [14]. If the available sources are limited then
it will also do the cost estimation analysis. For preventing the RFID tags from the sniff-
ing attack a lightweight authentication protocol is proposed. This protocol also provides
mutual authentication for the RFID readers [15]. The authors also proposed the secured
WSN that combines the healthcare system and cloud computing. The proposed frame-
work also does the monitoring and decision-making [16]. For providing message integrity,
authorization, and authentication, a two-step mutual scheme is proposed for the smart
grids. Diffie-Hellman algorithm is used for achieving the session key exchange [17].
7.5.3.2 Multilayer-Based Solutions
Some writers have provided multilayer-based solutions for cyber hardware and software
confidentiality and protection, recognizing that single-layer approaches to cyber security
problems are not always enough. For example, securing just one layer of a cyber physical
system won’t make it bulletproof; instead, you will need to protect all of the layers. A com-
bined public key-based approach which is an offline authentication is proposed. A mas-
sive data authentication and cross-domain authentication problem of security is solved
by this mechanism. This mechanism also provides security preservations for the data
transmission and the sensor data. This mechanism provides the solution at the perception
118 Cyber Physical Systems
transmission and the application layer [18]. A framework called “context aware security”
is suggested for the cyber physical system to help identify the behavior and study the sur-
roundings. This new framework protective measures, sensing, and cyber are all intercon-
nected. It’s flexible for the CPS since it includes security controls, cryptography, and key
agreement. The main objectives of this framework are integrity, authentication, confiden-
tiality, and authorization [19].
connected through it. Rat-trapping, browser hijackers, different kinds of virus, worms,
and phishing are the most used malwares by attackers these days [23].
7.6.5 Cryptanalysis
The study of analyzing the hidden parameters of an information system is known as
cryptanalysis [26]. It is the process of breaching the cryptographic system to achieve access
to the data of encrypted messages, even when the cipher key is unknown. Cryptanalysis is
also the study of the cryptosystem, cipher key, cipher text, and ciphers with the main goal
of understanding how they actually work in order to improve the techniques for weaken-
ing them. In this, cryptanalysts try to decrypt the cipher text without the knowledge of
plain text and the encryption key.
The main goal of cryptanalysis is to search for weaknesses in or to defeat the cryptographic
algorithm. The result analyzed by the cryptanalyst is also helpful for the cryptographers
to improve the flaws in the algorithm. Researchers also discovered some approaches of
attack that fully crack an encryption algorithm, which may result in the cipher text which
is to be encrypted by that particular algorithm and could be decrypted without knowing
the encryption key as shown in Figure 7.3. When a flaw in the algorithm’s implementations
FIGURE 7.3
Basic block diagram of cryptanalysis.
120 Cyber Physical Systems
is found, the number of keys that need to be tried to decipher the intended encrypted text
is reduced.
Cryptanalysis attack types include:
1. Known-Plaintext Analysis (KPA): In this attack, the attacker decrypts cipher texts
with the knowledge of the known partial plaintext.
2. Chosen Plaintext Analysis (CPA): In this method, the attacker uses cipher text that
is similar to the selected plaintext by using the same algorithm technique.
3. Cipher text Only Analysis (COA): In this approach, the attacker has a large known
collection of cipher text.
4. Man-in-the-Middle (MITM) Attack: In this attack, the attack is basically done
when two users exchange a message via the communication channel that seems
to be secure but actually is not.
5. Adaptive Chosen Plaintext Attack (ACPA): in this method, the attacker uses the
cipher text and chosen plain text based on the previous encryption results.
1. Cyber physical system is the quickest method to make sure of protection in actual
global operations.
2. CPS makes sure of good effectiveness in different actual global operations.
3. There is an advancement of life standards for millions of people because of cyber
physical systems.
4. Cyber physical system has the capability to conduct an optimistic revolution on a
global level.
5. Cyber physical system can execute millions of calculations instantly.
6. Variability in cyber-physical operation of the system. The process of demonstrat-
ing a plan’s repeatability is called proof-of-concept.
7. Cyber physical system is capable of developing and processing through new and
untrustworthy circumstances.
8. Cyber physical system is capable to supply better performance with regard to
feedback and automated re-design with a close interconnection of sensors and
cyber architecture.
9. As a thread of cloud computing cyber physical system is capable of giving assets
to users in terms of their needs.
10. Cyber physical system has the potential to supply more resources than wireless
sensor networks and cloud computing on its own.
Security and Privacy Aspects in Cyber Physical Systems 121
1. Cyber physical system gives less efficiency with regard to assets and potentiality.
The unbalanced type of cryptography makes its instantaneous interaction vulner-
able because of the extra time taken by encryption.
2. Due to its all-automated nature, it creates unemployment in the world.
3. Because of cyber physical system’s real-time communication, it creates
unpredictability.
4. In terms of cyber physical system forensics, it is vulnerable to many problems with
regard to the deficiency of tools, expertise, and feedback against any non-forensic
activities.
5. The efficacy of Intrusion Detection Systems is reduced by the fact that there are
many distinct kinds of these systems, including sign-based, action-based, and
peculiarity-based systems, which are often deployed in the context of Internet of
Things subdomains.
6. By cyber physical system the devices could achieve their own consciousness. This
can actually be a very big challenge in the coming future.
and findings. The Software Learning Environment (SLE) will ultimately revolu-
tionize the way people study and work in colleges.
5. The cyber physical system can be used in flight implementations for example air test
instrumentation, structure well-being observation, the landing of flight, the enter-
tainment wireless compartment in the flight, and staff-pilot intercommunication etc.
6. In recent times, many civil engineers face the challenge of management of getting old
of architectures like flyovers, buildings, dams, etc. A mechanical sensor, fiber optic
sensors, and micro electrical sensors and wireless intercommunication automation
give enormous assurance for accuracy and uninterrupted architectural observation.
7. Cyber physical system gives a path to upgrade the performance of control of traffic
system [29]. An environment that lies in the natural geopolitical environment and
artificial environment, for example, flyovers across the ocean or waterways, and
huge underpass, high-threat sub-grade slope, city uplifted flyovers are assembled
by road traffic control by cyber physical system, and also tremendous diversity of
vehicles, humans, and different goods in the road environments [30].
8. Humanoid robots: Humanoid robots of this sort are employed to provide care for
elderly people who live at home or in other locations where they may be easily
accessed by the robots. These types of robots are used in underwater sea opera-
tions, muddy military operation, landmine detection, space operations, rainforest
environments, and critical infrastructure problem-based task. They are used for
personal use and they are also used in the agricultural field. These types of robots
are especially helpful in emergency scenarios and violent confrontations when
human lives are under jeopardy.
9. Manufacturing: The cyber physical system is also used in the manufacturing
department for monitoring and controlling operations. Cyber physical system also
improves the manufacturing process by distributing information between the
business system, suppliers, customers, supply chain, and machines. For improv-
ing the traceability of the security goods, the cyber physical system does that work
easily by doing a certain set of operations [31].
10. Water distribution cyber physical systems: Nowadays, water distribution sys-
tems have become more automated. Tanks, pumps, wells, pipes, and reservoirs
are used for creating these types of automated water distribution systems. The
sensors are used for detecting the overflow of water in tanks and pipes, and the
algorithm is used for automated operations likes opening of valves, data acqui-
sition, supervisory and monitoring control, and all the devices which lie in the
network. They uncover the systems to possible attacks on the related software
that has control of it. If the attacker can get the remote access of any component of
the cyber physical system so they can also do damage like stealing data, cut water
supplies, and damage equipment.
7.9 Conclusion
This chapter presents the security and privacy issues in cyber physical system. The lit-
erature reviews of eight papers have been done in this chapter which is related to cyber
Security and Privacy Aspects in Cyber Physical Systems 123
physical systems. A general architecture of the cyber physical system is also presented in
this chapter along with its components. A simple framework for the cyber physical system
used in transportation system is also proposed along with the description of the proposed
framework. The attacks on cyber physical systems are also elaborated on in this chapter.
The advantages and disadvantages are also presented in this chapter. The applications of
cyber physical systems are also elaborated. The latest research topics and future research
areas in cyber physical systems are also discussed. This chapter will help future research-
ers working in this area and related topics because this chapter contains all the security-
and privacy-related aspects of cyber physical systems along with the proposed framework,
architecture, pros and cons, and the applications.
References
1. R Baheti, H Gill. Cyber Physical Systems. The Impact of Control Technology, 2011.
2. GA Fink, TW Edgar, TR Rice, DG MacDonald, CE Crawford. Overview of security and privacy
in cyber physical systems: Foundations, principles and applications. In Security and Privacy in
Cyber-Physical Systems (pp. 1–23). Oak Ridge National University, Pacific Northwest National
University USA, 2017.
3. J Shi, J Wan, H Yan, H Suo. A Survey of Cyber Physical Systems. IEEE, 2011.
4. J Giraldo, E Sarkar, AA Cardenas, M Maniatakos, M Kantarcioglu. Security and Privacy in Cyber
Physical Systems: A Survey of Surveys. IEEE, August 2017.
5. A Humayed, J Lin, F Li, B Luo. Cyber Physical Systems Security – A Survey. IEEE, 17 January 2017.
6. EK Wang, Y Ye, X Xu, SM Yiu, LCK Hui, KP Chow. Security issues and challenges for cyber phys-
ical system. 2010 IEEE/ACM International Conference on Green Computing and Communications &
2010 IEEE/ACM International Conference on Cyber, Physical and Social Computing, China, 2010.
7. F Pasqualetti, F Dörfler, F Bullo. Attack detection and identification in cyber physical systems.
IEEE Transactions on Automatic Control, 58(11), November 2013.
8. R Rajkumar, I Lee, L Sha, J Stankovic. Cyber physical systems: The next computing revolution.
Design Automation Conference, ACM, Anaheim, CA, USA, 2010.
9. Z Cai, X Zheng. A private and efficient mechanism for data uploading in smart cyber physical
systems. IEEE Transactions on Network Science and Engineering Department of Computer Science,
Georgia, State University, Atlanta, GA, USA, 2018.
10. MHR Muneeb Ul Hassan, J Chen. Differantial privacy techniques for cyber physical systems:
A survey. 27 September, 2019.
11. Y Ashibani, QH Mahmoud. Cyber physical systems security: Analysis, challenges and solu-
tions. Department of Electrical, Computer and Software Engineering, University of Ontario
Institute of Technology, Oshawa, Elsevier, Canada, 12 April 2017.
12. R Alguliyev, Y Imamverdiyev, L Sukhostat. Cyber physical systems and their security issues.
Elsevier, Institute of Information Technology, Azerbaijan National Academy of Sciences, 9A, B.
Vahabzade Street, Baku AZ1141, Azerbaijan, April 2018.
13. G Yang, CM Rong, C Veigner, JT Wang, HB Cheng. Identity-based key agreement and encryp-
tion for wireless sensor networks. The Journal of China Universities of Posts Telecommunication,
6:54–60, 2006.
14. SN Premnath, ZJ Haas. Security and privacy in the internet-of things under time-and-budget-
limited adversary model. IEEE Wireless Communications Letters, 4(3):277–80, 2015.
15. W Trappe, R Howard, RS Moore. Low-energy security: Limits and opportunities in the inter-
net of things. IEEE Security & Privacy, 13(1):14–21, 2015.
16. J Wang, H Abid, S Lee, L Shu, F Xia. A secured health care application architecture for cyber-
physical systems. Control Engineering and Applied Informatics, 6: 101–108, 2011.
124 Cyber Physical Systems
CONTENTS
8.1 Introduction......................................................................................................................... 125
8.2 Literature Review............................................................................................................... 127
8.2.1 Research Methodology.......................................................................................... 130
8.2.2 A Case Study Is about Automobile Manufacturing.......................................... 130
Step 1: Recognizing Commerce Requirements and Process............................. 130
8.3 Process Identification and Mapping................................................................................ 132
8.3.1 Decisions about Operations.................................................................................. 133
8.3.2 Organizing Needs by Priority.............................................................................. 133
8.3.3 Nonpractical Specifications................................................................................... 134
8.4 Layers of Overhaul Company and Application............................................................. 134
8.4.1 Analysis of a Case Study....................................................................................... 135
8.4.2 The Amount of Time Exhausted in and out of Institutions............................. 135
8.5 It’s Time to Put the Pieces Together.................................................................................. 135
8.5.1 Devotion to the Wash Process............................................................................... 135
8.5.2 Capturing Business Processes and Flexibility.................................................... 136
8.5.3 Manufacture Informed Decisions........................................................................ 136
8.5.4 Mechanisms Are Being Integrated into the CPS................................................ 136
8.6 Conclusions and Further Work......................................................................................... 137
References...................................................................................................................................... 137
8.1 Introduction
An automobile engine programmer might have a price tag of over US$2 billion (one-third
of a production line’s costs are spent on setup and maintenance). As modern manufactur-
ing systems technologies such as the Internet of Things (IoT) and intelligent goods are
becoming more common, smart manufacturing systems can reduce costs while meeting
demand. These systems are designed to be self-organizing, self-maintaining, controllable
in real time, efficient, robust, and autonomous [1]. One of the terms established by several
research groups worldwide to describe the evolving paradigm is Endeavour Industries
4.0, a German initiative to redefine manufacturing. A system composed of dispersed
components and closely linked digital representations, commonly called “twins.” These
systems are referred to in academic literature as cyber bodily systems. Digital modeling
and the IoT can often bring the digital and physical worlds together and provide unique
item identification in connection with materials, equipment, goods, and people [2]. It has
been recognized that CPSs can meet clients’ unique demands while also establishing and
creating a creative production model in the health check, power, and communications sec-
tors. By leveraging better defect detection to raise production yield and minimize waste,
cyber physical production systems (CPPSs) improve product quality, production efficiency,
and system flexibility. The availability of real-time, current, and historical system data
facilitates the development of credible simulations for planning, production prepara-
tion, load complementary and flexible, decentralized labor reserve organization to meet
fluctuating demands. As part of the “smart manufacturing” paradigm [3]. Industrialized
and logistics systems should be updated capabilities to increase the visibility of goods
and processes and optimize resource utilization and sustainability practices. At the local,
national, and international levels, reliable assets and products are essential to creating
sustainable supply chains. Radiodiffusion Television Ivoirienne (RTI), such as motionless
ages racks cases, is widely old to collect stock and optimize the logistics process. The use
of RTIs helps reduce solitary use wrapping and safeguard mechanisms from injury and
ecological threats throughout transit to meet global sustainability goals. Packaging and
RTIs are important in the supply chain because they allow component aggregation that
are keen on a solitary body, which improves logistical competence. Still, they also serve
as tools for aggregating components into a single entity, which improves logistical effi-
ciency [4]. RTI monitoring and management systems have to be adaptable and changeable
to suit changes in demand and diversity as part of “smart manufacturing.” Only 33% of
SMEs see the immediate benefits, and 80% believe their IT infrastructure is incapable or
inadequate to enable such use. Regardless of their variety of payback, RTIs have down-
sides such as inefficient logistical procedures and conclusion hold up [5]. RTI is frequently
absent, deleted enduringly, or injured (i.e., rendered worthless). Over 10% of RTIs need
to be replaced every year, with another 10% requiring maintenance, with one example
costing US$2 million. The direct costs of replacing and updating RTIs are straightforward
to calculate, but a slew of secondary expenses have far-reaching implications for a com-
pany [6–8]. Indirect costs include missing components (both completed and in progress),
late component entrance into manufacturing processes, and the provision of defective
components. Everybody loses when factories stop producing and people stop spending
money Additionally, determining the appropriate RTI navy dimension can be difficult; an
enlarged fleet wastes resources, whereas an undersized fleet fails to satisfy demand neces-
sitating the development of a system to aid in the monitoring and optimization of RTI
use. Two such difficulties are extreme client investment time and harm caused by abuse.
An ECHT of RTIs may be attributed to a number of causes, including incorrect demand
forecasts, a lack of necessary facilities, a delay in initiating necessary arrangements, and a
failure to fully appreciate the associated costs. About ten percent of RTI's fleet disappears
every year due to theft. For effective RTI returns, companies often rely on personality cov-
erage and kindness among stakeholders. To detect, treat, and remove damaged RTIs from
circulation, companies must guarantee that RTI surveillance technology with techniques
is inside put. RTIs’ existing visibility leads to a lack of procedure possession, delaying prob-
lem resolution. The present is a necessity toward guarantee monitoring and tracking RTI
efficiently is input with the configuration of contracts, incentives, fines, and preservation
commitment inside and flanked by organizations [9]. This may aid in reducing arguments
about who is accountable for replacing RTI casualties and whether or not the decisions
made were acceptable. The RTI monitor system must gather and present information on
The Impact of Industry 4.0 Cyber Physical Systems 127
RTI input presentation indicators (KPIs) to overcome the constraints imposed by cyber
physical production system (CPPS) standards and multi-stakeholders. RTI data must be
precise plus obtained in “real-time” as of the provided chain to make suitable judgments.
RTI fleets may demand regular real-time data collection, necessitating a low-cost solu-
tion. RFID’s use to provide real-world instance data collection makes it possible to build
a tracking system with little outlay of resources by facilitating Automatic Identification
(AIDC) of assets. This paper investigates the tools necessary to design a sophisticated RTI
monitoring system, with the goal of improving management and transparency around
RTI implementation [10]. This chapter which was carried out in partnership with the auto-
maker was used to improve CPPS capability with minor communications adjustments.
RTI usage management (to eliminate bottlenecks and delays) and quality assurance for
RTI utilization objectives, which are a significant element of their production processes
for decreasing engine defects, were the two aims of the smart RTIs monitoring system.
The previously provided research on smart RTI design and implementation is examined
to help expand the prospect system, therefore causal to the corpse of proof supporting
the acceptance of CPPS and its possible use in elegant RTI organization. The following is
the chapter structure: The section “Literature review and motivation” reviews relevant
literature and provides the rationale for this inquiry [11]. The unique system architecture
is offered in section “Smart RTI system design,” and the procedures for the evaluation
case study are detailed in section “Research methodology.” Section “Case study within an
automobile factory” describes the implementation. In contrast, section “Conclusions and
additional work” describes the outcomes and future work [12].
The requirement for suppleness and receptiveness among organizations, as delicate as
a multifaceted and incessantly changing corporate surroundings and customer insist, are
pushing knowledge advancement. Technology has long been recognized as a critical stra-
tegic instrument for assuring an organization’s long-term success and effectiveness. Many
companies are already using e-business technology to improve operational efficiency by
streamlining their business processes and achieving convergence [13]. They’re spend-
ing a lot of money on automation and robots right now so they can take advantage of
Industry 4.0’s cutting-edge innovations in the manufacturing sector. Industry 4.0 has been
predominantly examined from production as an operational vision in recent literature
and industry papers. On the other hand, Industry 4.0 and the technology that enables
it can transform each feature of factory plus organizations, vastly enhancing executive
disciplines such as providing sequence and logistics organization [14]. As a result of the
continual rise in business system automation, companies are adapting the manufacturing
4.0 in-service model to another aspect of operations and the efficiency and productivity
gains and quality enhancements that come with it. What makes this research stand out is
its endeavor to provide a comprehensive and integrated shift toward implementing tech-
nological innovations connected to Industry 4.0 in the service of providing sequence orga-
nization [15]. Third, it presents an incorporated framework for illustrating how embracing
Industry 4.0-related technology improvements could boost supply chain performance.
8.2 Literature Review
According to the authors, tags can be classified depending on their authority and commu-
niqué capabilities. Since the event wave is a modulated multispectral signal from a passive
128 Cyber Physical Systems
FIGURE 8.1
SOA and RAMI4.0 are used in the CPS RTI monitoring architecture.
8.2.1 Research Methodology
The research technique is based on the recommendations of Areola and Baines, and it
employs an adapted human-centered plan method that is well-suited to the construc-
tion of CPPSs. The strategy was based on a published case study that was used to create,
implement, and assess the sophisticated RTI program. Stakeholders need admission to
pertinent information to improve human decision-making and choose the best course of
action for achieving stated goals. The approach used the information knowledge Wisdom
dominance hierarchy, which was introduced in [25], to guarantee that the scheme is built
to facilitate excellent decision creation. Genomic sequences have been adjusted to give con-
notation and context, and information a collection of facts and, in turn, comprehension,
estimate, and ability have been used to enhance decision manufacturing.
FIGURE 8.2
Framework of requirement process.
132 Cyber Physical Systems
oversees all manufacturing processes and ensures that the plant runs smoothly and meets
the corporation’s distinct presentation criteria. All stakeholders necessitate the capacity to
monitor and review presentation indicators intended for every one sector of the amenities,
counting the monitoring and management of RTI, to improve the company’s efficiency.
The logistics team, which includes the store’s management and front-line employees, is the
most important group of stakeholders for an RTI to track and manage.
TABLE 8.1
Users and Their Responsibilities Are Identified
Stakeholders Domain Role/responsibilities
a predetermined schedule that distributes time evenly among all separator types. RTI’s
condition or demand does not appear to be used to prioritize laundry. Since the examina-
tion approach is physical and therefore based on human insight, this work gives a wide
range of quality (Table 8.1).
information types were chosen to fulfill the senior height needs. RTI IDs are regarded as
high-priority data categories, as with time stamps (12%) and geographical identifiers (12%).
8.3.3 Nonpractical Specifications
Scalability guarantees that the arrangement can be scaled to convene any nicotinamide ade-
nine dinucleotide insists by participatory processes message proper procedure and scheme
reserve complement capabilities – additional RTI, facilities, and user, for example. Stakeholders
have specified additional non-functional requirements, such as flexibility, toward a deal by an
unexpected change in RTI route and commerce process. (iii) Modularity allows for the incor-
poration of future technology developments and unique RTI types, such as on-plank RTI sen-
sors. (iv) Sanctuary guarantees any CPS will manage and control its resources. Third-party
attacks such as “man-in-the-middle,” denial of service, and insertion of false data can lead to
unauthorized disclosure [31]. Support for these non-functional criteria is essential for some,
but there are several stakeholder requirements that academic research hasn’t previously iden-
tified when considering future technologies and system implications. The use case revealed
the following necessities: Existing conventional skillets that may be enhanced utilizing indus-
trial hardware/software architectures are used or enabled inside a CPS. The organization’s
supplies are defined, biased, and discussed by the stakeholders. The agreed-upon materials
for the classy RTI system are as follows: The following factors are included into my calcula-
tions: (i) travel time, (ii) proximity to amenities, (iii) compliance with standards, (iv) ease of
completion, (v) data security, and (vi) system viability.
were only cleaned thrice throughout the six-month period. The first two occur after just
one series, and the third after 20 cycles. This shows a problem with the company’s quality
control, which must be addressed [33]. As a result of the poor performance, the RFID inte-
gration in the washing machine was examined to make sure it was working correctly. No
irregularities were established, implying that the clean devotion dimension was correct
[33]. Because of CPS’s continuous monitoring capabilities, the company may create planned
commerce procedure enhancements, in addition to quickly assessing their repercussions.
excellent tracking [36]. Although the scheme was successfully installed with the findings
being old for choice support, the system’s more comprehensive application is limited due
to the necessity to build a more robust system for extreme situations.
References
1. Colombo, A. W., Jammes, F., Smit, H., Harrison, R., Lastra, J. L. M., & Delamer, I. M. (2005).
Service-oriented architectures for collaborative automation. 31st Annu Conf IEEE Ind Electron
Società, 2005. IECON 2005, pp. 2649–2654.
2. Lee, J., Lapira, E., Yang, S., & Kao, A. (2013). Predictive manufacturing system—Trends of next-
generation production systems. IFAC Proc, 46(7), 150–156. http://doi.org/10.3182/20130522-3
-BR-4036.00107.
3. García-Arca, J., González-Portela Garrido, A. T., & Prado-Prado, J. C. (2016). “Pack- aging logis-
tics” for improving performance in supply chains: The role of meta-standards implementa-
tion. Producao, 26, 261–272. http://doi.org/10.1590/0103- 6513.184114.
4. Chaâri, R., Ellouze, F., Koubâa, A., Qureshi, B., Pereira, N., Youssef, H., & Tovar, E. (2016). Cyber-
physical systems clouds: A survey. Comput Netw, 108, 260–278. https://doi.org/10.1016/j.comnet
.2016.08.017.
138 Cyber Physical Systems
5. Monostori, L., Kádár, B., Bauernhansl, T., Kondoh, S., Kumara, S., Reinhart, G., Sauer, O.,
Schuh, G., Sihn, W., & Ueda, K. (2016). Cyber-physical systems in manufacturing. CIRP Ann
Manuftechnol, 65(2), 621–641. http://doi.org/10.1016/j.cirp.2016.06.005.
6. Lee, J., Bagheri, B., & Kao, H. A. (2015). A cyber-physical systems architecture for industry
4.0-based manufacturing systems. Manuf Lett, 3, 18–23. https://doi.org/10.1016/j.mfglet.2014.12
.001.
7. Barbosa, J., Leitão, P., Trentesaux, D., Colombo, A. W., & Karnouskos, S. (2016). Cross Benefits
from Cyber-Physical Systems and Intelligent Products for Future Smart Industries Cross Benefits from
Cyber-Physical Systems and Intelligent Products for Future Smart Industries. IEEE, pp. 504–509.
http://doi.org/10.1109/INDIN.2016.7819214.
8. Leitao, P., Rodrigues, N., Turrin, C., & Pagani, A. (2015). Multiagent system integrating process
and quality control in a factory producing laundry washing machines. IEEE Trans Ind Inform,
11(4), 879–886. http://doi.org/10.1109/TII.2015.2431232.
9. Li, D., Tang, H., Wang, S., & Liu, C. (2017). A big data-enabled load-balancing control for smart
manufacturing of industry 4.0. Clust Comput, 20(2), 1–10. https://doi.org/10.1007/s10586- 017
-0852-1.
10. Ardanza, A., Moreno, A., Segura, Á., de la Cruz, M., & Aguinaga, D. (2019). Sustainable and
flexible industrial human-machine interfaces to support adaptable applications in the industry
4.0 paradigm. Int J Prod Res, 57(12), 4045–4059. https://doi.org/10.1080/00207543.2019.1572932.
11. Vega, D., & Roussat, C. (2015). Humanitarian logistics: The role of logistics service providers.
Int J Phys Distriblogistmanag, 45(4), 352–375. http://doi.org/10.1108/IJPDLM-12-2014- 0309.
12. Govindan, K., Soleimani, H., & Kannan, D. (2015). Reverse logistics and closed-loop supply
chain: A comprehensive review to explore the future. Eur J Oper Res, 240(3), 603–626. http://doi
.org/10.1016/j.ejor.2014.07.012.
13. Glock, C. H. (2016). Decision support models for managing returnable transport items in sup-
ply chains: A systematic literature review. Int J Prod Econ, 183, 561–569. http://doi.org/10.1016/j
.ijpe.2016.02.015.
14. Wang, X., Ong, S. K., & Nee, A. Y. C. (2018). A comprehensive survey of ubiquitous manufactur-
ing research. Int J Prod Res, 56(1–2), 604–628. http://doi.org/10.1080/00207543.2017.1413259.
15. Leitão, P., Rodrigues, N., Barbosa, J., Turrin, C., & Pagani, A. (2015). Intelligent products: The
grace experience. Control Eng Pract, 42, 95–105. https://doi.org/10.1016/j.conengprac.2015.05
.001.
16. Segura Velandia, D. M., Kaur, N., Whittow, W. G., Conway, P. P., & West, A. A. (2016). Towards
industrial internet of things: Crankshaft monitoring, traceability and tracking using RFID.
Robot Comput Integr Manuf, 41, 66–77. http://doi.org/10.1016/j.rcim.2016.02.004.
17. Neal, A. D., Sharpe, R. G., Conway, P. P., & West, A. A. (2019). smaRTI—A cyber-physical intel-
ligent container for industry 4.0 manufacturing. J Manuf Syst, 52, 63–75. http://doi.org/10.1016
/j.jmsy.2019.04.011.
18. Ding, K., Jiang, P., & Su, S. (2018). RFID-enabled social manufacturing system for inter-enter-
prise monitoring and dispatching integrated production and transportation tasks. Robot
Comput Integr Manuf, 49, 120–133. https://doi.org/10.1016/j.rcim.2017.06.009.
19. Seshia, S. A., Hu, S., Li, W., & Zhu, Q. (2016). Design automation of cyber-physical systems:
Challenges, advances, and opportunities. IEEE Trans Comput des Integr Circuits Syst, 1. http://
doi.org/10.1109/TCAD.2016.2633961.
20. Neal, A. D., Sharpe, R. G., van Lopik, K., Tribe, J., Goodall, P., Lugo, H., & West, A. A. (2021). The
potential of industry 4.0 cyber-physical system to improve quality assurance: An automotive
case study for wash monitoring of returnable transit items. CIRP J Manuf Sci Technol, 32, 461–475.
21. Alfian, G., Syafrudin, M., Farooq, U., Ma’arif, M. R., Syaekhoni, M. A., Fitriyani, N. L., & Rhee,
J. (2020). Improving the efficiency of RFID-based traceability system for perishable food by
utilising IoT sensors and machine learning model. Food Control, 110, 107016.
22. Kumar, S., Gupta, G., & Singh, K. R. (2015). 5G: Revolution of future communication technol-
ogy. In 2015 International Conference on Green Computing and Internet of Things (ICGCIoT). IEEE,
pp. 143–147.
The Impact of Industry 4.0 Cyber Physical Systems 139
23. Walter Colombo, A., Karnouskos, S., &Hanisch, C. (2021). Engineering human-focused indus-
trial cyber-physical systems in industry 4.0 context. Philos Trans R Soc Lond A, 379(2207),
20200366.
24. Kravets, A. G. (2020). Cyber-Physical Systems: Industry 4.0 Challenges. A. A. Bolshakov & M. V.
Shcherbakov (Eds.). Springer.
25. Pivoto, D. G., de Almeida, L. F., da Rosa Righi, R., Rodrigues, J. J., Lugli, A. B., &Alberti, A. M.
(2021). Cyber-physical systems architectures for the industrial internet of things applications
in industry 4.0: A literature review. J Manuf Syst, 58, 176–192.
26. Colombo, A. W., Veltink, G. J., Roa, J., & Caliusco, M. L. (2020, June). Learning industrial cyber-
physical systems and industry 4.0-compliant solutions. In 2020 IEEE Conference on Industrial
Cyberphysical Systems (ICPS) (Vol. 1, pp. 384–390). IEEE.
27. Singh, H. (2021). Big data, industry 4.0 and cyber-physical systems integration: A brilliant
industry context. Mater Today Proc, 46, 157–162.
28. Schiele, H., & Torn, R. J. (2020). Cyber-physical systems with autonomous machine-to-machine
communication: Industry 4.0 and its particular potential for purchasing and supply manage-
ment. Int J Procurement Manag, 13(4), 507–530.
29. Karnouskos, S., Leitao, P., Ribeiro, L., & Colombo, A. W. (2020). Industrial agents as a critical
enabler for realising industrial cyber-physical systems: Multiagent systems entering industry
4.0. IEEE Ind Electron Mag, 14(3), 18–32.
30. Sinha, D., & Roy, R. (2020). Reviewing cyber-physical system as a part of the smart factory in
industry 4.0. IEEE Eng Manag Rev, 48(2), 103–117.
31. Lozano, C. V., & Vijayan, K. K. (2020). Literature review on cyber-physical systems design.
Procedia Manuf, 45, 295–300.
32. Kizim, A. V., &Kravets, A. G. (2020). Anepistemological approach to intelligent decision-
making support in industrial cyber-physical systems. In Cyber-Physical Systems: Industry 4.0
Challenges (pp. 167–183). Springer, Cham.
33. Radanliev, P., De Roure, D., Van Kleek, M., Santos, O., & Ani, U. (2021). Artificial intelligence in
cyber-physical systems. AI Soc, 36(3), 783–796.
34. Broo, D. G., Boman, U., & Törngren, M. (2021). Cyber-physical systems research and education
in 2030: Scenarios and strategies. J Ind Inf Integr, 21, 100192.
35. Morella, P., Lambán, M. P., Royo, J. A., & Sánchez, J. C. (2021). The importance of implementing
cyber-physical systems to acquire real-time data and indicators. J, 4(2), 147–153.
36. Sharma, R., Parhi, S., & Shishodia, A. (2021). Industry 4.0 applications in agriculture: Cyber-
physical agricultural systems (CPAs). In Advances in Mechanical Engineering (pp. 807–813).
Springer, Singapore.
9
Security and Privacy Aspect of
Cyber Physical Systems
CONTENTS
9.1 Introduction......................................................................................................................... 141
9.2 Architecture of Cyber Physical System........................................................................... 145
9.3 Security Issues and Challenges of Cyber Physical System........................................... 146
9.3.1 CPS Security Threats.............................................................................................. 147
9.3.2 CPS Security Attacks.............................................................................................. 150
9.4 Security Objectives of Cyber Physical System................................................................ 153
9.5 Proposed Methods and Approaches to Secure Cyber Physical Systems................... 154
9.6 Security Research Areas in Cyber Physical System....................................................... 158
9.7 Conclusion........................................................................................................................... 159
References...................................................................................................................................... 160
9.1 Introduction
Systems that integrate the physical and computational domains are known as cyber physi-
cal systems. Digital chips, software products, sensors, and actuators are among the diverse
interacting components in CPS. As a result, the CPS ecology differs from and is more
advanced than conventional settings. It is principally true because CPS is set up to become
accustomed to its approach to the existing real-world environment in accordance to the
observed condition [1]. CPSs are comparable to IoT systems; however, they feature greater
physical and computational synchronization [2, 3].
CPSs interact with consumers, physical surroundings, and a range of hardware- and
software-based systems. This includes the integration, interoperability, monitoring, and
control of CPS components. CPS has a sequence of i/p and o/p connected to cooperating
components, unlike stand-alone devices. Furthermore, CPS deployments are not restricted
to a particular field; rather, they are found in nearly every field [4].
A CPS is defined through a wide range of organized technologies and a variable size
across such structures [5]. These technologies, among other things, offer better personaliza-
tion of health care, traffic control, finance, and the smart grid. Computing devices, embed-
ded systems, sensors, control units, and other devices that perform various duties can be
found in a CPS. A single CPS, for example, a room temperature surveillance and adjustment
system might usually comprise a few sensor and actuator nodes. A CPS, on the other hand,
can grow into a massive network of diversified and unstructured decentralized subsystems
for example, which may do diverse independent jobs on a solar energy plant [6].
DOI: 10.1201/9781003220664-9 141
142 Cyber Physical Systems
FIGURE 9.1
Cyber physical systems (CPSs).
Adopting industry 4.0 even without an external entity, which alters by combining new
technologies and systems, delivering independence, managed networked, state-driven art
accessibility, and reliability [9].
Biometrics, big data, smart grid, Internet of Things (IoT), neural networks, and deep
learning are only a few of the major topics covered by CPS. IoT devices have recently
become a serious concern, boosting the platform’s vulnerability to cyber assaults. To han-
dle cyber and physical risks, such platforms must be built with a secure, reliable, and fault-
tolerant framework [10].
CPSs have a variety of weak points where cyber physical attack vulnerability compro-
mises, resulting in data breaches to control platform dependability and robustness [11].
In today’s environment, CPS security needs a lot of effort since a growing number of
devices are affected during information transit [12].
The safety and security requirements of CPS devices need careful consideration in both
architecture and research [13]. Physical process, networking, computing, and actuation
are the four phases of the CPS communication process. The CPS workflow is depicted in
Figure 9.2.
(i) Physical process: The primary purpose of this phase is to monitor the CPS and
to build a connection and process communication channel. It offers data on prior
values and ensures feedback on previous actions as well as proper operation in the
actual world. The sole purpose of physical processes is to ensure resource integ-
rity and appropriate operation.
(ii) Networking: Data aggregation and dissemination must be possible throughout
the networking phase. The CPS sensor used to be able to store a large quantity of
data. Such sensors provide records in real time and have a large number of sensors
that can take data for analysis to evaluate forthcoming necessities.
(iii) Computing: Information gathered during the present stage is mostly utilized
for interpreting and evaluating the level of complication being supervised, as
well as ensuring that the physical process meets pre-determined standards. If
FIGURE 9.2
CPS workflow phases.
144 Cyber Physical Systems
satisfactory results are not obtained, remedial action is suggested to attain the
desired outcomes.
(iv) Actuation: The findings of the computation phase are used in this step to activate
specific functionality.
(i) Physical layer: Physical layer consists of sensors/actuators and a range of supplemen-
tary devices and subcomponents having sensing/processing and communication
abilities [14]. Sensors inside this layer capture physical processes in the platform’s
physical surroundings. Actuator elements, that react to instantaneous event moni-
toring and interface with the application layer to facilitate data processing, are also
included [15, 16]. The actuator units have the capacity to alter the characteristics of
real-world physical objects and events [17]. Cyber physical activities are created as
FIGURE 9.3
Architecture of a cyber physical system.
Security and Privacy Aspect of Cyber Physical Systems 145
a result of the platform’s processing of information, and they induce a physical pro-
cess to be triggered. A component of this layer has the capacity to communicate with
other networks, such as the internet, using a gateway is a key feature. Implementing
security guidelines is critical since this level is so prone to cyberattacks.
(ii) Network layer: The network layer’s job is communicating control instructions and
sensual data b/w the applications and physical layers. Because there are so many
distinct diverse networks connecting, specialized security procedures must be con-
sidered. Although it acts as a connection between the physical and application lay-
ers, as well as a pathway between sensors/actuators, network layer is important to
CPS functioning [18, 19]. The network layer is the path via that information, sen-
sor evaluation and orders to actuation are sent and received. Ethernet, Distributed
Network Protocol (DNP), Preferred Specification 16(RS-232), TCP/IP, dial-up
modem, and various wireless protocols are examples of network layer protocols [20].
Wireless communication is the most preferred technique for sensing and actuation
communication due to its dispersed landscape. Aimed at wireless technology, cloud
or actual servers are considering commonly. Network layer links application and
physical levels, capable of communicating and collaborating effectively.
(iii) Physical layer: Several features make up the application layer, including control
systems, databases, and an interface design. This layer collects input from the net-
work layer and creates control orders for actual machines and systems to be con-
trolled [21]. Access control, precision farming, remote sensing, smart cities, electric
grid, and other application-specific roles include data accounting and depiction,
trying to act as a controller for end customers, and proposing most visual interface
for a wide collection of applications/services are all handled by the application
layer. It also gives end users an interface and services for obtaining sensual data
through portable items or workstations that might take many dissimilar proce-
dures and consume very different safety needs.
(i) Securing device access: The first difficulty is protecting device access. If authoriza-
tion is not given or is supplied in a bad manner, unauthorized entities may gain
entry and alter the environment [25]. As a consequence, neither the integrity of the
underlying binary codes nor the software functionality can be assured.
146 Cyber Physical Systems
(ii) Securing transmissions of data: Data transmission security is critical for detecting
pretenders and malicious acts in CPS communications systems, as well as restrict-
ing unauthorized access. For example, studying the data sent and received, attack-
ers try to capture the physical characteristics of network energy usage and temporal
characteristics [25]. Certain intruders seek and interrupt systems by initiating DoS
attacks or altering route architecture [26]. Several terminal devices lack significant
processing of data, communication, and data storage since they’re not complete
systems [27]. As a result, cyberattacks are much more likely to affect these devices.
Interconnection in Industrial Control System interfaces improves operational effi-
ciency and decreases operating costs by relying on open communications proto-
cols. While these interfaces make operations more efficient and productive, they
also expose the infrastructure to additional intrusions and hostile assaults, such
as malicious software, DDoS, eavesdropping, and unapproved access [28]. Another
contributor to security vulnerabilities is described as even design procedures are
constantly forced in terms of computational acceleration, physical servers, and
energy usage. Moreover, integrated structures are typically intended by specialists
with little expertise with security risks, and often prioritize functionality, checking
errors, and security throughput [29]. As a result, the platform is susceptible and
confidential material might be exposed to unauthorized or undesired individuals.
(iii) Application security: The application layer is where a field of application, and also
security issues, are brought all together. The data privacy that occurs at this layer
would not be resolved at another level, which does not face the same security chal-
lenges. As a result, hackers have access to critical information about users, which
can lead to information breaches and privacy issues. Spatial camouflage, faceless
space, and spatial cryptography are certain data security techniques employed at
this layer since this data may reveal information about prior and present places
visited by users. Many apps on this tier also have an influence on customers’ social
life, demanding their security [30].
(iv) Data storage security: It’s critical that private data in CPS equipment is kept secure.
Sensors, for example, make up the bulk of CPS equipment [26]. They are tiny,
wireless-linked nodes with limited resources. Regardless of the fact that several
technology approaches employ cryptography methods for certain instruments,
storage restrictions and the devices’ restricted computing power make them inad-
equate. Consequently, light-weight security techniques are essential [24].
(v) Securing actuation: Any actuation actions must originate from a trusted source,
according to actuation protection. In the event of a threat, this will guarantee that
the response and management orders are exact and protected. [27]. Accordingly,
to use the web as a transmission layer within CPS interconnections, there’ll be
security issues. Security must be given for entire system equally unified endwise
defense policy [30], instead of individual functional security tool at every level.
Furthermore, any desired security system must meet large memory requirements
and perform heavyweight calculations [28].
(i) Threats in physical layer: Within the multilayered architecture of CPSs, the physi-
cal layer will be the significant foundation of sensory data and implementation
location for control orders. Because the bulk of physical layer nodes in the network
is located in unsupervised contexts, they are convenient targets for hackers. So
the physical layer’s observation network has limited data analysis, transmission,
and storage capability, traditional security approaches cannot be directly imple-
mented. The physical layer’s main security threats are detailed in Table 9.1.
The physical security of every node’s architecture, the gathering of represented
data, and the implementation of control instructions are all considerations at the
physical layer. Sensors/Actuators, RFID instruments, picture capture devices, as
well as additional technologies should be safe thanks to this layer’s security coun-
termeasures. The physical layer’s security is the bedrock of cyber physical system
security. The physical layer’s major security mechanisms and countermeasures
are as follows:
• Improve the administration and security of the node’s identification. This
will, to some extent, extend the time it takes for a node to be approved. In real
implementations, admins can evaluate the system’s effectiveness and safety to
develop a more appropriate node authentication approach.
TABLE 9.1
Security Threats at Physical Layer
Security Threats Description
Physical assault Physical attacks mostly called to the concrete damage of the nodes.
Failure of equipment Equipment functionality is reduced or lost as a result of external pressures, the
surroundings, or age.
Electric line failure Line failure refers to power lines failure on nodes.
Electrostatic leakage Intruders can recover actual information by analyzing electrostatic
communication devices emitted out at work.
Electrostatic intervention Excessive electromagnetic communications or commotions degrade overall
performance by interfering with valuable signals.
Denial of service (DoS) The intruder leads the target computer to stop providing services by
consuming network bandwidth.
Channel blocking Data transmission is not possible due to a transmission medium that has been
saturated for a long period.
Sybil attack A unique rogue node utilizes several identities to assault the network by
commanding the majority of nodes.
Data spoofing An intruder intercepts and changes data before sending it to the intended
receiver.
Unauthorized access Malicious hackers get access to resources.
Passive attack Sniffing and information gathering are used by the attacker to passively
acquire data.
Entity capture An intruder gets hold of a gateway node or a normal node.
Replay attack The hacker retransmits the genuine data received before in order to gain the
system’s confidence.
Perception data destruction The unlawful insertion, deletion, alteration, or destruction of perceptual data.
Data intercept Obtaining unauthorized access to information resources by intercepting a line
of communication.
148 Cyber Physical Systems
• Biometric systems and relatively close to digital systems will be used to better
protect perceptual data.
• Make the legislation more robust. Make the consequences of unlawful activity
with cyber physical systems obvious.
• Cyber physical systems combined with cryptography [17, 18], privacy protec-
tion [19–21, 26, 31–33], security routing [34, 35], security data fusion [22, 23, 36],
and safety positioning [24, 25] research.
(ii) Threats in network layer: The “next-generation networks” acts as the main carrier
network for CPS network layer. The design, access techniques, network infrastruc-
ture of the “forthcoming generation network” will expose CPS to the multitude
of security vulnerabilities. The high number of nodes and enormous information
over the network layer might introduce congestion issues, rendering the struc-
ture vulnerable to DoS/DDoS attempts. As a result of information exchange,
entry point authorization, and the convergence of security rules across various
networks, additional security problems for the network layer of CPSs will emerge.
The major network layer security threats are shown in Table 9.2.
The network layer of CPS has security mechanisms in place to certify integrity,
confidentiality, and uniformity of transmission information within the systems.
For network layer protection, both peer-to-peer and endwise cryptography meth-
ods can be employed [26]. The network layer’s major security mechanisms and
countermeasures are as follows:
• A point-to-point cryptography method ensures data confidentiality through-
out hop-by-hop communication. This approach demands a greater degree of
node dependability since any node in the chain may acquire plaintext data. A
few of the safety features include peer authorization, node-to-node encrypt-
ing, and inter-network verification.
• Endwise encryption provides data protection from start to finish, with adjust-
able protection rules for different levels of security. Edge encryption, on the
other hand, may not hide the data’s sender/receiver, and enemies might utilize
that knowledge to their advantage. Some of the security techniques include
endwise verification, important negotiating, and access control.
( iii) Application-layer threats: The network layer of CPS has security mechanisms in
place to confirm the integrity, confidentiality, and uniformity for transmission of
data in the system. For network layer protection, both steeplechase and endwise
cryptography methods can be employed [26]. This approach demands a greater
degree of node dependability since any node in the chain can acquire plaintext data.
A few of the safety features include peer authorization, hop-by-hop encrypting, and
inter-network verification, the description of security threats are shown in Table 9.3.
The application layer is the most important part of a CPS, since it is respon-
sible for creating choices and giving control orders. Huge data amounts on the
application layer of CPSs demand sophisticated data processing skills and com-
prehensive user privacy data security on this layer. The following are the primary
physical security measures:
• Strengthen the platform’s access control list.
• In various circumstances, strengthen the authentication and encryption
mechanisms.
Security and Privacy Aspect of Cyber Physical Systems 149
TABLE 9.2
Network Layer Security Threats
Security Threats Description
DDoS A huge number of malicious nodes assault the target server around the same
moment as DoS sources.
Routing attack The intruder sends counterfeit routing information to disrupt the regular routing
procedure.
Sink node attack By targeting the sink node, data transfer between the physical and network layers
is disrupted.
Direction misleading Malicious node changes senders and receiver’s addresses of packets of data before
attack sending them down the incorrect path, causing confusion in network routing.
Black hole attack A malicious node deceives neighboring nodes into establishing routing links with
it, then discards packets that should have been routed, resulting in packet loss.
Flooding attack Smurf and DDoS consume the network servers’ capabilities upon that network
layer.
Trapdoor Permit an exemption to the security policy for transmitting particular data.
Sinkhole attack A malicious user draws regular nodes to itself as a point in the transmission range,
causing data to communicate via it.
Wormhole attack Malicious nodes band together to improve routing by reducing the number of
routing hops among them.
Routing loop attack A malicious node alters data route, resulting in endless routing loops.
Sybil attack By owning the most of the terminals, the rogue node can impede data transmission
by using several identities.
HELLO flooding attack The malicious node notifies others in the network which are their immediate
neighboring via broadcasting routing information through a strong signal.
Spoofing attack A malicious node impersonates a legitimate node in order to send data along a
sluggish route or to a node that has failed.
Selective transporting A malicious node loses part or every critical information in the redirect process on
purpose.
Tunnel attack Malicious nodes conceal their true connection extent in order to entice additional
nodes to create routes via them.
Fake routing details A malicious node tampers with the route knowledge to exploit the network layer
system.
TABLE 9.3
Application-Layer Security Threats
Security Threats Description
Privacy data leakage Consumers’ personal information is exposed due to unsecured data transfer,
storage, and display.
Illegal access Connectivity to network and system data that is not permitted.
Malicious code The system contains code that has no impact but may be a security risk.
Stolen control instructions Intruders deliberately utilize or damage a system by changing control
commands.
Loophole Attacking the system through application-layer flaws.
Viruses and Trojan horses The most frequent application-layer security risks are viruses and Trojan
horses.
SQL injection Attack SQL injection is a typical method of hacking a system’s database.
150 Cyber Physical Systems
to replace a sensor node and pass themselves off as the genuine edition while
swapping keys with other units [26, 27], revealing the additional nodes' under-
ground keys.
At each level within CPS, various sorts of hazards and common assaults for each layer may
be categorized as follows, based on the CPS design:
(i) Attacks at the physical layer: End devices such as RFID tags and sensors make
up the physical layer, which is constrained by computer resources and mem-
ory capacity. Furthermore, because such items are typically used in exterior
and outdoor environments, they are susceptible to physical assaults such
as component tampering or replacement. As a result, terminal devices are
particularly vulnerable to numerous types of assaults. Physical layer attacks
include device malfunctioning, link failure, electromagnetic conflict, cogni-
tive information skimming [23], discrepancy power investigation [38], infor-
mation disclosure, monitoring, forgery, detecting security breaches, complete
destruction, and power fatigue. Examples of frequent sorts of assaults include
the following:
• Node capture: Gets hold of the cluster and acquires and exposes data, includ-
ing encryption keys, and formerly utilized jeopardize whole system security.
Secrecy, availability, veracity, and legitimacy are all targets of this type of
assault [38, 40].
• False node: It introduces a new node to the network and broadcasts malicious
data to jeopardize the integrity of records. It can induce DoS attack via deplet-
ing power of platform’s node [38].
• Node outage: Halts node operations, making it tough to declaim and collect
data from them, and initiates a slew of other assaults that jeopardize the net-
work’s availability and integrity [40].
• Path-based DoS: Overflowing packets are dispatched with a transmitting path
to the origin station, depleting node cells and disturbing the network, decreas-
ing node uptime [40].
• Resonance: Forces sensors or controllers that have been tampered with to
operate at an alternative resonance frequency [41].
• Integrity: Efforts to disrupt the system by manipulating sensor data and intro-
ducing external influence inputs [42].
(ii) Attacks at the network layer: Data leakage during data transfer is one type of
attack against another layer. This occurs as a result of the communication medi-
um’s accessibility that is particularly true with wireless systems. These exploits
imitate digital credentials by collecting a broadcast message through a radio chan-
nel, changing and demodulating it, or moving information across composite net-
works. Additional characteristics, including such web access methods used by a
significant set of network endpoints, which could also generate congestion prob-
lems, could render it more vulnerable to assault [23, 39]. Reaction and manipu-
lation, exploitation, fatigue, crash, black hole, flooding trap doors, base station,
orientation confusing sinkhole, wormhole, improper route planning, tunneling
[23, 26], and illegal access are all prominent assaults at this layer. Here are a few
examples of common network layer attacks:
152 Cyber Physical Systems
(iii) Availability: A CPS’s high availability attempts to guarantee that operations are
often reachable by avoiding computation, management, and transmission corrup-
tions induced by component failure, efficiency improvements, power cuts, or DoS
[47] presented a multi-cyber infrastructure based on the Markov model to increase
CPS availability.
(iv) Authenticity: In computer and transmission operations, it requires confirming
the authenticity of data, communications, and conversations. Authentication of all
linked processes, such as sensing, communications, and actuations is the objective
of CPS.
(v) Trustworthiness: This is the degree to which users may trust the CPS to com-
plete needed activities within specific domain and time restrictions. The software,
hardware, and collected data must all exhibit a level of trustworthiness in order
for a CPS to be viable and trustworthy.
Cyber assaults against CPSs include not just typical IT-related cyberattacks, but also
attacks on CPSs that can transcend the cyber physical domain border [48]. The taxonomy
of assaults against CPS has already been addressed in depth in the above section.
FIGURE 9.4
Modeling security approaches: cyber physical systems.
154 Cyber Physical Systems
Due to a number of constraints, simulation and modeling are commonly used to do research
on CPS attacks. The importance of replicating real-world assaults cannot be overstated [49]
[50]. Proposed hybrid attack graphs as a novel approach to modeling cyber-physical risks in
smart grids. Fabio Pasqualetti et al. proposed an attack paradigm that integrates stealth and
replays assaults into a unified architecture with better monitoring systems for malfunction
and attack detection [51]. Michael E. Kuhl and colleagues proposed a cost-effective and
time-saving modeling technique for representing computer networks in order to simulate
cyberattack scenarios for the purpose of assessing security solutions [52].
Because heterogeneity, dynamism, and complexity demands must be properly inves-
tigated and addressed, CPS modeling is important [53]. From information transmission
to process modeling, CPS modeling may cover a wide range of issues [54]. Security tech-
niques such as threat modeling, strategy planning, and a holistic approach to tackling
security and safety concerns together are discussed in this context by [55]. There are
several problems that apply to all models, regardless of their nature. The model should
be deterministic, capable of aiding in problem-solving, provable, and executable [56].
System dynamics, Bayesian networks, coupled component models, agent-based models,
and knowledge-based models are five typical modeling techniques for a complex system,
according to [57]. A Bayesian network’s objective is to characterize the influence of one
entity’s attributes on the characteristics of another entity, or one event on another event.
The linked component modeling method, on the other hand, entails integrating models or
model components from a variety of fields to arrive at a comprehensive solution [57, 58]. All
system elements are represented by interacting agents with particular behavior that takes
into consideration their influence on the overall system in agent-based modeling. Finally,
utilizing a knowledge base and logic tools, knowledge-based modeling extracts solutions.
Several researchers have looked at the detection, isolation, and recovery of control sys-
tem faults. [59]. CPSs have vulnerabilities that are not present in traditional control sys-
tems, and suitable detection and identification methods must be developed for them [60].
Physical dynamics-focused internal assaults fail because security measures don’t conform
to the underlying physical process or method of control in any quantifiable way [61]. Robert
Mitchell et al. developed a general hierarchical model for assessing the performance of
intrusion detection algorithms in the context of a CPS [62]. They create two intrusion
detection techniques for identifying fraudulent attacks in a CPS and then use the hierar-
chical model that was created to assess the results of the two techniques and determine
the best design parameters for improving the CPS’s dependability. The author suggested
and tested a behavior regulation, configuration-based exploitation detection method for
medicinal devices surrounded in healthcare CPSs [63]. The causal connection between
components in a CPS is modeled using Bayesian networks and casual event graphs [64].
Florian Dorfler created a unified prediction system and an enhanced detection approach
in order to prototype an assault on a core network [65]. An Intrusion Detection Device
(IDS) is a vital component of cyber surveillance equipment that is designed to alert either a
human operator or another information security equipped system when an assault occurs.
The primary functions of IDS in CPS are to gather and analyze data about the entity that
has been infiltrated [66, 67].
• Wireless: Identical to the first, except that those IDSs include wireless traffic and
protocols.
• Network behavior analysis: Monitors network traffic flows to identify unusual
activity patterns and policy breaches.
• Host-based IDSs monitor traffic, application activity, file actions, and configura-
tion activities for a single host. This type of ID is commonly used on critical infra-
structure nodes.
Based on how they identify threats, modern IDS may be divided into three categories [68]:
In [68], the authors provide a unique approach of classifying IDSs by classifying them
according to the audit material they examine, such as the host or network, and the detec-
tion methodology they use, such as experience and understanding or behavior patterns.
The same research also clarifies the distinctions between standard IDSs and IDSs for cyber
physical systems. To deal with the problem of CPS resource limits, scheduling techniques
have been devised, in which responsibilities are shared among CPS nodes in order to keep
the processing flow constant [69] [68, 70]. It offers a plan to improve the likelihood of an
attack being recognized by the use of verified safe monitors. Data obtained from a refer-
ence device is compared to data collected from other devices in the same environment
using so-called trustworthy devices [71]. Using this concept assumes that a collection of
sensors measure the same underlying physical parameters. The measurements are then
collected and evaluated using a sensor algorithm that takes into consideration the sensor
precisions that have been established. However, this technique is not particularly practi-
cal and may expose the system to both passive and DoS assaults. Time-based detection is
another method of intrusion detection in CPS [72], which assumes a predefined variable
for worst-case execution time (WCET). If the execution time exceeds the preset limits, the
system is considered hacked.
Keeping protected CPS surroundings is not stress free due to the consistent growth of
issues, integration concerns, limitations of presenter solutions, such as a security/privacy/
accuracy deficiency. Cryptographic and non-cryptographic techniques are included.
These protections are common in SCADA systems to secure the route from active and
passive attacks, and also illegal access and disruption [73]. The main goal must be on pro-
tecting and ensuring the efficiency of the entire production system, rather than on data
security. As a result, a range of choices were made available [74]. Investigated CPS security
156 Cyber Physical Systems
and the degree to what reference images may be designed to improve safety. Security
problems, flaws in present security architecture, and alternative ways to restoring secu-
rity in power grids are all examined [75]. Security risks to water distribution systems are
highlighted [76], along with the need to build threat prototypes and supervision roles in
security management.
There were also a number of non-cryptographic solutions offered to limit and eliminate
any possible cyberattacks, including the following:
1. Intrusion detection systems (IDSs): Different IDS approach types are accessible
due to the availability of diverse network topologies [77]. When it comes to detec-
tion, setup, pricing, and network location, each IDS approach has its own set of
benefits and cons. A number of research projects were undertaken in order to
identify CPS assaults. [78]. These assaults are divided into two categories. A phys-
ics-based paradigm for defining basic CPS operations using anomaly detection
in CPS. According to [79, 80], a cyber-based model is utilized to detect possible
assaults. In reality, the techniques described were designed primarily to identify
particular attacks against specific applications, such as industrial control pro-
cesses [81] and smart grid [75].
2. Firewalls: Since the introduction of intrusion detection systems (IDS) and arti-
ficial intelligence (AI), firewalls have seen minimal use in the CPS sector. As a
result, only a few firewall-based solutions are available [82]. With the goal of
improving server computer networks, this report describes the use of paired fire-
wall in various network zones. The authors picked paired firewalls because of
the rigorous security and clear administrative separation. Ghosh et al. described
how they used event data to predict real-time network device failures such as
firewalls [83].
3. Honeypots and methods of deception: CPS uses deception as a decoy to conceal
and defend its system, which is a crucial defensive security measure. Honeypots
are mostly used to do this. Cohen talked about how honeypot deception might be
enhanced when used. [84], employing a variety of deceptive techniques. Author
proposed in [85] the HoneyBot was created using the HoneyPhy architecture.
According to the research, HoneyPhy may be used to replicate these actions in
real time. According to a recent study, HoneyBot can fool attackers into thinking
their attacks are effective.
4. Machine learning, threshold, and rule-based schemes: Understanding the dis-
tinction between basic rule-based procedures and machine learning algorithms
is critical (ML). At the same time, both can be represented in the same security
architecture. Rule-based mechanisms, which are based on previously collected
information, are used as the first line of defense against threats, detecting the most
significant risks that might harm the system. Feature extraction, feature selection,
rule-based detection, and ML algorithms for threat detection and rule extraction
are all important elements in a security architecture that combines ML algorithms
with rule-based processes. A more sophisticated method is to incorporate human
supervision into the security architecture, as provided by extracted information
from the machine-learning module. Specific traffic types, such as P2P, may be
Security and Privacy Aspect of Cyber Physical Systems 157
prioritized from the raw input, which could be represented by packets or log files
that are recorded and analyzed. The identification of critical characteristics that
are useful for threat detection is part of the second step. In the third step, rule-
based processes are applied to the list of important traits, and potentially hazard-
ous elements are discarded.
5. Knowledge-based schemes: The ML module checks other entities that have not
been identified as harmful after the rule-based detection module has removed
malicious entities and created the learning set for the ML module. In addition,
rule inference modules can be added to the ML module to produce new rules in
response to new threats.
6. Security architecture and design:
Networked resource-contained devices are expected to make up the bulk of CPSs. CPS
security is essential for preserving data integrity and privacy while bolstering system
defenses against intruders. Sebastian Seeber and colleagues illustrate how security may be
utilized to secure communication in an RPL network in [86]. New security risks would tar-
get CPSs, such as the ability to manipulate the structure at the IT system level and inside
its immediate environment. In [87], the author delves into the many security flaws that
exist, and suggests a novel system design that merges ideas from the realm of Biological
Computing with the goal of developing upcoming safe CPS.
9.7 Conclusion
Complex methods that rely on the convergence of physical and cyber or software com-
ponents are known as CPSs. CPS provides a diverse set of services. The number of CPS
deployed is steadily rising, posing a multitude of security and safety concerns. In this
study, researchers take an in-depth look at the idea and architecture of cyber physical sys-
tems (CPSs), discuss the security goals and challenges associated with CPSs, and analyze
the vulnerabilities and attacks faced by three CPS deployment tiers. It also spoke about
how important it is for CPS to develop new sophisticated methods in the field of security
and privacy. We looked at several mitigating strategies, such as sophisticated intrusion
detection systems that use machine learning algorithms. The fast growth of CPS has had
a profound impact on our way of life. CPS is now the highest focus in order to improve its
capabilities and create a lifecycle as easily as possible. Such CPS equipment is strongly cou-
pled by cyber space components and physical devices and are unified and synchronized
with the physical surroundings. CPSs are a viable framework for creating current and pro-
spective systems, and they have been predicted to get a significant influence on the actual
Security and Privacy Aspect of Cyber Physical Systems 159
world. CPS is more concerned with the design of complicated processes as a whole, instead
of particular cyber or physical systems. CPS systems are essential components of Industry
4.0, enabling Industry v4.0 by integrating the physical and cyber worlds. They’re clearly
changing the way individuals interact with their environment. CPS systems have a num-
ber of security and privacy problems that might jeopardize their dependability, safety, and
efficiency, as well as prevent broad implementation. In order to give a theoretical reference,
we looked at a variety of CPS risks and assaults in this chapter. We also looked at the cyber
physical system’s security objectives, ways to secure CPS, and security problems, as well
as open research questions. The CPS environment requires safe infrastructure to resist
severe cyber-physical attacks. We anticipate that CPS security researchers will find this
article useful in a variety of ways.
References
1. Gurgen, L., Gunalp, O., Benazzouz, Y., & Gallissot, M. (2013). Self-aware cyber-physical sys-
tems and applications in smart buildings and cities. In Design, Automation and Test in Europe
Conference and Exhibition (DATE) (pp. 1149–1154). IEEE Publications.
2. Rajkumar, R., Lee, I., Sha, L., & Stankovic, J. (2010). 47th ACM/IEEE. Cyber-physical systems:
The next computing revolution. In Design Automation Conference (DAC). (pp. 731–736). IEEE
Publications.
3. Da Xu, L. D., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions
on Industrial Informatics, 10(4), 2233–2243. https://doi.org/10.1109/TII.2014.2300753.
4. Gubbi, J., Buyya, R., Marusic, S. P. M., & Palaniswami, M. (2013). Internet of Things (IoT): A
vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7),
1645–1660. https://doi.org/10.1016/j.future.2013.01.010.
5. Wan, J., Yan, H., Suo, H., & Li, F. (2011). Advances in cyber-physical systems research. KSII
Transactions on Internet and Information Systems, 11, 5.
6. Brak, M. E., Brak, S. E., Essaaidi, M., & Benhaddou, D. (2014). Wireless sensor network applica-
tions in smart grid. In International Renewable and Sustainable Energy Conference (IRSEC) (pp.
587–592). IEEE Publications.
7. Bordel, B., Alcarria, R., Robles, T., & Martín, D. (2017). Cyber–physical systems: Extending per-
vasive sensing from control theory to the Internet of Things. Pervasive and Mobile Computing,
40, 156–184. https://doi.org/10.1016/j.pmcj.2017.06.011.
8. Lee, J., Bagheri, B., & Kao, H.-A. (2015). A cyber-physical systems architecture for industry 4.0-
based manufacturing systems. Manufacturing Letters, 3, 18–23. https://doi.org/10.1016/j.mfglet
.2014.12.001.
9. Zeng, J., Yang, L. T., Lin, M., Ning, H., & Ma, J. (2020). A survey: Cyber-physical social systems
and their system-level design methodology. Future Generation Computer Systems, 105, 1028–
1042. https://doi.org/10.1016/j.future.2016.06.034.
10. Liu, C., & Zhang, Y. (2016). Cyber-Physical Systems. CRC Press.
11. Akella, R., Tang, H., & McMillin, B. M. (2010). Analysis of information flow security in cyber–
physical systems. International Journal of Critical Infrastructure Protection, 3(3–4), 157–173. https://
doi.org/10.1016/j.ijcip.2010.09.001.
12. Wang, L., Törngren, M., & Onori, M. (2015). Current status and advancement of cyber-physical
systems in manufacturing. Journal of Manufacturing Systems, 37, 517–527. https://doi.org/10.1016
/j.jmsy.2015.04.008.
13. Sobhrajan, P., & Nikam, S. Y. (2014). Comparative study of abstraction in cyber physical sys-
tem. IJCSIT International Journal of Computer Science and Information Technologies, 51(0975–9646),
466–469. Accessed March 7 2020.
160 Cyber Physical Systems
14. Estrin, D., Culler, D., Pister, K., & Sukhatme, G. (2002). Connecting the physical world with perva-
sive networks. IEEE Pervasive Computing, 1(1), 59–69. https://doi.org/10.1109/MPRV.2002.993145.
15. Oliveira, L. M., & Rodrigues, J. J. (2011). Wireless sensor networks: A survey on environmental
monitoring. JCM, 6(2), 143–151. https://doi.org/10.4304/jcm.6.2.143-151.
16. Wang, S., Wan, J., Li, D., & Zhang, C. (2016). Implementing smart factory of industry 4.0: An
outlook. International Journal of Distributed Sensor Networks, 12(1), 3159805. https://doi.org/10
.1155/2016/3159805.
17. Dargie, W., & Zimmerling, M. (2007). Wireless sensor networks in the context of developing
countries. In IFIP World IT Forum (WITFOR).(pp. 43–48) Springer
18. Jazdi, N. (2014). Cyber physical systems in the context of Industry 4.0. In IEEE International
Conference on Automation, Quality and Testing, Robotics (pp. 1–4). IEEE Publications.
19. Tan, Y., Goddard, S., & Pérez, L. C. (2008). A prototype architecture for cyber-physical systems.
ACM SIGBED Review, 5(1), 1–2. https://doi.org/10.1145/1366283.1366309.
20. Han, S., Xie, M., Chen, H.-H., & Ling, Y. (2014). Intrusion detection in cyber-physical systems:
Techniques and challenges. IEEE Systems Journal, 8(4), 1052–1062. https://doi.org/10.1109/JSYST
.2013.2257594.
21. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things:
Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of
Things Journal, 4(5), 1125–1142. https://doi.org/10.1109/JIOT.2017.2683200.
22. Guan, Y., & Ge, X. (2017). Distributed attack detection and secure estimation of networked
cyber-physical systems against false data injection attacks and jamming attacks. IEEE
Transactions on Signal and Information Processing Over Networks, 4(1), 48–59. https://doi.org/10
.1109/TSIPN.2017.2749959.
23. Peng, Y., Lu, T., Liu, J., Gao, Y., Guo, X., & Xie, F. (2013). Cyber-physical system risk assessment
ninth international conference on intelligent information hiding and multimedia signal pro-
cessing, 2013, p. 169.
24. Lu, T., Xu, B., Guo, X., Zhao, L., & Xie, F. (2013). A New Multilevel Framework for Cyber-Physical
System Security (pp. 2–3). Springer.
25. Konstantinou, C., Maniatakos, M., Saqib, F., Hu, S., Plusquellic, J., & Jin, Y. (2015). Cyber-physical
systems: A security perspective. In 20th IEEE Europa Test Symposium (pp. 1–8). IEEE European
Test Symposium.
26. Raza, S. (2013). Lightweight Security Solutions for the Internet of Things, Mälardalen University Press
Dissertations. Mälardalen University.
27. Wang, E. K., Ye, Y., Xu, X., Yiu, S. M., Hui, L. C. K., & Chow, K. P. (2010). Security issues and
challenges for cyber physical system. In IEEE/ACM International Conference on Green Computing
and Communications and 2010 IEEE/ACM International Conference on Cyber, Physical and Social
Computing (pp. 733–738). Springer.
28. Weiss, J. (2010). Control System Cyber Vulnerabilities and Potential Mitigation of Risk for Utilities,
White Pap. Juniper Networks, Inc.
29. Hu, W., Oberg, J., Barrientos, J., Mu, D., & Kastner, R. (2013). Expanding gate level information
flow tracking for multilevel security. IEEE Embedded Systems Letters, 5(2), 25–28.
30. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things:
Perspectives and challenges. Wireless Networks, 20(8), 2481–2501. https://doi.org/10.1007/s11276
-014- 0761-7.
31. Stankovic, J. A. (2014). Research directions for the internet of things. IEEE Internet of Things
Journal, 1(1), 3–9. https://doi.org/10.1109/JIOT.2014.2312291.
32. Tawalbeh, L. A., Mowafi, M., & Aljoby, W. (2013). Use of elliptic curve cryptography for multi-
media encryption. IET Information Security, 7(2), 67–74. https://doi.org/10.1049/iet-ifs.2012.0147.
33. Rungger, M., & Tabuada, P. (2013). A notion of robustness for cyber-physical systems. IEEE
Transactions on Automatic Control, 61(8), 2108–2123. https://doi.org/10.1109/TAC.2015.2492438.
34. Lo’ai, A. T., Tawalbeh, L. A., Mehmood, R., Benkhlifa, E., & Song, H. (2016). Mobile cloud
computing model and big data analysis for healthcare applications. IEEE Access, 4, 6171–6180.
https://doi.org/10.1109/ACCESS.2016.2613278.
Security and Privacy Aspect of Cyber Physical Systems 161
35. Tawalbeh, A., Haddad, Y., Khamis, O., Benkhelifa, E., Jararweh, Y., & AlDosari, F. (2016).
Efficient and secure software-defined mobile cloud computing infrastructure. International
Journal of High Performance Computing and Networking, 9(4), 328–341. https://doi.org/10.1504/
IJHPCN.2016.077825.
36. Kocher, P. C. (1996). Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and
other systems. In Lecture Notes in Computer Science. Proceedings of the Cryptology, Santa Barbara
(pp. 104–113). https://doi.org/10.1007/3-540- 68697-5_9.
37. Lu, T., Lin, J., Zhao, L., Li, Y., & Peng, Y. (2015). A security architecture in cyber-physical sys-
tems: Security theories, analysis, simulation and application fields. International Journal of
Security and its Applications, 9(7), 1–16. https://doi.org/10.14257/ijsia.2015.9.7.01.
38. Zhao, K., & Ge, L. (2013). A survey on the internet of things security. In Proceedings of the 2013
Ninth International Conference on Computational Intelligence and Security (pp. 663–667). ACM.
39. Shafi, Q. (2012). Cyber physical systems security: A brief survey. In 2012 12th International
Conference on Computational Science and Its Applications (pp. 146–150).IEEE.
40. Bhattacharya, R. (2013). A comparative study of physical attacks on wireless sensor networks.
International Journal of Research in Engineering and Technology, 5, 72–74.
41. Alvaro, C., Amin, S., Sinopoli, B., Giani, A., Perrig, A., & Sastry, S. (2009). Challenges for secur-
ing cyber physical systems. Workshop on Future Directions in Cyber-physical Systems Security, 5,
45–50.
42. Mo, Y., & Sinopoli, B. (2012). Integrity attacks on cyber-physical systems. In Proceedings of the 1st
International Conference on High Confidence Networked Systems ACM (pp. 47–54).
43. Gaddam, N., Kumar, G. S. A., & Somani, A. K. (2008). Securing physical processes against
cyber attacks in cyber-physical systems. In High Confidence Transportation Cyber-Physical
Systems: Automotive, Aviation, and Rail, Washingtion DC (pp. 2–4). https://people.cs.ksu.edu/
~danielwang/Investigation/CPS_ Security_threat/ArunSomani_ 20081024_ emailsubmis-
sion.pdf
44. Gamage, T. T., Roth, T. P., & McMillin, B. M. (2011). Confidentiality preserving security prop-
erties for cyber-physical systems. In 35th IEEE Annual Computer Software and Applications
Conference IEEE (pp. 28–37).
45. Madden, J., McMillin, B., & Sinha, A. (2010). Environmental obfuscation of a cyber physical
system—Vehicle example. In Workshop on 34th Annual IEEE Computer Software and Applications
Conference IEEE (pp. 176–181).
46. Venkatasubramanian, K. K. (2009). ‘Security solutions for cyber-physical systems,’ A
[Dissertation] presented in partial fulfillment of the requirements for the degree doctor of
philosophy.
47. Parvin, S., Hussain, F. K., Hussain, O. K., Thein, T., & Park, J. S. (2013). Multi-cyber framework
for availability enhancement of cyber physical systems. Computing, 95(10–11), 927–948. https://
doi.org/10.1007/s00607- 012- 0227-7.
48. Seering, J., Flores, J. P., Savage, S., & Hammer, J. (2018). The social roles of bots: Evaluating
impact of bots on discussions in online communities. Proceedings of the ACM on Human-
Computer Interaction, 2(CSCW), 1–29. https://doi.org/10.1145/3274426.
49. Srivastava, A., Morris, T., Ernster, T., Vellaithurai, C., Pan, S., & Adhikari, U. (2013). Modeling
cyber-physical vulnerability of the smart grid with incomplete information. IEEE Transactions
on Smart Grid, 4(1), 235–244. https://doi.org/10.1109/TSG.2012.2232318.
50. Hawrylak, P. J., Haney, M., & Papa, M. H. (2012). Using hybrid attack graphs to model cyber-
physical attacks in the Smart Grid. In 5th International Symposium on Resilient Control Systems
IEEE (pp. 161–164).
51. Pasqualetti, F., Dorfler, F., & Bullo, F. (2011). Cyber-physical attacks in power networks: Models,
fundamental limitations and monitor design. In 50th IEEE Conference on Decision and Control
and European Control Conference IEEE (pp. 2195–2201).
52. Kuhl, M. E., Kistner, J., Antini, K. C., & Sudit, M. (2007). Cyber attack modeling and simulation
for network security analysis simulation conference. In 2007 Winter Simulation Conference IEEE
(pp. 1180–1188).
162 Cyber Physical Systems
53. Seiger, R., Keller, C., Niebling, F., & Schlegel, T. (2015). Modelling complex and flexible pro-
cesses for smart cyber-physical environments. Journal of Computational Science, 10, 137–148.
https://doi.org/10.1016/j.jocs.2014.07.001.
54. Kroiß, C., & Bureš, T. (2016). Logic-based modeling of information transfer in cyber–physical
multi-agent systems. Future Generation Computer Systems, 56, 124–139. https://doi.org/10.1016/j
.future.2015.09.013.
55. Khaitan, S. K., & McCalley, J. D. (2015). Design techniques and applications of cyberphysi-
cal systems: A survey. IEEE Systems Journal, 9(2), 350–365. https://doi.org/10.1109/JSYST.2014
.2322503.
56. Petnga, L., & Austin, M. (2016). An ontological framework for knowledge modeling and deci-
sion support in cyber-physical systems. Advanced Engineering Informatics, 30(1), 77–94. https://
doi.org/10.1016/j.aei.2015.12.003.
57. Kelly (Letcher), R. A., Jakeman, A. J., Barreteau, O., Borsuk, M. E., ElSawah, S., Hamilton, S. H.,
Henriksen, H. J., Kuikka, S., Maier, H. R., Rizzoli, A. E., van Delden, H., & Voinov, A. A. (2013).
Selecting among five common modelling approaches for integrated environmental assess-
ment and management. Environmental Modelling and Software, 47, 159–181. https://doi.org/10
.1016/j.envsoft.2013.05.005.
58. Strasser, U., Vilsmaier, U., Prettenhaler, F., Marke, T., Steiger, R., Damm, A., Hanzer, F.,
Wilcke, R. A. I., & Stötter, J. (2014). Coupled component modelling for inter- and trans-
disciplinary climate change impact research: Dimensions of integration and examples of
interface design. Environmental Modelling and Software, 60, 180–187. https://doi.org/10.1016/j
.envsoft.2014.06.014.
59. Zhu, M., & Martínez, S. (2011). Stackelberg-game analysis of correlated attacks in cyber-phys-
ical systems. In Proceedings of the American Control Conference, San Francisco, United States USA
(pp. 4063–4068).
60. Pasqualetti, F., Dorfler, F., & Bullo, F. (2013). Attack detection and identification in cyber-phys-
ical systems. IEEE Transactions on Automatic Control, 58(11), 2715–2729. https://doi.org/10.1109/
TAC.2013.2266831.
61. Slay, J., & Miller, M. (2007). Lessons learned from the Maroochy water breach. Critical
Infrastructure Protection, 253, 73–82.
62. Mitchell, R., & Chen, I. R. (2011). A hierarchical performance model for intrusion detection in
cyber-physical systems. In Wireless Communications and Networking Conference (WCNC) IEEE
(pp. 2095–2100).
63. Mitchell, R., & Chen, I. R. (2014). Behavior rule specification-based intrusion detection for safety
critical medical cyber physical systems. IEEE Transactions on Dependable and Secure Computing,
12(1), 16–30. https://doi.org/10.1109/TDSC.2014.2312327.
64. Pan, S., Morris, T. H., Adhikari, U., & Madani, V. (2011). Causal Event Graphs Cyber-Physical
System Intrusion Detection System Mississippi State University. USA.
65. Dorfler, F., Pasqualetti, F., & Bullo, F. (2011). Distributed detection of cyber-physical attacks
in power networks: A waveform relaxation approach. In 49th Annual Allerton Conference on
Communication, Control, and Computing (Allerton) Allerton (pp. 1486–1491).
66. Mitchell, R., & Chen, I. R. (2014). A survey of intrusion detection techniques for cyber-physical
systems. ACM Computing Surveys, 46(4), 1–29. https://doi.org/10.1145/2542049.
67. Mitchell, R., & Chen, I. (2015). Behavior rule specification-based intrusion detection for safety
critical medical cyber physical systems. IEEE Transactions on Dependable and Secure Computing,
12(1), 16–30.
68. Alcaraz, C., Cazorla, L., & Fernandez, G. (2015). Context-awareness using anomaly-based
detectors for smart grid domains. In Lecture Notes in Computer Science International Conference
on Risks and Security of Internet and Systems (pp. 17–34). Springer. https://doi.org/10.1007/978-3
-319-17127-2_ 2.
69. Abbas, W., Laszka, A., Vorobeychik, Y. et al. (2015). Scheduling intrusion detection systems in
resource-bounded cyber- physical systems. In Proceedings of the 1st ACM Workshop on Cyber-
Physical Systems-Security and/or Privacy. Academic Medicine, 55–66.
Security and Privacy Aspect of Cyber Physical Systems 163
70. Naghnaeian, M., Hirzallah, N., & Voulgaris, P. G. (2015). Dual rate control for security in cyber-
physical systems. In 54th IEEE Conference on Decision and Control (CDC) IEEE (pp. 14145–11420).
71. Ivanov, R., Pajic, M., & Lee, I. (2016). Attack-resilient sensor fusion for safety-critical cyber-
physical systems. ACM Transactions on Embedded Computing Systems, 15(1), 1–24. https://doi.org
/10.1145/2847418.
72. Zimmer, C., Bhat, B., Mueller, F. et al. (2010). Time-based intrusion detection in cyber-physical
systems. In Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems.
Academic Medicine, 109–118.
73. American Gas Association. (2005). Technical report. “Cryptographic protection of SCADA
communications part 1: Background, policies and test plan”. AGA Report.
74. Wan, K., & Alagar, V. (2013). Context-aware security solutions for cyber-physical systems.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications
Engineering, 109, 18–29. https://doi.org/10.1007/978-3- 642-36642- 0_ 3.
75. Sridhar, S., Hahn, A., & Govindarasu, M. (2012). Cyber physical system security for the elec-
tric power grid. Proceedings of the IEEE, 100(1), 210–224. https://doi.org/10.1109/JPROC.2011
.2165269.
76. Weiss, J. M. (2007). ‘Control systems cyber security—The need for appropriate regulations
to assure cyber security of the electric grid’, Testimony [Report]. To Homeland Security’s
Subcommittee on Emerging Threats, Cyber-Security, and Science and Technology.
77. Chakraborty, N. (2013). Intrusion detection system and intrusion prevention system: A com-
parative study. International Journal of Computing and Business Research (IJCBR), 4(6166), 2229.
78. Almohri, H., Cheng, L., Yao, D., & Alemzadeh, H. (2017). On threat modeling and mitigation
of medical cyber-physical systems. In IEEE/ACM International Conference on Connected
Health: Applications, Systems and Engineering Technologies (CHASE) IEEE and ACM (pp.
114–119).
79. Shu, X., Yao, D., & Ramakrishnan, N. (2015). Unearthing stealthy program attacks buried in
extremely long execution paths. In Proceedings of the 22nd ACM SIGSAC Conference on Computer
and Communications Security. Academic Medicine, 401–413.
80. Xu, K., Tian, K., Yao, D., & Ryder, B. G. (2016). A sharper sense of self: Probabilistic reasoning
of program behaviors for anomaly detection with context sensitivity. In 46th Annual IEEE/IFIP
International Conference on Dependable Systems and Networks (DSN) IEEE IEEE (pp. 467–478).
81. Urbina, D. I., Giraldo, J. A., Cardenas, A. A., Tippenhauer, N. O., Valente, J., Faisal, M., Ruths, J.,
Candell, R., & Sandberg, H. (2016). Limiting the impact of stealthy attacks on industrial control
systems. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications
Security. Academic Medicine, 1092–1105.
82. Jiang, N., Lin, H., Yin, Z., & Xi, C. (2017). Research of paired industrial firewalls in defense-
in-depth architecture of integrated manufacturing or production system. In 2017 IEEE
International Conference on Information and Automation (ICIA) IEEE (pp. 523–526).
83. Ghosh, T., Sarkar, D., Sharma, T., Desai, A., & Bali, R. (2016). Real time failure prediction of load
balancers and firewalls. In 2016 IEEE International Conference on Internet of Things (iThings)
and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and
Social Computing (CPSCom) and IEEE Smart Data (SmartData) IEEE (pp. 822–827).
84. Cohen, F. (2006). The use of deception techniques: Honeypots and decoys. Handbook of
Information Security, 3(1), 646–655.
85. Irvene, C., Formby, D., Litchfield, S., & Beyah, R. (2017). Honeybot: A honeypot for robotic sys-
tems. Proceedings of the IEEE, 106(1), 61–70. https://doi.org/10.1109/JPROC.2017.2748421.
86. Seeber, S., Sehgal, A., Stelte, B., Rodosek, G. D., & Schönwälder, J. (2013). Towards A Trust Computing
Architecture for RPL in Cyber Physical Systems. In Proceedings of the 9th International Conference
on Network and Service Management (CNSM 2013) (pp. 134–137). International Federation for
Information Processing/IEEE International Conference on Network and Service Management
(CNSM 2013).
87. Haehner, J., Rudolph, S., Tomforde, S., & Fisch, D. (2013). A Concept for Securing Cyber-Physical
Systems with Organic Computing Techniques IEEE (pp. 1–13).
164 Cyber Physical Systems
10
Cyber Physical System Approach for Smart
Farming and Challenges in Adoption
CONTENTS
10.1 Introduction......................................................................................................................... 165
10.2 Cyber-Physical Farming Platform.................................................................................... 167
10.2.1 Improving Crop Productivity............................................................................... 167
10.2.2 Sensing Soil Capability to Improve Crops.......................................................... 168
10.2.3 Crop Performance and Soil Improvement Analysis.......................................... 168
10.3 Challenging Factor in Agricultural.................................................................................. 169
10.3.1 Agricultural Techniques........................................................................................ 171
10.4 Agricultural Approach...................................................................................................... 172
10.4.1 Agricultural Tools................................................................................................... 173
10.4.2 Cyber Physical Systems.......................................................................................... 173
10.5 Future Studies..................................................................................................................... 174
10.6 Conclusions.......................................................................................................................... 174
References...................................................................................................................................... 175
10.1 Introduction
Among the most significant difficulties highlighted for the twenty-first century are:
All of these have significant consequences for the most critical aim of our century: ensur-
ing the correct framework for feeding and supporting the whole world's population over
an indefinite “time horizon” [1].
The quality and diversity of agriculture items as crucial characteristics of the popula-
tion's nutritional value have long been a central objective of both experts and, particularly,
administrations. On the other hand, there is a growing recognition that, in the case of
increased demography, not only are sustainable farming surfaces constricted, but the
impact of climate change on crop production may be so powerful that, in the very worst
sort of situation, the important environmental equivocation that allows all above con-
gregation to exist is likely to be destroyed.
Already, technology has had an effect “on the investment efficiency of agricultural pro-
duction: automation, artificial fertilizers, pharmaceutical pesticide application, and infor-
mation and technology have long proven their usefulness in raising the quantity of food
while requiring less human labor” [2].
Innovative products (biotechnologies, planning, and control) have also been introduced
to reduce negative environmental consequences and improve the efficiency of operations
of the agricultural sector. However, technology advancements have been employed in the
pato assist one or more components of the farm sector, without a comprehensive perspec-
tive of their interdependencies, rely without taking into account the feedback mechanism,
which includes the long-term risk associated.
“Agriculture’s development, particularly in the last fifty years, has favored specializa-
tion food and fiber productivity rose due to new technologies (mechanized farming,
automating, chemistry, and microbiology) and regulations favor maximizing output in
response to market forces. Because of these advances, fewer producers with lower labor
needs could provide the bulk of food and fiber in the most industrialized economies” [3].
“While these modifications have had numerous good benefits and decreased many dan-
gers in farming,” as stated in [1] “there have also been major expenses.” Topsoil degrada-
tion, groundwater pollution, the demise of agricultural producers, persistent disregard of
farm laborer social and studying circumstances, rising production costs, and the break-
down of the standard of living in rural areas are noteworthy among these [4].
During the last two decades, a significant movement has developed to challenge the agri-
business leadership’s role in encouraging practices that contribute to these socioeconomic
problems. Today, the sustainable agricultural movement is gaining traction and accept-
ability in mainstream agriculture. Sustainable agriculture not only addresses numerous
environmental issues, but it also provides creative and commercially viable options for
producers, laborers, consumers, legislators, and so many others across the food chain. The
referencing above is significant of a growing phenomenon in which the farmland entre-
preneurship model is shifting toward greater complexity, with behavior emerging from
the communication networks and coexistence of multiple portions that are independent of
the legislature and knowledgeable, through promoting best practices, of achieving a fully
functioning optimal solution, sharing “costs, and especially reducing the environmental
footprint. The environment is especially considered in this model, both as a specialized
efficiency requirement and as an explicit feature of the model” [5].
System dynamics, “ICT, and” information sharing now can enable the development of
such a framework by utilizing one of the most recent and demanding paradigms – cyber
physical systems.
This chapter seeks to give a systematic agricultural approach. Enterprise is described as
a dynamic system whose emergence behavior may be altered by changes in the external
environment.
The following part will introduce the notion of agricultural production enterprise used
in this work and the essential criteria for its operation.
Cyber Physical System Approach 167
A model of this firm will be given, emphasizing the complicated flow of information and
goods and their linkage.
The notion of cyber physical systems will be briefly described as solutions and technolo-
gies for an intelligence agriculture organization central controller, as an interconnected
multi-agent wireless mesh network. “Such design may be able to facilitate a lean migra-
tion from current industrially focused agriculture to sustainable farming in short, realistic
phases [6].”
in crops. Furthermore, increased drone data may be utilized to extract important crop
properties, such as leaf shape and color patterns that are not recorded in low-resolution
aerial photographs. Certain phenotypic (for example, metabolic and molecular qualities)
are distinguished by variations in the morphology of the leaves without changing the
crop’s spectral content. In addition, leaf coloration characteristics can determine sick plants
from nutritional ones. This work investigates the use of fieldwork mappings for numerous
regularly used switch virtual interfaces (SVIs), as well as leaf shape-color metadata, in the
building of business intelligence algorithms for assessing the influence of nutrients on
organically crop output [10].”
synchronizing. This data is kept in the cloud to allow for remote collection and manage-
ment with stakeholders to enhance farming techniques instantaneously and daily [15].”
We are taking the earth as a fundamental and fundamental resource, densely populated
locations, and due to excessive soil extraction and phenomena caused by the climate risk
factors such as desertification.
Soil erosion is a significant danger to our capacity to generate enough food. Soil man-
agement encompasses various measures designed to maintain the soil in places, such as
reducing or even eliminating tillage, using irrigation scheduling management to decrease
runoff, and keeping the ground covered with vegetation or mulch. Soil quality not only
has a significant impact on food production, dictating its structure and expenses but it
may also be influenced by cultures, serving as both an input and a production for the
agricultural sector as a whole [21].
Considering Earth itself to be a primary resource, renewable energy, especially hydro-
carbons, it would be economically unsustainable to quickly abandon or even reduce the
works (mostly mechanical) that depend on these nonrenewable energy sources. On the
other hand, sustainable farming practices need to look for extra reliable and preferably
electric resources (like energy obtained from organic waste); until then, excellent manage-
ment of the activities involved in agricultural production could decrease energy usage.
• Population aging: An older society means reducing skilled workers, which could
be made obsolete, but at a penalty in terms of energy assets. Furthermore, this
population sector, in particular, is driving up the production of organic, healthful
products [22].
• Population and rising and widespread urbanization: This entails a constant loss
of resources such as soil and water and a strain on the economic process of pro-
ductivity, as food and fiber output should increase as resources are depleted.
Furthermore, an unintended consequence of urbanization is the degradation of air
quality. In addition to having an immediate impact on the urban microclimate, air
pollution has the potential to trigger far-reaching weather patterns over time [23].”
• Globalization and greater mobility: Assurance and the potential to alter both the
distribution and distribution patterns of agricultural goods. Canadian currency
and financial pressure on the agribusiness company’s present expenses and rev-
enues; on the other hand, the growing susceptibility of the repercussions of dis-
ruptions in certain regions of the world to spread due to rising globalization [24].
• Increasing economic pressure: Profit drives any business, and its degree signifi-
cantly impacts how innovators conduct their work. There is high competition
between companies worldwide, resulting in high dynamism in client demands
and revenue maximization. These developments may have a significant impact on
agribusiness businesses.
• Highly technological advancement dimension: Managed to install mechanical
and mechanized systems in agriculture, increasing production. Production, a
reduction in the number of people employed, and more efficient soil utilization
overall. In addition, advances in ICT have resulted in more significant usage of
these techniques at every stage of agricultural production, laying the groundwork
for a paradigm shift in which the notion of cyber physical systems (CPS) might
find a wide range of applications [25].”
• Facilitating a Greater degree of communications: This factor may be a driver for
the intensive farming organization, as it means knowledge that could be used to
enhance functional departments and respond swiftly to environmental factors is
Cyber Physical System Approach 171
gathered through sound surveillance systems while keeping all of the above vari-
ables in mind through adequate measuring devices. These sources include things
like weather forecasting, transfer stock rates, and supply chain partners.
10.3.1 Agricultural Techniques
As mentioned in the preceding section, Figure 10.1 depicts a modular form of the super-
vised agricultural experience (SAE).
The firm is believed to have both vegetable and animal products, resulting in three criti-
cal subsystems:
• the land management subsystems, which encompasses all aspects of culture and
pasture scheduling, fertilization, and soil dampness continuous monitoring, as
well as natural conditions, weather forecasts, market predictions, business goals,
and producing technologies and knowledge [26];
• The production planning sub-system deals with achieving goals specified by the
soil conservation comment thread for crops; it considers elements such as seed
production, work planning based on crop-specific characteristics and growing
conditions, weather patterns, and plant population. The conservation farming
component has similar objectives but is concerned with animals.
• The first step of this process is to ensure that the terrain has the best enslavement
conditions possible, using different methods tailored to soil quality and snow con-
ditions, weather predictions, and long- and medium-term crop and livestock plan-
ning to meet customer expectations and full compliance.
FIGURE 10.1
Smart agricultural monitoring system.
172 Cyber Physical Systems
are stored in the world model and whose current state and evolution can be separately
upgraded, as shown in the implementation approach [27].
As the network’s dimensions grow, the agricultural company’s complicated behavior
will emerge with higher precision. The real benefit of this method is that humans may
participate. As autonomous algorithms and knowledge consumers, the agent architecture
provides sufficient expertise while also adding a lot of freedom.
The existence of a detection network – not only multisensory networks, but also more
elaborate gadgets that can construe various intelligence gathered from channels such as
sensors, living beings, and even news stations to recognize and even foresee pertinent
changes whereby the farm could perhaps adjust – appears to be required to guarantee the
flexibility of the producing to external conditions – weather, market, diseases [28].
In the last stage of deployment, agents work together to form a system that displays
emergent proactive behavior as a result of linking its inherent structure (as supplied by the
SAE). Stage I entails a production schedule (as completed by the AI system), while Stage II
involves an evaluation of the external world's evolution (regarding the SAE) based on the
sensing network and the perception of its knowledge via an effective knowledge adminis-
tering and context successful track record of integrating.
In this model, two massively parallel ecosystems could be recognized: one for produc-
tion, which is severely affected by climate, weather patterns, pests, and other factors, and
another for product-market capitalization, which is influenced primarily by environmen-
tal factors with a highly dynamic system progression.
Intelligent process and reporting systems, which connect sensing, actuators, computers,
and telecommunication technologies, could control the first one into a scalable ability to
scale with reliable and adaptive governance.
The second ecosystem is susceptible to market-driven disruptions that are difficult to
foresee and even appropriately detect.
SAE will have a comprehensive system monitoring and assessment, planning and con-
trol of crop development, and, last but not least, a production and distribution manage-
ment system as an intelligent farm.
Due to its integration into a global information system, SAE will have access to services
such as complex, large datasets containing a variety of crop selection options, correlated
with specific soil characteristics, weather forecasts, and market developments, as well as
the decision support that comes along with them, techniques for efficiently handling agri-
cultural outputs and scoring the greatest possible price on the global market.
The goal of an irrigation canal with actual self and acclimation functionality at environment
protection, snow conditions, and market mechanisms and instabilities in the general frame-
work of an autonomous, conservation and economical, and socially responsible improvement
is considered through appropriate machine collection, enhanced digital transformation, and
efficient subjugation of multi-annual data sets in the decision-making process.”
10.4 Agricultural Approach
As mentioned before, each component of an SAE paradigm can be thought of as a separate
but collaborating individual. It has to be able to process information related to its major aims
utilizing synaptic plasticity, evaluate its suitability with the stated goals along the course
of achieving its objectives, deliberate on goal revisions, and act it toward the environment.
Cyber Physical System Approach 173
10.4.1 Agricultural Tools
Since the success of this module depends on the participation of these other entities, gath-
ering data from a variety of sources belonging to them should be the top priority.
Complex behaviors might emerge from the hierarchical structure of these agents,
which could simulate various aspects of SAE during various stages of development and
deployment.
These systems will alter our methods of dealing with the external surroundings in the
same way that the internet has changed social communication.
Economic and social drivers, such as falling costs of computation, connections, and sen-
sor systems; rising demands for energy-efficient use of extensive and complex infrastruc-
ture facilities; and conservation of natural for technological solutions that make efficient
use of renewable resources and produce less waste all contribute to the CPS worldview. It
has genuine goods with usable information embedded in them.
The fundamental economic motive for implementing CPS in every business and applica-
tion is lowering computing, communications, and sensor costs. Computer and telecommu-
nications have evolved into the “universal system engineer” that joins disparate systems.
They make it possible to build CPS networks global or regional.
It is only reasonable to regard the intensive agriculture industry as a dynamic process,
operating on the premise of autonomously and interacting agents – either human or non-
human – behaviors, as previously indicated.
By integrating networking and computing infrastructure with manufacturing indus-
tries, promoting sustainable development, and related components, CPS enables a more
accessible evolution of “intelligent” structures. The voice wants and knowledge of the
“customers” will be integrated across the global supply chain in the upcoming generations
of enterprises in the twenty-first century. It will be a results-driven company that responds
swiftly to client needs while reducing resource consumption and enhancing environmen-
tal stability and economic attractiveness.
174 Cyber Physical Systems
The CPS approach might already be deployed on the first stage of an SAE model, also
incorporating the apparatus, equipment, and devices that offer soil treatments, thereby
applying control rules and minimizing the effects of perturbations that might act at this
level (drought, rain excess, pests etc.).
CPS necessitates more complex surveillance, forecasting, and understanding of associ-
ated data and characteristics on the second floor, based on information fusion and organi-
zational learning. Depending on the quality, productivity, and environmental needs, such
agricultural systems and approaches form the paradigms of a critical component of success.
Gradually expanding operational diversification and mechanization level, such a system
might be implemented, guaranteeing a lean migration from a homogenous specialized
income-producing property to a flexible, versatile, and responsive upgraded one.
10.5 Future Studies
Improved monitoring and complete evaluations can also provide appropriate soil/crop
performance evaluation; however, current methods are prohibitively expensive and don’t
even provide real-time data. The following are some possible future research directions:
Result measurements for soil/crop evaluation and SDSS observation methodologies are
being developed.
• Creation of a low-cost analysis tool that allows landowners to examine their farms’
soil/crop health quickly.
• A comparative of crop yield and phenotypic expression in fields altered with
organic fertilizer with areas handled with livestock wastes (e.g., bovine manure)
or chemical fertilizers.
• Exploration mineralization rates are high enough to support agricultural produc-
tion throughout the planting period, but they drop once the fallow season begins.
• Exploration of nutrients in contrast to the pulses of nutrients that soils receive fol-
lowing more contemporary agricultural practices.
• Exploration of biannual measurements of soil bulk density, carbon content, heavy
metals, macroinvertebrates, and microbes.”
10.6 Conclusions
Agricultural activity should really be re-designed as a sustainable food supply system
for a continually growing populace in the framework of relevant climatic changes, exten-
sive soil degradation, and reductions in drinking drinkable water sources. The rational
utilization of mineral wealth (soil, water, and energy) in the context of global sustain-
able development has already been recognized as necessary for the planet’s and its inhab-
itants’ health. Real progress in industrial automation, biology, and “microbiology” has
provided professionals with improved technological and organizational methods for pro-
ducing high-quality food through the agricultural field. Significant outcomes from ICT
Cyber Physical System Approach 175
made an application in the agricultural sector ensure more excellent production perfor-
mance and accuracy. As a result, additional value is created in a field that is critical to
humanity’s survival. As an effectual agroecosystem, the intellectual farm is frequently
mentioned, representing the effort to connect this industry in the digital reality of calcula-
tion and information exchange, allowing the Intelligent Cyber-Enterprise principle to be
implemented in the field through the Availability Enterprise. As an integrated intelligent
system, tomorrow’s farming will allow for effective soil exploitation, environmental con-
servation, and, not least, the provision of ecologically cheap nutrients, all of which will
have a significant impact on people's quality of life.
References
1. Hamuda E, Glavin M, Jones E (2016) A survey of image processing techniques for plant extrac-
tion and segmentation in the field. Computers and Electronics in Agriculture 125: 184–199.
2. Hersh B, Mirkouei A, Sessions J, Rezaie B, You Y (2019) A review and future directions on
enhancing sustainability benefits across food-energy-water systems: The potential role of bio-
char-derived products. AIMS Environmental Science 6(5): 379–416.
3. Brenchley R et al. (2012) Analysis of the bread wheat genome using whole-genome shotgun
sequencing. Nature 491(7426): 705–710.
4. Vogl GW, Weiss BA, Helu M (2016) A review of diagnostic and prognostic capabilities and best
practices for manufacturing. Journal of Intelligent Manufacturing 30(1): 1–17.
5. Mirkouei A (2019) Cyber-Physical Real-Time Monitoring and Controlling Biomass-Based Energy
Production. Emerging Frontiers in Industrial and Systems Engineering: Growing Research and
Practice. Taylor & Francis, USA.
6. Elmore AJ, Stylinski CD, Pradhan K (2016) Synergistic use of citizen science and remote sens-
ing for forest tree phenology continental-scale measurements. Remote Sensing 8(6): 502.
7. Candiago S, Remondino F, Del Giglio M, Dubbini M, Gattelli M (2015) Evaluating multispectral
images and vegetation indices for precision farming applications from UAV images. Remote
Sensing 7(4): 4026–4047.
8. Lottes P, Khanna R, Pfeifer J, Siegwart R, Stachniss C (2017) UAV-based crop and weed clas-
sification for smart farming. Robotics and Automation (ICRA), IEEE International Conference on,
IEEE. Singapore.
9. Delgado-Baquerizo M et al. (2013) Decoupling soil nutrient cycles as a function of aridity in
global drylands. Nature 502(7473): 672–676.
10. Panke-Buisse K, Poole AC, Goodrich JK, Ley RE, Kao-Kniffin J (2015) Selection on soil micro-
biomes reveals reproducible impacts on plant function. The ISME Journal 9(4): 980–989.
11. Challinor AJ et al. (2014) A meta-analysis of crop yield under climate change and adaptation.
Nature Climate Change 4(4): 287–291.
12. Kaswan KS, Dhatterwal JS, Baliyan A, Jain V (2021). “Special sensors for autonomous naviga-
tion systems in crops investigation system” in the book title “virtual and augmented reality for
automobile industry: Innovation vision and applications” published in springer series: Studies
in systems, decision and control, January, 2022. Print ISBN 978-3-030-94101-7, Online ISBN 978-3-
030-94102-4, https://doi.org/10.1007/978-3- 030-94102-4_4.
13. Ray DK, Ramankutty N, Mueller ND, West PC, Foley JA (2012) Recent crop yield growth and
stagnation patterns. Nature Communications 3: 1293.
14. Bradford JB et al. (2017) Future soil moisture and temperature extremes imply expanding suit-
ability for rainfed agriculture in temperate drylands. Scientific Reports 7(1): 12923.
15. Wolfe ML et al. (2016) Engineering solutions for food-energy-water systems: It is more than
engineering. Journal of Environmental Studies and Sciences 6(1): 172–182.
176 Cyber Physical Systems
16. Hansen S, Mirkouei A, Xian M (2019) Cyber-physical control and optimization for biofuel 4.0.
In Romeijn HE, Schaefer A, Thomas R (eds.) Proceedings of the 2019 IISE Annual Conference.
Florida, USA, 75–85.
17. Dhatterwal JS, Kaswan KS, Pandey A (2022) “Implementation and deployment of 5G-drone
setups”, book entitled “internet of drones: Opportunities and challenges”. In Apple Academic
Press (AAP), Canada, Published Hard ISBN: 9781774639856.
18. Liu Z, Peng Y, Wang B, Yao S, Liu Z (2017) Review on cyber-physical systems. IEEE/CAA Journal
of Automatica Sinica 4(1): 27–40.
19. Monostori L et al. (2016) Cyber-physical systems in manufacturing. CIRP Annals-Manufacturing
Technology 65(2): 621–641.
20. Lee EA (2015) The past, present and future of cyber-physical systems: A focus on models.
Sensors (Basel) 15(3): 4837–4869.
21. Gao R et al. (2015) Cloud-enabled prognosis for manufacturing. CIRP Annals-Manufacturing
Technology 64(2): 749–772.
22. Hansen S, Mirkouei A (2018) Past Infrastructures and Future Machine Intelligence (MI) for Biofuel
Production: A Review and mi-Based Framework. American Society of Mechanical Engineers, New
York.
23. Lee J, Bagheri B, Kao H-A (2015) A cyber-physical systems architecture for industry 4.0-based
manufacturing systems. Manufacturing Letters 3: 18–23.
24. Dhatterwal JS, Kaswan KS, Jaglan V, Vij A (2022) “Machine learning and deep learning algo-
rithms for IoD”. In book entitled “internet of drones: Opportunities and challenges” in “Apple
Academic Press (AAP), Canada, Published Hard ISBN: 9781774639856.
25. Richardson AD, Hufkens K, Milliman T, Frolking S (2018) Intercomparison of phenological
transition dates derived from the PhenoCam Dataset V1.0 and MODIS satellite remote sensing.
Scientific Reports 8: 5679.
26. Liu S et al. (2017) Spatiotemporal dynamics of grassland aboveground biomass on the Qinghai-
Tibet Plateau based on validated MODIS NDVI. Scientific Reports 7(1): 4182.
27. Zhang N, Wang M, Wang N (2002) Precision agriculture-a worldwide overview. Computers and
Electronics in Agriculture 36(2–3): 113–132.
28. Sripada RP, Heiniger RW, White JG, Weisz R (2005) Aerial colour infrared photography for
determining late-season nitrogen requirements in corn. Agronomy Journal 97(5): 1443–1451.
Index
177
178 Index