applsci-logo

Journal Browser

Journal Browser

Trustworthiness in Mobile Cyber Physical Systems

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (31 October 2020) | Viewed by 25939

Printed Edition Available!
A printed edition of this Special Issue is available here.

Special Issue Editors


E-Mail Website
Guest Editor
Department of Artificial Intelligence, Hanyang University, Ansan 15588, Republic of Korea
Interests: interdisciplinary area of cyber-physical systems; medical AI
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Co-Guest Editor
Department of Computer Science, Kennesaw State University, Marietta, GA 30060, USA
Interests: applied cryptography, security and privacy in various critical applications; data science in cybersecurity, and blockchains and smart contracts
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Co-Guest Editor
School of Computer Science and Information Engineering, The Catholic University of Korea, Bucheon 14462, Korea
Interests: mobile systems; electronic identification system; wireless systems
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

As computing and communication capabilities both continue to become faster and cheaper, they are increasingly embedded in diverse objects and structures in the physical environment. Harnessing these capabilities will provide the basis for applications with enormous societal impact and economic benefits, linking the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities (including human activities) leads to greater demand for trustworthy systems. Here, we use the term system trustworthiness in the broad sense of a system being worthy of confidence or being dependable such that it can be justifiably trusted, so that it guarantees continuous service in the presence of internal errors or external attacks.

Mobile CPS (MCPS), a prominent subcategory of CPS in which the physical component has no permanent location, is receiving much attention in these days. Mobile Internet devices, such as iPhone and Android phones, with their increasing processing power, range of sensors, and pervasive cellular connections, already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to the direction of research on modern/future trustworthy MCPS, including design, modeling, verification and validation, simulation, dependability, resilience, security, safety, and run-time resource optimization. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS including, but not limited to, the aerospace, autonomous automotive systems, automatic pilot avionics, smart grid, distributed robotics, and many more.

Prof. Kyungtae Kang
Dr. Junggab Son
Dr. Hyo-Joong Suh
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • mobile cyber physical systems
  • trustworthiness
  • mobility
  • dependability
  • security
  • safety
  • error resiliency

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (10 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Editorial

Jump to: Research

5 pages, 170 KiB  
Editorial
Trustworthiness in Mobile Cyber-Physical Systems
by Hyo-Joong Suh, Junggab Son and Kyungtae Kang
Appl. Sci. 2021, 11(4), 1676; https://doi.org/10.3390/app11041676 - 13 Feb 2021
Viewed by 1735
Abstract
As they continue to become faster and cheaper, devices with enhanced computing and communication capabilities are increasingly incorporated into diverse objects and structures in the physical environment [...] Full article
(This article belongs to the Special Issue Trustworthiness in Mobile Cyber Physical Systems)

Research

Jump to: Editorial

17 pages, 426 KiB  
Article
Robust CNN Compression Framework for Security-Sensitive Embedded Systems
by Jeonghyun Lee and Sangkyun Lee
Appl. Sci. 2021, 11(3), 1093; https://doi.org/10.3390/app11031093 - 25 Jan 2021
Cited by 10 | Viewed by 2589
Abstract
Convolutional neural networks (CNNs) have achieved tremendous success in solving complex classification problems. Motivated by this success, there have been proposed various compression methods for downsizing the CNNs to deploy them on resource-constrained embedded systems. However, a new type of vulnerability of compressed [...] Read more.
Convolutional neural networks (CNNs) have achieved tremendous success in solving complex classification problems. Motivated by this success, there have been proposed various compression methods for downsizing the CNNs to deploy them on resource-constrained embedded systems. However, a new type of vulnerability of compressed CNNs known as the adversarial examples has been discovered recently, which is critical for security-sensitive systems because the adversarial examples can cause malfunction of CNNs and can be crafted easily in many cases. In this paper, we proposed a compression framework to produce compressed CNNs robust against such adversarial examples. To achieve the goal, our framework uses both pruning and knowledge distillation with adversarial training. We formulate our framework as an optimization problem and provide a solution algorithm based on the proximal gradient method, which is more memory-efficient than the popular ADMM-based compression approaches. In experiments, we show that our framework can improve the trade-off between adversarial robustness and compression rate compared to the existing state-of-the-art adversarial pruning approach. Full article
(This article belongs to the Special Issue Trustworthiness in Mobile Cyber Physical Systems)
Show Figures

Figure 1

23 pages, 5357 KiB  
Article
Model Checking Resiliency and Sustainability of In-Vehicle Network for Real-Time Authenticity
by Jin Hyun Kim, Hyo Jin Jo and Insup Lee
Appl. Sci. 2021, 11(3), 1068; https://doi.org/10.3390/app11031068 - 25 Jan 2021
Cited by 2 | Viewed by 2186
Abstract
The Controller Area Network (CAN) is the most common network system in automotive systems. However, the standardized design of a CAN protocol does not consider security issues, so it is vulnerable to various security attacks from internal and external electronic devices. Recently, in-vehicle [...] Read more.
The Controller Area Network (CAN) is the most common network system in automotive systems. However, the standardized design of a CAN protocol does not consider security issues, so it is vulnerable to various security attacks from internal and external electronic devices. Recently, in-vehicle network is often connected to external network systems, including the Internet, and can result in an unwarranted third-party application becoming an attack point. Message Authentication CAN (MAuth-CAN) is a new centralized authentication for CAN system, where two dual-CAN controllers are utilized to process message authentication. MAuth-CAN is designed to provide an authentication mechanism as well as provide resilience to a message flooding attack and sustainably protect against a bus-off attack. This paper presents formal techniques to guarantee critical timing properties of MAuth-CAN, based on model checking, which can be also used for safety certificates of vehicle components, such as ISO 26262. Using model checking, we prove sufficient conditions that MAuth-CAN is resilient and sustainable against message flooding and bus-off attacks and provide two formal models of MAuth-CAN in timed automata that are applicable for formal analysis of other applications running on CAN bus. In addition, we discuss that the results of model checking of those properties are consistent with the experiment results of MAuth-CAN implementation. Full article
(This article belongs to the Special Issue Trustworthiness in Mobile Cyber Physical Systems)
Show Figures

Figure 1

17 pages, 1960 KiB  
Article
Data Quality Measures and Efficient Evaluation Algorithms for Large-Scale High-Dimensional Data
by Hyeongmin Cho and Sangkyun Lee
Appl. Sci. 2021, 11(2), 472; https://doi.org/10.3390/app11020472 - 6 Jan 2021
Cited by 2 | Viewed by 2522
Abstract
Machine learning has been proven to be effective in various application areas, such as object and speech recognition on mobile systems. Since a critical key to machine learning success is the availability of large training data, many datasets are being disclosed and published [...] Read more.
Machine learning has been proven to be effective in various application areas, such as object and speech recognition on mobile systems. Since a critical key to machine learning success is the availability of large training data, many datasets are being disclosed and published online. From a data consumer or manager point of view, measuring data quality is an important first step in the learning process. We need to determine which datasets to use, update, and maintain. However, not many practical ways to measure data quality are available today, especially when it comes to large-scale high-dimensional data, such as images and videos. This paper proposes two data quality measures that can compute class separability and in-class variability, the two important aspects of data quality, for a given dataset. Classical data quality measures tend to focus only on class separability; however, we suggest that in-class variability is another important data quality factor. We provide efficient algorithms to compute our quality measures based on random projections and bootstrapping with statistical benefits on large-scale high-dimensional data. In experiments, we show that our measures are compatible with classical measures on small-scale data and can be computed much more efficiently on large-scale high-dimensional datasets. Full article
(This article belongs to the Special Issue Trustworthiness in Mobile Cyber Physical Systems)
Show Figures

Figure 1

13 pages, 361 KiB  
Article
SPEKS: Forward Private SGX-Based Public Key Encryption with Keyword Search
by Hyundo Yoon, Soojung Moon, Youngki Kim, Changhee Hahn, Wonjun Lee and Junbeom Hur
Appl. Sci. 2020, 10(21), 7842; https://doi.org/10.3390/app10217842 - 5 Nov 2020
Cited by 7 | Viewed by 2422
Abstract
Public key encryption with keyword search (PEKS) enables users to search over encrypted data outsourced to an untrusted server. Unfortunately, updates to the outsourced data may incur information leakage by exploiting the previously submitted queries. Prior works addressed this issue by means of [...] Read more.
Public key encryption with keyword search (PEKS) enables users to search over encrypted data outsourced to an untrusted server. Unfortunately, updates to the outsourced data may incur information leakage by exploiting the previously submitted queries. Prior works addressed this issue by means of forward privacy, but most of them suffer from significant performance degradation. In this paper, we present a novel forward private PEKS scheme leveraging Software Guard Extension (SGX), a trusted execution environment provided by Intel. The proposed scheme presents substantial performance improvements over prior work. Specifically, we reduce the query processing cost from O(n) to O(1), where n is the number of encrypted data. According to our performance analysis, the overall computation time is reduced by 80% on average. Lastly, we provide a formal security definition of SGX-based forward private PEKS, as well as a rigorous security proof of the proposed scheme. Full article
(This article belongs to the Special Issue Trustworthiness in Mobile Cyber Physical Systems)
Show Figures

Figure 1

21 pages, 359 KiB  
Article
A Taxonomy for Security Flaws in Event-Based Systems
by Youn Kyu Lee and Dohoon Kim
Appl. Sci. 2020, 10(20), 7338; https://doi.org/10.3390/app10207338 - 20 Oct 2020
Cited by 3 | Viewed by 2819
Abstract
Event-based system (EBS) is prevalent in various systems including mobile cyber physical systems (MCPSs), Internet of Things (IoT) applications, mobile applications, and web applications, because of its particular communication model that uses implicit invocation and concurrency between components. However, an EBS’s non-determinism in [...] Read more.
Event-based system (EBS) is prevalent in various systems including mobile cyber physical systems (MCPSs), Internet of Things (IoT) applications, mobile applications, and web applications, because of its particular communication model that uses implicit invocation and concurrency between components. However, an EBS’s non-determinism in event processing can introduce inherent security vulnerabilities into the system. Multiple types of attacks can incapacitate and damage a target EBS by exploiting this event-based communication model. To minimize the risk of security threats in EBSs, security efforts are required by determining the types of security flaws in the system, the relationship between the flaws, and feasible techniques for dealing with each flaw. However, existing security flaw taxonomies do not appropriately reflect the security issues that originate from an EBS’s characteristics. In this paper, we introduce a new taxonomy that defines and classifies the particular types of inherent security flaws in an EBS, which can serve as a basis for resolving its specific security problems. We also correlate our taxonomy with security attacks that can exploit each flaw and identify existing solutions that can be applied to preventing such attacks. We demonstrate that our taxonomy handles particular aspects of EBSs not covered by existing taxonomies. Full article
(This article belongs to the Special Issue Trustworthiness in Mobile Cyber Physical Systems)
Show Figures

Figure 1

19 pages, 805 KiB  
Article
Reducing Dynamic Power Consumption in Mixed-Critical Real-Time Systems
by Ijaz Ali, Yong-Il Jo, Seonah Lee, Wan Yeon Lee and Kyong Hoon Kim
Appl. Sci. 2020, 10(20), 7256; https://doi.org/10.3390/app10207256 - 16 Oct 2020
Cited by 9 | Viewed by 2737
Abstract
In this paper, we study energy minimization consumption of a mixed criticality real-time system on uni-core. Our focus is on a new scheduling scheme to decrease the frequency level in order to conserve power. Since many systems are equipped with dynamic power and [...] Read more.
In this paper, we study energy minimization consumption of a mixed criticality real-time system on uni-core. Our focus is on a new scheduling scheme to decrease the frequency level in order to conserve power. Since many systems are equipped with dynamic power and frequency level memory, power can be saved by decreasing the system frequency. In this paper, we provide new dynamic energy minimization consumption in mixed-criticality real-time systems. Recent research has been done on low-criticality mode for power reduction. Thus, the proposed scheme can reduce the energy both in high-criticality and low-criticality modes. The effectiveness of our proposed scheme in energy reduction is clearly shown through simulations results. Full article
(This article belongs to the Special Issue Trustworthiness in Mobile Cyber Physical Systems)
Show Figures

Figure 1

18 pages, 889 KiB  
Article
Dynamic All-Red Signal Control Based on Deep Neural Network Considering Red Light Runner Characteristics
by Seong Kyung Kwon, Hojin Jung and Kyoung-Dae Kim
Appl. Sci. 2020, 10(17), 6050; https://doi.org/10.3390/app10176050 - 1 Sep 2020
Cited by 2 | Viewed by 2419
Abstract
Despite recent advances in technologies for intelligent transportation systems, the safety of intersection traffic is still threatened by traffic signal violation, called the Red Light Runner (RLR). The conventional approach to ensure the intersection safety under the threat of an RLR is to [...] Read more.
Despite recent advances in technologies for intelligent transportation systems, the safety of intersection traffic is still threatened by traffic signal violation, called the Red Light Runner (RLR). The conventional approach to ensure the intersection safety under the threat of an RLR is to extend the length of the all-red signal when an RLR is detected. Therefore, the selection of all-red signal length is an important factor for intersection safety as well as traffic efficiency. In this paper, for better safety and efficiency of intersection traffic, we propose a framework for dynamic all-red signal control that adjusts the length of all-red signal time according to the driving characteristics of the detected RLR. In this work, we define RLRs into four different classes based on the clustering results using the Dynamic Time Wrapping (DTW) and the Hierarchical Clustering Analysis (HCA). The proposed system uses a Multi-Channel Deep Convolutional Neural Network (MC-DCNN) for online detection of RLR and also classification of RLR class. For dynamic all-red signal control, the proposed system uses a multi-level regression model to estimate the necessary all-red signal extension time more accurately and hence improves the overall intersection traffic safety as well as efficiency. Full article
(This article belongs to the Special Issue Trustworthiness in Mobile Cyber Physical Systems)
Show Figures

Figure 1

12 pages, 460 KiB  
Article
A Real-Time Data Delivery for Mobile Sinks Group on Mobile Cyber-Physical Systems
by Seungmin Oh, Yoonsoo Choi, Sangdae Kim, Cheonyong Kim, Kwansoo Jung and Seok-Hun Kim
Appl. Sci. 2020, 10(17), 5950; https://doi.org/10.3390/app10175950 - 27 Aug 2020
Cited by 3 | Viewed by 1844
Abstract
Mobile Cyber-Physical Systems (MCPS) have extended the application domains by exploiting the advantages of Cyber-Physical Systems (CPS) through the mobile devices. The cooperation of various mobile equipment and workers based on the MCPS further improved efficiency and productivity in the industry. To support [...] Read more.
Mobile Cyber-Physical Systems (MCPS) have extended the application domains by exploiting the advantages of Cyber-Physical Systems (CPS) through the mobile devices. The cooperation of various mobile equipment and workers based on the MCPS further improved efficiency and productivity in the industry. To support this cooperation of groups of workers (hereafter referred to as the Mobile Sink Groups), data should be delivered to appropriate groups of workers in a timely manner. Traditionally, the data dissemination for MSG relies on flooding-based geocasting into the movable area of the group due to frequent movements of each group member. However, the flooding-based data dissemination could not be directly applied to real-time data delivery that demands the required time deadline and the end-to-end delivery distance, because the flooding could not define the end-to-end distance and progress to each member in a group. This paper proposes a real-time data delivery mechanism for supporting MSG in time-critical applications. In our mechanism, a ring-based modeling and data transfer scheme on a virtual grid in the ring for group mobility provides the end-to-end distance and the progress to forward real-time data to each member. Simulation results show our mechanism is superior to the existing ones in terms of real-time communication for MSG. Full article
(This article belongs to the Special Issue Trustworthiness in Mobile Cyber Physical Systems)
Show Figures

Figure 1

28 pages, 1925 KiB  
Article
AUTOSAR Runnable Periods Optimization for DAG-Based Complex Automobile Applications
by Daeho Choi, Tae-Wook Kim and Jong-Chan Kim
Appl. Sci. 2020, 10(17), 5829; https://doi.org/10.3390/app10175829 - 23 Aug 2020
Cited by 5 | Viewed by 3265
Abstract
When developing an automobile control application, its scheduling parameters as well as the control algorithm itself should be carefully optimized to achieve the best control performance from given computing resources. Moreover, since the wide acceptance of the AUTOSAR standard, where finer-granular scheduling entities [...] Read more.
When developing an automobile control application, its scheduling parameters as well as the control algorithm itself should be carefully optimized to achieve the best control performance from given computing resources. Moreover, since the wide acceptance of the AUTOSAR standard, where finer-granular scheduling entities (called runnables) rather than the traditional real-time tasks are used, the number of scheduling parameters to be optimized is far greater than the traditional task-based control systems. Hence, due to the vast problem space, it is not feasible to reuse existing time-consuming search-based optimization methods. With this motivation, this paper presents an analytical codesign method for deciding runnable periods that minimize given control cost functions. Our solution approach, based on the Lagrange multiplier method, can find optimized runnable periods in polynomial times due to its analytical nature. Moreover, our evaluation results for synthesized applications with varying complexities show that our method performs significantly better (12% to 59% of control cost reductions) than a state-of-the-art evolutionary algorithm. To the best of our knowledge, this study is one of the first attempts to find runnable periods that maximize a given system’s control performance. Full article
(This article belongs to the Special Issue Trustworthiness in Mobile Cyber Physical Systems)
Show Figures

Figure 1

Back to TopTop