|
|
Study on Self-Decision of Cyber-Physical Systems Based on Similarity Computation |
ZHOU Wang-Ping, WANG Guo-Dong |
School of Information and Control, Nanjing University of Information Science & Technology,Nanjing 210044 |
|
|
Abstract Cyber-Physical systems (CPS) are getting more and more popular. How to make the system automatically capture the changes of complex statuses and take proper actions responding to the changes is one of the key problems of CPS. Combining with the reinforcement learning algorithm, a novel self-decision algorithm of CPS based on similarity computation, called Similarity Computation Based on Reinforcement Learning Algorithm(SCBRLA), is proposed to solve this problem. In this algorithm, the features of both system and system targets are firstly extracted, and then the similarities of current system state and target states are computed. Based on the computation result, system takes corresponding actions and decides the execution order of those actions. The proposed algorithm can be well used to analyze strategies of system self-decision when it receives attacks. The simulation results show that the proposed algorithm can help systems realize self-decision, and it has faster response speed compared with traditional method.
|
Received: 21 June 2013
|
|
|
|
|
[1] Wang Z J, Xie L L. Cyber-Physical Systems: A Survey. Acta Automatic Sinica, 2011, 37(10): 1157-1166 (in Chinese) (王中杰,谢璐璐.信息物理融合系统研究综述.自动化学报, 2011, 37(10): 1157-1166) [2] Rajkumar R, Lee I, Sha L, et al. Cyber-Physical Systems: The Next Computing Revolution // Proc of the 47th ACM/IEEE Design Automation Conference. Anaheim, USA, 2010: 731-736 [3] Baheti R, Gill H. Cyber-Physical Systems // Samad T, Annaswamy A M, eds. The Impact of Control Technology. Washington D C, USA: IEEE, 2011: 161-166 [4] Dillon T S, Zhuge H, Wu C, et al. Web-of-Things Framework for Cyber-Physical Systems. Concurrency and Computation: Practice and Experience, 2011, 23(9): 905-923 [5] Lin J, Sedigh S, Miller A. A General Framework for Quantitative Modeling of Dependability in Cyber-Physical System: A Proposal for Doctoral Research // Proc of the 33rd Annual IEEE International Computer Software and Applications Conference. Seattle, USA, 2009: 668-671 [6] Sastry S. Networked Embedded Systems: From Sensor Webs to Cyber-Physical Systems // Proc of the 10th International Workshop on Hybrid Systems: Computation and Control. Berlin, Germany, 2007: 1 [7] Sha L, Gopalakrishnan S, Liu X, et al. Cyber-Physical Systems: A New Frontier // Proc of the IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing. Taichung, China, 2009: 3-13 [8] Lee E A. Cyber Physical Systems: Design Challenges. Technical Report, No.UCB/EECS-2008-8. Berkeley, USA: University of California at Berkeley, 2008 [9] Cardenas A A, Amin S, Sastry S. Secure Control: Towards Survivable Cyber-Physical Systems // Proc of the 28th International Conference on Distributed Computing Systems Workshops. Beijing, China, 2008: 495-500 [10] Phan L T X, Lee I. Towards a Compositional Multi-modal Framework for Adaptive Cyber-Physical Systems // Proc of the 17th IEEE Conference on Embedded and Real-Time Computing Systems and Applications. Toyama, Japan, 2011: 67-73 [11] Siaterlis C, Genge B. Theory of Evidence-Based Automated Decision Making in Cyber-Physical System // Proc of the IEEE International Conference on Smart Measurements for Future Grids. Bologna, Italy, 2011: 107-112 [12] Don S, Choi E, Min D. Event Driven Adaptive Awareness System for Medical Cyber Physical Systems // Proc of the 4th International Conference on Awareness Science and Technology. Seoul, Korea, 2012: 238-242 [13] Amoui M, Salehie M, Mirarab S, et al. Adaptive Action Selection in Autonomic Software Using Reinforcement Learning // Proc of the 4th International Conference on Autonomic and Autonomous Systems. Guadeloupe, France, 2008: 175-181 [14] Mitchell T M. Machine Learning and Data Mining. Communications of the ACM, 1999, 42(11): 30-36 [15] Tang J J, Zhao J J Z, Ding J W, et al. Cyber-Physical Systems Modeling Method Based on Modelica // Proc of the 6th IEEE International Conference on Software Security and Reliability Companion. Gaithersburg, USA, 2012: 188-191 |
|
|
|