Vicky's PageVicky's Page
Vivian
Recipe
Tools
English
Semester 3
Vivian
Recipe
Tools
English
Semester 3
  • Main Pages

    • Basic
    • General
    • Block Chain
  • CyberDefense Pro - 1.0 Introduction

    • 1.1 Introduction to TestOut CyberDefense Pro
  • CyberDefense Pro - 2.0 Vulnerability Response, Handling, and Management

    • 2.1 Regulations and Standards
    • 2.2 Risk Management
    • 2.3 Security Controls
    • 2.4 Attack Surfaces
    • 2.5 Patch Management
    • 2.6 Security Testing
  • CyberDefense Pro - 3.0 Threat Intelligence and Threat Hunting

    • 3.1 Threat Actors
    • 3.2 Threat Intelligence
    • 3.3 Threat Hunting
    • 3.4 Honeypots
  • CyberDefense Pro - 4.0 System and Network Architecture

    • 2.1 Regulations and Standards
    • 4.2 Network Architecture
    • Section 4.3 Identity and Access Management (IAM)
    • 4.4 Data Protection
    • 4.5 Logging
  • CyberDefense Pro - 5.0 Vulnerability Assessments

    • 5.1 Reconnaissance
    • 2.1 Regulations and Standards
    • 5.3 Enumeration
    • 5.4 Vulnerability Assessments
    • 5.5 Vulnerability Scoring Systems
    • 5.6 Classifying Vulnerability Information
  • CyberDefense Pro - 6.0 Network Security

    • 2.1 Regulations and Standards
    • 6.2 Wireless Security
    • 6.3 Web Server Security
    • 2.1 Regulations and Standards
    • 6.5 Sniffing
    • 6.6 Authentication Attacks
    • 6.7 Cloud Security
    • 6.8 Email Security
    • 2.1 Regulations and Standards
    • 6.10 Industrial Computer Systems
  • CyberDefense Pro - 7.0 Host-Based Attacks

    • 7.1 Device Security
    • 7.2 Unauthorized Changes
    • 27.3 Malware
    • 7.4 Command and Control
    • 2.1 Regulations and Standards
    • 7.6 Scripting and Programming
    • 2.1 Regulations and Standards
  • CyberDefense Pro - 8.0 Security Management

    • 8.1 Security Information and Event Management (SIEM)
    • 8.2 Security Orchestration, Automation, and Response (SOAR)
    • 8.3 Exploring Abnormal Activity
  • CyberDefense Pro - 9.0 Post-Attack

    • 9.1 Containment
    • 2.1 Regulations and Standards
    • 9.3 Post-Incident Activities
  • A.0 CompTIA CySA+ CS0-003 - Practice Exams

    • A.1 Prepare for CompTIA CySA+ Certification
    • A.2 CompTIA CySA+ CS0-003 Domain Review (20 Questions)
    • A.3 CompTIA CySA+ CS0-003 Practice Exams (All Questions)
  • B.0 TestOut CyberDefense Pro - Practice Exams

    • Section B.1 Prepare for TestOut CyberDefense Pro Certification
    • B.2 TestOut CyberDefense Pro Exam Domain Review
  • Glossary

    • Glossary
  • CYB400

    • Chapter 01
    • Chapter 02
    • Chapter 03
    • Chapter 04
    • Project 01
  • CYB402

    • lab
    • essay
  • CYB406

    • lab 01
    • lab 02
    • lab 03
    • lab 04
    • lab 05
    • lab 06
  • CYB300 Automobility Cybersecurity Engineering Standards

    • Schedule
    • Tara PPT
    • MidTerm Notes
    • Questions
  • ISO 21434

    • Introduction
    • Forward
    • Introduction
    • Content
  • CYB302 Automobility Cybersecurity

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Chapter 5 - AUTOSAR Embedded Security in Vehicles
    • Chapter 6
    • Chapter 7
    • Chapter 8
    • How to Write
    • Review 5
  • CYB304 Project Management For Cybersecurity In Automobility

    • Unit 1 Introduction
    • Unit 1 Frameworks
    • Unit 1 Methodologies
    • Unit 1 Standards
    • Unit 1 Reqirements
    • Unit 2 Scheduling
    • Unit 2 Scheduling 2
    • Unit 2 Trends
    • Unit 2 Risk
    • Unit 2 Project Monitoring & Controlling
    • Unit 2 Budgeting
    • Unit 2 Closure
  • Project Manager

    • Resource
    • Gantt Charts
    • Intrduction
    • First Things
    • Project Plan
    • Project Schedule
    • Agile
    • Resource
  • CYB306 Cyber-Physical Vehicle System Security

    • Chapter 1
    • Chapter 2
    • Chapter 3
    • Chapter 4
    • Chapter 5
    • Chapter 6 - Infrastructure for Transportation Cyber-Physical Systems
    • Chapter 7
    • Chapter 8
    • Chapter 9
    • Chapter 10
    • Chapter 11
    • Case 3
    • Case 4
    • Discussion 4
    • Discussion 5
  • CYB308 Cybersecurity System Audits

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Week 05
    • C 4
    • C 5
    • C 5 Business Resilience
    • C 6
    • C 6-2
    • Review
    • Questions
  • CYB308 TextBook

    • CHAPTER 1 Becoming a CISA
    • CHAPTER 2 IT Governance and Management
    • CHAPTER 3 The Audit Process
    • CHAPTER 4 IT Life Cycle Management
    • Input Controls
    • CHAPTER 5 IT Service Management and Continuity
    • Business Resilience
    • CHAPTER 6 Information Asset Protection
    • Encryption
    • Appendix A
    • Appendix B
    • Appendix C

Chapter 2: Architectures of Transportation Cyber-Physical Systems

OBJECTIVES

  • Introduction
  • Background
  • Current canonical cyber-physical system architectures
  • Types of architecture models
  • Issues with the current models
  • Emerging architectures
  • Case studies
  • Conclusion

INTRODUCTION

  • Transportation systems are increasingly linked to other systems and to the physical world in which the system is deployed.
  • These systems use sensors to understand the properties of objects and systems with which they interact.
  • Recently, the term ‘cyber-physical’ has emerged to describe systems that are a blend of physical sensing and computation and that are networked with other similar systems.
  • The collection of these systems is widely touted as the ‘Internet of Things (IoT)’.
  • The National Science Foundation of the United States uses the following definition: cyber-physical systems (CPSs) are engineered systems that are built from, and depend upon, the seamless integration of computational algorithms and physical components.
  • The seamless integration is accomplished through carefully structured and rigorously analyzed system architecture.
  • The integration makes certain system design problems explicit earlier than in traditional system development.

BACKGROUND

Architecture Analysis and Design Language

  • Architecture Analysis and Design Language (AADL) is strongly typed and can be extended through the use of annex languages.
  • Some examples are an error model annex, which specifies propagation errors, a behavior annex, which allows us to add behavior to the architecture using the concept of state machines, and others such as security and safety.
  • AADL models both software and hardware.
    • Software is represented by process, thread, and subprogram constructs, while hardware components are represented by device, processor, bus, and memory constructs.
    • The language has an integration component typed as ‘system’ that ties software and hardware together.

Quality Attributes

  • Transportation systems are partially defined by functional requirements—what the system must do—and by nonfunctional requirements—attributes of the system.
  • These attributes describe the qualities of the system, such as reliability, availability, and many others.
  • The ISO 9126 standard, which has been replaced by ISO/IEC 25010, provides a categorization of these attributes.
  • The quality attributes support trade studies in which the different attribute values resulting from different design decisions are compared, allowing the architect to choose the design action that will be best, given the objectives of the architecture.

Quality attributes

Frameworks

image-20241005215019375

CURRENT CANONICAL CYBER-PHYSICAL SYSTEM ARCHITECTURES

image-20241005215207020

TYPES OF ARCHITECTURE MODELS

image-20241005215629594

Figure 2.6 Portion of ACT-IT reference architecture-architecture reference for cooperative and intelligent transportation, US DoT, https://local.iteris. com/arc-it/.

ISSUES WITH THE CURRENT MODELS

Mobility

  • Transportation systems involve the movement of people from one place to another, and their smart devices must be sufficiently mobile to move with them while continuing to deliver service.
  • The transportation engineer needs to understand the environment in which the transportation system will be deployed in order to make appropriate design decisions.
  • There are transportation systems that are stationary, but many newly emerging capabilities are based on being mobile so that the user can use the capability from exactly where they are, rather than going to a spot possibly removed from the events that require attention.

Agility of Development

  • Technologies for intelligent transportation systems are rapidly evolving, but transportation systems are large, and development projects associated with these systems are also large and often slow-moving.
  • In order to take advantage of emerging technologies, architectures must be modified to allow for faster modification and deployment.
  • DevOps is an emerging organizational technique that merges development and operations responsibilities to facilitate the development-to-deployment cycle.
  • The basic idea is to ensure that requirements related to deployment are treated as equally important as other capabilities.

EMERGING ARCHITECTURES

image-20241005220303063 Figure 2.10 The NIST cloud computing reference architecture. F. Liu, J. Tong, J. Mao, R. Bohn, J. Messina, M. Badger, D. Leaf, Sept 2011. Reprinted courtesy of the National Institute of Standards and Technology, U.S. Department of Commerce. Not copyrightable in the United States.

image-20241005220713890

Figure 2.11 Basic cloud infrastructure. NIST Cloud Computing Reference Architecture. F. Liu, J. Tong, J. Mao, R. Bohn, J. Messina, M. Badger, D. Leaf, Sept 2011. Reprinted courtesy of the National Institute of Standards and Technology, U.S. Department of Commerce. Not copyrightable in the United States.

Smart City Architecture

  • Large cities tend to face several problems, such as high natural resource consumption, human health concerns, traffic jams, waste management, and so on.
  • These issues have become so serious that many cities have been motivated to find smarter ways to handle them.
  • The common thread among their solutions is the use of CPSs.
  • For these cities, we use the term Smart City, which brings benefits for the entire city by connecting people, improving citizens' life quality, and reducing costs, among other benefits.

China’s smart cities’ project

image-20241005221127532

SOFTWARE ARCHITECTURE ASPECTS

Table 2.1 Layer Function Mobile Application

LayerFunction
Data transportResponsible for transporting data between the RESCUER mobile solution and the RESCUER back-end.
Data analysisResponsible for analysing various kinds of data collected from mobile applications independently and for doing a combined analysis.
ManagementResponsible for managing the crowd and workforces. It helps to plan a set of actions based on the current situation.
VisualisationResponsible for showing analysed data, static emergency plans and the status of the action decided by the command and control centre.
Ad hoc networkResponsible for providing an alternative communication channel in the event of no Internet access.
Data integrationResponsible for integrating components within RESCUER, as well as legacy operating resources.

QUALITY ATTRIBUTES FOR SMART CITY APPLICATIONS

Table 2.2 Significance of Quality Attribute

Quality AttributeStatus
Mobility, scalability, reliability, usability, maintainability, performance, robustnessThey were successfully specified, designed, implemented and tested.
Availability, portability, reusability, adaptability, interoperabilityThey have been specified and designed but neither implemented nor tested.
Sustainability, privacy, securityThey have been specified but neither designed nor implemented.

CONCLUSION

  • Transportation systems are becoming more dynamic, with more decisions made during operation.
  • These systems need architectures that can apply traditional control system architectures with the ability to apply autonomy to alter the system dynamically based on different sensing patterns.
  • We have presented a number of aspects of architectural design and discussed the implications of those design aspects in the context of smart transportation systems.
Last Updated:
Prev
Chapter 1
Next
Chapter 3