Call For Papers
Download: Call-for-Papers [PDF] [text]
As digital computing and communication become faster, cheaper and less power consuming, these capabilities are increasingly embedded in many objects and structures in the physical environment. Cyber-Physical Systems (CPS) are co-engineered interacting networks of physical and computational components. These systems will provide the foundation of our critical infrastructure, form the basis of emerging and future smart services, and improve our quality of life in many areas. For instance, a multitude of CPS devices and applications exist in industrial, transportation, medical, home-security, building automation, emergency management, power, and many other systems, which serve critical functions in our lives. However, there are several issues and challenges remain open in this field, such as robust and real-time communication, network heterogeneity, data security and privacy, safety, etc.
This Workshop seeks novel submissions describing practical and theoretical solutions to challenges facing CPS and Internet of Things. Submissions may represent any application area for CPS. Work-in-progress submissions are also welcome.
Check the topics of interest for more details.
Towards the goal of the TC-CPS, the topics of interest for the workshop include, but are not limited to, the following:
- Systems, Technology, and Foundations of CPS
- Emerging applications and use cases in CPS
- Cloud, Middleware, and Networks for CPS
- Communication and networking for CPS
- Cellular systems (e.g. 4G, 5G) for CPS
- MAC-layer and network-layer protocol design for CPS
- D2D, and machine type communications
- Energy efficient communications for the CPS
- Vehicular communication design
- Coexistence of wireless technologies in CPS
- SDR, SDN and NFV as enabling technologies for CPS
- Data security and privacy for CPS
- Safety and security co-engineering
- Dependability in CPS (real-time, reliability, availability, safety, security)
- Modeling, simulation, and visualization of CPS
- Big data modeling and analytics for CPS
- Control and Optimization of CPS
- Real-time systems for CPS
- Papers should be formatted according to the IEEE WCNC 2018 guidelines (click here to see).
- Electronic submission is accepted through the EDAS web site at https://edas.info/newPaper.php?c=24101&track=87530.
- Standard IEEE conference templates for LaTeX and Microsoft Word can be found here.
Cluster-Based D2D Architecture for Safety Services in Vehicular Ad Hoc Networks
Authors: Shashank Kumar Gupta, Jamil Y Khan, Duy T Ngo
Abstract: With the possible introduction of autonomous vehicles in the next decade, it will be imperative for road traffic authorities to develop strategies to manage the co-existence of autonomous and legacy vehicles. In this scenario, the exchange of safety message among vehicles in a timely manner will be critical for a future advanced road traffic management system. Most of the work in the area of vehicular ad hoc network (VANET) has concentrated on the IEEE802.11p and the DSRC standards. With the emergence of the advanced LTE-based cellular network standard, researchers are now concentrating on the LTE-based VANET architecture. However, due to the use of the centralized architecture, an LTE-based system may require significant network resources to support vehicle-to-vehicle (V2V) communications. In this paper, we propose a new vehicle discovery technique and LTE cluster-based device-to-device (D2D) architecture to achieve high packet delivery ratio for the safety services in a vehicular network. The performance of the proposed network architecture is analyzed by an OMNET++ based simulation model. Simulations with practical parameter settings confirm the lower end-to-end delay, lower signalling overhead and improved the data packet delivery ratio (DPDR) compared to the existing 3GPP ProSe technique for vehicular safety message exchanges.
A Collision Avoidance Solution for UAVs Following Planned Missions
Authors: Francisco Fabra, Carlos T. Calafate, Juan-Carlos Cano, Pietro Manzoni
Abstract: The number of Unmanned Aerial Vehicles (UAVs) flying around is increasing year after year due to their popularity. This new scenario considerably increases the risk of collision between UAVs, which makes the development of protocols to avoid this issue an emerging topic. This work focuses on the development of a collision avoidance protocol between UAVs performing planned missions. Our proposal is based on the periodic submission of state information, and future position estimates of the UAV, allowing the detection of collision risks. Collision avoidance is achieved by forcing UAVs to stop when they are flying critically near each other, and establishing the priority of the UAV passing by the critical area first; this decision is based on a per-UAV unique identifier. We prove that our solution is robust enough to avoid collisions in all the situations tested; in addition, the overhead introduced by our protocol in terms of additional UAV flight time is low.
On the impact of communication delays on UAVs flocking behavior
Authors: Victor Casas Melo, Andreas Mitschele-Thiel
Abstract: Communication delay plays an important role for the safety in a Cyber Physical System (CPS). Self-organized flocks of UAVs (Unmanned Aerial Vehicle) are a particularly highly dynamic and complex example of a CPS. Since flocking algorithms rely on the exchange of position and velocity information, high communication delays may lead the flock to show an oscillatory behavior. This behavior increases the probability of collisions. In the literature some conceptual methodologies for verifying safety in CPS have been discussed. They mainly proposed to identify states or actions, that may affect safety in a CPS. In this paper we analyze the impact of communication delays on the safety of a flock of UAVs. We introduce an architecture for an UAV, that simulates the asynchronous behavior of different key components. We used our self-organized flocking algorithm to evaluate this architecture using different communication delays. Thus, we estimate the communication delay constraints for 2, 3 and 5 UAVs for the safe operation of the given flocking algorithm.
An Empirical Study on Using D2D Relaying in 5G for Factory Automation
Authors: Hubertus Andreas Munz, Junaid Ansari
Abstract: Factory automation applications typically require Ultra-Reliable Low-Latency Communication (URLLC). As existing wireless technologies operating in the unlicensed spectrum are unable to fulfil the stringent QoS requirements of factory automation applications, certainly this has become one of the key opportunities for 5G. In this paper, we introduce the concept of cooperation in Device-to-Device (D2D) communication for LTE and 5G NR. We have conducted comprehensive overthe- air evaluation of the proposed D2D cooperative scheme in a representative factory hall using a Software Defined Radio (SDR) testbed. Our empirical results indicate that the scheme is able to provide a high degree of reliability while satisfying the strict timeliness constraints as demanded by factory automation applications.
An Analytical Model for Deploying Mobile Sinks in Industrial Internet of Things
Authors: Maryam Vahabi, Hamid Reza Faragardi, Hossein Fotouhi
Abstract: Nowadays, it is common to use mobile robots in factories for manufacturing requirements. Adding data collection capability to the mobile robots would realize the mobile sink deployment in a smart factory in a close future. As it is important to reduce the deployment cost, we are aiming at a network with minimum number of required mobile sinks while ensuring network reliability and timeliness. In this paper, we analytically model a given trajectory for the motion of mobile sinks and the routing of mobile sinks along the trajectory in an IIoT system. We introduce an optimization problem in the form of Integer Linear Programming (ILP) to specify the minimum number of required mobile sinks to reduce deployment cost of an IIoT system, and also to identify the routing of multiple mobile sinks along a given trajectory in a smart factory. The proposed ILP model can be solved by several existing off-the-shelf ILP-solvers.
Time-Critical Communication in 6TiSCH Networks
Authors: Abdulkadir Karaagac, Jetmir Haxhibeqiri, Ingrid Moerman, Jeroen Hoebeke
Abstract: In Industry, there are number of time-critical applications with strong requirements for network services with latency and reliability guarantees. However, the lack of open and flexible, but also reliable and deterministic wireless communication solutions hinders the realization of fully connected and digital industrial spaces. In this paper, we investigate the approach of 6TiSCH architecture for deterministic networking performance and highlight its potential to be used in time-critical applications based on an experimental study.
Analysis of Low Latency TSCH Networks for Physical Event Detection
Authors: Alex Yang, Arvind Sundararajan, Craig Schindler, Kris Pister
Abstract: Timeslotted Channel Hopping (TSCH) is a mode of the IEEE802.15.4e MAC protocol for low-power wireless sensor networks. We discuss the variation in performance of a 6TiSCH network implemented using OpenWSN, an open-source implementation of current low-power wireless sensor networking standards, by measuring end-to-end packet latency --- the time between an event trigger signaling the transmitter node microprocessor to create a packet, and the packet reception on the receiving node --- with microsecond accuracy. In TSCH networks, time is divided into repeated chunks known as slotframes, which are further divided into timeslots. We explore the effect the number of available transmission slots has on packet end-to-end latency for an 11 slot slotframe TSCH network with 1, 3, 5, 8, and 11 transmission slots. Results are reported for a setup with one transmitter and one receiver.
Industrial IoT Security Threats and Concerns by Considering CISCO and Microsoft IoT reference Models
Authors: Zeynab Bakhshi, Ali Balador, Jawad Mustafa
Abstract: This paper investigates security concerns and issues for Industrial Internet of Things (IIoT). The IIoT is an emerging transformation, bringing great values to every industry. Although this rapid alter in industries create values, but there are concerns about security issues, most of which would be still unknown due to the novelty of this platform. In order to provide a guideline for those who want to investigate IoT security and contribute to its improvement, this paper attempts to provide a list of security threats and issues on the cloud-side layer of IoT, which consists of data accumulation and abstraction levels. For this reason, we choose Cisco and Microsoft Azure IoT Architecture as reference models. Then, two layers of Cisco reference architecture model have been chosen to be investigated for their security issues. Finally, consideration of security issues has been briefly explained.
Steering committee member
Steering committee member
Steering committee member
Steering committee member
CARLO ALBERTO BOANO
Technical Program Committee
Idoia de la Iglesia
CARLOS TAVARES CALAFATE
check our previous conference photos
these organizations and projects support us
- Barcelona International Convention Centre, Plaça de Willy Brandt, 11-14, 08019 Barcelona, Spain