Document 15625231

advertisement
Proceedings of the 7th Annual ISC Graduate Research Symposium
ISC-GRS 2013
April 24, 2013, Rolla, Missouri
DESIGN OF A DRIVER-CENTRIC SYSTEM USING CPS-CSH MODEL
Anusha Sankara, Chakradhar Vadde, Srinivas Chakravarthi. T
Department of Computer Science, Missouri University of Science and Technology, Rolla, Missouri 65401, USA.
Faculty Supervisors : Dr. Bruce McMillin, Dr. Sahra Sedigh, Dr. Dale Fitch
To enhance safety and reliability, an
increasing number of modern automobiles are
essentially drive-by-wire systems, highly
computerized, and connected wirelessly to
services such as OnStar or Toyota Safety
Connect. The impact of these advanced
features is a growing concern. Since there are
many entities in the system, we need to know
which entity has control over the Cyber
Physical Object at a given level of Hierarchy.
The fundamental questions to be addressed
are: (i) What is the control flow in the
system? (ii) How does the driver interact with
the automobile and manufacturer? To address
these questions, we are utilizing the CPSCSH model on Drive-By-Wire car system.
ABSTRACT
Existing methodologies to assess
cyber-physical systems (CPSs) are hampered
by their diverse nature and complexity. This
paper tests the model proposed for cyberphysical systems design and analysis rooted
in the social science approach to complex
system analysis, Critical System Heuristics
(CSH). The model affords an analysis at both
the level of abstraction of functionality and
the type of functionality within a CPS. In this
paper, the CPS-CSH model is utilized to
understand Drive-by-Wire Car system.
INTRODUCTION
Cyber-physical systems (CPSs) are the
integration of computation, as manifested by
embedded computers and communication
networks, with physical processes that
involve people. Control interactions, safety,
liveness, security, fault tolerance, reliability,
and human factors are among the many
challenges in the development and analysis of
CPSs, which must take into account the
complex ways in which the cyber, physical,
and social components interact.
We utilize the CPS-CSH model to analyze the
functionality of the Drive-By-Wire system
considering the various entities in the system
that can control the Cyber – Physical object.
We also try to ensure the privacy, safety of the
driver.
CPS-CSH MODEL
In this model Critical Systems
Heuristics (CSH) is used to develop a
qualitative ontological model of CPSs. CSH
is a methodological approach to facilitate
boundary setting when analyzing systems.
Drawing system boundaries is not an easy
process. As soon as a boundary is drawn then
claims are made that either too much" or “not
enough" was considered.
The CPS-CSH model provides a structured
analysis and will be able to address questions
of (1) what design aspects must be addressed
within a CPS, (2) how do CPS components
relate to each other, and (3) where do
functionalities within a CPS occur?
1
4.
5.
6.
Fig 1: The CSH Reference System
7.
Therefore Ulrich [4] developed heuristics in
which four boundary issues are discussed:
sources of
1. Motivation
2. Power
3. Knowledge and
4. Legitimation.
The first three constitute those involved in the
system and the last constitutes those affected.
8.
9.
Taken together they become the reference
system as shown in Figure 1. Each of these
four issues has three categories:
1. Stakeholder - those involved or concerned
by a situation,
2. The specific concern relevant to the
stakeholder and
3. Difficulties regarding the concern because
concerns compete with each other. Taken
together, the four issues are examined by each
of the three categories, resulting in twelve
boundary questions.
10.
11.
1.
2.
3.
Societal Sources of
Motivation
Who is the client or
Customer
or that
which is acted upon?
What is the purpose of
that which is acted
upon?
What is the measure of
improvement
or
success for this client
or customer or that
which is acted upon?
Cyber-Physical
Objects
Controlled object
Regulated
Object
Functionality
Improved Operational
Element
12.
2
Sources of Power
Cyber-Physical
Environment
Who or what is the
decision maker or
controller?
What resources are
controlled
by
the
decision maker?
What
does
the
decision maker not
control?
Sources
of
Knowledge
Who
is
to
be
considered
a
professional or expert
in the situation?
What expertise do
these
professional’s
hold? That is, what is
considered
relevant
knowledge?
Which
methodologies do they
use?
What is the guarantor
of success? That is,
upon what axioms or
algorithms
do
the
professionals rely?
Sources
of
Legitimation
Who or what is a
witness to the interests
of those affected but
not involved? That is,
who or what can
observe the actions of
the decision makers
upon the client or
customer or that which
is acted upon?
What
secures
the
emancipation of those
affected
from
the
premises or assertions
made
by
those
involved? That is, how
can
unanticipated
adverse consequences
be minimized?
What
worldview
pervades? That is,
what different visions
of
improvement
should be considered
Control Element
Actor on Object and
State Information
Other
actors
objects not in
reference system.
Cyber-Physical
Requirements
Domain Expert
and
the
Domain Knowledge
System Correctness
Cyber-Physical
Requirements
Embedded Monitor
Evaluation
of
the
Methodology used(#8)
or
the
resulting
Guarantee (#9)
Protects
Against
Requirements
Invalidation
the car to control its movement and bring it to
a safe state.
Table 1: CSH in CPS Context
Third party: This can be a federal agency or
a consumer watchdog group, which keeps
monitoring the corporation. This is above all
entities considering hierarchy.
These twelve questions are framed within a
CPS context and are represented in Table 1,
the left column indicating the Ulrich
heuristics, and the right, the proposed CPSCSH model.
External environment: The External
environment consists of the entities in the
environment that cannot be controlled but can
influence the Cyber Physical Object (Car).
These consist of other cars, roads and various
physical or cyber entities
The following three tables apply CPS-CSH to
the Drive-By-Wire Car system at three levels
of the hierarchy, that of the CPS-CSH with
boundary at the brakes, traction control and
brainbox
These tables enable us in identifying which
entity holds control over the functionality of
the Cyber Physical Object at various levels of
hierarchy.
1.
CPS-CSH for Drive-By-Wire Car
System
A CPS-CSH system when seen in a big
picture will have various cyber physical
elements distributed. The assumption for the
system to run reliably is: At any instance of
time the control is given to respective control
element on the controlled object.
2.1. Description of the System
The Cyber Physical element in the DriverCentric CPS-CSH model is the Car.
Corporation, Brainbox, Third-party and the
external driver are the other elements. They
are defined as following:
Car: This is the Cyber Physical element in
the system and entities: The Corporation,
Driver, and external environment try to attain
control of this element.
1
Brainbox: This is a processor that analyses
the input from various sensors in the car,
processes the data and performs necessary
actions. The tasks include Braking,
Acceleration and other physical actions.
2
3
4
Corporation: This is the entity that controls
the car in case of emergency and theft
conditions.
5
Traction Control: This is the control element
integrated within the car. In case any
hazardous situations are sensed by the
brainbox through the sensors, the Traction
Control kicks in and temporarily takes over
6
3
Boundary
Category
Controlled
Object
Regulated
Object
Functionality
CPS-CSH analysis with
boundary at the Brakes
Improved
Functionality
Decision
Makers,
Control
Element
ResourcesActor
on
Object state
information
To improve the braking
system
Environment
Brakes
Stopping
controlling
movement of the car
and
the
Brainbox- Traction Control/
Braking Pedal
Data generated by the brain
box and traction control
Acceleration
and
wheels,
system
system
hydraulic
7
Professional,
Domain
Expert
8
Expertise,
Domain
Knowledge
9
Guarantee,
System
Correctness
10
Embedded
Monitor
11
Emancipatio
n
12
Worldview
(value
determinatio
n)
communications
network
Automobile engineers
6
Environment
that
brakes
makes
7
Professional, Domain
Expert
8
Expertise, Domain
Knowledge
Safety policy, evaluating
methodology
and
design of the traction
control
9
Guarantee, System
Correctness
10
Embedded Monitor
11
Emancipation
12
Worldview
(value
determination)
Mechanics
brakes design
of
Methodologies
produces
design
and
it functional
the
Traction Control
Protects
against
the
improper
functioning
of the brakes
Table 2: CPS-CSH model with Boundary
At the Brakes
In the above table, the CPS-CSH is
applied to the proposed cyber physical object
at the initial level brakes. This gives the scope
of the functionality of the brakes which is to
control the movement of the car. Hence this
will be the major concern which ensures the
safety of the driver. At this boundary
condition, the CSH holds good only when
brakes work as per the expectation of the
driver.
1
2
3
4
5
Boundary Category
Controlled Object
Regulated
Object
Functionality
Improved
Functionality
Decision
Makers,
Control Element
Resources-Actor on
Object
state
information
Other cars on the
road,
humans.
Network
Security
Administrators,
Automobile engineers
Mechanics of Brain
box
(ECM,
sensors)design
Brain box design for
non-deducibility, for
Traction
control,
proper functioning of
the brainbox
Driver
Evaluating
methodology
and
design of the brain
box.
Protects against the
improper functioning
of the brain box.
Table 3: Boundary Conditions with boundary
at the Brainbox
In the above CPS-CSH analysis it is seen
that the brainbox as a boundary will have
decision-making
privilege
under
Corporation’s supervision with Driver as an
embedded monitor. Here the role of
embedded monitor can also be fulfilled by
Corporation, but we would prefer the driver
evaluating the system rather than the
Corporation.
CPS-CSH analysis
with
boundary at the
Brainbox
Brain box
Safety and security of
the driver
To improve safety
and security of the
driver
1
2
Driver, Toyota
Data generated by the
brain
box,
other
devices,
and
3
4
Boundary
Category
Controlled
Object
Regulated
Object
Functionality
Improved
Functionality
CPS-CSH analysis
boundary
at
Traction Control
with
the
Traction control
Safety of the driver, reduce
slippage, and helps the car
not loose grip
To improve the
safety of the driver, no
slippage of the car
4
5
6
7
8
Decision
Makers,
Control
Element
ResourcesActor
on
Object
state
information
Environment
Professional,
Domain
Expert
Expertise,
Domain
Knowledge
hierarchy that can efficiently monitor the
functioning of Traction Control.
Brainbox
Data generated by
The traction control, brakes,
and
the
wheel
speed
data.
Driver, Corporation, fourth
party driver, other cars on
the road.
Traction control
engineers
design
Mechanics
of
the
traction control design
Methodologies
that
produce
the
traction
control
design
and
makes it functional
9
Guarantee,
System
Correctness
10
Embedded
Monitor
Brainbox – Safety Monitor
Emancipation
Safety
policy,
evaluating
methodology
and
design
of
the
traction control
11
12
Worldview
(value
determination)
2.2. Control Flow in the system.
Fig.2 Representation of CPS-CSH system.
- Figure 2 shows the information flow
and Control flow in the system
- Brain box in this system is a cyberphysical element
- The Traction control acts on the
brakes and the information flow
between them is bidirectional flow
- The Third party has got an indirect
control on the car through Toyota as
an intermediary
- There is a unidirectional control flow
as well as information flow between
driver and brainbox
- Control flows
C1 – The traction control during its
operation exerts an indirect control over the
driver
C2-Toyota has a control over the brain
box under theft conditions of the automobile.
C3- Third party Entity has a control
over Toyota Care Corporation, (monitoring,
validating, approving)
Protects
against
the
improper
functioning
of the traction control
Table 4: Boundary Conditions
boundary at the Traction Control
with
Traction Control as a boundary in the
proposed system is superior to conventional
Drive-By-Driver automobiles, in a sense it
acts independently based on any hazardous
road conditions. CPS-CSH-2, 3 conveys the
same; it has improved functionality which
ensures the driver’s safety which serves the
very purpose of the proposed system by
making it driver-centric system. Here the
Brain Box is the control element as it senses
any hazardous conditions and makes the
traction control take over the car. The Brain
Box also functions as the embedded monitor
even though it is the control element because
it is the only entity at the current level of
5
C4- The inputs analyzed by the
brainbox are sent to the traction control which
in turn will produce an impact on the moving
car by operating the brakes/accelerator
system.
deducibility to prevent data leakage to
unwanted recipients.
REFERENCES
[1] G. Howser, B. McMillin - Modeling and
reasoning about the security of drive-by-wire
automobile systems, International Journal of
Critical Infrastructure Protection (2012),
http://dx.doi.org/10.1016/ j.ijcip.2012.09.001
CONCLUSION
The CPS-CSH model for Driver
Centric environment considering the car as
Cyber Physical element ensures the safety of
the driver. By testing the CPS-CSH model
using a Drive-by-wire car system, we have
been able to determine the functionality of the
system, the interactions between the entities
of the system i.e. the control and information
flow.
[2] Andrew W. Moore Professor School of
Computer
Science
Carnegie
Mellon
University
Information
Gain
http://www.cs.cmu.edu/~awm/tutorials
[3] B. McMillin, D. Fitch, S. Sedigh, R.
Akella, CPS-CSH Cyber-Physical Social
Privacy for the Smart Grid, 7th CRITIS
Conference, September 2012, Norway.
There has been a difficulty while trying to
emphasize the embedded monitor at the
various levels of hierarchy. The entity that
provides a particular service should not be the
one to evaluate that service. But in certain
cases there exists no entity that can properly
monitor a service, other than the entity that is
a part of the service being provided.
[4] W. Ulrich, \Beyond methodology choice:
Critical systems thinking as critically systemic
Discourse," Journal of the Operational
Research Society, vol. 54, no. 4, pp.
325{342, 2003
The issues related to Privacy and Concerns of
the customer should be monitored by a trusted
third party entity (Federal organization,
Customer welfare Groups...). The primary
functions of such entity would be to monitor
the collection and usage of the data related to
the customer and provides assurance to the
customer regarding privacy and safety.
[5] Patricia Derler, Edward A. Lee, and
Alberto Sangiovanni Vincentelli - Addressing
Modeling Challenges in Cyber-Physical
Systems - March 4, 2011
FUTURE WORK
The future work includes the
establishing of suitable embedded monitors at
different levels of hierarchy. Ensuring non-
6
-
We express our appreciation of
support to the ISC.
-
We appreciate Gerry Howser for the
Toyota Prius Model.
Download