Posters (Sessions 8 & 11)

file

Visible to the public Cyber-Physical Systems Virtual Organization: Active Resources

Explanation of Demonstration: The Cyber-Physical Systems Virtual Organization (CPS-VO) was founded by NSF in 2010 to: (i) facilitate and foster interaction and exchanges among CPS PIs and their teams; (ii) enable sharing of artifacts and knowledge generated by the projects with the broader engineering and scientific communities; and (iii) facilitate and foster collaboration and information exchange between CPS researchers and industry.

file

Visible to the public Foundations of Secure Cyber-Physical Systems of Systems

Factories, chemical plants, automobiles, and aircraft have come to be described today as cyber-physical systems of systems--distinct systems connected to form a larger and more complex system. For many such systems, correct operation is critical to safety, making their security of paramount importance. Unfortunately, because of their heterogeneous nature and special purpose, it is very difficult to determine whether a malicious attacker can make them behave in a manner that causes harm. This type of security analysis is an essential step in building and certifying secure systems.

file

Visible to the public Zero-Delay Load Balancing Algorithms in Large-Scale Data Centers

This poster presents results on a class of load balancing algorithms for large-scale cloud computing systems. We established steady-state perfor-mance of load balancing algorithms in the heavy traffic regime such that the load of system is approaches to one. This is a typical scenario under demand-response. We established a sufficient condition under which the probability that an incoming job is routed to an idle server is one asymp-totically.

file

Visible to the public Web-based Attacks on Local IoT Devices

Abstract: In this paper, we present two web-based attacks against local IoT devices that any malicious web page or third-party script can perform, even when the devices are behind NATs. In our attack scenario, a victim visits the attacker's website, which contains a malicious script that communicates with IoT devices on the local network that have open HTTP servers. We show how the malicious script can circumvent the same-origin policy by exploiting error messages on an HTML5 interface or by carrying out DNS rebinding attacks.

file

Visible to the public Wearable-Machine Interface Architectures

Wrist-worn wearable devices provide rich sets of pulsatile physiological data under various modalities and circumstances. An unexploited capability is that the pulsatile physiological time series collected by wrist-worn wearable devices can be used for recovering internal brain dynamics. This Cyber Physical System research project integrates computational algorithms for state-space estimation with wrist-worn wearable devices that sense the physiological signals to present wearable machine-interface architectures related to mental stress.

file

Visible to the public WARP: Wide Area Assisted Resilient Protection

Power system blackouts occur due to system-wide instability brought forth through a combination of dynamic events. Due to availability of system-wide synchrophasor data, it has become possible to conceive and apply real-time protection and control schemes that detect causes and symptoms of instabilities, and respond to arrest the progression of blackouts. However, detailed dynamic data from an actual blackout would be desirable for validation of such schemes. This poster describes the process of dynamically simulating the September 8, 2011 blackout in the Southwestern United States.

file

Visible to the public WARP- Wide Area assisted Resilient Protection

The goal of the project is to develop techniques that will allow detection and correction of relay misoperations in electric grids. The work from NDSU in (2017-2018): 1) advanced the concept of energy function traces to detect disturbance events in power systems including: temporary and permanent line faults, load loss and excitation failures 2) developed SVD/PCA methods to determine the sensitivity and accuracy of energy-based methods.

file

Visible to the public Trusted CPS from Untrusted Components

The nation's critical infrastructures are increasingly dependent on systems that use computers to control vital physical components. Imagine if you lose electric power, your water stops flowing, airplanes stop flying, medical devices stop working, and chemical plants explode. These are all examples of Cyber-Physical Systems (CPSs) that are vulnerable to attack through their computer systems, through their physical properties such as power flow, water flow, chemistry, etc., or through both.

file

Visible to the public Understanding Ultrafast Instabilities in a Global Cyber-Physical System

Abstract: Most future CPS systems will represent a complex, messy mix of hardware, software and human interactions - and may produce dangerous instabilities quicker than some external controller can react. The specific focus and motivation of this project concerns modeling and understanding the dynamics of such CPS that are large and evolve in a decentralized way due to changing market conditions, yielding a system comprising many heterogeneous components that may have incompatible communication protocols (e.g.