Abstract

Cyber-physical manufacturing systems are a new paradigm of manufacturing systems that integrate cyber systems and physical systems to aid smart manufacturing. Cyber-physical manufacturing systems can improve agility and responsiveness and guarantee the quality of products to meet the market requirements. Meanwhile, cyber-physical manufacturing systems also become susceptible to cyber-attacks. In order to improve the trustworthiness of cyber-physical manufacturing systems in the dynamic modeling phase, a cyber-physical manufacturing system formal model based on object-oriented Petri nets is presented from the perspective of multi-agent systems. Some mathematical methods and supporting tools of Petri nets can be utilized to analyze, verify, and validate cyber-physical manufacturing system formal model. To defense the malicious software spreading in cyber-physical manufacturing systems at run-time, a spreading dynamics model is proposed, and its dynamic behaviors are analyzed. A hybrid bifurcation control me...

Highlights

  • Cyber-physical systems (CPSs) integrate the computation processes with physical processes, which are emerging as a new generation of intelligent engineering systems.[1]

  • CPSs are introduced into manufacturing systems,[8] which are called cyber-physical manufacturing systems (CPMSs)

  • To insure the trustworthiness of CPMSs at run-time, we describe the malicious software spreading mechanism in CPMSs and analyze its dynamic behaviors based on the stability theorem and Hopf bifurcation theorem

Read more

Summary

Introduction

Cyber-physical systems (CPSs) integrate the computation processes with physical processes, which are emerging as a new generation of intelligent engineering systems.[1]. The cyber part can transfer, process, save, analyze data that are acquired from the radio-frequency identification (RFID) devices/sensors/measurement devices deployed on the manufacturing equipment.[10] The communication systems transmit the data to the corresponding computing systems, which control the actions of the machines and make decisions to achieve high-quality and flexible production. The use of a formal representation in CPMS design is indispensable.[18] After CPMSs are deployed, abnormal behaviors will occur if CPMSs are attacked by the malicious software. To insure the trustworthiness of CPMSs at run-time, we describe the malicious software spreading mechanism in CPMSs and analyze its dynamic behaviors based on the stability theorem and Hopf bifurcation theorem. A hybrid bifurcation control method combining the parameter adjustment method and state feedback method is designed to control the abnormal behaviors that are caused by the malicious software

Related work
Design phases of CPMSs
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call