Question

Prepare a technical report on key features of transportation/mobile cyber physical systems, key challenges on securing...

Prepare a technical report on key features of transportation/mobile cyber physical systems, key challenges on securing transportation/mobile cyber physical systems and some approaches to secure transportation/mobile cyber physical systems.
Note: Report must be at least one page long (but as many pages as you want) excluding references, and the report should contain references. References are not counted for one-page limit.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Transportation/mobile cyber physical systems

INTRODUCTION

This Report depicts how the mobile internet is changing the substance of the transportation cyber physical framework at a quick pace. In the last five years, mobile phone innovation has jumped a few endeavors to develop dedicated infrastructure systems to monitor traffic. Today, GPS prepared cell phones are continuously transforming into a universal traffic checking framework, with the possibility to give traffic data progressively for the whole transportation arrange. Traffic data frameworks are one of the first launches of the capability of participatory detecting for huge scale cyber physical foundation frameworks. While cell phone innovation is promising, key difficulties stay to be solved, specifically in the fields of displaying.

key features of transportation/mobile cyber physical systems:
1.Smart phones as sensors of the built environment:
cell phones gives the building network uncommon observing capacities. Cell phones, for example, the Nokia N96 now incorporate a camcorder, various sensors (accelerometers, light sensors, GPS, receiver), remote correspondence outlets (GSM, GPRS, WiFi, Bluetooth, infrared), computational force and memory. This telephone can be utilized to tune in to the radio, to watch advanced TV, to peruse the web, to do video conferencing, to filter scanner tags, to peruse pdfs, and so on. Nokia Maps show theaters and historical centers close to the telephone, Google Mobile gives driving headings from the telephone area, and the iPhone Travelocity shows lodgings close to the telephone. Because of their convenience, calculation, and correspondence capacities, cell phones are getting valuable for various applications in which they go about as sensors moving with people implanted in the fabricated foundation.

2.The challenge for test traffic information assortment as an intermediary for the bigger war to vanquish the mobile web. As of late, there have been expanded competition between mobile phone producers, organize suppliers, web access suppliers, PC and programming makers, and mapping organizations. Following the change from work areas to PCs to littler and progressively compact gadgets, top organizations in these enterprises are redefining themselves to stay relevant as the web goes versatile.

3.New source of traffic information for the transportation organize.
Roadways have generally been observed utilizing static sensors, which incorporate loop detectors worked in the radars and cameras along the street, (for example, FasTrak or EZ-pass), which can fill in as tests any place such framework exists. While this foundation has end up being efficient for expressways, the expenses of arrangement, correspondence, and support for such a framework in the blood vessel organize make it restrictive for open offices or organizations to send on a worldwide scale.

key challenges on securing transportation/mobile cyber physical systems:
1.SYSTEM STABILITY
As a typical issue in numerous application fields, dependability is a key test in versatile CPS. Without steadiness, a framework couldn't work appropriately true to form. Crowdsensing application is a field that could be executed in numerous versatile CPS spaces, for example, VSN, social insurance frameworks, and MES. The accident of working frameworks and the depletion of battery may make cell phones be inaccessible and problematic, bringing about the check of predominant utilization of crowdsensing applications [29]. For instance, in a publicly supporting errand situation, an abrupt breakdown of a cell phone going about as a taking an interest hub because of an assistance disappointment of the framework may prompt the defer or even hinder that assignment to effectively finish.1.

2. MOBILE DYNAMIC ENVIRONMENT
Different from customary CPS, portable CPS face an extraordinary test of managing dynamic condition brought about by its characteristic portability. Since they are made out of versatile digital segments (e.g., cell phones and vehicles), their profoundly powerful trademark presents numerous difficulties on strength of frameworks, steering conventions of systems, information transmission, and correspondences. In vehicular systems administration frameworks, the circumstances of taking care of information transmission are intricate, on the grounds that the system topologies of vehicular frameworks are profoundly powerful

3 ENERGY CONSUMPTION
In customary CPS, vitality for the most part is certifiably not a typical worry since most physical segments are associated with power supplies when running. Analysts consider vitality administrations primarily for making frameworks more force sparing so as to fabricate green CPS. For instance, a green adaption of genuine time services to optimize dynamic voltage and frequency scaling might be utilized in a multi-target improvement condition [20]. Be that as it may, in portable CPS, vitality utilization is a basic issue. Since numerous cell phones at present are fit for detecting, imparting, and managing huge and complex computational undertakings, which requires a lot of vitality, such digital segments of versatile CPS depending for the most part on their batteries are vitality energetic but since of the mobility trademark , cell phones for the most part run without ceaseless power supply. When batteries have come up short on energy , these digital segments can not work , and in this manner mobile CPS are not ready to work.

Approach to secure transportation/mobile cyber physical systems
host-based audit and network-based audit, are utilized in CPS. The previous is supported for frameworks with high-volume configurations, for example, savvy network, since it is conveyed control. Additionally, it is direct for have based review to decide or distinguish have level unfortunate activities. Be that as it may, such technique requires additional work to gather review information for every hub and specific OS or application to be actualized. System based review, then again, has advantage in liberating every hub from keeping up or dissecting logs.It negatively affects the adequacy of system based strategies because of its perceivability of hubs' review information assortments.

FUTURE RESEARCH :

  • Green Internet Of Things
  • Mobile User Privacy
  • Cloud Based Mobile Robotic System

CONCLUSION:

There are increasingly more mobile CPS applications being extensively conveyed in various spaces in day by day life. As a result of their portability trademark, they take the upsides of conventional CPS, yet additionally grow and advance the association among digital and physical universes, which has prompted the upsets in numerous application fields, for example, vehicular systems administration frameworks, medicinal services frameworks, and versatile instruction There are many research gives that request inside and out examinations so as to build the efficiency and upgrade the usefulness and knowledge of the utilizations of mobile CPS. One bearing is to consider portable client security in their different application plans, which is on a very basic level significant in ensuring clients 'individual data. Examinations of green Internet of Things and cloud-based portable mechanical frameworks of the rising applications could additionally expand the capacities of current mobile CPS

REFERENCES

S. K. Khaitan and J. D. McCalley, ‘‘Design techniques and applications of cyberphysical systems: A survey,’’ IEEE Syst. J., vol. 9, no. 2, pp. 350–365, Jun. 2015.

D. B. Work and A. M. Bayen, ‘‘Impacts of the mobile Internet on transportation cyber physical systems: Traffic monitoring using smartphones,’’ in Proc. Nat. Workshop Res. High-Confidence Transp. Cyber-Phys. Syst., Autom., Aviation, Rail, 2008, pp. 1–3.

Please Rate the answer positively if you like it .

Add a comment
Know the answer?
Add Answer to:
Prepare a technical report on key features of transportation/mobile cyber physical systems, key challenges on securing...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • SCADA systems sit in between the cyber and physical world. What is one of the biggest...

    SCADA systems sit in between the cyber and physical world. What is one of the biggest threats to these systems? Connection to traditional networks Those darn aliens Reducing risk by integration Human machine interface What are some reasons that IoT devices are so susceptible to hacking? (select all that apply) They are so small Difficult to patch The sheer number of devices Poor software design What is the key capability that RTOS provides over traditional OSs. (select all that apply)...

  • For milestone #1, we will start the CARIT site with three static HTML pages and a...

    For milestone #1, we will start the CARIT site with three static HTML pages and a CSS file. Create a dedicated folder for this project. This folder should contain all related files in this project. The future milestones are cumulative and built directly on top of your prior work. Function/content requirements: A home page named “index.html”, which include these contents at least: Description of the center. You may reference the example sites. Latest news: use list tags; make up some...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • My topic is diabetes 597690/viewContent/7888874/View The Science of Popular Diets The Impact of Nutrition Practices on...

    My topic is diabetes 597690/viewContent/7888874/View The Science of Popular Diets The Impact of Nutrition Practices on Human Wellness Understanding the Dietary Needs of Special Populations Consider that up until this point in Module 2, we have been focused on the nutritional needs and diet plans for healthy, adult individuals. The AMDRS used to calculate caloric needs have been determined to fit a general population of these individuals. In addition, there has been little need to consider deficiencies or toxicities of...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • Discussion questions 1. What is the link between internal marketing and service quality in the ai...

    Discussion questions 1. What is the link between internal marketing and service quality in the airline industry? 2. What internal marketing programmes could British Airways put into place to avoid further internal unrest? What potential is there to extend auch programmes to external partners? 3. What challenges may BA face in implementing an internal marketing programme to deliver value to its customers? (1981)ǐn the context ofbank marketing ths theme has bon pururd by other, nashri oriented towards the identification of...

  • Will facebook be able to have a successful business model without invading privacy? explain your answer?...

    Will facebook be able to have a successful business model without invading privacy? explain your answer? could facebook take any measures to make this possible? BUSINESS PROBLEM-SOLVING CASE Facebook Privacy: Your Life for Sale Facebook has quickly morphed from a small, niche haps most obviously. Facebook allows you to keep in networking site for mostly Ivy League college stu- touch with your friends, relatives, local restaurants, dents into a publicly traded company with a market and, in short, just about...

  • Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions...

    Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions listed below in specific detail. A minimum of 4 pages is required; ensure that you answer all questions completely Case Questions Who are the main players (name and position)? What business (es) and industry or industries is the company in? What are the issues and problems facing the company? (Sort them by importance and urgency.) What are the characteristics of the environment in which...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

  • ABC International: Solving the Rural Barrier

         Compensation sessionABC International:   Solving the Rural BarrierSource: Thunderbird School of Global Management, A unit of the Arizona State University Knowledge Enterprise. 2015. This case was prepared by Erin Bell under the guidance and supervision of Dr. Amanda Bullough, and revised and updated by Drew Helm for the purpose of classroom discussion only, and not to indicate either effective or ineffective managementSiham sat with her family and childhood friend, Leila, in their rural village of Qabatiya, Palestine. Leila had recently returned from...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT