| Literature DB >> 25815444 |
Salman Ali1, Saad Bin Qaisar2, Husnain Saeed3, Muhammad Farhan Khan4, Muhammad Naeem5, Alagan Anpalagan6.
Abstract
The synergy of computational and physical network components leading to the Internet of Things, Data and Services has been made feasible by the use of Cyber Physical Systems (CPSs). CPS engineering promises to impact system condition monitoring for a diverse range of fields from healthcare, manufacturing, and transportation to aerospace and warfare. CPS for environment monitoring applications completely transforms human-to-human, human-to-machine and machine-to-machine interactions with the use of Internet Cloud. A recent trend is to gain assistance from mergers between virtual networking and physical actuation to reliably perform all conventional and complex sensing and communication tasks. Oil and gas pipeline monitoring provides a novel example of the benefits of CPS, providing a reliable remote monitoring platform to leverage environment, strategic and economic benefits. In this paper, we evaluate the applications and technical requirements for seamlessly integrating CPS with sensor network plane from a reliability perspective and review the strategies for communicating information between remote monitoring sites and the widely deployed sensor nodes. Related challenges and issues in network architecture design and relevant protocols are also provided with classification. This is supported by a case study on implementing reliable monitoring of oil and gas pipeline installations. Network parameters like node-discovery, node-mobility, data security, link connectivity, data aggregation, information knowledge discovery and quality of service provisioning have been reviewed.Entities:
Year: 2015 PMID: 25815444 PMCID: PMC4431241 DOI: 10.3390/s150407172
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Network elements in CPS architecture.
Figure 2A typical wireless sensor network setup with central monitoring.
Popular WSN platforms available for industrial and academic use [1,7].
| Resource | Company/Major Distributor |
|---|---|
| Argo Systems, WisMote, BTnode, IMote, KMote, TinyMote, EPIC Mote. EyesIFX, FlatMesh, Mica, Telos, Iris, NeoMote, Waspmote, RedBee, Ubimote, Shimmer, WizziMote, FireFly, Bitsym Bitsense | |
| AdvanticSys, Dwara, Shimmer Span, Stargate, FlatMesh,VEmesh, DigiMesh, Bitsym Bithaul | |
| Texas Instruments, Atmel ATmega, ARM Cortex, Thumb Microcontroller Renesas, Marvell, PIC | |
| Chipcon, ATmega, ZigBit, himmer,RFM | |
| Contiki, ERIKA Enterprise,Nano-RK, TinyOS, LiteOS, OpenTag, NanoQplus | |
| C, LabVIEW, nesC | |
| Arduino API, TinyDB, TOSSIM, NS-2, NS-3, OPNET, NetSim, LinuxMCE, QualNet | |
| ANT 6LoWPAN, DASH7, ONE-NET, ZigBee, Z-Wave, Wibree, WirelessHART, 802.15.4, MiWi |
Technical requirements for cyber physical systems and wireless sensor network architectures.
| Characteristic Aspect | Wireless Sensor Networks | Cyber Physical Systems |
|---|---|---|
Field and application specific Less mobility support for infrastructure monitoring Supports joining and leaving of a node | Can encompass several overlapping networks from different applications Supports dynamic joining and leaving of a network | |
Data communicated to a central point Use of collective node effort to route data Mostly query and response interactions occur between nodes | Supports intra WSN communication Frequent cross layer interaction support for control over numerous actuators and QoS provisioning | |
Power management is critical since system lifetime is associated with it Nodes are activated and put to sleep depending on the mission sensitivity and critical situations | CPS is supported by web cloud in most cases where power concerns may not be as critical due to abstraction of middleware network The monitoring station and actuation centre might need to be active most of the time | |
Strict requirements to meet network coverage for specific environments Network needs to remain in connected state for long periods of time | Broader coverage and connectivity options that lie outside of WSN domain | |
Both controlled and uncontrolled mobility of nodes can be used in a network | May include mobile and static node networks Data from nodes of hybrid interconnected networks collected in dynamic and random fashion. | |
More focus is on collecting and aggregating sensed data | More elaborate information gathering and knowledge base population Intelligent decision making platforms dedicated to analyzing information. | |
Quality of sensed data is important for WSN due to low data rate restrictions | QoS for CPS relates to a higher level cross layered approach Security and confidentiality are important service aspects |
Figure 3Cyber physical system applications with interconnecting boundary between cyber and object domain.
Figure 4Network communication parameters for cyber physical sensor network architecture.
Figure 5Wireless sensor network parameters and issues related to mobility and reconfiguration in a cyber-physical environment.
Example implementation layers and protocols for a cyber-physical sensor network environment.
| Implementation Layers | Protocol | Scope |
|---|---|---|
| Application | HTTP, COAP | End to End |
| Transport | UDP, TCP | End to End |
| Network | IP | End to End |
| Routing | RPL | Per Hop |
| PAN | 6LowPAN | None |
| Data Link | IEEE 802.15.4 | Per Hop |
Figure 6A division of cyber-physical sensor network requirements.
Figure 7Data processing related programming scope for remote sensor network monitoring.
Figure 8Event driven code design abstraction for data sensing model.
Applications highlights of sensing plane in cyber physical sensor network.
| WSN in a CPS Environment: Applications and Platforms | ||
|---|---|---|
| Health Care | Physical Rehabilitation | |
| Telemedicine | ||
| Elder Assistance | ||
| Security | Transit Tracking | |
| Emergency Navigation | ||
| Social Networking | Personal Interaction | |
| Gaming | Grouping, Interaction | |
| Monitoring | Traffic Lights | |
| Parking | ||
| Route and Transit Planning | ||
| Pulse | ECG, EMG | |
| Movement | Accelerometer, Tilt Sensors | |
| Imaging | Video Camera | |
| Thermal Visibility | Light, Temperature Sensor | |
| Location | GPS, Compass, Magnetometer | |
| Commodity | Gas and Liquid Monitor | |
| Frequency | Ultrasonic’s | |
| Long Haul | GPRS, LTE, 3G, | |
| Limited | Body Sensor Network | |
Figure 9Summary of wireless sensor network based cyber physical monitoring of pipeline infrastructure.
Figure 10Optical fiber-based leakage detection mechanism.
Figure 11Interacting elements of cyber physical sensor network for infrastructure monitoring.
Sensor devices used in industry for event detection.
| Sensor Used | Fluid Inside Pipeline | Sensor Placement | Events Detected by Sensor | Physical Phenomenon |
|---|---|---|---|---|
| Acoustic sensor [ | Any | Outside the pipe | High frequency noise | Leakage |
| Acoustic sensors [ | Any | Outside the pipeline near the bends | High frequency noise | Presence of solid particles in the fluids |
| pH sensor [ | Water | Inside the pipeline-in contact with the fluid | pH variation | Contamination |
| Optical Fiber sensor [ | Gas (Natural Gas) | Above the pipeline | All Major | Leakage |
| Optical Fiber sensor [ | Liquid (Water/Oil) | Beneath the pipeline | All Major | Leakage |
| Hydrocarbon vapour sensor [ | Oil | Outside the pipeline for underground pipelines | Change in the concentration of hydrocarbon vapor | Leakage |
| Magnetostrictive Sensor MsS [ | Any | Inside the pipe | Strain upon the piezo-electric sensors | Rust/Blockage |
| Pressure Sensors [ | Any | In contact with fluid | Fluid Pressure | Leakage |
Figure 12Sample pipeline configuration levels for oil and gas transfer.
Cyber physical sensor network infrastructure-related security concerns.
| Dimension | Parameters |
|---|---|
| Routing | Black Hole Attack, Hello Flood Attack, Worm Hole Attack, Denial of Service, Sybil Attack, Counterfeit Routing Selective Forwarding, Sink Hole Attack, Flood Attack, Acknowledgement Spoofing |
| Localization | Routing Misuse, Inaccurate Distance Measure |
| Transmission Modes | Broadcast Attacks, Multicast Attacks |
| Transport Layer | End-to-End Connection Disruption, Node Exhaustion, Network Link Exhaustion |
| Node Position Attacks | End Node Software Attack, End Node Hardware Attack, False Data Injection in Aggregator Cluster Role Destruction, False Relay Data Route |
| Covert Service Disruption Attack | Service Disruption, Service Misuse, Service QoS Loss |
| In-Network Security | Technical Failure, Employee Issue, Network Negligence, Internet Connection Concerns Deployment Area Access, Uncontrollable Circumstances |
| Consequences | Loss of Network Control, Loss of Node Control, Inaccurate Information Interoperability Failure, Loss of Engineering Effort |
Summary of CPSN architectures for infrastructure monitoring.
| Reference | Technique Specifics | WSN-CPS Integration | Intelligent Data Processing | QoS | Mobility | Cross Layer | Level of Control | Localization | IP-Based | Energy Efficiency | Applications |
|---|---|---|---|---|---|---|---|---|---|---|---|
| [ | Multi Application Quality Monitoring | Yes, Middle Level Resource Sharing | Yes, Dedicated Computing Resources | Quality Of Monitoring | No | Yes, Multi-Application Allocation and Deployment | High | Yes | Yes | Not, Available | Multi Application |
| [ | General Survey | Yes | Yes | Event Handling, Network Coverage | No | Yes (Domain Intelligence) | High | Yes (Knowledge Mining) | No | Low | Intelligent Transportation, Social Networking |
| [ | Cloud Software as a Service | Yes | Yes | Yes, IP Based | Yes, Software Level | Yes, Implementat-ion Abstraction | Yes, Software Based | Yes | Yes | Not, Available | Network Monitoring, IP Based Services |
| [ | Unmanned Vehicle Detection | Yes Integrated | Yes | Software Vision System | Yes, Vehicle Navigation | Yes | Very High | Yes, GPS–0.67 m Accuracy | No | Energy Controller | Vehicle Trajectory |
| [ | Structure Condition Reporting | Yes | Multi level Computing | Flexible Network Operation, Multi-resolution Feature | No | Flexible Software Integration | High | Yes (Damage Localization) | No | Yes | Structural Health Monitoring |
| [ | Locating Structure Damages | Partial | Yes | 64.8% Latency Reduction | No | No | Limited | Yes, DLAC Algorithm | No, Decentrali-Zed | 69.5% Less Power Usage | Infrastructure Damage Localization |
| [ | Internet of Things | Limited | Yes | Lighter Algorithms | Yes | Yes, Software Based | Medium | Yes | Yes | Yes | Energy Monitoring, Social Networking |
| [ | Sensor Node Localization | Limited | Yes | Service Application Based | Yes | Limited | High | Range Free, Proximity, Multi hop | Yes | Yes | Cyber Transportation, Social Networking |
| [ | Soil Moisture Monitoring | Yes, Full | Yes, Collection, Management, Visualization | Confirm with Sensor Web Standard | Yes | Yes | Yes, Unification | Yes | Yes | Not, Available | Environment Monitoring |
| [ | IEEE 802.15.4 Evaluation | Yes | Yes | Effective Data, Packet Loss Rate, End-to-End Delay | Yes | Yes | No | Yes | Yes | Yes | General Service Application (Video, Voice) |
| [ | Sensor Grid | Yes | Yes, Analysis, Forecast, Data Repository | Real-time Data | No | No | No | Yes | No | No | Weather Forecast |
| [ | Packet Loss Control with Actuation | Yes, Integrated | Yes, Prediction | Packet Loss, Mixed Traffic Reliability | No | Yes, Platform Heterogeneity | Yes, Actuation | Yes, Dynamic Network Topology | Yes | Yes, Resource Constrained | General |
| [ | Plume Detection DITSCN | Yes | Yes, 3-D Data Analysis, Storage and Computational Resources | Medium | Yes | Yes | Medium | Yes, Movement and Location Tracking | No | No | Plume Detection and Tracking Biological Application |
| [ | Aggregate Load Modelling Using Data Mining | Yes | Mathematical Relation and Analysis | Highly Interactive Protocols | Yes | Yes, High | High | Distributed Algorithm | Yes | Yes | Complex Electric Power System Monitoring, Distributed Sensing and Control |
| [ | Cellular Networking | Yes | Yes, Data (Alerts) Pre-processing | Wide Coverage Real-time | Yes | No | Software Alerts | Limited Cellular Tracking | Yes | Not, Available | Vehicular Monitoring |
| [ | Pipeline Leakage Detection -REMONG | Yes, Cellular and Internet | Wavelet Signal Processing And Learning Algorithms | Linear Routing With Feedback And Link Status | No | Yes | Software Alerts, Valve Actuation | Yes, Leakage Between Routers | Yes | Node Transmission Power Control | Oil and Gas Pipeline Monitoring |
Figure 13Relevant factors for designing CPSN applications.