[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,653)

Search Parameters:
Keywords = cyber–physical system

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
41 pages, 9332 KiB  
Article
An Innovative Real-Time Recursive Framework for Techno-Economical Self-Healing in Large Power Microgrids Against Cyber–Physical Attacks Using Large Change Sensitivity Analysis
by Mehdi Zareian Jahromi, Elnaz Yaghoubi, Elaheh Yaghoubi, Mohammad Reza Maghami and Harold R. Chamorro
Energies 2025, 18(1), 190; https://doi.org/10.3390/en18010190 - 4 Jan 2025
Viewed by 629
Abstract
In the past, providing an online and real-time response to cyber–physical attacks in large-scale power microgrids was considered a fundamental challenge by operators and managers of power distribution networks. To address this issue, an innovative framework is proposed in this paper, enabling real-time [...] Read more.
In the past, providing an online and real-time response to cyber–physical attacks in large-scale power microgrids was considered a fundamental challenge by operators and managers of power distribution networks. To address this issue, an innovative framework is proposed in this paper, enabling real-time responsiveness to cyberattacks while focusing on the techno-economic energy management of large-scale power microgrids. This framework leverages the large change sensitivity (LCS) method to receive immediate updates to the system’s optimal state under disturbances, eliminating the need for the full recalculation of power flow equations. This significantly reduces computational complexity and enhances real-time adaptability compared to traditional approaches. Additionally, this framework optimizes operational points, including resource generation and network reconfiguration, by simultaneously considering technical, economic, and reliability parameters—a comprehensive integration often overlooked in recent studies. Performance evaluation on large-scale systems, such as IEEE 33-bus, 69-bus, and 118-bus networks, demonstrates that the proposed method achieves optimization in less than 2 s, ensuring superior computational efficiency, scalability, and resilience. The results highlight significant improvements over state-of-the-art methods, establishing the proposed framework as a robust solution for real-time, cost-effective, and resilient energy management in large-scale power microgrids under cyber–physical disturbances. Full article
Show Figures

Figure 1

Figure 1
<p>Conceptual model and graphical abstract of the proposed method (PM).</p>
Full article ">Figure 2
<p>Flowchart of the proposed multi-objective framework for techno-economic self-healing.</p>
Full article ">Figure 3
<p>Different types of dynamic switching in proposed framework.</p>
Full article ">Figure 4
<p><math display="inline"><semantics> <mrow> <mi>P</mi> <mo>−</mo> <mi>δ</mi> </mrow> </semantics></math> graph for variations in network topology.</p>
Full article ">Figure 5
<p>Power exchange between bus <span class="html-italic">i</span> and <span class="html-italic">j</span>.</p>
Full article ">Figure 6
<p>Overview of IEEE 118-bus system with dynamic switches and microgrids.</p>
Full article ">Figure 7
<p>Variations in load factor during 24 h of a day.</p>
Full article ">Figure 8
<p>Variations in solar radiation during 24 h of a day.</p>
Full article ">Figure 9
<p>Variations in temperature during 24 h of a day.</p>
Full article ">Figure 10
<p>Variations in wind speed during 24 h of a day.</p>
Full article ">Figure 11
<p>Considering PDF for IEEE 118-bus case study in each objective function.</p>
Full article ">Figure 12
<p>Considering PDF for IEEE 69-bus case study in each objective function.</p>
Full article ">Figure 13
<p>Considering PDF for IEEE 33-bus case study in each objective function.</p>
Full article ">Figure 14
<p>Allocation of optimal generation for each unit under various load factors across different case studies (IEEE 118-bus).</p>
Full article ">Figure 15
<p>Allocation of optimal generation for each unit under various load factors across different case studies (IEEE 69-bus).</p>
Full article ">Figure 16
<p>Allocation of optimal generation for each unit under various load factors across different case studies (IEEE 33-bus).</p>
Full article ">Figure 17
<p>Optimal state of dynamically coupled switches in IEEE 118-bus within various load factors.</p>
Full article ">Figure 18
<p>Optimal state of dynamically coupled switches in IEEE 69-bus within various load factors.</p>
Full article ">Figure 19
<p>Optimal state of dynamically coupled switches in IEEE 33-bus within various load factors.</p>
Full article ">
23 pages, 1216 KiB  
Article
Metaverse for Manufacturing: Leveraging Extended Reality Technology for Human-Centric Production Systems
by Vivian Egbengwu, Wolfgang Garn and Chris J. Turner
Sustainability 2025, 17(1), 280; https://doi.org/10.3390/su17010280 - 2 Jan 2025
Viewed by 574
Abstract
As we progress towards Industry 5.0, technological advancements are converging; this movement is realised by the increasing collaboration between humans and intelligent digital platforms and further enabled by the interactive visualisation modes provided by Metaverse technology. This research examines the practical applications and [...] Read more.
As we progress towards Industry 5.0, technological advancements are converging; this movement is realised by the increasing collaboration between humans and intelligent digital platforms and further enabled by the interactive visualisation modes provided by Metaverse technology. This research examines the practical applications and limitations of Metaverse technology providing insights into the transformative possibilities it offers for the manufacturing sector. Specifically, the research was guided by the core objective to trace the evolution of Metaverse technology within manufacturing. This study provides a comprehensive and state-of-the-art analysis of the adoption and impact of Metaverse technologies in the manufacturing sector. While previous research has explored aspects of Industry 4.0 and digital transformation, this study specifically focuses on human-centric manufacturing (human-in-the-loop) applications of Metaverse technology, including augmented reality, virtual reality, digital twins, and cyber-physical robotic systems. Findings from the systematic literature review indicate that Metaverse technologies, primarily augmented reality and virtual reality, have evolved into powerful tools in manufacturing. They are widely adopted across sectors in the industry, transforming processes such as product design, quality control, and maintenance. Augmented reality and virtual reality offer intuitive ways to visualise data and interact with digital twins, bridging the gap between physical and virtual realms in manufacturing. A roadmap and scenarios for the introduction of Metaverse technology in manufacturing are provided with suggested adoption timespans. Furthermore, the systematic literature review identified barriers hindering the wider adoption of Metaverse technology in manufacturing. Full article
Show Figures

Figure 1

Figure 1
<p>Number of Metaverse-related publications available each year since 2010.</p>
Full article ">Figure 2
<p>The primary constituent realities of all reality (All *R) (adapted: Mann et al., [<a href="#B23-sustainability-17-00280" class="html-bibr">23</a>]).</p>
Full article ">Figure 3
<p>Augmentation of the human worker senses with Metaverse technologies for real-time round-trip interactions with intelligent manufacturing systems.</p>
Full article ">Figure 4
<p>Scenarios for the introduction of Metaverse technology in manufacturing with suggested adoption timespans.</p>
Full article ">
20 pages, 15263 KiB  
Article
An Efficient Cluster-Based Mutual Authentication and Key Update Protocol for Secure Internet of Vehicles in 5G Sensor Networks
by Xinzhong Su and Youyun Xu
Sensors 2025, 25(1), 212; https://doi.org/10.3390/s25010212 - 2 Jan 2025
Viewed by 242
Abstract
The Internet of Vehicles (IoV), a key component of smart transportation systems, leverages 5G communication for low-latency data transmission, facilitating real-time interactions between vehicles, roadside units (RSUs), and sensor networks. However, the open nature of 5G communication channels exposes IoV systems to significant [...] Read more.
The Internet of Vehicles (IoV), a key component of smart transportation systems, leverages 5G communication for low-latency data transmission, facilitating real-time interactions between vehicles, roadside units (RSUs), and sensor networks. However, the open nature of 5G communication channels exposes IoV systems to significant security threats, such as eavesdropping, replay attacks, and message tampering. To address these challenges, this paper proposes the Efficient Cluster-based Mutual Authentication and Key Update Protocol (ECAUP) designed to secure IoV systems within 5G-enabled sensor networks. The ECAUP meets the unique mobility and security demands of IoV by enabling fine-grained access control and dynamic key updates for RSUs through a factorial tree structure, ensuring both forward and backward secrecy. Additionally, physical unclonable functions (PUFs) are utilized to provide end-to-end authentication and physical layer security, further enhancing the system’s resilience against sophisticated cyber-attacks. The security of the ECAUP is formally verified using BAN Logic and ProVerif, and a comparative analysis demonstrates its superiority in terms of overhead efficiency (more than 50%) and security features over existing protocols. This work contributes to the development of secure, resilient, and efficient intelligent transportation systems, ensuring robust communication and protection in sensor-based IoV environments. Full article
(This article belongs to the Special Issue Advances in Security for Emerging Intelligent Systems)
Show Figures

Figure 1

Figure 1
<p>IOV authentication model.</p>
Full article ">Figure 2
<p>Factorial-tree-based accessible device table. The number of leaf nodes at each level in factorial tree is <math display="inline"><semantics> <mrow> <mo>(</mo> <mi>t</mi> <mo>+</mo> <mn>1</mn> <mo>)</mo> <mo>!</mo> </mrow> </semantics></math>, where <span class="html-italic">t</span> is the level of the tree.</p>
Full article ">Figure 3
<p><math display="inline"><semantics> <mrow> <mi>R</mi> <mi>S</mi> <mi>U</mi> </mrow> </semantics></math> registration.</p>
Full article ">Figure 4
<p>Mutual authentication between <math display="inline"><semantics> <mrow> <mi>R</mi> <mi>S</mi> <mi>U</mi> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>I</mi> <mi>O</mi> <mi>V</mi> <mi>D</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p><math display="inline"><semantics> <mrow> <mi>I</mi> <mi>O</mi> <mi>V</mi> <mi>D</mi> </mrow> </semantics></math> join and leave.</p>
Full article ">Figure 6
<p>Proverif simulation results.</p>
Full article ">Figure 7
<p>Comparison of communication cost and calculation cost.</p>
Full article ">
42 pages, 6551 KiB  
Article
Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions
by Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev, Shafiullah Khan and Noha Alnazzawi
Sensors 2025, 25(1), 213; https://doi.org/10.3390/s25010213 - 2 Jan 2025
Viewed by 371
Abstract
This paper provides the complete details of current challenges and solutions in the cybersecurity of cyber-physical systems (CPS) within the context of the IIoT and its integration with edge computing (IIoT–edge computing). We systematically collected and analyzed the relevant literature from the past [...] Read more.
This paper provides the complete details of current challenges and solutions in the cybersecurity of cyber-physical systems (CPS) within the context of the IIoT and its integration with edge computing (IIoT–edge computing). We systematically collected and analyzed the relevant literature from the past five years, applying a rigorous methodology to identify key sources. Our study highlights the prevalent IIoT layer attacks, common intrusion methods, and critical threats facing IIoT–edge computing environments. Additionally, we examine various types of cyberattacks targeting CPS, outlining their significant impact on industrial operations. A detailed taxonomy of primary security mechanisms for CPS within IIoT–edge computing is developed, followed by a comparative analysis of our approach against existing research. The findings underscore the widespread vulnerabilities across the IIoT architecture, particularly in relation to DoS, ransomware, malware, and MITM attacks. The review emphasizes the integration of advanced security technologies, including machine learning (ML), federated learning (FL), blockchain, blockchain–ML, deep learning (DL), encryption, cryptography, IT/OT convergence, and digital twins, as essential for enhancing the security and real-time data protection of CPS in IIoT–edge computing. Finally, the paper outlines potential future research directions aimed at advancing cybersecurity in this rapidly evolving domain. Full article
Show Figures

Figure 1

Figure 1
<p>Paper structure.</p>
Full article ">Figure 2
<p>Procedure for selecting related work.</p>
Full article ">Figure 3
<p>Integration of physical and digital technologies in IIoT.</p>
Full article ">Figure 4
<p>Interaction of key IIoT components and technologies.</p>
Full article ">Figure 5
<p>IIoT layers: common attacks, effects, and mitigation methods.</p>
Full article ">Figure 6
<p>Architecture of IIoT–edge computing.</p>
Full article ">Figure 7
<p>Importance of integrating IIoT technologies and edge computing.</p>
Full article ">Figure 8
<p>Cybersecurity challenges in IIoT–edge computing.</p>
Full article ">Figure 9
<p>CPS aspects and technologies in IIoT.</p>
Full article ">Figure 10
<p>Types of cyber attacks on CPS and their impact on industry.</p>
Full article ">Figure 11
<p>Security methods in CPS of IIoT with integration edge computing.</p>
Full article ">Figure 12
<p>Impact of CPS on performance and cybersecurity in industry. The blue line in the top panel shows resource utilization efficiency increase, the red line is downtime. The straight blue line in the bottom panel shows the annual number of cyberattacks decreased, the red dashed line response time.</p>
Full article ">
34 pages, 2190 KiB  
Review
Security of Smart Grid: Cybersecurity Issues, Potential Cyberattacks, Major Incidents, and Future Directions
by Mohammad Ahmed Alomari, Mohammed Nasser Al-Andoli, Mukhtar Ghaleb, Reema Thabit, Gamal Alkawsi, Jamil Abedalrahim Jamil Alsayaydeh and AbdulGuddoos S. A. Gaid
Energies 2025, 18(1), 141; https://doi.org/10.3390/en18010141 - 1 Jan 2025
Viewed by 769
Abstract
Despite the fact that countless IoT applications are arising frequently in various fields, such as green cities, net-zero decarbonization, healthcare systems, and smart vehicles, the smart grid is considered the most critical cyber–physical IoT application. With emerging technologies supporting the much-anticipated smart energy [...] Read more.
Despite the fact that countless IoT applications are arising frequently in various fields, such as green cities, net-zero decarbonization, healthcare systems, and smart vehicles, the smart grid is considered the most critical cyber–physical IoT application. With emerging technologies supporting the much-anticipated smart energy systems, particularly the smart grid, these smart systems will continue to profoundly transform our way of life and the environment. Energy systems have improved over the past ten years in terms of intelligence, efficiency, decentralization, and ICT usage. On the other hand, cyber threats and attacks against these systems have greatly expanded as a result of the enormous spread of sensors and smart IoT devices inside the energy sector as well as traditional power grids. In order to detect and mitigate these vulnerabilities while increasing the security of energy systems and power grids, a thorough investigation and in-depth research are highly required. This study offers a comprehensive overview of state-of-the-art smart grid cybersecurity research. In this work, we primarily concentrate on examining the numerous threats and cyberattacks that have recently invaded the developing smart energy systems in general and smart grids in particular. This study begins by introducing smart grid architecture, it key components, and its security issues. Then, we present the spectrum of cyberattacks against energy systems while highlighting the most significant research studies that have been documented in the literature. The categorization of smart grid cyberattacks, while taking into account key information security characteristics, can help make it possible to provide organized and effective solutions for the present and potential attacks in smart grid applications. This cyberattack classification is covered thoroughly in this paper. This study also discusses the historical incidents against energy systems, which depicts how harsh and disastrous these attacks can go if not detected and mitigated. Finally, we provide a summary of the latest emerging future research trend and open research issues. Full article
(This article belongs to the Section A: Sustainable Energy)
Show Figures

Figure 1

Figure 1
<p>Flowchart of article selection criteria process.</p>
Full article ">Figure 2
<p>Domains of smart grid—conceptual model [<a href="#B22-energies-18-00141" class="html-bibr">22</a>].</p>
Full article ">Figure 3
<p>Timeline of major worldwide cyberattacks against energy systems.</p>
Full article ">
16 pages, 1922 KiB  
Article
Automation Processes for Efficient Verification of Complex Systems: An Empirical Case Study
by Rune Andre Haugen, Nils-Olav Skeie and Gerrit Muller
Systems 2025, 13(1), 17; https://doi.org/10.3390/systems13010017 - 31 Dec 2024
Viewed by 438
Abstract
This paper investigated the effect of automation processes in an industrial company engineering complex cyber-physical systems. The authors used an industry-as-laboratory approach as the research method, exploring an ongoing development project. The automation efforts focused on four areas: (1) test setup, (2) test [...] Read more.
This paper investigated the effect of automation processes in an industrial company engineering complex cyber-physical systems. The authors used an industry-as-laboratory approach as the research method, exploring an ongoing development project. The automation efforts focused on four areas: (1) test setup, (2) test execution, (3) test result analysis, and (4) documentation. All four areas showed promising results on increased effectiveness and/or efficiency. In particular, the automation of test result analysis will help the industrial company, KONGSBERG, reduce their main bottleneck in the test process, as well as reduce the risk of costly project delays. An automated system integration test process, facilitating iterative regression testing, will leverage the efficiency of the verification test process. Full article
(This article belongs to the Section Systems Engineering)
Show Figures

Figure 1

Figure 1
<p>AUV [<a href="#B1-systems-13-00017" class="html-bibr">1</a>].</p>
Full article ">Figure 2
<p>Research design.</p>
Full article ">Figure 3
<p>Emergent behavior and complexity relation (adapted from [<a href="#B10-systems-13-00017" class="html-bibr">10</a>]).</p>
Full article ">Figure 4
<p>Industry-as-laboratory approach [<a href="#B25-systems-13-00017" class="html-bibr">25</a>].</p>
Full article ">Figure 5
<p>Test process.</p>
Full article ">Figure 6
<p>Emergent behavior example [<a href="#B29-systems-13-00017" class="html-bibr">29</a>].</p>
Full article ">
31 pages, 13275 KiB  
Article
Assessing the Impacts of Failures on Monitoring Systems in Real-Time Data-Driven State Estimation Models Using GCN-LSTM for Water Distribution Networks
by Carlos A. Bonilla, Bruno Brentan, Idel Montalvo, David Ayala-Cabrera and Joaquín Izquierdo
Water 2025, 17(1), 46; https://doi.org/10.3390/w17010046 - 27 Dec 2024
Viewed by 387
Abstract
Water distribution networks (WDNs) are critical infrastructures that directly impact urban development and citizens’ quality of life. Due to digitalization technologies, modern networks have evolved towards cyber-physical systems, allowing real-time management and monitoring of network components. However, the increasing volume of data from [...] Read more.
Water distribution networks (WDNs) are critical infrastructures that directly impact urban development and citizens’ quality of life. Due to digitalization technologies, modern networks have evolved towards cyber-physical systems, allowing real-time management and monitoring of network components. However, the increasing volume of data from monitoring poses significant challenges to accurately estimate the hydraulic status of the system, mainly when anomalous events or unreliable readings occur. This paper presents a novel methodology for state estimation (SE) in WDNs by integrating convolutional graph networks (GCNs) with long short-term memory (LSTM) networks. The methodology is validated on two WDNs of different scales and complexities, evaluating the SE of the sensors. The capability of the GCN-LSTM model was assessed during the last two months of the time series by simulating failures to analyze its impact on sensor readings and estimation accuracy. The smaller network showed higher sensitivity of the sensors to detect failures, while the larger one evidenced more challenges in SE due to the sensor dispersion. Overall, the model achieved low prediction errors and high coefficient of determination values between the actual and simulated values, showing good performance. Likewise, the simulated failures showed that replacing the missing data with the hourly mean of the last week significantly improved the accuracy of the predictions, guaranteeing a robust SE in the event of sensor failures. This methodology provides a reliable tool for addressing various network configurations’ operational challenges. Full article
Show Figures

Figure 1

Figure 1
<p>Schematic configuration of the proposed methodology.</p>
Full article ">Figure 2
<p>Topology and spatial distribution of sensors and leak nodes in networks used in (<b>a</b>) Network District-B and (<b>b</b>) Network C-Town.</p>
Full article ">Figure 3
<p>Time series in the District-B Network; sensors (<b>a</b>) N-10, (<b>b</b>) N-30, (<b>c</b>) N-86, (<b>d</b>) p11, (<b>e</b>) p32, and (<b>f</b>) p104.</p>
Full article ">Figure 4
<p>Time series in the C-Town Network; sensors (<b>a</b>) J58, (<b>b</b>) J96, (<b>c</b>) J238, (<b>d</b>) J314, (<b>e</b>) P63 and (<b>f</b>) P220.</p>
Full article ">Figure 4 Cont.
<p>Time series in the C-Town Network; sensors (<b>a</b>) J58, (<b>b</b>) J96, (<b>c</b>) J238, (<b>d</b>) J314, (<b>e</b>) P63 and (<b>f</b>) P220.</p>
Full article ">Figure 5
<p>State estimation and scatter plots in the District-B network; sensors (<b>a</b>) N10, (<b>b</b>) N30, (<b>c</b>) N86, (<b>d</b>) p11, (<b>e</b>) p32, and (<b>f</b>) p104.</p>
Full article ">Figure 5 Cont.
<p>State estimation and scatter plots in the District-B network; sensors (<b>a</b>) N10, (<b>b</b>) N30, (<b>c</b>) N86, (<b>d</b>) p11, (<b>e</b>) p32, and (<b>f</b>) p104.</p>
Full article ">Figure 6
<p>State estimation and scatter plots in the C-Town network; sensors (<b>a</b>) J58, (<b>b</b>) J96, (<b>c</b>) J238, (<b>d</b>) J314, (<b>e</b>) P63, and (<b>f</b>) P220.</p>
Full article ">Figure 6 Cont.
<p>State estimation and scatter plots in the C-Town network; sensors (<b>a</b>) J58, (<b>b</b>) J96, (<b>c</b>) J238, (<b>d</b>) J314, (<b>e</b>) P63, and (<b>f</b>) P220.</p>
Full article ">Figure 7
<p>N86 sensor failure prediction in the District-B network; (<b>a</b>) PI-S1, (<b>b</b>) PII-S1, (<b>c</b>) PI-S2, (<b>d</b>) PII-S2, (<b>e</b>) PI-S3, and (<b>f</b>) PII-S3.</p>
Full article ">Figure 7 Cont.
<p>N86 sensor failure prediction in the District-B network; (<b>a</b>) PI-S1, (<b>b</b>) PII-S1, (<b>c</b>) PI-S2, (<b>d</b>) PII-S2, (<b>e</b>) PI-S3, and (<b>f</b>) PII-S3.</p>
Full article ">Figure 8
<p>p11 sensor failure prediction in the District-B network; (<b>a</b>) PI-S1, (<b>b</b>) PII-S1, (<b>c</b>) PI-S2, (<b>d</b>) PII-S2, (<b>e</b>) PI-S3, and (<b>f</b>) PII-S3.</p>
Full article ">Figure 8 Cont.
<p>p11 sensor failure prediction in the District-B network; (<b>a</b>) PI-S1, (<b>b</b>) PII-S1, (<b>c</b>) PI-S2, (<b>d</b>) PII-S2, (<b>e</b>) PI-S3, and (<b>f</b>) PII-S3.</p>
Full article ">Figure 9
<p>J314 sensor failure prediction in the C-Town network; (<b>a</b>) PI-S1, (<b>b</b>) PII-S1, (<b>c</b>) PI-S2, (<b>d</b>) PII-S2, (<b>e</b>) PI-S3, and (<b>f</b>) PII-S3.</p>
Full article ">Figure 9 Cont.
<p>J314 sensor failure prediction in the C-Town network; (<b>a</b>) PI-S1, (<b>b</b>) PII-S1, (<b>c</b>) PI-S2, (<b>d</b>) PII-S2, (<b>e</b>) PI-S3, and (<b>f</b>) PII-S3.</p>
Full article ">Figure 10
<p>P220 sensor failure prediction in the C-Town network; (<b>a</b>) PI-S1, (<b>b</b>) PII-S1, (<b>c</b>) PI-S2, (<b>d</b>) PII-S2, (<b>e</b>) PI-S3, and (<b>f</b>) PII-S3.</p>
Full article ">Figure 10 Cont.
<p>P220 sensor failure prediction in the C-Town network; (<b>a</b>) PI-S1, (<b>b</b>) PII-S1, (<b>c</b>) PI-S2, (<b>d</b>) PII-S2, (<b>e</b>) PI-S3, and (<b>f</b>) PII-S3.</p>
Full article ">
30 pages, 1914 KiB  
Review
Securing the Future of Railway Systems: A Comprehensive Cybersecurity Strategy for Critical On-Board and Track-Side Infrastructure
by Nisrine Ibadah, César Benavente-Peces and Marc-Oliver Pahl
Sensors 2024, 24(24), 8218; https://doi.org/10.3390/s24248218 - 23 Dec 2024
Viewed by 411
Abstract
The growing prevalence of cybersecurity threats is a significant concern for railway systems, which rely on an extensive network of onboard and trackside sensors. These threats have the potential to compromise the safety of railway operations and the integrity of the railway infrastructure [...] Read more.
The growing prevalence of cybersecurity threats is a significant concern for railway systems, which rely on an extensive network of onboard and trackside sensors. These threats have the potential to compromise the safety of railway operations and the integrity of the railway infrastructure itself. This paper aims to examine the current cybersecurity measures in use, identify the key vulnerabilities that they address, and propose solutions for enhancing the security of railway infrastructures. The report evaluates the effectiveness of existing security protocols by reviewing current standards, including IEC62443 and NIST, as well as case histories of recent rail cyberattacks. Significant gaps have been identified, especially where modern and legacy systems need to be integrated. Weaknesses in communication protocols such as MVB, CAN and TCP/IP are identified. To address these challenges, the paper proposes a layered security framework specific to railways that incorporate continuous monitoring, risk-based cybersecurity modeling, AI-assisted threat detection, and stronger authentication methodologies. The aim of these recommendations is to improve the resilience of railway networks and ensure a safer, more secure infrastructure for future operations. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Example of On-board/Trackside instances.</p>
Full article ">Figure 2
<p>An overview of the railway physical infrastructure.</p>
Full article ">Figure 3
<p>Railway sensors.</p>
Full article ">Figure 4
<p>NIST CSF phases.</p>
Full article ">Figure 5
<p>Methodology overview of the proposal.</p>
Full article ">Figure 6
<p>Cost-effective and scalable solutions.</p>
Full article ">Figure 7
<p>Collaborative security measures.</p>
Full article ">
28 pages, 7597 KiB  
Review
AI-Powered Digital Twins and Internet of Things for Smart Cities and Sustainable Building Environment
by Aljawharah A. Alnaser, Mina Maxi and Haytham Elmousalami
Appl. Sci. 2024, 14(24), 12056; https://doi.org/10.3390/app142412056 - 23 Dec 2024
Viewed by 767
Abstract
This systematic literature review explores the intersection of AI-driven digital twins and IoT in creating a sustainable building environment. A comprehensive analysis of 125 papers focuses on four major themes. First, digital twins are examined in construction, facility management, and their role in [...] Read more.
This systematic literature review explores the intersection of AI-driven digital twins and IoT in creating a sustainable building environment. A comprehensive analysis of 125 papers focuses on four major themes. First, digital twins are examined in construction, facility management, and their role in fostering sustainability and smart cities. The integration of IoT and AI with digital twins and energy optimization for zero-energy buildings is discussed. Second, the application of AI and automation in manufacturing, particularly in Industry 4.0 and cyber-physical systems, is evaluated. Third, emerging technologies in urban development, including blockchain, cybersecurity, and EEG-driven systems for sustainable buildings, are highlighted. The study underscores the role of data-driven approaches in flood resilience and urban digital ecosystems. This review contributes to sustainability by identifying how digital technologies and AI can optimize energy use and enhance resilience in both urban and industrial contexts. Full article
(This article belongs to the Section Civil Engineering)
Show Figures

Figure 1

Figure 1
<p>Sustainable building environment (SBE) technologies [<a href="#B7-applsci-14-12056" class="html-bibr">7</a>,<a href="#B8-applsci-14-12056" class="html-bibr">8</a>].</p>
Full article ">Figure 2
<p>Integration of Digital Twins, IoT, and AI for Smart Building Management [<a href="#B26-applsci-14-12056" class="html-bibr">26</a>].</p>
Full article ">Figure 3
<p>Research Methodology.</p>
Full article ">Figure 4
<p>PRISMA and final research sample identification.</p>
Full article ">Figure 5
<p>Annual research publications and citations.</p>
Full article ">Figure 6
<p>Number of Publications and Citations for Review and Research Articles.</p>
Full article ">Figure 7
<p>Network of the research’s most influential countries.</p>
Full article ">Figure 8
<p>Most influential authors in the research.</p>
Full article ">Figure 9
<p>The most influential authors based on total link strength.</p>
Full article ">Figure 10
<p>The research disciplines.</p>
Full article ">Figure 11
<p>Keywords interrelations.</p>
Full article ">Figure 12
<p>Top influential keywords.</p>
Full article ">Figure 13
<p>Digital Twin—AI integration.</p>
Full article ">Figure 14
<p>DT- AI applications in Building Environment.</p>
Full article ">Figure 15
<p>Limitations of DT-AI Integration in Building Environments.</p>
Full article ">Figure 16
<p>Future research directions.</p>
Full article ">
15 pages, 1275 KiB  
Article
Integrating Digital Twins and Cyber-Physical Systems for Flexible Energy Management in Manufacturing Facilities: A Conceptual Framework
by Gerrit Rolofs, Fabian Wilking, Stefan Goetz and Sandro Wartzack
Electronics 2024, 13(24), 4964; https://doi.org/10.3390/electronics13244964 - 17 Dec 2024
Viewed by 621
Abstract
This paper presents a conceptual framework aimed at integrating Digital Twins and cyber-physical production systems into the energy management of manufacturing facilities. To address the challenges of rising energy costs and environmental impacts, this framework combines digital modeling and customized energy management for [...] Read more.
This paper presents a conceptual framework aimed at integrating Digital Twins and cyber-physical production systems into the energy management of manufacturing facilities. To address the challenges of rising energy costs and environmental impacts, this framework combines digital modeling and customized energy management for direct manufacturing operations. Through a review of the existing literature, essential components such as physical models, a data platform, an energy optimization platform, and various interfaces are identified. Key requirements are defined in terms of functionality, performance, reliability, safety, and additional factors. The proposed framework includes the physical system, data platform, energy management system, and interfaces for both operators and external parties. The goal of this framework is to set the basis for allowing manufacturers to reduce energy consumption and costs during the lifecycle of assets more effectively, thereby improving energy efficiency in smart manufacturing. The study highlights opportunities for further research, such as real-world applications and sophisticated optimization methods. The advancement of Digital Twin technologies holds significant potential for creating more sustainable factories. Full article
(This article belongs to the Special Issue Digital Twins in Industry 4.0, 2nd Edition)
Show Figures

Figure 1

Figure 1
<p>Definition of the Digital Twin based on [<a href="#B15-electronics-13-04964" class="html-bibr">15</a>,<a href="#B18-electronics-13-04964" class="html-bibr">18</a>,<a href="#B19-electronics-13-04964" class="html-bibr">19</a>].</p>
Full article ">Figure 2
<p>Workshop Method and achieved Milestones.</p>
Full article ">Figure 3
<p>Flexible Energy Management System—Framework.</p>
Full article ">
21 pages, 3863 KiB  
Article
IoRT-Based Middleware for Heterogeneous Multi-Robot Systems
by Emil Cuadros Zegarra, Dennis Barrios Aranibar and Yudith Cardinale
J. Sens. Actuator Netw. 2024, 13(6), 87; https://doi.org/10.3390/jsan13060087 - 16 Dec 2024
Viewed by 395
Abstract
The concurrence of social robots with different functionalities and cyber-physical systems in indoor environments has recently been increasing in many fields, such as medicine, education, and industry. In such scenarios, the collaboration of such heterogeneous robots demands effective communication for task completion. The [...] Read more.
The concurrence of social robots with different functionalities and cyber-physical systems in indoor environments has recently been increasing in many fields, such as medicine, education, and industry. In such scenarios, the collaboration of such heterogeneous robots demands effective communication for task completion. The concept of the Internet of Robotic Things (IoRT) is introduced as a potential solution, leveraging technologies like Artificial Intelligence, Cloud Computing, and Mesh Networks. This paper proposes an IoRT-based middleware that allows the communication of different types of robot operating systems in dynamic environments, using a cloud-based protocol. This middleware facilitates task assignment, training, and planning for heterogeneous robots, while enabling distributed communication via WiFi. The system operates in two control modes: local and cloud-based, for flexible communication and information distribution. This work highlights the challenges of current communication methods, particularly in ensuring information reach, agility, and handling diverse robots. To demonstrate the middleware suitability and applicability, an implementation of a proof-of-concept is shown in a touristic scenario where several guide robots can collaborate by effectively sharing information gathered from their heterogeneous sensor systems, with the aid of cloud processing or even internal communication processes. Results show that the performance of the middleware allows real-time applications for heterogeneous multi-robot systems in different domains. Full article
(This article belongs to the Section Communications and Networking)
Show Figures

Figure 1

Figure 1
<p>Workflow for task assignment in multi-robot systems [<a href="#B26-jsan-13-00087" class="html-bibr">26</a>].</p>
Full article ">Figure 2
<p>IoRT = IoT + Cloud Robotics [<a href="#B14-jsan-13-00087" class="html-bibr">14</a>].</p>
Full article ">Figure 3
<p>Publisher/subscriber model [<a href="#B34-jsan-13-00087" class="html-bibr">34</a>].</p>
Full article ">Figure 4
<p>Proposed middleware for communication in heterogeneous multi-robot systems.</p>
Full article ">Figure 5
<p>Message package structure of protocol model.</p>
Full article ">Figure 6
<p>Main program flowchart of <span class="html-italic">Cloud Server</span>.</p>
Full article ">Figure 7
<p>Client communication with server flowchart.</p>
Full article ">Figure 8
<p>Publish process in <span class="html-italic">Server</span> flowchart.</p>
Full article ">Figure 9
<p>Subscribe process in server flowchart.</p>
Full article ">Figure 10
<p>Messages published and subscribed by each Robot Node.</p>
Full article ">Figure 11
<p>Average time for publishing package to be sent from <span class="html-italic">Robot Node</span> to <span class="html-italic">Server</span>.</p>
Full article ">Figure 12
<p>Average time for subscribing package to be sent from <span class="html-italic">Robot Node</span> to <span class="html-italic">Server</span>.</p>
Full article ">Figure 13
<p>Percentage of correct packages delivered from <span class="html-italic">Robot Nodes</span> to <span class="html-italic">Server</span>.</p>
Full article ">Figure 14
<p>Moving Turtlebot4 (images above) and Turtlesim (images below) using publish and subscribe in middleware.</p>
Full article ">
15 pages, 3320 KiB  
Article
Upcity: Addressing Urban Problems Through an Integrated System
by Andre A. F. Silva, Adao J. S. Porto, Bruno M. C. Belo and Cecilia A. C. Cesar
Sensors 2024, 24(24), 7956; https://doi.org/10.3390/s24247956 - 13 Dec 2024
Viewed by 639
Abstract
Current technologies could potentially solve many of the urban problems in today’s cities. Many cities already possess cameras, drones, thermometers, pollution air gauges, and other sensors. However, most of these have been designated for use in individual domains within City Hall, creating a [...] Read more.
Current technologies could potentially solve many of the urban problems in today’s cities. Many cities already possess cameras, drones, thermometers, pollution air gauges, and other sensors. However, most of these have been designated for use in individual domains within City Hall, creating a maze of individual data domains that cannot connect to each other. This jumble of domains and stakeholders prevents collaboration and transparency. Cities need an integrated system in which data and dashboards can be shared by city administrators to better deal with urban problems that involve several sectors and to improve oversight. This paper presents a model of an integrative system to manage classes of problems within one administrative municipal domain. Our model contains the cyber-physical system’s elements: the physical object, the sensors and electronic devices attached to it, a database of collected problems, code running on the devices or remotely, and the human. We tested the model by using it on the recurring problem of potholes in city streets. An AI model for identifying potholes was integrated into applications available to citizens and operators so that they can feed the municipal system with images and the locations of potholes using their cell phone camera. Preliminary results indicate that these sensors can detect potholes with an accuracy of 91% and 99%, depending on the detection equipment used. In addition, the dashboards provide the manager and the citizen with a transparent view of the problems’ progress and support for their correct address. Full article
(This article belongs to the Special Issue Advanced IoT Systems in Smart Cities: 2nd Edition)
Show Figures

Figure 1

Figure 1
<p>Context diagram of UpCity: urban problem treatment system.</p>
Full article ">Figure 2
<p>System modeling with UML.</p>
Full article ">Figure 3
<p>Pothole identification process.</p>
Full article ">Figure 4
<p>Steps of the pothole identification process.</p>
Full article ">Figure 5
<p>Citizen’s dashboard.</p>
Full article ">Figure 6
<p>Public infrastructure manager’s dashboard.</p>
Full article ">
21 pages, 4115 KiB  
Article
A Quantitative Assessment of the Economic Viability of Photovoltaic Battery Energy Storage Systems
by Aayesha S. Ahmad, Sumit K. Chattopadhyay and B. K. Panigrahi
Energies 2024, 17(24), 6279; https://doi.org/10.3390/en17246279 - 12 Dec 2024
Viewed by 616
Abstract
Rooftop PV-BESS installations often lose profitability despite policy support to accelerate capacity growth. This paper performs techno-economic analysis to assess the effect of heterogeneity in real-world conditions on the economic viability of residential rooftop PV-BESSs. The stochastic nature of generation and consumption is [...] Read more.
Rooftop PV-BESS installations often lose profitability despite policy support to accelerate capacity growth. This paper performs techno-economic analysis to assess the effect of heterogeneity in real-world conditions on the economic viability of residential rooftop PV-BESSs. The stochastic nature of generation and consumption is modeled as multiple deterministic scenarios that vary in the capacity rating of the PV system, climatic conditions (insolation and temperature), self-consumption ratio (SCR), generation–demand concurrence, and the presence/absence of capacity and storage subsidies. The results indicate that PV-BESSs are mostly profitable when operating at a capacity factor ≥ 18%. Furthermore, higher daytime electricity consumption enables greater savings with smaller storage capacities, thereby facilitating cost-effective installations at capacity factors ≥ 8%. However, low-yielding PV-BESSs and prosumers exhibiting low generation–demand concurrence require suitable subsidy allocations to become profitable. Full article
(This article belongs to the Section A2: Solar Energy and Photovoltaic Systems)
Show Figures

Figure 1

Figure 1
<p>Framework of the PV-BESS feasibility investigation process.</p>
Full article ">Figure 2
<p>Matrix representation of zone-wise input parameters of the PV generation model.</p>
Full article ">Figure 3
<p>Schematic diagram of the energy exchange model.</p>
Full article ">Figure 4
<p>(<b>a</b>) Contour plot of annual PV generation under the four climatic zones for a 10 kWp PV system. (<b>b</b>) Histogram plot of annual PV generation scenarios for a 10 kWp system.</p>
Full article ">Figure 5
<p>Visualization of changes in the plant capacity factor with annual insolation and average cell temperature for (<b>a</b>) climatic zone 1, (<b>b</b>) climatic zone 2, (<b>c</b>) climatic zone 3, and (<b>d</b>) climatic zone 4.</p>
Full article ">Figure 6
<p>(<b>a</b>) Energy production over the project lifetime of 10 kW PV system operating at an annual capacity factor of 14.33%. (<b>b</b>) Cyclable capacity available for a 10 kWh battery, assuming 70% depth of discharge over a 26-year project with battery replacements in years 8, 15, and 22.</p>
Full article ">Figure 7
<p>Battery storage capacity requirement for different SCR and generation–demand concurrence values defined as follows: Series 1: low; Series 2: medium; series 3: high generation–demand concurrence.</p>
Full article ">Figure 8
<p>Histogram plot for the population size of profitable and non-profitable cases for (<b>a</b>) zone 1, (<b>b</b>) zone 2, (<b>c</b>) zone 3, and (<b>d</b>) zone 4 considering the scenario of medium generation–demand concurrence in the absence of subsidy allocation. The red line in the graphs depicts NPV = 0.</p>
Full article ">Figure 9
<p>Impact of plant capacity factor and SCR on the profitability of PV-BESS installations. The stars represent SCR values.</p>
Full article ">
18 pages, 3254 KiB  
Article
Design and Implementation of an Immersive Web-Based Digital Twin Steam Turbine System for Industrial Training
by Zhe Li, Hui Xiao, Bo Wang, Xuzhu Dong, Lianteng Shen, Xiaomeng Di and Xiaodong Du
Information 2024, 15(12), 800; https://doi.org/10.3390/info15120800 - 11 Dec 2024
Viewed by 531
Abstract
The steam turbine and its digital electro-hydraulic (DEH) control system constitute vital elements within thermal power generation. However, the complexity of the on-site environment and the high production costs of the equipment hinder users, especially novices, from fully understanding and mastering the operation [...] Read more.
The steam turbine and its digital electro-hydraulic (DEH) control system constitute vital elements within thermal power generation. However, the complexity of the on-site environment and the high production costs of the equipment hinder users, especially novices, from fully understanding and mastering the operation mechanisms and production processes. In the realm of emerging technologies, the digital twin stands out as a powerful tool for enhancing industrial training and learning for students and operators in this field. This paper details the design and implementation of a web-based digital twin steam turbine system. Initially, a pioneering web-based digital twin architecture is proposed, featuring high-fidelity equipment modeling, web-based immersive 3D displays, algorithm design and networked implementation, and data-driven model synchronization. Subsequently, the functionalities and benefits of the digital twin system in facilitating industrial training are explained, covering aspects such as steam turbine cognitive learning, DEH system simulation learning, and condition monitoring. Finally, a case study in a real thermal power plant is presented to demonstrate the practicability and effectiveness of this web-based digital twin system. This research endeavors to contribute valuable insights and potential solutions to the growing field of web-based digital twin applications in industry. Full article
(This article belongs to the Section Information and Communications Technology)
Show Figures

Figure 1

Figure 1
<p>Overall diagram of an intermediate reheat steam turbine system (see <a href="#information-15-00800-t001" class="html-table">Table 1</a> for detailed descriptions of each numbered block).</p>
Full article ">Figure 2
<p>Proposed web-based DT steam turbine system architecture.</p>
Full article ">Figure 3
<p>High-fidelity 3D components of a 1000 MW ultra-supercritical steam turbine. (<b>a</b>) Base. (<b>b</b>) Blade. (<b>c</b>) Condenser. (<b>d</b>) High-pressure union valve.</p>
Full article ">Figure 4
<p>Communication channels among the frontend, backend, and model sides in the proposed DT steam turbine system.</p>
Full article ">Figure 5
<p>Web-based immersive display of DT steam turbine. (<b>a</b>) Interactive component selection with corresponding explanations on the right side of the screen. (<b>b</b>) Data-driven animation of steam and flame.</p>
Full article ">Figure 6
<p>Algorithm design and networked implementation in proposed DT steam turbine system.</p>
Full article ">Figure 7
<p>Diagram illustrating data-driven synchronization of the DT stream turbine 3D model.</p>
Full article ">Figure 8
<p>Physical pictures of the 1000 MW steam turbine in Ezhou Thermal Power Plant.</p>
Full article ">Figure 9
<p>Functional diagram of the proposed DT steam turbine system.</p>
Full article ">Figure 10
<p>Schematic diagram of the steam turbine DEH control system, where <math display="inline"><semantics> <msub> <mi>λ</mi> <mi>n</mi> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>λ</mi> <mi>P</mi> </msub> </semantics></math>, <span class="html-italic">p</span>, <span class="html-italic">R</span>, <math display="inline"><semantics> <msub> <mi>p</mi> <mi>T</mi> </msub> </semantics></math>, <span class="html-italic">P</span>, <span class="html-italic">n</span>, and <math display="inline"><semantics> <mi>φ</mi> </semantics></math> represent the speed setpoint, power setpoint, steam pressure disturbance, load disturbance, first-stage pressure, power, rotating speed, and relative rotating speed, respectively. PI2 is the inner PI controller for pressure control, while PI1 is the middle PI controller for power control.</p>
Full article ">Figure 11
<p>Speed control loop and power control loop step simulation results. (<b>a</b>) Speed curve. (<b>b</b>) Speed difference curves under different pressure disturbances. (<b>c</b>) Power curve. (<b>d</b>) Power difference curves under different pressure disturbances.</p>
Full article ">
22 pages, 3412 KiB  
Article
Educational Cyber–Physical Systems (ECPSs) for University 4.0
by Laurent Gallon, Khouloud Salameh, Richard Chbeir, Samia Bachir and Philippe Aniorté
Information 2024, 15(12), 790; https://doi.org/10.3390/info15120790 - 9 Dec 2024
Viewed by 432
Abstract
University 4.0 represents the adaptation of the Education 4.0 paradigm to the university context. The core principle is the automated supervision of the entire student learning process by an AI-driven computer assistant, allowing for timely adjustments based on the student’s progression. Critical to [...] Read more.
University 4.0 represents the adaptation of the Education 4.0 paradigm to the university context. The core principle is the automated supervision of the entire student learning process by an AI-driven computer assistant, allowing for timely adjustments based on the student’s progression. Critical to this process is the assistant’s ability to collect comprehensive information on all student activities within the curriculum, particularly overseeing pedagogical activities in real time to make necessary adaptations. This utilizes Educational Cyber–Physical Systems (ECPSs) to gather all relevant data and extract appropriate information effectively. This article examines a specific case of practical work involving students at two distinct geographical locations collaborating in a blended learning environment. A specialized ECPS is deployed to collect data from equipment at both sites, enabling the modeling of the pedagogical sequence, the cyber–physical system, and the data necessary for monitoring student progress in real time. Full article
Show Figures

Figure 1

Figure 1
<p>MAPE control loop from IBM’s definition [<a href="#B26-information-15-00790" class="html-bibr">26</a>].</p>
Full article ">Figure 2
<p>Generic ECPS model.</p>
Full article ">Figure 3
<p>ECPS instances.</p>
Full article ">Figure 4
<p>Y development cycle from MDA.</p>
Full article ">Figure 5
<p>CPSML.</p>
Full article ">Figure 6
<p>EML4.0.</p>
Full article ">Figure 7
<p>ECPSML.</p>
Full article ">Figure 8
<p>Examples of some ATL rules.</p>
Full article ">Figure 9
<p>ToIP course architecture with a dedicated ECPS.</p>
Full article ">Figure 10
<p>ToIP practical work ECPS setup for each pair.</p>
Full article ">Figure 11
<p>CPS model.</p>
Full article ">Figure 12
<p>MAPE CPS model.</p>
Full article ">Figure 13
<p>Manual draft of the learning scenario.</p>
Full article ">Figure 14
<p>Learning activities and controls (EML4.0-compliant).</p>
Full article ">Figure 15
<p>Modeled learning environment through learning objects, learning services, etc. (conforms to EML4.0).</p>
Full article ">Figure 16
<p>Automatic transformation of the ECPS model via ATL rules.</p>
Full article ">Figure 17
<p>ECPS model.</p>
Full article ">Figure 18
<p>ECPS activity diagram.</p>
Full article ">Figure 19
<p>Implementation of the ECPSML model in a ClassroomECPS.</p>
Full article ">Figure 20
<p>CPS data dashboard availability—green for available, red for unavailable, black for not used.</p>
Full article ">Figure 21
<p>Teacher dashboard.</p>
Full article ">Figure 22
<p>Student dashboard.</p>
Full article ">
Back to TopTop