4. ENERGY EFFICIENT SENSING
Mobile devices operate on a finite supply of energy
Continuously capturing user context through sensors
imposes heavy workload
It drains the battery power rapidly
So, EES is one of the key challenge in MCPS.
5. ENERGY EFFICIENT SENSING
EXAMPLE
- Galaxy SIII smartphone consumes 805 mW in idle mode puts
extra 573 mW power consumption while employing GPS
connectivity. [1]
- When the HTC Touch Pro uses accelerometer, overall power
consumption on device increases by 370 mW . [2]
6. NETWORKING CHALLENGES
NETWORK ARCHITECTURE AND SYSTEM DESIGN
- Finding a scalable, flexible, secure and cost-efficient
-Proposed in the past years [3], [4],e.g., healthcare [5] , meter
reading [6] , enterprise services [7])
7. NETWORKING CHALLENGES
ADDRESSING AND NAMING
To Identify and interact with the huge number of mCPS objects .
(i) How can we identify and interact
(ii) How can we make it efficiently if mCPS objects are
heterogeneous or homogeneous in character.
8. OBJECT MOBILITY CHALLENGES
A large part of mCPS objects are not fixed.
Because, most of the services are expected to be delivered to
mobile users.
Example: Autonomous Car
9. BIG DATA CHALLENGES
SCALABILITY
-Sometimes it produces multi-petabyte data
COMPLEXITY
-In Multi-point correlations (e.g., moving taxies and e.g., rivers,
buildings, roads, etc.)
-Raw data collected from sensors are likely to be incomplete and
inaccurate.
10. BIG DATA CHALLENGES
REPRODUCIBILITY
-10% of the disk space is used for storing “hot” data, while the
remaining 90% space is “wasted” .
DATA CALIBRATION AND ROBUSTNESS
-Suppose an accelerometer based application,
Upward or downward position and the device causes x-axis
flipped to y-axis or vice versa.
11. SECURITY
• Secure authentication and authorization,
• Secure bootstrapping of objects and transmission of
data,
• Security of CPS data,
• Secure access to data by authorized persons
12. SECURITY
EXAMPLE
Monitor the medical parameters of a patient. [8]
• The device has to securely join CPS
• Secure data transmission
• Secure storage mechanisms are essential
• Data access should be guaranteed only to authorized people
such as doctors
13. SOCIAL CHALLENGES
Design of a suitable human-system cooperation.
-System should manageable and trustworthy for human as well
as user of this service.
Image src:https://iot-analytics.com/10-internet-of-things-applications/ https://www.researchgate.net/publication/262160531_Cyber-Physical_Systems_Imminent_Challenges
14. SOCIAL CHALLENGES
EXAMPLE:
• When it will be trustworthy Then a business man will
exchange his data with this system or a user will accept this
system to use it. [9]
• Similarly, If it is easily manageable, then a car driver easily will
be able to update and to trained himself in the latest version of
a route. [9]
15. RESOURCE LINKS
1. B. Priyantha, D. Lymberopoulos, and J. Liu, “LittleRock: Enabling Energy-Efficient Continuous Sensing on Mobile Phones,” IEEE
Pervasive Comput., vol. 10, no. 2, pp. 12–15, Apr. 2011.
2. A. Carroll and G. Heiser, “The systems hacker’s guide to the galaxy energy usage in a modern smartphone,” in Proceedings of
the 4th Asia-Pacific workshop on systems, 2013, p. 5.
3. H. Ning and Z. Wang, “Future internet of things architecture: like mankind neural system or social organization framework?,”
Commun. Lett. IEEE, vol. 15, no. 4, pp. 461–463, 2011.
4. M. Wu, T. Lu, F.-Y. Ling, L. Sun, and H.-Y. Du, “Research on the architecture of Internet of things,” in Advanced Computer Theory
and Engineering (ICACTE), 2010 3rd International Conference on, 2010, vol. 5, pp. V5–484.
5. A. J. Jara, M. A. Zamora, and A. F. G. Skarmeta, “An architecture based on internet of things to support mobility and security in
medical environments,” in Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE, 2010, pp. 1–5.
6. D. Guinard, V. Trifa, and E. Wilde, “A resource oriented architecture for the web of things,” in Internet of Things (IOT), 2010, 2010,
pp. 1–8.
7. P. Spiess, S. Karnouskos, D. Guinard, D. Savio, O. Baecker, L. Souza, and V. Trifa, “SOA-based integration of the internet of
things in enterprise services,” in Web Services, 2009. ICWS 2009. IEEE International Conference on, 2009, pp. 968–975.
8. The Internet of Things vision: Key features, applications and open issues Eleonora Borgia ⇑ nstitute of Informatics and Telematics
(IIT), Italian National Research Council (CNR), via G. Moruzzi 1, 56124 Pisa, Italy
9. Cyber-Physical Systems: Imminent Challenges - https://www.researchgate.net/publication/262160531_Cyber-
Physical_Systems_Imminent_Challenges