sensors-logo

Journal Browser

Journal Browser

Cyber-Physical Systems and Industry 4.0

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Communications".

Deadline for manuscript submissions: closed (31 December 2023) | Viewed by 107846

Special Issue Editors


E-Mail Website
Guest Editor
Telecom SudParis, Institut Mines-Telecom & Institut Polytechnique de Paris, 91120 Palaiseau, France
Interests: cybersecurity problems; with an emphasis on the management of formal policies; analysis of vulnerabilities; enforcement of countermeasures
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Information & Communication Engineering, University of Murcia, Calle Campus Universitario, 30100 Murcia, Spain
Interests: cybersecurity; cyber defense; Intrusion detection and reaction system; IoT security; malware detection; threat intelligence

Special Issue Information

Dear Colleagues,

In the last several decades, the digital revolution has strongly impacted industry, forcing a paradigm shift. Thus, we are currently witnessing the advent of Industry 4.0, featuring high automation of industrial processes and focusing on the data produced by the smart factories. Of course, several disruptive technologies are leading the way in this revolution, including artificial intelligence, the Internet of Things, cloud computing, and cyber-physical systems (CPS). Specifically, the latter promise to innovate a wide range of application domains, from manufacturing to IoT-enabled ecosystems to healthcare, seamlessly integrating cyber and physical components. By adopting these technologies, the industrial sector expects to quickly adapt and respond to market demands for high-quality products.

This Special Issue in Sensors aims to cover the most innovative and recent advances surrounding the CPS and Industry 4.0 ecosystem, including emerging methods, systems, tools, frameworks, testbeds, and applications. Reviews, state-of-the-art surveys, and case studies are also welcomed. Topics of interest for this Special Issue include, but are not limited to, the following:

  • CPS architectures;
  • Monitoring and predictive models;
  • Threat analysis of CPS;
  • Data mining and analytics for Industry 4.0;
  • Edge and cloud computing in smart industries;
  • Visual analytics for cyber-physical security;
  • Functional protection of critical infrastructures;
  • Machine learning and deep learning;
  • Wired and wireless communication;
  • Command and control protocols;
  • Quantitative and comparative assurance metrics;
  • Security and privacy;
  • Human factors;
  • Continuity of services and data trustworthiness;
  • Digital twins for cyber-physical security;
  • Technological applications;
  • Forensic tools, techniques, and analysis for cyber-physical attacks;
  • Case studies of cyber-physical security assessment. 

Prof. Dr. Joaquin Garcia-Alfaro
Dr. Pantaleone Nespoli
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (8 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

21 pages, 4455 KiB  
Article
Smart Grid Security: An Effective Hybrid CNN-Based Approach for Detecting Energy Theft Using Consumption Patterns
by Muhammed Zekeriya Gunduz and Resul Das
Sensors 2024, 24(4), 1148; https://doi.org/10.3390/s24041148 - 9 Feb 2024
Viewed by 1024
Abstract
In Internet of Things-based smart grids, smart meters record and report a massive number of power consumption data at certain intervals to the data center of the utility for load monitoring and energy management. Energy theft is a big problem for smart meters [...] Read more.
In Internet of Things-based smart grids, smart meters record and report a massive number of power consumption data at certain intervals to the data center of the utility for load monitoring and energy management. Energy theft is a big problem for smart meters and causes non-technical losses. Energy theft attacks can be launched by malicious consumers by compromising the smart meters to report manipulated consumption data for less billing. It is a global issue causing technical and financial damage to governments and operators. Deep learning-based techniques can effectively identify consumers involved in energy theft through power consumption data. In this study, a hybrid convolutional neural network (CNN)-based energy-theft-detection system is proposed to detect data-tampering cyber-attack vectors. CNN is a commonly employed method that automates the extraction of features and the classification process. We employed CNN for feature extraction and traditional machine learning algorithms for classification. In this work, honest data were obtained from a real dataset. Six attack vectors causing data tampering were utilized. Tampered data were synthetically generated through these attack vectors. Six separate datasets were created for each attack vector to design a specialized detector tailored for that specific attack. Additionally, a dataset containing all attack vectors was also generated for the purpose of designing a general detector. Furthermore, the imbalanced dataset problem was addressed through the application of the generative adversarial network (GAN) method. GAN was chosen due to its ability to generate new data closely resembling real data, and its application in this field has not been extensively explored. The data generated with GAN ensured better training for the hybrid CNN-based detector on honest and malicious consumption patterns. Finally, the results indicate that the proposed general detector could classify both honest and malicious users with satisfactory accuracy. Full article
(This article belongs to the Special Issue Cyber-Physical Systems and Industry 4.0)
Show Figures

Figure 1

25 pages, 4474 KiB  
Article
Cyber-Physical System for Smart Traffic Light Control
by Siddhesh Deshpande and Sheng-Jen Hsieh
Sensors 2023, 23(11), 5028; https://doi.org/10.3390/s23115028 - 24 May 2023
Cited by 1 | Viewed by 3487
Abstract
In recent years, researchers have proposed smart traffic light control systems to improve traffic flow at intersections, but there is less focus on reducing vehicle and pedestrian delays simultaneously. This research proposes a cyber-physical system for smart traffic light control utilizing traffic detection [...] Read more.
In recent years, researchers have proposed smart traffic light control systems to improve traffic flow at intersections, but there is less focus on reducing vehicle and pedestrian delays simultaneously. This research proposes a cyber-physical system for smart traffic light control utilizing traffic detection cameras, machine learning algorithms, and a ladder logic program. The proposed method employs a dynamic traffic interval technique that categorizes traffic into low, medium, high, and very high volumes. It adjusts traffic light intervals based on real-time traffic data, including pedestrian and vehicle information. Machine learning algorithms, including convolutional neural network (CNN), artificial neural network (ANN), and support vector machine (SVM), are demonstrated to predict traffic conditions and traffic light timings. To validate the proposed method, the Simulation of Urban Mobility (SUMO) platform was used to simulate the real-world intersection working. The simulation result indicates the dynamic traffic interval technique is more efficient and showcases a 12% to 27% reduction in the waiting time of vehicles and a 9% to 23% reduction in the waiting time of pedestrians at an intersection when compared to the fixed time and semi-dynamic traffic light control methods. Full article
(This article belongs to the Special Issue Cyber-Physical Systems and Industry 4.0)
Show Figures

Figure 1

13 pages, 3372 KiB  
Article
Deep Learning with Attention Mechanisms for Road Weather Detection
by Madiha Samo, Jimiama Mosima Mafeni Mase and Grazziela Figueredo
Sensors 2023, 23(2), 798; https://doi.org/10.3390/s23020798 - 10 Jan 2023
Cited by 6 | Viewed by 2715
Abstract
There is great interest in automatically detecting road weather and understanding its impacts on the overall safety of the transport network. This can, for example, support road condition-based maintenance or even serve as detection systems that assist safe driving during adverse climate conditions. [...] Read more.
There is great interest in automatically detecting road weather and understanding its impacts on the overall safety of the transport network. This can, for example, support road condition-based maintenance or even serve as detection systems that assist safe driving during adverse climate conditions. In computer vision, previous work has demonstrated the effectiveness of deep learning in predicting weather conditions from outdoor images. However, training deep learning models to accurately predict weather conditions using real-world road-facing images is difficult due to: (1) the simultaneous occurrence of multiple weather conditions; (2) imbalanced occurrence of weather conditions throughout the year; and (3) road idiosyncrasies, such as road layouts, illumination, and road objects, etc. In this paper, we explore the use of a focal loss function to force the learning process to focus on weather instances that are hard to learn with the objective of helping address data imbalances. In addition, we explore the attention mechanism for pixel-based dynamic weight adjustment to handle road idiosyncrasies using state-of-the-art vision transformer models. Experiments with a novel multi-label road weather dataset show that focal loss significantly increases the accuracy of computer vision approaches for imbalanced weather conditions. Furthermore, vision transformers outperform current state-of-the-art convolutional neural networks in predicting weather conditions with a validation accuracy of 92% and an F1-score of 81.22%, which is impressive considering the imbalanced nature of the dataset. Full article
(This article belongs to the Special Issue Cyber-Physical Systems and Industry 4.0)
Show Figures

Figure 1

19 pages, 732 KiB  
Article
Best of Both Worlds: Detecting Application Layer Attacks through 802.11 and Non-802.11 Features
by Efstratios Chatzoglou, Georgios Kambourakis, Christos Smiliotopoulos and Constantinos Kolias
Sensors 2022, 22(15), 5633; https://doi.org/10.3390/s22155633 - 28 Jul 2022
Cited by 7 | Viewed by 2218
Abstract
Intrusion detection in wireless and, more specifically, Wi-Fi networks is lately increasingly under the spotlight of the research community. However, the literature currently lacks a comprehensive assessment of the potential to detect application layer attacks based on both 802.11 and non-802.11 network protocol [...] Read more.
Intrusion detection in wireless and, more specifically, Wi-Fi networks is lately increasingly under the spotlight of the research community. However, the literature currently lacks a comprehensive assessment of the potential to detect application layer attacks based on both 802.11 and non-802.11 network protocol features. The investigation of this capacity is of paramount importance since Wi-Fi domains are often used as a stepping stone by threat actors for unleashing an ample variety of application layer assaults. In this setting, by exploiting the contemporary AWID3 benchmark dataset along with both shallow and deep learning machine learning techniques, this work attempts to provide concrete answers to a dyad of principal matters. First, what is the competence of 802.11-specific and non-802.11 features when used separately and in tandem in detecting application layer attacks, say, website spoofing? Second, which network protocol features are the most informative to the machine learning model for detecting application layer attacks? Without relying on any optimization or dimensionality reduction technique, our experiments, indicatively exploiting an engineered feature, demonstrate a detection performance up to 96.7% in terms of the Area under the ROC Curve (AUC) metric. Full article
(This article belongs to the Special Issue Cyber-Physical Systems and Industry 4.0)
Show Figures

Figure 1

30 pages, 535 KiB  
Article
Design, Modeling and Implementation of Digital Twins
by Mariana Segovia and Joaquin Garcia-Alfaro
Sensors 2022, 22(14), 5396; https://doi.org/10.3390/s22145396 - 20 Jul 2022
Cited by 77 | Viewed by 16010
Abstract
A Digital Twin (DT) is a set of computer-generated models that map a physical object into a virtual space. Both physical and virtual elements exchange information to monitor, simulate, predict, diagnose and control the state and behavior of the physical object within the [...] Read more.
A Digital Twin (DT) is a set of computer-generated models that map a physical object into a virtual space. Both physical and virtual elements exchange information to monitor, simulate, predict, diagnose and control the state and behavior of the physical object within the virtual space. DTs supply a system with information and operating status, providing capabilities to create new business models. In this paper, we focus on the construction of DTs. More specifically, we focus on determining (methodologically) how to design, create and connect physical objects with their virtual counterpart. We explore the problem into several phases: from functional requirement selection and architecture planning to integration and verification of the final (digital) models. We address as well how physical components exchange real-time information with DTs, as well as experimental platforms to build DTs (including protocols and standards). We conclude with a discussion and open challenges. Full article
(This article belongs to the Special Issue Cyber-Physical Systems and Industry 4.0)
Show Figures

Figure 1

Review

Jump to: Research

41 pages, 964 KiB  
Review
Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies
by Mary Nankya, Robin Chataut and Robert Akl
Sensors 2023, 23(21), 8840; https://doi.org/10.3390/s23218840 - 30 Oct 2023
Cited by 2 | Viewed by 4636
Abstract
Industrial Control Systems (ICS), which include Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and Programmable Logic Controllers (PLC), play a crucial role in managing and regulating industrial processes. However, ensuring the security of these systems is of utmost importance [...] Read more.
Industrial Control Systems (ICS), which include Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and Programmable Logic Controllers (PLC), play a crucial role in managing and regulating industrial processes. However, ensuring the security of these systems is of utmost importance due to the potentially severe consequences of cyber attacks. This article presents an overview of ICS security, covering its components, protocols, industrial applications, and performance aspects. It also highlights the typical threats and vulnerabilities faced by these systems. Moreover, the article identifies key factors that influence the design decisions concerning control, communication, reliability, and redundancy properties of ICS, as these are critical in determining the security needs of the system. The article outlines existing security countermeasures, including network segmentation, access control, patch management, and security monitoring. Furthermore, the article explores the integration of machine learning techniques to enhance the cybersecurity of ICS. Machine learning offers several advantages, such as anomaly detection, threat intelligence analysis, and predictive maintenance. However, combining machine learning with other security measures is essential to establish a comprehensive defense strategy for ICS. The article also addresses the challenges associated with existing measures and provides recommendations for improving ICS security. This paper becomes a valuable reference for researchers aiming to make meaningful contributions within the constantly evolving ICS domain by providing an in-depth examination of the present state, challenges, and potential future advancements. Full article
(This article belongs to the Special Issue Cyber-Physical Systems and Industry 4.0)
Show Figures

Figure 1

28 pages, 2926 KiB  
Review
Intelligent Warehouse in Industry 4.0—Systematic Literature Review
by Agnieszka A. Tubis and Juni Rohman
Sensors 2023, 23(8), 4105; https://doi.org/10.3390/s23084105 - 19 Apr 2023
Cited by 8 | Viewed by 8239
Abstract
The development of Industry 4.0 (I4.0) and the digitization and automation of manufacturing processes have created a demand for designing smart warehouses to support manufacturing processes. Warehousing is one of the fundamental processes in the supply chain, and is responsible for handling inventory. [...] Read more.
The development of Industry 4.0 (I4.0) and the digitization and automation of manufacturing processes have created a demand for designing smart warehouses to support manufacturing processes. Warehousing is one of the fundamental processes in the supply chain, and is responsible for handling inventory. Efficient execution of warehouse operations often determines the effectiveness of realized goods flows. Therefore, digitization and its use in exchanging information between partners, especially real-time inventory levels, is critical. For this reason, the digital solutions of Industry 4.0 have quickly found application in internal logistics processes and enabled the design of smart warehouses, also known as Warehouse 4.0. The purpose of this article is to present the results of the conducted review of publications on the design and operation of warehouses using the concepts of Industry 4.0. A total of 249 documents from the last 5 years were accepted for analysis. Publications were searched for in the Web of Science database using the PRISMA method. The article presents in detail the research methodology and the results of the biometric analysis. Based on the results, a two-level classification framework was proposed, which includes 10 primary categories and 24 subcategories. Each of the distinguished categories was characterized based on the analyzed publications. It should be noted that in most of these studies, the authors’ attention primarily focused on the implementation of (1) Industry 4.0 technological solutions, such as IoT, augmented reality, RFID, visual technology, and other emerging technologies; and (2) autonomous and automated vehicles in warehouse operations processes. Critical analysis of the literature also allowed us to identify the current research gaps, which will be the subject of further research by the authors. Full article
(This article belongs to the Special Issue Cyber-Physical Systems and Industry 4.0)
Show Figures

Figure 1

18 pages, 1812 KiB  
Review
Ethical Dilemmas and Privacy Issues in Emerging Technologies: A Review
by Lubna Luxmi Dhirani, Noorain Mukhtiar, Bhawani Shankar Chowdhry and Thomas Newe
Sensors 2023, 23(3), 1151; https://doi.org/10.3390/s23031151 - 19 Jan 2023
Cited by 31 | Viewed by 68107
Abstract
Industry 5.0 is projected to be an exemplary improvement in digital transformation allowing for mass customization and production efficiencies using emerging technologies such as universal machines, autonomous and self-driving robots, self-healing networks, cloud data analytics, etc., to supersede the limitations of Industry 4.0. [...] Read more.
Industry 5.0 is projected to be an exemplary improvement in digital transformation allowing for mass customization and production efficiencies using emerging technologies such as universal machines, autonomous and self-driving robots, self-healing networks, cloud data analytics, etc., to supersede the limitations of Industry 4.0. To successfully pave the way for acceptance of these technologies, we must be bound and adhere to ethical and regulatory standards. Presently, with ethical standards still under development, and each region following a different set of standards and policies, the complexity of being compliant increases. Having vague and inconsistent ethical guidelines leaves potential gray areas leading to privacy, ethical, and data breaches that must be resolved. This paper examines the ethical dimensions and dilemmas associated with emerging technologies and provides potential methods to mitigate their legal/regulatory issues. Full article
(This article belongs to the Special Issue Cyber-Physical Systems and Industry 4.0)
Show Figures

Figure 1

Back to TopTop