cyber-physical systems jeannette m. wing assistant director computer and information science and...
TRANSCRIPT
Cyber-Physical Systems
Jeannette M. WingAssistant Director
Computer and Information Science and Engineering DirectorateNational Science Foundation
Cyber-Physical Systems Security WorkshopNewark, NJ
July 22, 2009
and Making them Trustworthy!
2Cyber Physical Systems Security Jeannette M. Wing
Smart Cars
Cars drive themselves
A BMW is “now actually a network of computers.”
[R. Achatz, Seimens, Economist Oct 11, 2007]
Lampson’s Grand Challenge:
Reduce highway traffic deaths to zero.
[Butler Lampson, Getting Computers to Understand, Microsoft, J. ACM 50, 1 (Jan. 2003), pp 70-72.]
Smart parking
Credit: PaulStamatiou.com
3Cyber Physical Systems Security Jeannette M. Wing
Smart Fliers
An airplane is a network of computers.
smart helicopters
smart insects
Credit: Boeing
Credit: Harvard university
Credit: NASA/JPL
4Cyber Physical Systems Security Jeannette M. Wing4IBM Research Jeannette M. Wing
Embedded Medical Devices
infusion pump
pacemaker
scanner
Credit: Baxter International
Credit: Siemens AG
5Cyber Physical Systems Security Jeannette M. Wing5IBM Research Jeannette M. Wing
Sensors Everywhere
Sonoma Redwood Forest smart buildings
smart bridges
Credit: MO Dept. of Transportation
Credit: Arthur Sanderson at RPI
Hudson River Valley
6Cyber Physical Systems Security Jeannette M. Wing
Robots Everywhere
At work: Two ASIMOs working together in coordination to deliver refreshments
Credit: Honda
At home: Paro, therapeutic robotic sealCredit: Paro Robots U.S., Inc.
At home/clinics: Nursebot, robotic assistance for the elderly
Credit: Carnegie Mellon University
At home: iRobot Roomba vacuums your house
7Cyber Physical Systems Security Jeannette M. Wing7IBM Research Jeannette M. Wing
Assistive Technologies for Everyone
brain-computer interfaces of today
memex of tomorrow
Credit: Dobelle Institute
Credit: Emotiv
Credit: Paramount Pictures
8Cyber Physical Systems Security Jeannette M. Wing
What is Common to These Systems?
• They have a computational core that interacts with the physical world.
• Cyber-physical systems are engineered systems that require tight conjoining of and coordination between the computational (discrete) and the physical (continuous).
• Trends for the future– Cyber-physical systems will be smarter and smarter.– More and more intelligence will be in software.
9Cyber Physical Systems Security Jeannette M. Wing
CSTB National Academies StudySoftware for Dependable Systems: Sufficient Evidence?Daniel Jackson, Martyn Thomas, and Lynette I. Millett, EditorsMay 9, 2007
10Cyber Physical Systems Security Jeannette M. Wing
U.S Broader Research Agenda and PrioritiesDan Reed and George Scalise, editorsAugust 2007
11Cyber Physical Systems Security Jeannette M. Wing
U.S Broader Research Agenda and Priorities
#1 Priority: Cyber-Physical Systems Our lives depend on them.
Dan Reed and George Scalise, editorsAugust 2007
12Cyber Physical Systems Security Jeannette M. Wing
Cyber Security Trustworthy Computing
• Security• Reliability• Privacy• Usability
In what follows for CPS Research Challenges,I will interleave these aspects of Trustworthy Computing
Trustworthiness from the BEGINNING.
Say “NO” to bolt-on security!
13Cyber Physical Systems Security Jeannette M. Wing
Trustworthiness from the Begin
14Cyber Physical Systems Security Jeannette M. Wing
Drivers of Computing
Science Technology
Society
15Cyber Physical Systems Security Jeannette M. Wing
Societal Challenges• How can we provide people and society with cyber-
physical systems they can bet their lives on?– Expectations: 24/7 availability, 100% reliability, 100% connectivity, instantaneous response, store anything and everything forever, unintrusive, predictable (or unsurprising), ...– Classes: young to old, able and disabled, rich and poor, literate and illiterate, …
– Numbers: individual cliques acquaintances social networks cultures populations
– Trustworthiness: reliability, reliability, reliability; privacy, privacy, privacy; usability, usability, usability!
16Cyber Physical Systems Security Jeannette M. Wing
Technical Challenges
• How can we build intelligent and safe digital systems that interact with the physical world?
– Perception, control, and coordination: continuous and ubiquitous– Self-monitoring, real-time learning and adapting
• Beyond current technology– Computing side
• There are limits to digitizing the continuous world by abstractions• Computing abstractions currently focus primarily on functionality, and secondarily
on aspects of the physical world (e.g., time, space, energy, temperature, human behavior)
• Compositional reasoning may be impossible
– Engineering side• Cautiously over-designed systems preclude flexibility offered by computing’s
power, especially the intelligence embodied in software.– Bridging the two worlds
• Need for smart sensors, transponders, actuators, likely in new form factors• E.g., tracking people may require new “camera” technologies
especially for security (a global property), …
security and reliability
privacy and usability
17Cyber Physical Systems Security Jeannette M. Wing
Scientific Challenges• Co-existence of Booleans and Reals
– Discrete systems in a continuous world– Need for new models (new mathematics?) or extensions of
existing continuous and/or hybrid ones
• Reasoning about uncertainty– Human, Mother Nature, the Adversary
• Understanding complex, unpredictable systems– Emergent behavior, tipping points, disruptive events…– Chaos theory, randomness, ...
securityprivacy and usability reliability
Communities Needed to Meet These Challenges
19Cyber Physical Systems Security Jeannette M. Wing
Disciplines and Sectors
• Academic Disciplines– Civil engineering– Control systems– Electrical engineering– Embedded systems– Formal methods– Human-computer interaction– Hybrid systems– Mathematics– Mechanical engineering– Networking– Operations research– Probability and statistics– Real-time systems– Robotics– Security and privacy– Social sciences– Software engineering– Systems engineering– Usability– …
• Industrial Sectors– Aeronautics– Automotive– Buildings– Consumer/Home – Energy– Finance– Medical– Physical infrastructure– Power– Telecommunications– …
20Cyber Physical Systems Security Jeannette M. Wing
Partnerships
• Theoreticians, experimentalists, domain experts
• Computer scientists, engineers (of all types)
• Industry, Academia, Government– domain experts, domain problems– general solutions that work for specific problems
21Cyber Physical Systems Security Jeannette M. Wing
A (Flower) Model for Expediting Progress
FundamentalResearch
auto
finance
civil
aero
medical
chemical materials
energy
IndustryGov’t (e.g., military)
IndustryGov’tAcademia
AcademiaGov’t (NSF, NSA, NIH, DoD, …)
transportation
Sectors
22Cyber Physical Systems Security Jeannette M. Wing
NSF Cyber-Physical Systems Program
• CISE and ENG, $30M FY09– All three divisions in CISE are participating– CISE PDs: Michael Branicky, Helen Gill, Paul Oh, Lenore Zuck– ENG PD: Scott Midkiff– http://www.nsf.gov/funding/pgm_summ.jsp?pims_id=503286&o
rg=CISE• Deadline: February 27, 2009• Small, medium, large
• Unique: CPS-Virtual Organization– My dream is that CPS-VO will help realize my Flower Model!
23Cyber Physical Systems Security Jeannette M. Wing
What the EU is Spending on CPS
• Advanced Research and Technology for Embedded Intelligent Systems (ARTEMIS) [Cyber-Physical Systems]
• Annual budget of € 243 M ($325M), includes €144M in private funds
• 10-yr budget €1.1B public funds, €1.6B private funds
• Part of European Community Framework 7• One of four ICT calls for proposals for 7-year projects
24Cyber Physical Systems Security Jeannette M. Wing
NSF/CISE Trustworthy Computing Program
• Covers all aspects of trustworthiness– Foundations: crypto, quantum, algorithms, models, logics,
languages, software– Systems: architecture, O/S, devices, I/O, networking, sensors,
testbeds– Information: data– People: privacy, usability
• CNCI FY09 foci: foundations of trustworthiness, privacy, usablity
• FY09 investment $65M, including $20M ARRA• Program cuts across entire directorate
– PDs: Amy Baylor, Richard Beigel, Karl Levitt, Sylvia Spengler, Lenore Zuck
Thank you!
26Cyber Physical Systems Security Jeannette M. Wing
Credits
• Copyrighted material used under Fair Use. If you are the copyright holder and believe your material has been used unfairly, or if you have any suggestions, feedback, or support, please contact: [email protected]
• Except where otherwise indicated, permission is granted to copy, distribute, and/or modify all images in this document under the terms of the GNU Free Documentation license, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled “GNU Free Documentation license” (http://commons.wikimedia.org/wiki/Commons:GNU_Free_Documentation_License)
• The inclusion of a logo does not express or imply the endorsement by NSF of the entities' products, services or enterprises