Cyber-Physical Systems: Imminent Challenges

A German project is presented which was initiated in order to analyse the potential and risks associated with Cyber-Physical Systems. These have been recognised as the next wave of innovation in information and communication technology. Cyber-Physical Systems are herein understood in a very broad sense as the integration of embedded systems with global networks such as the Internet. The survey aims at deepening understanding the impact of those systems at technological and economical level as well as at political and sociological level. The goal of the study is to collect arguments for decision makers both in business and politics to take actions in research, legislation and business development.

[1]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[2]  Richard Fikes,et al.  STRIPS: A New Approach to the Application of Theorem Proving to Problem Solving , 1971, IJCAI.

[3]  C. Marchetti,et al.  Society as a Learning System : Discovery, Invention, and Innovation Cycles Revisited : Technological Forecasting and Social Change , 1980 .

[4]  B. Latour Science in action : how to follow scientists and engineers through society , 1989 .

[5]  A. Kleinknecht Are There Schumpeterian Waves of Innovations , 1990 .

[6]  Peter Norvig,et al.  Artificial Intelligence: A Modern Approach , 1995 .

[7]  Nancy G. Leveson,et al.  Safeware: System Safety and Computers , 1995 .

[8]  Jon Damon Reese,et al.  Analyzing Software Specifications for Mode Confusion Potential , 1998 .

[9]  Ian Sommerville,et al.  Requirements Engineering: Processes and Techniques , 1998 .

[10]  Michael A. Cusumano,et al.  Thinking Beyond Lean: How Multi Project Management is Transforming Product Development at Toyota and Other Companies , 1998 .

[11]  R. Bell,et al.  IEC 61508: functional safety of electrical/electronic/ programme electronic safety-related systems: overview , 1999 .

[12]  Stefan A. Brands,et al.  Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .

[13]  Gerhard Weiss,et al.  Multiagent systems: a modern approach to distributed artificial intelligence , 1999 .

[14]  B. Verspagen,et al.  Breaking the waves: a Poisson regression approach to Schumpeterian clustering of basic innovations. , 2000 .

[15]  Stefan Bussmann,et al.  Self-organizing manufacturing control: an industrial application of agent technology , 2000, Proceedings Fourth International Conference on MultiAgent Systems.

[16]  Michael Wooldridge,et al.  Introduction to multiagent systems , 2001 .

[17]  Andrew P. Sage,et al.  On the Systems Engineering and Management of Systems of Systems and Federations of Systems , 2001, Inf. Knowl. Syst. Manag..

[18]  Stefan Bussmann,et al.  Einführung der Agententechnologie in einem produzierenden Unternehmen — ein Erfahrungsbericht , 2001, Wirtsch..

[19]  Werner Rammert,et al.  Technik und Handeln - wenn soziales Handeln sich auf menschliches Verhalten und technische Artefakte verteilt , 2002 .

[20]  Lui Sha,et al.  Real-time communication and coordination in embedded sensor networks , 2003, Proc. IEEE.

[21]  Mica R. Endsley,et al.  Designing for Situation Awareness : An Approach to User-Centered Design , 2003 .

[22]  Fahiem Bacchus,et al.  Reasoning with Conditional Plans in the Presence of Incomplete Knowledge , 2003 .

[23]  Werner Rammert Technik in Aktion: verteiltes Handeln in soziotechnischen Konstellationen. , 2003 .

[24]  M. Hönig Total vernetzt - Szenarien einer informatisierten Welt , 2003 .

[25]  Martin J. Osborne,et al.  An Introduction to Game Theory , 2003 .

[26]  Siani Pearson,et al.  Towards accountable management of identity and privacy: sticky policies and enforceable tracing services , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..

[27]  Yannis Kalfoglou,et al.  Ontology mapping: the state of the art , 2003, The Knowledge Engineering Review.

[28]  M. Kettner,et al.  Vernetzt gespalten: Der Digital Divide in ethischer Perspektive , 2004 .

[29]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[30]  Klaus Pohl,et al.  Software Product Line Engineering , 2005 .

[31]  Thomas Malsch,et al.  Socionics - Scalability of Complex Social Systems , 2005, Socionics.

[32]  Klaus Pohl,et al.  Software Product Line Engineering - Foundations, Principles, and Techniques , 2005 .

[33]  Vincent Hilaire,et al.  Applications of Self-Organising Multi-Agent Systems: An Initial Framework for Comparison , 2006, Informatica.

[34]  Christopher G Chute,et al.  National Center for Biomedical Ontology: advancing biomedicine through structured organization of scientific knowledge. , 2006, Omics : a journal of integrative biology.

[35]  Johannes Weyer Die Zukunft des Autos - das Auto der Zukunft: Wird der Computer den Menschen ersetzen? , 2006 .

[36]  László Monostori,et al.  Agent-based systems for manufacturing , 2006 .

[37]  Christopher W. Geib,et al.  Object Action Complexes as an Interface for Planning and Robot Control , 2006 .

[38]  Mike Bond,et al.  Cryptographic Processors-A Survey , 2006, Proceedings of the IEEE.

[39]  R. Garside,et al.  Integrating modular avionics: A new role emerges , 2007, IEEE Aerospace and Electronic Systems Magazine.

[40]  Ulrich Dolata,et al.  Gesellschaft und die Macht der Technik: Sozioökonomischer und institutioneller Wandel durch Technisierung , 2007 .

[41]  Peter Schaar Das Ende der Privatsphäre - Der Weg in die Überwachungsgesellschaft , 2007 .

[42]  Bianca Scholten,et al.  The Hitchhiker's Guide to Manufacturing Operations Management: ISA-95 Best Practices Book 1.0 , 2007 .

[43]  Nasser M. Nasrabadi,et al.  Pattern Recognition and Machine Learning , 2006, Technometrics.

[44]  Manfred Broy,et al.  Ein Requirements-Engineering-Referenzmodell , 2007, Informatik-Spektrum.

[45]  Bernhard Schätz,et al.  Modellbasierte Anforderungsanalyse mit AutoRAID , 2007, Informatik - Forschung und Entwicklung.

[46]  Thomas Malsch,et al.  Socionics: Sociological Concepts for Social Systems of Artificial (and Human) Agents , 2007, J. Artif. Soc. Soc. Simul..

[47]  Eva Geisberger,et al.  Requirements Engineering Reference Model (REM) , 2007, Softwaretechnik-Trends.

[48]  Jan M. Rabaey A brand new wireless day , 2008, 2008 Asia and South Pacific Design Automation Conference.

[49]  Kranthimanoj Nagothu,et al.  Applications and prototype for system of systems swarm robotics , 2008, 2008 IEEE International Conference on Systems, Man and Cybernetics.

[50]  Dietmar Pfahl,et al.  Making Globally Distributed Software Development a Success Story, International Conference on Software Process, ICSP 2008, Leipzig, Germany, May 10-11, 2008, Proceedings , 2008, ICSP.

[51]  Juan Li,et al.  Requirement-Centric Traceability for Change Impact Analysis: A Case Study , 2008, ICSP.

[52]  Andreas Pfitzmann,et al.  Datenschutz-Schutzziele — revisited , 2009, Datenschutz und Datensicherheit - DuD.

[53]  Didar Zowghi,et al.  Towards a Classification of Requirements Relationships , 2009, SEKE.

[54]  John A. Stankovic,et al.  Security of Distributed, Ubiquitous, and Embedded Computing Platforms , 2009 .

[55]  Matthias Damm,et al.  OPC Unified Architecture , 2009, Autom..

[56]  K. Beetz,et al.  Nationale Roadmap Embedded Systems , 2010 .

[57]  Zhendong Ma,et al.  Privacy in inter-vehicular networks: Why simple pseudonym change is not enough , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).

[58]  Christian Thiel,et al.  Multiple Classifier Systems Incorporating Uncertainty , 2011 .

[59]  Peter Schaar,et al.  Privacy by Design , 2010 .

[60]  Michael Weber,et al.  Towards Territorial Privacy in Smart Environments , 2010, AAAI Spring Symposium: Intelligent Information Privacy Management.

[61]  Olaf Sauer,et al.  Interoperabilität von Manufacturing Execution Systems (MES) , 2011, Autom..

[62]  Fariba Sadri,et al.  Logic-Based Approaches to Intention Recognition , 2011 .

[63]  Wolfgang Mahnke,et al.  OPC Unified Architecture , 2009, Autom..

[64]  G. Schuh,et al.  Integrative Produktionstechnik für Hochlohnländer , 2011 .

[65]  Margaret Martonosi,et al.  SignalGuru: leveraging mobile phones for collaborative traffic signal schedule advisory , 2011, MobiSys '11.

[66]  Jun-Da Huang Kinerehab: a kinect-based system for physical rehabilitation: a pilot study for young adults with motor disabilities , 2011, ASSETS '11.

[67]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[68]  Marjorie Skubic,et al.  Evaluation of an inexpensive depth camera for passive in-home fall risk assessment , 2011, 2011 5th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops.

[69]  Martin Rost,et al.  Privacy By Design und die Neuen Schutzziele , 2011, Datenschutz und Datensicherheit - DuD.

[70]  Wolfgang Wahlster,et al.  Internet der Dienste , 2011 .

[71]  Kai Rannenberg,et al.  Privacy and Identity Management for Life , 2011, Privacy and Identity Management for Life.

[72]  Marit Hansen,et al.  Cyber-Physical Systems und Privatsphärenschutz , 2012, Datenschutz und Datensicherheit - DuD.

[73]  Michael A. Cusumano,et al.  Staying power : six enduring principles for managing strategy and innovation in an uncertain world (lessons from Microsoft, Apple, Intel, Google, Toyota and more) , 2012 .