Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,858)

Search Parameters:
Keywords = Cyber Physical Systems

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 4545 KiB  
Article
A Multi-Purpose Simulation Layer for Digital Twin Applications in Mechatronic Systems
by Chiara Nezzi, Matteo De Marchi, Renato Vidoni and Erwin Rauch
Machines 2025, 13(8), 671; https://doi.org/10.3390/machines13080671 (registering DOI) - 1 Aug 2025
Abstract
The rising complexity of industrial systems following the Industry 4.0 era involves new challenges and the need for innovative solutions. In the context of arising digital technologies, Digital Twins represent a holistic solution to overcome heterogeneity and to achieve remote and dynamic control [...] Read more.
The rising complexity of industrial systems following the Industry 4.0 era involves new challenges and the need for innovative solutions. In the context of arising digital technologies, Digital Twins represent a holistic solution to overcome heterogeneity and to achieve remote and dynamic control of cyber–physical systems. In common reference architectures, decision-making modules are usually integrated for system and process optimization. This work aims at introducing the adoption of a multi-purpose simulation module in a Digital Twin environment, with the objective of proving its versatility for different scopes. This is implemented in a relevant laboratory environment, strongly employed for the test and validation of mechatronic solutions. The paper starts from revising the common techniques adopted for decision-making modules in Digital Twin frameworks, proposing then a multi-purpose approach based on physics simulation. Performance profiling of the simulation environment demonstrates the potential of real-time-capable simulation while also revealing challenges related to computational load and communication latency. The outcome of this work is to provide the reader with an exemplary modular arrangement for the integration of such module in Digital Twin applications, highlighting challenges and limitations related to computational effort and communication. Full article
(This article belongs to the Special Issue Digital Twins in Smart Manufacturing)
Show Figures

Figure 1

36 pages, 5053 KiB  
Systematic Review
Prescriptive Maintenance: A Systematic Literature Review and Exploratory Meta-Synthesis
by Marko Orošnjak, Felix Saretzky and Slawomir Kedziora
Appl. Sci. 2025, 15(15), 8507; https://doi.org/10.3390/app15158507 (registering DOI) - 31 Jul 2025
Abstract
Prescriptive Maintenance (PsM) transforms industrial asset management by enabling autonomous decisions through simultaneous failure anticipation and optimal maintenance recommendations. Yet, despite increasing research interest, the conceptual clarity, technological maturity, and practical deployment of PsM remains fragmented. Here, we conduct a comprehensive and application-oriented [...] Read more.
Prescriptive Maintenance (PsM) transforms industrial asset management by enabling autonomous decisions through simultaneous failure anticipation and optimal maintenance recommendations. Yet, despite increasing research interest, the conceptual clarity, technological maturity, and practical deployment of PsM remains fragmented. Here, we conduct a comprehensive and application-oriented Systematic Literature Review of studies published between 2013–2024. We identify key enablers—artificial intelligence and machine learning, horizontal and vertical integration, and deep reinforcement learning—that map the functional space of PsM across industrial sectors. The results from our multivariate meta-synthesis uncover three main thematic research clusters, ranging from decision-automation of technical (multi)component-level systems to strategic and organisational-support strategies. Notably, while predictive models are widely adopted, the translation of these capabilities to PsM remains limited. Primary reasons include semantic interoperability, real-time optimisation, and deployment scalability. As a response, a structured research agenda is proposed to emphasise hybrid architectures, context-aware prescription mechanisms, and alignment with Industry 5.0 principles of human-centricity, resilience, and sustainability. The review establishes a critical foundation for future advances in intelligent, explainable, and action-oriented maintenance systems. Full article
Show Figures

Figure 1

26 pages, 5549 KiB  
Article
Intrusion Detection and Real-Time Adaptive Security in Medical IoT Using a Cyber-Physical System Design
by Faeiz Alserhani
Sensors 2025, 25(15), 4720; https://doi.org/10.3390/s25154720 (registering DOI) - 31 Jul 2025
Abstract
The increasing reliance on Medical Internet of Things (MIoT) devices introduces critical cybersecurity vulnerabilities, necessitating advanced, adaptive defense mechanisms. Recent cyber incidents—such as compromised critical care systems, modified therapeutic device outputs, and fraudulent clinical data inputs—demonstrate that these threats now directly impact life-critical [...] Read more.
The increasing reliance on Medical Internet of Things (MIoT) devices introduces critical cybersecurity vulnerabilities, necessitating advanced, adaptive defense mechanisms. Recent cyber incidents—such as compromised critical care systems, modified therapeutic device outputs, and fraudulent clinical data inputs—demonstrate that these threats now directly impact life-critical aspects of patient security. In this paper, we introduce a machine learning-enabled Cognitive Cyber-Physical System (ML-CCPS), which is designed to identify and respond to cyber threats in MIoT environments through a layered cognitive architecture. The system is constructed on a feedback-looped architecture integrating hybrid feature modeling, physical behavioral analysis, and Extreme Learning Machine (ELM)-based classification to provide adaptive access control, continuous monitoring, and reliable intrusion detection. ML-CCPS is capable of outperforming benchmark classifiers with an acceptable computational cost, as evidenced by its macro F1-score of 97.8% and an AUC of 99.1% when evaluated with the ToN-IoT dataset. Alongside classification accuracy, the framework has demonstrated reliable behaviour under noisy telemetry, maintained strong efficiency in resource-constrained settings, and scaled effectively with larger numbers of connected devices. Comparative evaluations, radar-style synthesis, and ablation studies further validate its effectiveness in real-time MIoT environments and its ability to detect novel attack types with high reliability. Full article
Show Figures

Figure 1

16 pages, 2174 KiB  
Article
TwinFedPot: Honeypot Intelligence Distillation into Digital Twin for Persistent Smart Traffic Security
by Yesin Sahraoui, Abdessalam Mohammed Hadjkouider, Chaker Abdelaziz Kerrache and Carlos T. Calafate
Sensors 2025, 25(15), 4725; https://doi.org/10.3390/s25154725 (registering DOI) - 31 Jul 2025
Abstract
The integration of digital twins (DTs) with intelligent traffic systems (ITSs) holds strong potential for improving real-time management in smart cities. However, securing digital twins remains a significant challenge due to the dynamic and adversarial nature of cyber–physical environments. In this work, we [...] Read more.
The integration of digital twins (DTs) with intelligent traffic systems (ITSs) holds strong potential for improving real-time management in smart cities. However, securing digital twins remains a significant challenge due to the dynamic and adversarial nature of cyber–physical environments. In this work, we propose TwinFedPot, an innovative digital twin-based security architecture that combines honeypot-driven data collection with Zero-Shot Learning (ZSL) for robust and adaptive cyber threat detection without requiring prior sampling. The framework leverages Inverse Federated Distillation (IFD) to train the DT server, where edge-deployed honeypots generate semantic predictions of anomalous behavior and upload soft logits instead of raw data. Unlike conventional federated approaches, TwinFedPot reverses the typical knowledge flow by distilling collective intelligence from the honeypots into a central teacher model hosted on the DT. This inversion allows the system to learn generalized attack patterns using only limited data, while preserving privacy and enhancing robustness. Experimental results demonstrate significant improvements in accuracy and F1-score, establishing TwinFedPot as a scalable and effective defense solution for smart traffic infrastructures. Full article
Show Figures

Figure 1

18 pages, 4857 KiB  
Article
Fast Detection of FDI Attacks and State Estimation in Unmanned Surface Vessels Based on Dynamic Encryption
by Zheng Liu, Li Liu, Hongyong Yang, Zengfeng Wang, Guanlong Deng and Chunjie Zhou
J. Mar. Sci. Eng. 2025, 13(8), 1457; https://doi.org/10.3390/jmse13081457 - 30 Jul 2025
Viewed by 39
Abstract
Wireless sensor networks (WSNs) are used for data acquisition and transmission in unmanned surface vessels (USVs). However, the openness of wireless networks makes USVs highly susceptible to false data injection (FDI) attacks during data transmission, which affects the sensors’ ability to receive real [...] Read more.
Wireless sensor networks (WSNs) are used for data acquisition and transmission in unmanned surface vessels (USVs). However, the openness of wireless networks makes USVs highly susceptible to false data injection (FDI) attacks during data transmission, which affects the sensors’ ability to receive real data and leads to decision-making errors in the control center. In this paper, a novel dynamic data encryption method is proposed whereby data are encrypted prior to transmission and the key is dynamically updated using historical system data, with a view to increasing the difficulty for attackers to crack the ciphertext. At the same time, a dynamic relationship is established among ciphertext, key, and auxiliary encrypted ciphertext, and an attack detection scheme based on dynamic encryption is designed to realize instant detection and localization of FDI attacks. Further, an H fusion filter is designed to filter external interference noise, and the real information is estimated or restored by the weighted fusion algorithm. Ultimately, the validity of the proposed scheme is confirmed through simulation experiments. Full article
(This article belongs to the Special Issue Control and Optimization of Ship Propulsion System)
Show Figures

Figure 1

10 pages, 1357 KiB  
Article
Design of Balanced Wide Gap No-Hit Zone Sequences with Optimal Auto-Correlation
by Duehee Lee, Seho Lee and Jin-Ho Chung
Mathematics 2025, 13(15), 2454; https://doi.org/10.3390/math13152454 - 30 Jul 2025
Viewed by 44
Abstract
Frequency-hopping multiple access is widely adopted to blunt narrow-band jamming and limit spectral disclosure in cyber–physical systems, yet its practical resilience depends on three sequence-level properties. First, balancedness guarantees that every carrier is occupied equally often, removing spectral peaks that a jammer or [...] Read more.
Frequency-hopping multiple access is widely adopted to blunt narrow-band jamming and limit spectral disclosure in cyber–physical systems, yet its practical resilience depends on three sequence-level properties. First, balancedness guarantees that every carrier is occupied equally often, removing spectral peaks that a jammer or energy detector could exploit. Second, a wide gap between successive hops forces any interferer to re-tune after corrupting at most one symbol, thereby containing error bursts. Third, a no-hit zone (NHZ) window with a zero pairwise Hamming correlation eliminates user collisions and self-interference when chip-level timing offsets fall inside the window. This work introduces an algebraic construction that meets the full set of requirements in a single framework. By threading a permutation over an integer ring and partitioning the period into congruent sub-blocks tied to the desired NHZ width, we generate balanced wide gap no-hit zone frequency-hopping (WG-NHZ FH) sequence sets. Analytical proofs show that (i) each sequence achieves the Lempel–Greenberger bound for auto-correlation, (ii) the family and zone sizes satisfy the Ye–Fan bound with equality, (iii) the hop-to-hop distance satisfies a provable WG condition, and (iv) balancedness holds exactly for every carrier frequency. Full article
Show Figures

Figure 1

10 pages, 1855 KiB  
Article
TCAD Design and Optimization of In0.20Ga0.80N/In0.35Ga0.65N Quantum-Dot Intermediate-Band Solar Cells
by Salaheddine Amezzoug, Haddou El Ghazi and Walid Belaid
Crystals 2025, 15(8), 693; https://doi.org/10.3390/cryst15080693 - 30 Jul 2025
Viewed by 130
Abstract
Intermediate-band photovoltaics promise single-junction efficiencies that exceed the Shockley and Queisser limit, yet viable material platforms and device geometries remain under debate. Here, we perform comprehensive two-dimensional device-scale simulations using Silvaco Atlas TCAD to analyze p-i-n In0.20Ga0.80N solar cells [...] Read more.
Intermediate-band photovoltaics promise single-junction efficiencies that exceed the Shockley and Queisser limit, yet viable material platforms and device geometries remain under debate. Here, we perform comprehensive two-dimensional device-scale simulations using Silvaco Atlas TCAD to analyze p-i-n In0.20Ga0.80N solar cells in which the intermediate band is supplied by In0.35Ga0.65N quantum dots located inside the intrinsic layer. Quantum-dot diameters from 1 nm to 10 nm and areal densities up to 116 dots per period are evaluated under AM 1.5G, one-sun illumination at 300 K. The baseline pn junction achieves a simulated power-conversion efficiency of 33.9%. The incorporation of a single 1 nm quantum-dot layer dramatically increases efficiency to 48.1%, driven by a 35% enhancement in short-circuit current density while maintaining open-circuit voltage stability. Further increases in dot density continue to boost current but with diminishing benefit; the highest efficiency recorded, 49.4% at 116 dots, is only 1.4 percentage points above the 40-dot configuration. The improvements originate from two-step sub-band-gap absorption mediated by the quantum dots and from enhanced carrier collection in a widened depletion region. These results define a practical design window centred on approximately 1 nm dots and about 40 dots per period, balancing substantial efficiency gains with manageable structural complexity and providing concrete targets for epitaxial implementation. Full article
(This article belongs to the Section Materials for Energy Applications)
Show Figures

Figure 1

42 pages, 1300 KiB  
Article
A Hybrid Human-AI Model for Enhanced Automated Vulnerability Scoring in Modern Vehicle Sensor Systems
by Mohamed Sayed Farghaly, Heba Kamal Aslan and Islam Tharwat Abdel Halim
Future Internet 2025, 17(8), 339; https://doi.org/10.3390/fi17080339 - 28 Jul 2025
Viewed by 116
Abstract
Modern vehicles are rapidly transforming into interconnected cyber–physical systems that rely on advanced sensor technologies and pervasive connectivity to support autonomous functionality. Yet, despite this evolution, standardized methods for quantifying cybersecurity vulnerabilities across critical automotive components remain scarce. This paper introduces a novel [...] Read more.
Modern vehicles are rapidly transforming into interconnected cyber–physical systems that rely on advanced sensor technologies and pervasive connectivity to support autonomous functionality. Yet, despite this evolution, standardized methods for quantifying cybersecurity vulnerabilities across critical automotive components remain scarce. This paper introduces a novel hybrid model that integrates expert-driven insights with generative AI tools to adapt and extend the Common Vulnerability Scoring System (CVSS) specifically for autonomous vehicle sensor systems. Following a three-phase methodology, the study conducted a systematic review of 16 peer-reviewed sources (2018–2024), applied CVSS version 4.0 scoring to 15 representative attack types, and evaluated four free source generative AI models—ChatGPT, DeepSeek, Gemini, and Copilot—on a dataset of 117 annotated automotive-related vulnerabilities. Expert validation from 10 domain professionals reveals that Light Detection and Ranging (LiDAR) sensors are the most vulnerable (9 distinct attack types), followed by Radio Detection And Ranging (radar) (8) and ultrasonic (6). Network-based attacks dominate (104 of 117 cases), with 92.3% of the dataset exhibiting low attack complexity and 82.9% requiring no user interaction. The most severe attack vectors, as scored by experts using CVSS, include eavesdropping (7.19), Sybil attacks (6.76), and replay attacks (6.35). Evaluation of large language models (LLMs) showed that DeepSeek achieved an F1 score of 99.07% on network-based attacks, while all models struggled with minority classes such as high complexity (e.g., ChatGPT F1 = 0%, Gemini F1 = 15.38%). The findings highlight the potential of integrating expert insight with AI efficiency to deliver more scalable and accurate vulnerability assessments for modern vehicular systems.This study offers actionable insights for vehicle manufacturers and cybersecurity practitioners, aiming to inform strategic efforts to fortify sensor integrity, optimize network resilience, and ultimately enhance the cybersecurity posture of next-generation autonomous vehicles. Full article
Show Figures

Figure 1

25 pages, 1343 KiB  
Article
Low-Latency Edge-Enabled Digital Twin System for Multi-Robot Collision Avoidance and Remote Control
by Daniel Poul Mtowe, Lika Long and Dong Min Kim
Sensors 2025, 25(15), 4666; https://doi.org/10.3390/s25154666 - 28 Jul 2025
Viewed by 182
Abstract
This paper proposes a low-latency and scalable architecture for Edge-Enabled Digital Twin networked control systems (E-DTNCS) aimed at multi-robot collision avoidance and remote control in dynamic and latency-sensitive environments. Traditional approaches, which rely on centralized cloud processing or direct sensor-to-controller communication, are inherently [...] Read more.
This paper proposes a low-latency and scalable architecture for Edge-Enabled Digital Twin networked control systems (E-DTNCS) aimed at multi-robot collision avoidance and remote control in dynamic and latency-sensitive environments. Traditional approaches, which rely on centralized cloud processing or direct sensor-to-controller communication, are inherently limited by excessive network latency, bandwidth bottlenecks, and a lack of predictive decision-making, thus constraining their effectiveness in real-time multi-agent systems. To overcome these limitations, we propose a novel framework that seamlessly integrates edge computing with digital twin (DT) technology. By performing localized preprocessing at the edge, the system extracts semantically rich features from raw sensor data streams, reducing the transmission overhead of the original data. This shift from raw data to feature-based communication significantly alleviates network congestion and enhances system responsiveness. The DT layer leverages these extracted features to maintain high-fidelity synchronization with physical robots and to execute predictive models for proactive collision avoidance. To empirically validate the framework, a real-world testbed was developed, and extensive experiments were conducted with multiple mobile robots. The results revealed a substantial reduction in collision rates when DT was deployed, and further improvements were observed with E-DTNCS integration due to significantly reduced latency. These findings confirm the system’s enhanced responsiveness and its effectiveness in handling real-time control tasks. The proposed framework demonstrates the potential of combining edge intelligence with DT-driven control in advancing the reliability, scalability, and real-time performance of multi-robot systems for industrial automation and mission-critical cyber-physical applications. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

18 pages, 16988 KiB  
Article
Deploying Virtual Quality Gates in a Pilot-Scale Lithium-Ion Battery Assembly Line
by Xukuan Xu, Simon Stier, Andreas Gronbach and Michael Moeckel
Batteries 2025, 11(8), 285; https://doi.org/10.3390/batteries11080285 - 25 Jul 2025
Viewed by 221
Abstract
Pilot production is a critical transitional phase in the process of new product development or manufacturing, aiming at ensuring that products are thoroughly validated and optimized before entering full-scale production. During this stage, a key challenge is how to leverage limited resources to [...] Read more.
Pilot production is a critical transitional phase in the process of new product development or manufacturing, aiming at ensuring that products are thoroughly validated and optimized before entering full-scale production. During this stage, a key challenge is how to leverage limited resources to build data infrastructure and conduct data analysis to establish and verify quality control. This paper presents the implementation of a cyber–physical system (CPS) for a lithium battery pilot assembly line. A machine learning-based predictive model was employed to establish quality control mechanisms. Process knowledge-guided data analysis was utilized to build a quality prediction model based on the collected battery data. The model-centric concept of ‘virtual quality’ enables early quality judgment during production, which allows for flexible quality control and the determination of optimal process parameters, thereby reducing production costs and minimizing energy consumption during manufacturing. Full article
(This article belongs to the Section Battery Processing, Manufacturing and Recycling)
Show Figures

Figure 1

21 pages, 454 KiB  
Article
Modelling Cascading Failure in Complex CPSS to Inform Resilient Mission Assurance: An Intelligent Transport System Case Study
by Theresa Sobb and Benjamin Turnbull
Entropy 2025, 27(8), 793; https://doi.org/10.3390/e27080793 - 25 Jul 2025
Viewed by 286
Abstract
Intelligent transport systems are revolutionising all aspects of modern life, increasing the efficiency of commerce, modern living, and international travel. Intelligent transport systems are systems of systems comprised of cyber, physical, and social nodes. They represent unique opportunities but also have potential threats [...] Read more.
Intelligent transport systems are revolutionising all aspects of modern life, increasing the efficiency of commerce, modern living, and international travel. Intelligent transport systems are systems of systems comprised of cyber, physical, and social nodes. They represent unique opportunities but also have potential threats to system operation and correctness. The emergent behaviour in Complex Cyber–Physical–Social Systems (C-CPSSs), caused by events such as cyber-attacks and network outages, have the potential to have devastating effects to critical services across society. It is therefore imperative that the risk of cascading failure is minimised through the fortifying of these systems of systems to achieve resilient mission assurance. This work designs and implements a programmatic model to validate the value of cascading failure simulation and analysis, which is then tested against a C-CPSS intelligent transport system scenario. Results from the model and its implementations highlight the value in identifying both critical nodes and percolation of consequences during a cyber failure, in addition to the importance of including social nodes in models for accurate simulation results. Understanding the relationships between cyber, physical, and social nodes is key to understanding systems’ failures that occur because of or that involve cyber systems, in order to achieve cyber and system resilience. Full article
Show Figures

Figure 1

27 pages, 8383 KiB  
Article
A Resilience Quantitative Assessment Framework for Cyber–Physical Systems: Mathematical Modeling and Simulation
by Zhigang Cao, Hantao Zhao, Yunfan Wang, Chuan He, Ding Zhou and Xiaopeng Han
Appl. Sci. 2025, 15(15), 8285; https://doi.org/10.3390/app15158285 - 25 Jul 2025
Viewed by 101
Abstract
As cyber threats continue to grow in complexity and persistence, resilience has become a critical requirement for cyber–physical systems (CPSs). Resilience quantitative assessment is essential for supporting secure system design and ensuring reliable operation. Although various methods have been proposed for evaluating CPS [...] Read more.
As cyber threats continue to grow in complexity and persistence, resilience has become a critical requirement for cyber–physical systems (CPSs). Resilience quantitative assessment is essential for supporting secure system design and ensuring reliable operation. Although various methods have been proposed for evaluating CPS resilience, major challenges remain in accurately modeling the interaction between cyber and physical domains and in providing structured guidance for resilience-oriented design. This study proposes an integrated CPS resilience assessment framework that combines cyber-layer anomaly modeling based on Markov chains with mathematical modeling of performance degradation and recovery in the physical domain. The framework establishes a structured evaluation process through parameter normalization and cyber–physical coupling, enabling the generation of resilience curves that clearly represent system performance changes under adverse conditions. A case study involving an industrial controller equipped with a diversity-redundancy architecture is conducted to demonstrate the applicability of the proposed method. Modeling and simulation results indicate that the framework effectively reveals key resilience characteristics and supports performance-informed design optimization. Full article
Show Figures

Figure 1

51 pages, 5654 KiB  
Review
Exploring the Role of Digital Twin and Industrial Metaverse Technologies in Enhancing Occupational Health and Safety in Manufacturing
by Arslan Zahid, Aniello Ferraro, Antonella Petrillo and Fabio De Felice
Appl. Sci. 2025, 15(15), 8268; https://doi.org/10.3390/app15158268 - 25 Jul 2025
Viewed by 323
Abstract
The evolution of Industry 4.0 and the emerging paradigm of Industry 5.0 have introduced disruptive technologies that are reshaping modern manufacturing environments. Among these, Digital Twin (DT) and Industrial Metaverse (IM) technologies are increasingly recognized for their potential to enhance Occupational Health and [...] Read more.
The evolution of Industry 4.0 and the emerging paradigm of Industry 5.0 have introduced disruptive technologies that are reshaping modern manufacturing environments. Among these, Digital Twin (DT) and Industrial Metaverse (IM) technologies are increasingly recognized for their potential to enhance Occupational Health and Safety (OHS). However, a comprehensive understanding of how these technologies integrate to support OHS in manufacturing remains limited. This study systematically explores the transformative role of DT and IM in creating immersive, intelligent, and human-centric safety ecosystems. Following the PRISMA guidelines, a Systematic Literature Review (SLR) of 75 peer-reviewed studies from the SCOPUS and Web of Science databases was conducted. The review identifies key enabling technologies such as Virtual Reality (VR), Augmented Reality (AR), Extended Reality (XR), Internet of Things (IoT), Artificial Intelligence (AI), Cyber-Physical Systems (CPS), and Collaborative Robots (COBOTS), and highlights their applications in real-time monitoring, immersive safety training, and predictive hazard mitigation. A conceptual framework is proposed, illustrating a synergistic digital ecosystem that integrates predictive analytics, real-time monitoring, and immersive training to enhance the OHS. The findings highlight both the transformative benefits and the key adoption challenges of these technologies, including technical complexities, data security, privacy, ethical concerns, and organizational resistance. This study provides a foundational framework for future research and practical implementation in Industry 5.0. Full article
Show Figures

Figure 1

19 pages, 1040 KiB  
Systematic Review
A Systematic Review on Risk Management and Enhancing Reliability in Autonomous Vehicles
by Ali Mahmood and Róbert Szabolcsi
Machines 2025, 13(8), 646; https://doi.org/10.3390/machines13080646 - 24 Jul 2025
Viewed by 278
Abstract
Autonomous vehicles (AVs) hold the potential to revolutionize transportation by improving safety, operational efficiency, and environmental impact. However, ensuring reliability and safety in real-world conditions remains a major challenge. Based on an in-depth examination of 33 peer-reviewed studies (2015–2025), this systematic review organizes [...] Read more.
Autonomous vehicles (AVs) hold the potential to revolutionize transportation by improving safety, operational efficiency, and environmental impact. However, ensuring reliability and safety in real-world conditions remains a major challenge. Based on an in-depth examination of 33 peer-reviewed studies (2015–2025), this systematic review organizes advancements across five key domains: fault detection and diagnosis (FDD), collision avoidance and decision making, system reliability and resilience, validation and verification (V&V), and safety evaluation. It integrates both hardware- and software-level perspectives, with a focus on emerging techniques such as Bayesian behavior prediction, uncertainty-aware control, and set-based fault detection to enhance operational robustness. Despite these advances, this review identifies persistent challenges, including limited cross-layer fault modeling, lack of formal verification for learning-based components, and the scarcity of scenario-driven validation datasets. To address these gaps, this paper proposes future directions such as verifiable machine learning, unified fault propagation models, digital twin-based reliability frameworks, and cyber-physical threat modeling. This review offers a comprehensive reference for developing certifiable, context-aware, and fail-operational autonomous driving systems, contributing to the broader goal of ensuring safe and trustworthy AV deployment. Full article
Show Figures

Figure 1

16 pages, 1848 KiB  
Article
Research on Attack Node Localization in Cyber–Physical Systems Based on Residual Analysis and Cooperative Game Theory
by Zhong Sun and Xinchun Jie
Electronics 2025, 14(15), 2943; https://doi.org/10.3390/electronics14152943 - 23 Jul 2025
Viewed by 160
Abstract
With the widespread application of cyber–physical systems (CPS) in the field of automation, security concerns have become increasingly prominent. One critical and urgent challenge is the accurate identification of sensor nodes compromised by false data injection (FDI) attacks in multiple-input multiple-output (MIMO) control [...] Read more.
With the widespread application of cyber–physical systems (CPS) in the field of automation, security concerns have become increasingly prominent. One critical and urgent challenge is the accurate identification of sensor nodes compromised by false data injection (FDI) attacks in multiple-input multiple-output (MIMO) control systems. Building on the implementation of multi-step sampling and residual-based anomaly detection using a support vector machine (SVM), this paper further introduces the Shapley value evaluation method from cooperative game theory and a voting mechanism, and proposes a method for node attack localization. First, multi-step sampling is conducted within each control period to provide a large amount of effective data for the localization of attacked sensor nodes. Next, the residual between the estimated value of the MIMO system’s full response and the actual value received by the controller is calculated, and an SVM model is used to detect anomalies in the residual. Finally, the Shapley value contribution of each residual to the SVM anomaly detection result is evaluated based on cooperative game theory and combined with a voting mechanism to achieve accurate localization of the attacked sensor nodes. Simulation results demonstrate that the proposed method achieves an anomaly detection accuracy of 96.472% and can accurately localize attacked nodes in both single-node and multi-node attack scenarios, indicating strong robustness and practical applicability. Full article
Show Figures

Figure 1

Back to TopTop