Cyber-Physical Systems

Augmenting Learning Components for Safety in Resource Constrained Autonomous Robots

Learning enabled components (LECs) trained using data-driven algorithms are increasingly being used in autonomous robots commonly found in factories, hospitals, and educational laboratories. However, these LECs do not provide any safety guarantees, …

Cyber-Physical Simulation Platform for Security Assessment of the Transactive Energy Systems

Transactive energy systems (TES) are emerging as a transformative solution for the problems that distribution system operators face due to an increase in the use of distributed energy resources and rapid growth in scalability of managing active …

Data-Driven Energy Optimization for Multi-Modal Transit

The goal of this project is to develop a high-resolution system-level data capture and analysis framework to revolutionize the operational planning of a regional transportation authority, specifically the Chattanooga Area Regional Transportation Authority (CARTA).

Improving Network Connectivity and Robustness Using Trusted Nodes with Application to Resilient Consensus

To observe and control a networked system, especially in failure-prone circumstances, it is imperative that the underlying network structure is robust against node or link failures. A common approach for increasing network robustness is redundancy: …

TRANSAX: A Blockchain-based Decentralized Forward-Trading Energy Exchange for Transactive Microgrids

Power grids are undergoing major changes due to rapid growth in renewable energy and improvements in battery technology. Prompted by the increasing complexity of power systems, decentralized IoT solutions are emerging, which arrange local communities …

Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening

As the Industrial Internet of Things (IIot) becomes more prevalent in critical application domains, ensuring security and resilience in the face of cyber-attacks is becoming an issue of paramount importance. Cyber-attacks against critical …

Application-Aware Anomaly Detection of Sensor Measurements in Cyber-Physical Systems

Detection errors such as false alarms and undetected faults are inevitable in any practical anomaly detection system. These errors can create potentially significant problems in the underlying application. In particular, false alarms can result in …

SolidWorx: A Resilient and Trustworthy Transactive Platform for Smart and Connected Communities

Internet of Things and data sciences are fueling the development of innovative solutions for various applications in Smart and Connected Communities (SCC). These applications provide participants with the capability to exchange not only data but also …

A Game-Theoretic Approach for Integrity Assurance in Resource-Bounded Systems

Assuring communication integrity is a central problem in security. However, overhead costs associated with cryptographic primitives used towards this end introduce significant practical implementation challenges for resource-bounded systems, such as …

Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks

In networked systems, monitoring devices such as sensors are typically deployed to monitor various target locations. Targets are the points in the physical space at which events of some interest, such as random faults or attacks, can occur. Most …