Analysing Design Approaches for the Power Consumption in Cyber-Physical Systems
2021-06-30, Sailer, Patrizia, Ivkić, Igor, Tauber, Markus, Mauthe, Andreas, Gouglidis, Antonios
The importance of Cyber Physical Systems (CPS) and Internet of Things (IoT) applications is constantly increasing, especially in the context of Industry 4.0. Architectural decisions are crucial not just for performance, security and resilience reasons but also regarding costs and resource usage. In this paper we analyse two of the fundamental approaches to design control loops (i.e. time-driven and event-driven), show how they can be realised and evaluate their power requirements. Through this the design criteria can be extended also considering the optimization of energy related aspects.
SECCRIT: Secure Cloud Computing for High Assurance Services
2013, Bless, R., Hutchison, D., Schoeller, M., Smith, P., Tauber, Markus
Smart industrial indoor farming - Technical and societal challenges
2019, Schmittner, Christoph, Christl, Korbinian, Macher, Georg, Knapitsch, Johannes, Parapatits, Martin, Tauber, Markus, Pichler, Harald, Gnauer, Clemens
Population growth and food development are two of the major challenges for society. While smart farming can help, available arable land is restricted. Smart industrial indoor farming has the potential to increase agricultural production while also reducing resources usage. To guarantee a reliable food supply, we need to ensure a dependable system, which protects not only the plants, but also the Intellectual property (IP). We give an overview about the challenges on agriculture, available indoor farming systems and standards for smart farming. We evaluate the standards for applicability towards indoor farming and present a use case for a smart industrial indoor farming system. To assure a dependable system, we present a methodology to analyze the system and achieve a trade-off between different dependability attributes.
Autonomic Management of Client Concurrency in a Distributed Storage Service
2011, Tauber, Markus, Kirby, G. N. C., Dearle, A.
Impact of Critical Infrastructure Requirements on Service Migration Guidelines to the Cloud
2015, Wagner, Christian, Hudic, Aleksandar, Maksuti, Silia, Tauber, Markus, Pallas, Frank
A high level of information security in critical infrastructure IT systems and services has to be preserved when migrating their IT services to the cloud. Often various legislative and security constraints have to be met in line with best practice guidelines and international standards to perform the migration. To support the critical infrastructure providers in migrating their services to the cloud we are developing a process based migration guideline for critical infrastructure providers focusing on information security. First of all we investigate, via questionnaires, how the importance of individual security topics covered in such guidelines differentiates between industry stakeholders and critical infrastructure providers. This supports the selection of relevant security topics and the considered guidelines and standards, which we survey in search for common relevant security topics. Subsequently we present the analysis of the above-mentioned security requirements and how they affect a here developed taxonomy for a process-based security guideline. Furthermore we present potential service migration use cases and how our methodology would affect the migration of secure critical infrastructure services.
Trustworthy and High Assurance Cyber-Physical Systems - A Research Agenda
2015, Tauber, Markus, Wagner, Christian, Mauthe, Andreas
Autonomous CPS Mobility Securely Designed
2019-06, Hofbauer, David, Schmittner, Christoph, Brandstetter, Manuela, Tauber, Markus
Trustworthy Evidence Gathering Mechanism for Multilayer Cloud Compliance.
2014, Florian, M., Paudel, S., Tauber, Markus
Cloud Computing allows the designing of systems which dynamically acquire compute resources. This makes it very suitable for Critical Infrastructures where unpredictable load due to human usage patterns are very likely. Especially in this domain legal compliance is a growing concern in general. Abstraction over multiple architectural cloud layers allows for individual layers being operated by different providers. This makes it hard to determine whether legal compliance is given. In this paper we motivate the research towards an Event Gathering Mechanism which is envisioned to allow the modelling of legal aspects in a multi layered cloud environment.
The Effect of the 802.11 Power Save Mechanism (PSM) on Energy Efficiency and Performance During System Activity
2012, Tauber, Markus, Bhatti, S. N.
802.11 WLAN is a popular choice for wireless access on a range of ICT devices. A growing concern is the increased energy usage of ICT, for reasons of cost and environmental protection. The Power Save Mode (PSM) in 802.11 deactivates the wireless network interface during periods of inactivity. However, applications increasingly use push models, and so devices may be active much of the time. We have investigated the effectiveness of PSM, and considered its impact on performance when a device is active. Rather than concentrate on the NIC, we have taken a system-wide approach, to gauge the impact of the PSM from an application perspective. We experimentally evaluated performance at the packet level and system-wide power usage under various offered loads, controlled by packet size and data rate, on our 802.11n test bed. We have measured the system-wide power consumption corresponding to the individual traffic profiles and have derived application-specific effective energy-usage. We have found that in our scenarios, no significant benefit can be gained from using PSM.
Towards Taxonomy based Software Security Standard and Tool Selection for Critical Infrastructure IT in the Cloud
2014, Paudel, S., Tauber, Markus, Brandic, I.