From Machine-to-Machine Communications towards Cyber-Physical Systems

被引:103
作者
Wan, Jiafu [1 ]
Chen, Min [2 ]
Xia, Feng [3 ]
Li, Di [4 ]
Zhou, Keliang [5 ]
机构
[1] Guangdong Jidian Polytech, Coll Informat Engn, Guangzhou 510515, Guangdong, Peoples R China
[2] Huazhong Univ Sci & Technol, Sch Comp Sci & Engn, Wuhan 430074, Peoples R China
[3] Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China
[4] S China Univ Technol, Sch Mech & Automot Engn, Guangzhou 510006, Guangdong, Peoples R China
[5] JiangXi Univ Sci & Technol, Coll Elect Engn & Automat, Ganzhou 341000, Peoples R China
基金
中国国家自然科学基金; 新加坡国家研究基金会;
关键词
internet of things; machine-to-machine communications; wireless sensor networks; cyber-physical systems; unmanned vehicles; cyber-transportation systems; challenges; M2M; LOCALIZATION; RELIABILITY; NETWORKS; SECURITY;
D O I
10.2298/CSIS120326018W
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, cyber-physical systems (CPS) have emerged as a promising direction to enrich the interactions between physical and virtual worlds. In this article, we first present the correlations among machine-to-machine (M2M), wireless sensor networks (WSNs), CPS and internet of things (IoT), and introduce some research activities in M2M, including M2M architectures and typical applications. Then, we review two CPS platforms and systems that have been proposed recently, including a novel prototype platform for multiple unmanned vehicles with WSNs navigation and cyber-transportation systems. Through these reviews, we propose CPS is an evolution of M2M by the introduction of more intelligent and interactive operations, under the architecture of IoT. Also, we especially hope to demonstrate how M2M systems with the capabilities of decision-making and autonomous control can be upgraded to CPS and identify the important research challenges related to CPS designs.
引用
收藏
页码:1105 / 1128
页数:24
相关论文
共 49 条
[1]  
[Anonymous], P 7 INT C EMB MULT C
[2]   Roundtable: Reliability of Embedded and Cyber-Physical Systems [J].
Barnum, Sean ;
Sastry, Shankar ;
Stankovic, John A. .
IEEE SECURITY & PRIVACY, 2010, 8 (05) :27-32
[3]  
Bo Hyun Kim, 2010, 2010 International Conference on Information and Communication Technology Convergence (ICTC), P519, DOI 10.1109/ICTC.2010.5674785
[4]   Cyberphysical Systems: Workload Modeling and Design Optimization [J].
Bogdan, Paul ;
Marculescu, Radu .
IEEE DESIGN & TEST OF COMPUTERS, 2011, 28 (04) :78-87
[5]  
Borri A., 2011, THESIS ITALY
[6]   A Survey on Security Issues of M2M Communications in Cyber-Physical Systems [J].
Chen, Dong ;
Chang, Guiran .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (01) :24-45
[7]   Machine-to-Machine Communications: Architectures, Standards and Applications [J].
Chen, Min ;
Wan, Jiafu ;
Li, Fang .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (02) :480-497
[8]  
Chen M, 2011, INT J SENS NETW, V9, P1
[9]   Code-Centric RFID System Based on Software Agent Intelligence [J].
Chen, Min ;
Gonzalez, Sergio ;
Zhang, Qian ;
Leung, Victor C. M. .
IEEE INTELLIGENT SYSTEMS, 2010, 25 (02) :12-19
[10]  
Dohler M., 2010, MACHINE TO MACHINE E