Comprehensive coverage

"All cyber-physical devices will have to be safe and reliable and will be required to respect privacy"

Says Jeanette Wing, vice president of research at Microsoft at the iNNOVEX2016 conference that took place last week at Kiryat Airport. "Robots will be our pets, our friends, our work partners and they will help us when we are old. Smart devices such as smart wheelchairs will allow the disabled to access information that would otherwise be inaccessible to them. These devices will be connected at home and outside through the cloud and life will be nice."

Jeanette Wing, Vice President of Research at Microsoft at the iNNOVEX2016 conference. Photo: Kobi Kantor
Jeanette Wing, Vice President of Research at Microsoft at the iNNOVEX2016 conference. Photo: Kobi Kantor

The cyber-physical products - systems such as drones, robotic vacuum cleaners, industrial robots and in the future also autonomous cars - will make our lives easier but may also be a source of danger of hacking by hackers. This is what Prof. Jeanette Wing, vice president for research at Microsoft, said at the INNOVEX2016 conference organized by ASG. The session in which Wing participated dealt with innovation in large companies. Cyber-physical products is Microsoft's definition of the Internet of Things. "All cyber-physical devices" will have to be secure and reliable and will be required to respect privacy." she added.

"We are in an amazing world, we are facing a world of smart connected devices that will belong to the Internet of Things category, but they will be large products, not just small sensors. Today we already have thermometers and light bulbs in the house that are smart enough to turn off and on remotely, cameras that watch the baby and transmit the data in real time to the smartphone device. In the future we will wear things on our bodies that will allow us to operate the devices through gestures and speech. We live in a world where cars will drive themselves, drones will fly to places we can't see carrying packages for example. Contact lenses that will check the sugar level and tell the doctor in real time how we are doing, as well as smart pills, sensors in the fields, smart buildings and bridges, smart agriculture, smart infrastructure and more."

"Robots will be our pets, our friends, our work partners and they will help us when we are old. Smart devices such as smart wheelchairs will allow the disabled to access information that would otherwise be inaccessible to them. These devices will be connected at home and outside through the cloud and life will be nice."

"What all these devices have in common is that they have a connection with the real unknown and that's why I call them Cyber-Physical Systems. These devices will become more and more intelligent and most of the new intelligence will come through software. More of these devices will be connected and information will flow between them. So what could go wrong? many things. At this point, she projected a video with a sequence of drones crashing into their owners, into trees, cars, cafe chairs, and more."

All the cyber-physical devices we have built and will be built will have to be safe, reliable and they will be required to respect privacy. The systems include a hardware component and a software component as well as a human component. When talking about the reliability of cyber-physical systems, it is necessary to take into account all these factors."

"Reliability problems can be solved by combining discrete algorithms (the car is on the road or not, the drone is in the air or not, etc.). Problems solved by Boolean equations. While traveling or flying, one must take into account factors whose behavior will be described in terms of physics - differential equations. We have to take into account both situations at the same time. We need to develop a new logic, and find new ways to analyze the behavior of the products to ensure their reliability."

"As for the uncertainty of the environment - we cannot anticipate nature - for example a wind that will divert the drone from its course. The other reason is the human factor. The devices should avoid harming people or on the contrary a device should contact people in its environment. Humans are an unpredictable factor. We need to design the products so that the environment in which they will operate is unpredictable."

"The best way to achieve this is to provide protection for each of the layers: the real-time operating system layer, the cameras and sensors layer, the control of the motors (e.g. the stabilization of the drone) and in the upper layer the mission execution phase must be secured. For this purpose, we must increase the research in the field of artificial intelligence that will allow the drone to get from point A to point B despite the interference."

"As for the security challenges - we have seen headlines of examples where physical cyber systems have been hacked - an example of this is the Stectant worm that disrupted the production of nuclear systems in Iran. Suddenly we will have more attack factors, more places to attack and greater difficulty in determining the source of the attack. In order to be able to protect all the layers from the device identification stage to the application so that the whole way is secure, we must take into account the capabilities of the device. What is done, for example, in the case of a battery-powered device with low processing and storage capabilities? It is necessary to implement this methodology in a way that requires minimum resources. If the devices are secure and also the network and the cloud, we will have a secure network of cyber-physical products."

"Another problem that needs to be taken into account is the problem of privacy. Cameras used to monitor children were hacked and strangers scared the children. Privacy consists of a collection of information and processes in a certain area regulated by the data owners and the flow of data between the data owners as well as mechanisms for sharing the data with others. All these nodes are sensitive areas in terms of the ability to harm privacy."

"The accepted way of using information without disclosing it is anonymization - that is, cutting off the connection between a person and the record about him. For example, if I have data on all the salaries of the people sitting in the hall, I can know what the average salary of everyone is without knowing how much each earns. Such sharing is common, for example, in medical experiments."

"In order to build physical cyber systems we need to respond to all these requirements in a way that will improve people's lives and ensure the reliability, safety and privacy of the cyber-physical systems." Prof. Wing concludes.

2 תגובות

  1. Reality proves that while these are talking about security and safety and are busy developing elaborate and (almost) unrealizable protocols, someone smart comes along and throws something he developed in his backyard, without security, and without anything, onto the market, and the public buys. The public doesn't even bother to change the minimum settings that might give it security and safety in the products it buys (until someone scares its children, then it wakes up - but those outside its closest circle remain dormant and complacent).

Leave a Reply

Email will not be published. Required fields are marked *

This site uses Akismat to prevent spam messages. Click here to learn how your response data is processed.