for the mutual exclusion problem. Each algorithm had
two components, one describing the behavior of users
in the physical-subsystem and the other describing the
cyber algorithm. We identified several characteristic
of a CPS which make solutions for TDS inapplicable
to a CPS. We simulated all the presented algorithms
using OMNeT++. The results provide suggestions on
the best algorithm to use in different scenarios. For
example, the results show that when fewer resources
are present, it might be best to rely completely on
the cyber-subsystem; otherwise, participation of users
in locating resource can improve performance. The
model proposed in this paper opens the possibility of
studying more complex scenarios and algorithms for
CPSs. These possibilities include associating proper-
ties with the reachability edges in
G
P
and cooperation
between the users in locating resources. Finally, in the
SPRA
algorithm, identifying mechanisms via which
existing tree information could be utilized in creating
on-demand paths to reduce number of messages is a
subject of future research.
ACKNOWLEDGEMENTS
This work was supported in part by NSF Grant
0615337 and K-State Targeted Excellence program.
REFERENCES
Bapat, S. and Arora, A. (2008). Message efficient termina-
tion detection in wireless sensor networks. In Proceed-
ings of the 2008 INFOCOM Workshops.
Bulgannawar, S. and Vaidya, N. (1995). A distributed k-
mutual exclusion algorithm. In Proceedings of the 15th
International Conference on Distributed Computing
Systems, pages 153–160.
Chandy, K. M. and Lamport, L. (1985). Distributed snap-
shots: Determining global states of distributed systems.
ACM Transactions on Computer Systems, 3(1).
Chinrungrueng, J., Sunantachaikul, U., and Triamlumlerd,
S. (2007). Smart parking: an application of optical-
wireless sensor network. In Proceedings of the 2007
International Symposium on Applications and the In-
ternet Workshops.
Conner, W. S., Heidemann, J., Krishnamurthy, L., Wang,
X., and Yarvis, M. (2004). Workplace applications of
sensor networks. In USC/ISI Technical Report ISI-TR-
2004-591.
Dijkstra, E. (1965). Solution of a problem in concurrent
programming control. Communications of the ACM.
Dijkstra, E. (1971). Hierarchical ordering of sequential
processes. Acta Informatica, 1:115–138.
Gujrati, S. and Singh, G. (2011). Mutual exclusion in cyber-
physical systems. Technical report, Kansas State Uni-
versity CIS TR 2011-2.
Kaveti, L., Pulluri, S., and Singh, G. (2009). Event ordering
in pervasive sensor networks. In 5th IEEE Interna-
tional Workshop on Sensor Networks and Systems for
Pervasive Computing.
Kurian, H., Rakshit, A., and Singh, G. (2009). Detecting
termination in pervasive sensor networks. In 9th IEEE
International Symposium on Asynchronous Decentral-
ized Systems.
Liu, M., Mihaylov, S. R., Bao, Z., Jacob, M., Ives, Z. G.,
Loo, B. T., and Guha, S. (2010). Smartcis: Integrating
digital and physical environments. SIGMOD Record.
Lynch, N. (1980). Fast allocation of nearby resources in a
distributed system. In Proceedings of the 12th Annual
ACM Symposium on Theory of Computing, pages 70–
81.
Makki, K., Banta, P., Been, K., Pissinou, N., and Park, E.
(1992). A token based distributed k mutual exclusion
algorithm. In IEEE Proceedings of the Symposium on
Parallel and Distributed Processing, pages 408–411.
Rajamani, V. and Julien, C. (2010). Blurring snapshots:
Temporal inference of missing and uncertain data. In
Proceedings of the IEEE International Conference on
Pervasive Computing and Communications.
Raymond, K. (1989). A distributed algorithm for multiple
entries to a critical section. In Information Processing
Letters, volume 30, pages 189–193.
Reif, J. H. and Spirakis, P. (1982). Real time resource al-
location in distributed systems. In Proceedings of
ACM SIGACT-SIGOPS Symposium on Principles of
Distributed Computing, pages 84–94.
Romer, K. (2003). Temporal message ordering in wireless
sensor networks. In Annual Mediterranean Ad Hoc
Networking Workshop.
Srimani, P. and Reddy, R. (1992). Another distributed al-
gorithm for multiple entries to a critical section. In
Information Processing Letters, volume 41, pages 51–
57.
Varga, A. (2001). The omnet++ discrete event simulation
system. In Proceedings of the European Simulation
Multiconference (ESM 2001).
Walter, J., Cao, G., and Mohanty, M. (2001). A k-mutual
exclusion algorithm for wireless ad hoc networks. In
Proceedings of the First Annual Workshop on Princi-
ples of Mobile Computing.
Wessel, K., Swigulski, M., , Kpke, A., and Willkomm, D.
(2009). Mixim: the physical layer an architecture
overview. In Proceedings of the 2nd International
Conference on Simulation Tools and Techniques.
Wieland, M., Kopp1, O., Nicklas, D., and Leymann, F.
(2007). Towards context-aware workflows. In Pro-
ceedings of the CAISE07 Workshops and Doctoral
Consortium.
MUTUAL EXCLUSION IN CYBER-PHYSICAL SYSTEMS
79