Mutual exclusion in cyber-physical systems

Sumeet Gujrati, Gurdip Singh

Research output: Chapter in Book/Entry/PoemConference contribution

1 Scopus citations


Distributed computing problems such as mutual exclusion have been studied extensively for traditional distributed systems. In traditional systems, a strict layered approach is taken wherein a set of users (application processes) U 1; ... ;U n is layered on top of a mutual exclusion algorithm with processes P 1; ... ;P n. User Ui interacts with process P i to request access to resources which are modeled as tokens, and users rely entirely on mutual exclusion algorithm to regulate access to the resources. In a cyber-physical system, users (physical entities) may themselves possess capabilities such as sensing, observing and mobility using which they may also attempt to locate physical resources such as wheelchairs. Thus, a mutual exclusion algorithm in a cyber-physical system must contend with the behavior of users. This paper proposes a graph-based model for cyber-physical systems which is used to describe mutual exclusion algorithm as well as user behavior. Based on this model, we present several solutions for the mutual exclusion problem. We have also conducted an extensive simulation study of our algorithms using OMNeT++ discrete event simulation system.

Original languageEnglish (US)
Title of host publicationSENSORNETS 2012 - Proceedings of the 1st International Conference on Sensor Networks
Number of pages7
StatePublished - 2012
Externally publishedYes
Event1st International Conference on Sensor Networks, SENSORNETS 2012 - Rome, Italy
Duration: Feb 24 2012Feb 26 2012

Publication series

NameSENSORNETS 2012 - Proceedings of the 1st International Conference on Sensor Networks


Other1st International Conference on Sensor Networks, SENSORNETS 2012


  • Cyber-physical systems
  • Mutual exclusion
  • Resource allocation

ASJC Scopus subject areas

  • Computer Networks and Communications


Dive into the research topics of 'Mutual exclusion in cyber-physical systems'. Together they form a unique fingerprint.

Cite this