Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Public Access

Systematically Ensuring the Confidence of Real-Time Home Automation IoT Systems

Published: 13 June 2018 Publication History

Abstract

Recent advances and industry standards in Internet of Things (IoT) have accelerated the real-world adoption of connected devices. To manage this hybrid system of digital real-time devices and analog environments, the industry has pushed several popular home automation IoT (HA-IoT) frameworks, such as If-This-Then-That (IFTTT), Apple HomeKit, and Google Brillo. Typically, users author device interactions by specifying the triggering sensor event and the triggered device command. In this seemingly simple software system, two dominant factors govern the system confidence properties with respect to the physical world. First, IoT users are largely nonexperts who lack the comprehensive consideration regarding potential impact and joint effect with existing rules. Second, while the increasing complexity of IoT devices enables fine-grained control (e.g., heater temperature) of continuous real-time environments, even two simply connected devices can have a huge state space to explore. In fact, bugs that wrongfully control devices and home appliances can have ramifications on system correctness and even user physical safety. It is crucial to help users to make sure the system they created meets their expectation. In this article we introduce how techniques from hybrid automata can be practically applied to assist nonexpert IoT users in the confidence checking of such hybrid HA-IoT systems. We propose an automated framework for end-to-end programming assistance. We build and check the Linear Hybrid Automata (LHA) model of the system automatically. We also present a quantifier elimination-based method to analyze the counterexample found and synthesize fix suggestions. We implemented a platform, MenShen, based on this framework and proposed techniques. We conducted sets of real HA-IoT case studies with up to 46 devices and 65 rules. Empirical results show that MenShen can find violations and generate rule fix suggestions in only 10 seconds.

References

[1]
Apple HomeKit. 2016. Apple HomeKit. Retrieved from http://www.apple.com/ios/homekit/.
[2]
Gilles Audemard, Marco Bozzano, Alessandro Cimatti, and Roberto Sebastiani. 2005. Verifying industrial hybrid systems with mathSAT. Electrical Notes on Theoretical Computer Science 119, 2 (2005), 17--32.
[3]
AWS IoT. 2015. Device Registry for AWS IoT. Retrieved from http://docs.aws.amazon.com/iot/latest/developerguide/thing-registry.html.
[4]
Armin Biere, Alessandro Cimatti, Edmund M. Clarke, Ofer Strichman, and Yunshan Zhu. 2003. Bounded model checking. Advances in Computers 58 (2003), 117--148.
[5]
Aaron R. Bradley. 2011. SAT-based model checking without unrolling. In Proceedings of the 12th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI’11). 70--87.
[6]
Lei Bu. 2006. BACH. Retrieved from http://seg.nju.edu.cn/BACH/.
[7]
Lei Bu. 2016. MenShen Project Page. Retrieved from http://seg.nju.edu.cn/MenShen/.
[8]
Lei Bu and Xuandong Li. 2011. Path-oriented bounded reachability analysis of composed linear hybrid systems. International Journal on Software Tools for Technology Transfer (2011), 307--317.
[9]
Lei Bu, You Li, Linzhang Wang, and Xuandong Li. 2008. BACH: Bounded reachability checker for linear hybrid automata. In Proceedings of Formal Methods in Computer-Aided Design (FMCAD’08). 1--4.
[10]
Lei Bu, Qixin Wang, Xin Chen, Linzhang Wang, Tian Zhang, Jianhua Zhao, and Xuandong Li. 2011. Toward online hybrid systems model checking of cyber-physical systems time-bounded short-run behavior. SIGBED Review 8, 2 (2011), 7--10.
[11]
Alessandro Cimatti, Alberto Griggio, Sergio Mover, and Stefano Tonetta. 2013. Parameter synthesis with IC3. In Proceedings of Formal Methods in Computer-Aided Design (FMCAD’13). 165--168.
[12]
Edmund Clarke, Orna Grumberg, and Doron A. Peled. 2001. Model Checking. MIT Press.
[13]
Edmund Clarke, Bruce Krogh, Andre Platzer, and Raj Rajkumar. 2008. Analysis and verification challenges for cyber-physical transportation systems. In Proceedings of the National Workshop for Research on High-Confidence Transportation Cyber-Physical Systems: Automotive, Aviation and Rail.
[14]
Jason Croft, Ratul Mahajan, Matthew Caesar, and Madan Musuvathi. 2015. Systematically exploring the behavior of control programs. In Proceedings of the 2015 USENIX Annual Technical Conference (USENIX ATC’15). 165--176.
[15]
Leonardo Mendonça de Moura and Nikolaj Bjørner. 2008. Z3: An efficient SMT solver. In Proceedings of the 14th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS’08). 337--340.
[16]
Andreas Dolzmann. 2006. Redlog. Retrieved from http://redlog.eu/.
[17]
Google Brillo. 2016. Google Brillo. Retrieved from https://developers.google.com/brillo/.
[18]
Goran Frehse, Sumit Kumar Jha, and Bruce H. Krogh. 2008. A counterexample-guided approach to parameter synthesis for linear hybrid automata. In Proceedings of the 11th International Workshop on Hybrid Systems: Computation and Control (HSCC’08). 187--200.
[19]
Ştefan Gunǎ, Luca Mottola, and Gian Pietro Picco. 2014. DICE: Monitoring global invariants with wireless sensor networks. ACM Trans. Sen. Netw. 10, 4 (2014), 54:1--54:34.
[20]
Thomas A. Henzinger. 1996. The theory of hybrid automata. In Proceedings of the 11th Annual IEEE Symposium on Logic in Computer Science. 278--292.
[21]
Thomas A. Henzinger, Peter W. Kopke, Anuj Puri, and Pravin Varaiya. 1998. What’s decidable about hybrid automata?Journal of Computer Systems Science 57, 1 (1998), 94--124.
[22]
Thomas A. Henzinger and Howard Wong-Toi. 1995. Using hytech to synthesize control parameters for a steam boiler. In Formal Methods for Industrial Applications, Specifying and Programming the Steam Boiler Control, vol. 1165. Lecture Notes in Computer Science, Springer, 265--282.
[23]
Douglas Herbert, Vinaitheerthan Sundaram, Yung-Hsiang Lu, Saurabh Bagchi, and Zhiyuan Li. 2007. Adaptive correctness monitoring for wireless sensor networks using hierarchical distributed run-time invariant checking. TAAS 2, 3 (2007), 8:1--8:23.
[24]
IFTTT. 2011. IFTTT: Put the internet to work for you. Retrieved from http://ifttt.com.
[25]
Json.NET. 2009. Json.Net. Retrieved from https://www.newtonsoft.com/json.
[26]
Edward Lee. 2006. Cyber- physical systems- are computing foundations adequate?Position Paper for NSF Workshop on Cyber-Physical Systems: Research Motivation, Techniques and Roadmap. Austin, Texas. https://ptolemy.berkeley.edu/publications/papers/06/CPSPositionPaper/Lee_CPS_PositionPaper.pdf.
[27]
Xuandong Li, Sumit Jha, and Lei Bu. 2007. Towards an efficient path-oriented tool for bounded reachability analysis of linear hybrid systems using linear programming. Electrical Notes on Theoretical Computer Science 174, 3 (2007), 57--70.
[28]
Chieh-Jan Mike Liang, Lei Bu, Zhao Li, Junbei Zhang, Shi Han, Börje Karlsson, Dongmei Zhang, and Feng Zhao. 2016. Systematically debugging IoT control system correctness for building automation. In Proceedings of the 3rd ACM International Conference on Systems for Energy-Efficient Built Environments (BuildSys@SenSys’16). ACM, 133--142.
[29]
Chieh-Jan Mike Liang, Börje F. Karlsson, Nicholas D. Lane, Feng Zhao, Junbei Zhang, Zheyi Pan, Zhao Li, and Yong Yu. 2015. SIFT: Building an internet of safe things. In Proceedings of the 14th International Conference on Information Processing in Sensor Networks (IPSN’15). 298--309.
[30]
Shan Lin, Tian He, and John A. Stankovic. 2008. CPS-IP: Cyber physical systems interconnection protocol. SIGBED Review 5, 1 (2008), 22.
[31]
David Monniaux. 2008. A quantifier elimination algorithm for linear real arithmetic. In Proceedings of the 15th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR’08). 243--257.
[32]
Sirajum Munir and John A. Stankovic. 2014. DepSys: Dependency aware integration of cyber-physical systems for smart homes. In ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS’14). Berlin, Germany, 127--138.
[33]
Nielsen Norman Group. 1993. Response Times: The 3 Important Limits. Retrieved from https://www.nngroup.com/articles/response-times-3-important-limits.
[34]
Stefan Schupp, Erika Ábrahám, Xin Chen, Ibtissem Ben Makhlouf, Goran Frehse, Sriram Sankaranarayanan, and Stefan Kowalewski. 2015. Current challenges in the verification of hybrid systems. In Proceedings of the 5th International Workshop on Cyber Physical Systems. Design, Modeling, and Evaluation (CyPhy’15). 8--24.
[35]
Universal Devices Products. 2007. Universaldevicesproducts/insteon/isy-99iseries. Retrieved from http://www.universal-devices.com/.
[36]
Dingbao Xie, Lei Bu, Jianhua Zhao, and Xuandong Li. 2014. SAT-LP-IIS Joint-directed path-oriented bounded reachability analysis of linear hybrid automata. Formal Methods in System Design 45, 1 (2014), 42--62.

Cited By

View all
  • (2024)Safety Assurance in IoT-Based Smart HomesEdge Computing Architecture - Architecture and Applications for Smart Cities10.5772/intechopen.1005492Online publication date: 2-Jul-2024
  • (2024)TapChecker: A Lightweight SMT-Based Conflict Analysis for Trigger-Action ProgrammingIEEE Internet of Things Journal10.1109/JIOT.2024.337455611:12(21411-21426)Online publication date: 15-Jun-2024
  • (2024)Cascading Threat Analysis of IoT Devices in Trigger-Action PlatformsIEEE Internet of Things Journal10.1109/JIOT.2023.333527911:7(12240-12251)Online publication date: 1-Apr-2024
  • Show More Cited By

Recommendations

Reviews

Dominik Strzalka

The quick expansion of computing technology in many areas leads to different new paradigms; among them is the paradigm of cyber-physical systems (CPS) with commonly acquired sensor data that can be processed in real time. One of the manifestations of this paradigm is the omnipresence and the development of the Internet of Things (IoT) in home automation (HA-IoT) services, which industry also supports via simple, intuitive event-triggered rules called if-this-then-that (IFTTT) rules. They are so common that thousands of users shared more than 340,000 rules in the format of "if A , then B ," where A is a sensor triggering event and B is a device command. However, it should also be noted that the rules can be very simple, but the final user of an IFTTT-style HA-IoT system need not necessarily be aware of their behavior over time. The paper shows "an end-to-end programming assistance system to automate the modeling, checking, and fixing of HA-IoT systems" via "hybrid automata model checking of real-time HA-IoT system[s]"; counterexample-guided fix suggestions; and "system implementation and real case evaluation." The authors support their proposal using two important reasons: (i) "lack of automatic HA-IoT confidence verification," and (ii) "lack of debugging feedback for nonexpert IoT users." Following a simple mathematical background in section 2, the authors propose an architecture framework in section 3. It consists of three parts: (1) linear hybrid automata (LHA) automatic modeling, (2) reachability analysis of the LHA model, and (3) counterexample-guided fix suggestion synthesis. Each proposed part is described in sections 4 and 5. Finally, the supporting system, called MenShen, is proposed. Its work and important features are described in section 6, together with the results of some experiments. The result is an interesting solution that allows for automated end-to-end programming. It may be especially helpful for nonexpert IoT users in modeling and managing HA-IoT systems.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Cyber-Physical Systems
ACM Transactions on Cyber-Physical Systems  Volume 2, Issue 3
Special Issue on the Internet of Things: Part 2
July 2018
181 pages
ISSN:2378-962X
EISSN:2378-9638
DOI:10.1145/3232714
  • Editor:
  • Tei-Wei Kuo
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 13 June 2018
Accepted: 01 January 2018
Revised: 01 June 2017
Received: 01 July 2016
Published in TCPS Volume 2, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. IFTTT
  2. automatic modeling and verification
  3. fix suggestion
  4. home automation
  5. internet of things
  6. linear hybrid automata

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • NSF
  • National Natural Science Foundation of China
  • Israel Science Foundation
  • Microsoft Research Asia Collaborative Research Program
  • NSFC-ISF Research Program

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)205
  • Downloads (Last 6 weeks)20
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Safety Assurance in IoT-Based Smart HomesEdge Computing Architecture - Architecture and Applications for Smart Cities10.5772/intechopen.1005492Online publication date: 2-Jul-2024
  • (2024)TapChecker: A Lightweight SMT-Based Conflict Analysis for Trigger-Action ProgrammingIEEE Internet of Things Journal10.1109/JIOT.2024.337455611:12(21411-21426)Online publication date: 15-Jun-2024
  • (2024)Cascading Threat Analysis of IoT Devices in Trigger-Action PlatformsIEEE Internet of Things Journal10.1109/JIOT.2023.333527911:7(12240-12251)Online publication date: 1-Apr-2024
  • (2024)A Survey on Verification of Security and Safety in IoT SystemsIEEE Access10.1109/ACCESS.2024.341307112(138627-138645)Online publication date: 2024
  • (2023)Security Checking of Trigger-Action-Programming Smart Home IntegrationsProceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3597926.3598084(639-651)Online publication date: 12-Jul-2023
  • (2023)Reliable Event Detection Using Time-Synchronized IoT PlatformsProceedings of Cyber-Physical Systems and Internet of Things Week 202310.1145/3576914.3587501(355-360)Online publication date: 9-May-2023
  • (2023)Security and Safety Verification in IoT Apps2023 IEEE International Conference on Software Maintenance and Evolution (ICSME)10.1109/ICSME58846.2023.00080(601-605)Online publication date: 1-Oct-2023
  • (2022)FortClash: Predicting and Mediating Unintended Behavior in Home AutomationProceedings of the ACM on Human-Computer Interaction10.1145/35322046:EICS(1-20)Online publication date: 17-Jun-2022
  • (2022)Protecting Smart Homes from Unintended Application Actions2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)10.1109/ICCPS54341.2022.00031(270-281)Online publication date: May-2022
  • (2022)A Survey on IoT Vulnerability DiscoveryNetwork and System Security10.1007/978-3-031-23020-2_15(267-282)Online publication date: 9-Dec-2022
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media