Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Runtime Monitoring of Cyber-Physical Systems Under Timing and Memory Constraints

Published: 20 October 2015 Publication History

Abstract

The goal of runtime monitoring is to inspect the well-being of a system by employing a monitor process that reads the state of the system during execution and evaluates a set of properties expressed in some specification language. The main challenge in runtime monitoring is dealing with the costs imposed in terms of resource utilization. In the context of cyber-physical systems, it is crucial for a software monitoring solution to be time predictable to improve scheduling, as well as support composition of monitoring solutions with an overall predictable behavior. Moreover, a small memory footprint is often required in components of cyber-physical systems, especially in deeply embedded systems. In this article, we propose a novel control-theoretic software monitoring solution for coordinating time predictability and memory utilization in runtime monitoring of systems that interact with the physical world. The controllers attempt to reduce monitoring jitter and maximize memory utilization while simultaneously ensuring the soundness of evaluation of properties. For systems where multiple properties are required to be monitored simultaneously, we construct a buffer sharing mechanism in which controllers dynamically share the memory space to negate the effect of bursts of environment actions, thus reducing jitter due to transient high loads.
To validate our design choices, we present three case studies: (1) a Bluetooth mobile payment system, which shows a sporadic rate of events during peak hours; (2) a laser beam stabilizer for target tracking, and (3) a monitoring system for air/fuel ratio in a car engine exhaust and the CAM inlet position in the engine’s cylinders. The experimental results of the case studies demonstrate up to 40% improvement in time predictability of the monitoring solution when compared to a basic event-triggered approach. Moreover, memory utilization reaches an average of 90% when using our dynamic buffer resizing mechanism.

References

[1]
E. Bodden, L. Hendren, and O. Lhoták. 2007. A staged static program analysis to improve the performance of runtime monitoring. In Proceedings of the 21st European Conference on Object-Oriented Programming (ECOOP’07). Springer-Verlag, Berlin, 525--549.
[2]
B. Bonakdarpour, S. Navabpour, and S. Fischmeister. 2011. Sampling-based runtime verification. In Proceedings of the 17th International Symposium on Formal Methods (FM). 88--102.
[3]
B. Bonakdarpour, S. Navabpour, and S. Fischmeister. 2013. Time-triggered runtime verification. Formal Methods in Systems Design (FMSD) 43, 1 (2013), 29--60.
[4]
F. Chen and G. Roşu. 2007. MOP: An efficient and generic runtime verification framework. In ACM SIGPLAN Notices, Vol. 42. ACM, 569--588.
[5]
S. Colin and L. Mariani. 2005. Run-Time Verification. LCNS Vol. 3472. Springer-Verlag, Chap. 18.
[6]
M. d’Amorim and K. Havelund. 2005. Event-based runtime verification of Java programs. In ACM SIGSOFT Software Engineering Notes, Vol. 30. ACM, 1--7.
[7]
M. d’Amorim and G. Roşu. 2005. Efficient monitoring of ω-languages. In Proceedings of the 17th International Conference on Computer Aided Verification (CAV’05). Springer-Verlag, Berlin, 364--378.
[8]
D. Driankov, H. Hellendoorn, and W. Reinfrank. 1993. An Introduction to Fuzzy Control. Springer-Verlag New York, Inc., New York, NY.
[9]
M. B. Dwyer, A. Kinneer, and S. Elbaum. 2007. Adaptive online program analysis. In Proceedings of the 29th International Conference on Software Engineering (ICSE’07). IEEE Computer Society, Washington, DC, 220--229.
[10]
P. Galan. 2003. Temperature control based on traditional PID versus fuzzy controllers. Nortel Networks Control Software Design Documentation (2003).
[11]
A. Galati and C. Greenhalgh. 2010. Human mobility in shopping mall environments. In Proceedings of the 2nd International Workshop on Mobile Opportunistic Networking. ACM, 1--7.
[12]
D. Giannakopoulou and K. Havelund. 2001. Automata-based verification of temporal properties on running programs. In Proceedings of the IEEE/ACM International Conference on Automated Software Engineering (ASE). 412--416.
[13]
M. Hauswirth and T. M. Chilimbi. 2004. Low-overhead memory leak detection using adaptive statistical profiling. In ACM SIGPLAN Notices, Vol. 39. ACM, 156--164.
[14]
X. Huang, J. Seyster, S. Callanan, K. Dixit, R. Grosu, S. A. Smolka, S. D. Stoller, and E. Zadok. 2012. Software monitoring with controllable overhead. Software Tools for Technology Transfer (STTT) 14, 3 (2012), 327--347.
[15]
H. Kopetz. 1991. Event-triggered versus time-triggered real-time systems. In Operating Systems of the 90s and Beyond. Springer, 86--101.
[16]
H. Kopetz and G. Bauer. 2003. The time-triggered architecture. Proceedings of the IEEE 91, 1 (2003), 112--126.
[17]
S. Navabpour, B. Bonakdarpour, and S. Fischmeister. 2012. Path-aware time-triggered runtime verification. In Runtime Verification (RV). 199--213.
[18]
S. Navabpour, B. Bonakdarpour, and S. Fischmeister. 2015. Time-triggered runtime verification of component-based multi-core systems. In Proceedings of the 15th International Conference on Runtime Verification (RV). 153--168.
[19]
A. Pnueli and A. Zaks. 2006. PSL model checking and run-time verification via testers. In Symposium on Formal Methods (FM). 573--586.
[20]
D. E. Rivera, M. Morari, and S. Skogestad. 1986. Internal model control: PID controller design. Industrial & Engineering Chemistry Process Design and Development 25, 1 (1986), 252--265.
[21]
T. J. Ross. 2009. Fuzzy Logic with Engineering Applications. Wiley.
[22]
S. Stoller, E. Bartocci, J. Seyster, R. Grosu, K. Havelund, S. Smolka, and E. Zadok. 2011. Runtime verification with state estimation. In Proceedings of the 2nd International Conference on Runtime Verification. Springer-Verlag, 193--207.
[23]
J. G. Ziegler and N. B. Nichols. 1942. Optimum settings for automatic controllers. Transactions of the ASME 64, 11 (1942).

Cited By

View all
  • (2024)Design Methodology for Robust, Distributed Time-Sensitive ApplicationsIEEE Internet of Things Magazine10.1109/IOTM.001.23000487:1(104-110)Online publication date: Jan-2024
  • (2023)Monitoring Signal Temporal Logic in Distributed Cyber-physical SystemsProceedings of the ACM/IEEE 14th International Conference on Cyber-Physical Systems (with CPS-IoT Week 2023)10.1145/3576841.3585937(154-165)Online publication date: 9-May-2023
  • (2023)A Review and Analysis of the Characteristics of Cyber-physical Systems in Industry 4.0SN Computer Science10.1007/s42979-023-02268-04:6Online publication date: 28-Oct-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Embedded Computing Systems
ACM Transactions on Embedded Computing Systems  Volume 14, Issue 4
December 2015
604 pages
ISSN:1539-9087
EISSN:1558-3465
DOI:10.1145/2821757
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 20 October 2015
Accepted: 01 March 2015
Revised: 01 January 2015
Received: 01 October 2014
Published in TECS Volume 14, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Runtime monitoring
  2. cyber-physical systems
  3. resource efficiency

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • NSERC Discovery
  • Canada NSERC Strategic Project

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)2
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Design Methodology for Robust, Distributed Time-Sensitive ApplicationsIEEE Internet of Things Magazine10.1109/IOTM.001.23000487:1(104-110)Online publication date: Jan-2024
  • (2023)Monitoring Signal Temporal Logic in Distributed Cyber-physical SystemsProceedings of the ACM/IEEE 14th International Conference on Cyber-Physical Systems (with CPS-IoT Week 2023)10.1145/3576841.3585937(154-165)Online publication date: 9-May-2023
  • (2023)A Review and Analysis of the Characteristics of Cyber-physical Systems in Industry 4.0SN Computer Science10.1007/s42979-023-02268-04:6Online publication date: 28-Oct-2023
  • (2023)Predicate monitoring in distributed cyber-physical systemsInternational Journal on Software Tools for Technology Transfer (STTT)10.1007/s10009-023-00718-x25:4(541-556)Online publication date: 1-Aug-2023
  • (2022)Leveraging System Dynamics in Runtime Verification of Cyber-Physical SystemsLeveraging Applications of Formal Methods, Verification and Validation. Verification Principles10.1007/978-3-031-19849-6_16(264-278)Online publication date: 17-Oct-2022
  • (2021)Cyber-Physical Systems and Smart Cities in India: Opportunities, Issues, and ChallengesSensors10.3390/s2122771421:22(7714)Online publication date: 19-Nov-2021
  • (2021)Secure Planning Against Stealthy Attacks via Model-Free Reinforcement Learning2021 IEEE International Conference on Robotics and Automation (ICRA)10.1109/ICRA48506.2021.9560940(10656-10662)Online publication date: 30-May-2021
  • (2021)Predicate Monitoring in Distributed Cyber-Physical SystemsRuntime Verification10.1007/978-3-030-88494-9_1(3-22)Online publication date: 11-Oct-2021
  • (2020)Towards real-time cyber-physical systems instrumentation for creating digital twinsProceedings of the 2020 Spring Simulation Conference10.5555/3408207.3408241(1-12)Online publication date: 19-May-2020
  • (2020)Efficient Two-Layered Monitor for Partially Synchronous Distributed Systems2020 International Symposium on Reliable Distributed Systems (SRDS)10.1109/SRDS51746.2020.00020(123-132)Online publication date: Sep-2020
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media