Integrated Modeling Method of CPS for Real-time Data
Author:
Affiliation:

Clc Number:

TP311

Fund Project:

National Natural Science Foundation of China (61877040, 61702348, 61602325); National Key R&D Plan of China (2017YFB1303000)

  • Article
  • | |
  • Metrics
  • |
  • Reference [35]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    Cyber-physical systems (CPS) is a system that integrates physical and computational elements based on context-awareness. It can intelligently respond to dynamic changes in the real world and has important and broad application prospects. However, CPS works in a complex physical environment, and changes around it can affect the behavior of CPS. Therefore, ensuring the safety and reliability of CPS in complex environments is critical. This study proposes an integrated modeling method for real-time data. By defining a series of rules, the domain environment model is combined into the runtime verification process to ensure the safety and reliability of CPS in an uncertain environment. First, the method builds a mathematical model for the environment. Then, design the merge rules to merge the mathematical models with only one environmental factor under the same system parameter into a mathematical model with one or more environmental factors under the same system parameter. Next, the transformation rules are defined to convert the mathematical model into an environment model represented by pseudocode. Finally, the environment model is combined into the runtime monitoring model to perform verification according to the combination rules. The method makes the verification process more complete and accurate. When the environment changes, it ensures that the safety properties in the CPS are still satisfied by dynamically adjusting the parameter range. Finally, the method is applied to the mobile robot obstacle avoidance experiment, to model the temperature and humidity physical environment and then, to combine it into the monitoring model, eventually, the life time safety reminder is accurately given in different environments.

    Reference
    [1] Luo JH, Xiao ZH, Zhong CP. Analysis of the development trend of information physics systems. Telecommunications Science, 2012,28(2):127-132(in Chinese with English abstract).[doi:10.3969/j.issn.1000-0801.2012.02.025]
    [2] Li L. Research on security technology of cyber-physical systems (CPS). Automated Expo, 2017,2016(7):58-61(in Chinese with English abstract).[doi:10.3969/j.issn.1003-0492.2016.07.031]
    [3] Tsiou C, Efthymiatos G, Katostaras T. Noise in the operating rooms of Greek hospitals. The Journal of the Acoustical Society of America, 2008,123(2):757-765.[doi:10.1121/1.2821972]
    [4] Siu KC, Suh IH, Mukherjee M, Oleynikov D, Stergiou N. The effect of music on robot-assisted laparoscopic surgical performance. Surgical Innovation, 2010,17(4):306-311.[doi:10.1177/1553350610381087]
    [5] Barai S, Sau B. Path following mobile robot using passive RFID tags in indoor environment. Int'l Journal on Recent and Innovation Trends in Computing and Communication, 2015,3(7):3652-3655.
    [6] D'Amorim M, Havelund K. Event-based runtime verification of Java programs. ACM SIGSOFT Software Engineering Notes, 2005,30(4):1-7.[doi:10.1145/1082983.1083249]
    [7] Lin HM, Zhang WH. Model checking:Theory, method and application. Chinese Journal of Electronics, 2002,30(12a):1907-1912(in Chinese with English abstract).[doi:10.3321/j.issn:0372-2112.2002.z1.002]
    [8] Luo CX, Wang R, Jiang Y, Yang K, Guan Y, Li XJ, Shi ZP. Runtime verification of robots collision avoidance case study. In:Proc. of the 42nd IEEE Annual Computer Software and Applications Conf. (COMPSAC). Tokyo:IEEE Computer Society, 2018. 204-212.[doi:10.1109/COMPSAC.2018.00033]
    [9] Zhang S, He F. Research progress of runtime verification technology. Computer Science, 2014,41(s2):359-363(in Chinese with English abstract).
    [10] Wang R, Wei YX, Song HB, Jiang Y, Guan Y, Song XY, Li XJ. From off-line towards real-time verification for robot systems. IEEE Trans. on Industrial Informatics, 2018,14(4):1712-1721.[doi:10.1109/TⅡ.2017.2788901]
    [11] Meredith PO, Jin D, Griffith D, Chen F, Rosu G. An overview of the MOP runtime verification framework. Int'l Journal on Software Tools for Technology Transfer, 2012,14(3):249-289.[doi:10.1007/s10009-011-0198-6]
    [12] Jiang Y, Zhang HH, Li ZH, Deng YD, Song XY, Gu M, Sun JG. Design and optimization of multiclocked embedded systems using formal techniques. In:Proc. of the Joint Meeting on Foundations of Software Engineering. ACM, 2013. 1270-1278.[doi:10.1145/2491411.2494575]
    [13] Jiang Y, Liu H, Song HB, Kong H, Wang R, Guan Y, Sha L. Safety assured formal model driven design of the multifunction vehicle bus controller. IEEE Trans. on Intelligent Transportation Systems, 2016,(99):1-14.[doi:10.1109/TITS.2017.2778077]
    [14] Jiang Y, Song HB, Wang R, Gu M, Sun JG, Sha L. Data-centered runtime verification of wireless medical cyber-physical system. IEEE Trans. on Industrial Informatics, 2016,1(1):1-9.[doi:10.1109/tii.2016.2573762]
    [15] Zhang S, He F, Gu M. VeRV:A temporal and data-concerned verification framework for the vehicle bus systems. In:Proc. of the Computer Communications. IEEE, 2015. 1167-1175.[doi:10.1109/INFOCOM.2015.7218491]
    [16] Havelund K. Runtime verification of C programs. In:Proc. of the 20th IFIP TC 6/wg 6.1 Int'l Conf. on Testing of Software and Communicating Systems:The 8th Int'l Workshop. Berlin:Springer-Verlag, 2008. 7-22.[doi:10.1007/978-3-540-68524-1_3]
    [17] Jiang Y, Liu H, Kong H, Wang R, Hosseini M, Sun JG, Sha L. Use runtime verification to improve the quality of medical care practice. In:Proc. of the 38th IEEE/ACM Int'l Conf. on Software Engineering Companion (ICSE-C). IEEE Computer Society, 2016. 112-121.[doi:10.1145/2889160.2889233]
    [18] Gawanmeh A, Alwadi A, Parvin S. Formal verification of control strategies for a cyber physical system. In:Proc. of the 37th IEEE Int'l Conf. on Distributed Computing Systems Workshops. IEEE, 2017. 91-96.[doi:10.1109/ICDCSW.2017.59]
    [19] Bersani MM, Garcia-valls M. The cost of formal verification in adaptive CPS. An example of a virtualized server node. In:Proc. of the IEEE Int'l Symp. on High Assurance Systems Engineering. IEEE, 2016. 39-46.[doi:10.1109/HASE.2016.46]
    [20] Ishigooka T, Saissi H, Piper T, Winter S, Suri N. Practical use of formal verification for safety critical cyber-physical systems:A case study. In:Proc. of the IEEE Int'l Conf. on Cyber-physical Systems, Networks, and Applications (CPSNA). IEEE, 2014. 7-12.[doi:10.1109/CPSNA.2014.20]
    [21] Tabak Y, Jain R. Building an environment model using depth information. Computer, 1989,22(6):85-90.[doi:10.1109/2.30724]
    [22] Yang Y, Jin Y, Zhang J. Modeling method on environmental information in CPS. Journal of Jilin University (Science Edition), 2015,53(2):280-284(in Chinese with English abstract).[doi:10.13413/j.cnki.jdxblxb.2015.02.24]
    [23] Fu ZC, Guo CH, Ren SP, Jiang Y, Sha L. Modeling and integrating human interaction assumptions in medical cyber-physical system design. In:Proc. of the 30th IEEE Int'l Symp. on Computer-Based Medical Systems (CBMS). IEEE, 2017. 1619-1622.[doi:10.1109/CBMS.2017.50]
    [24] Wang Z. Research on runtime verification of real-time systems[M.S. Thesis]. Wuhan:Huazhong Normal University, 2014(in Chinese with English abstract).
    [25] Kiczales G, Hilsdale E, Hugunin J, Kersten M. An overview of AspectJ. In:Proc. of the European Conf. on Object-oriented Programming. Berlin, Heidelberg:Springer-Verlag, 2001. 327-353.[doi:10.1007/3-540-45337-7_18]
    [26] Xin Y. Research on detection, prediction and collision avoidance methods of unobstructed vehicles[Ph.D. Thesis]. Hefei:University of Science and Technology of China, 2014(in Chinese with English abstract).
    [27] Wang R, Wang M, Guan Y, Li XJ. Modeling and analysis of the obstacle-avoidance strategies for a mobile robot in a dynamic environment. In:Mathematical Problems in Engineering. 2015. 1-11.[doi:10.1155/2015/837259]
    附中文参考文献:
    [1] 罗俊海,肖志辉,仲昌平.信息物理系统的发展趋势分析.电信科学,2012,28(2):127-132.[doi:10.3969/j.issn.1000-0801.2012.02. 025]
    [2] 李琳.信息物理系统(CPS)安全技术研究.自动化博览,2017,2016(7):58-61.[doi:10.3969/j.issn.1003-0492.2016.07.031]
    [7] 林惠民,张文辉.模型检测:理论、方法与应用.电子学报,2002,30(12a):1907-1912.[doi:10.3321/j.issn:0372-2112.2002.z1.002]
    [9] 张硕,贺飞.运行时验证技术的研究进展.计算机科学,2014,41(s2):359-363.
    [22] 于洋,金英,张晶.CPS中环境信息的建模方法.吉林大学学报(理学版),2015,53(2):280-284.[doi:10.13413/j.cnki.jdxblxb.2015. 02.24].
    [24] 王珍.实时系统的运行时验证研究[硕士学位论文].武汉:华中师范大学,2014.
    [26] 辛煜.无人驾驶车辆运动障碍物检测、预测和避撞方法研究[博士学位论文].合肥:中国科学技术大学,2014.
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

罗晨霞,王瑞,关永,李晓娟,施智平,Xiaoyu SONG.面向实时数据的CPS一体化建模方法.软件学报,2019,30(7):1966-1979

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:July 15,2018
  • Revised:September 28,2018
  • Online: April 03,2019
You are the first2032291Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063