Multi-valued model checking IoT and intelligent systems with commitment protocols in multi-source data environments

被引:6
作者
Alwhishi, Ghalya [1 ]
Bentahar, Jamal [1 ,2 ]
Elwhishi, Ahmed [3 ]
Pedrycz, Witold [4 ,5 ,6 ,7 ]
Drawel, Nagat [1 ]
机构
[1] Concordia Univ, 1455 Boul Maisonneuve Ouest, Montreal, PQ, Canada
[2] Khalifa Univ, Dept Elect Engn & Comp Sci, Abu Dhabi, U Arab Emirates
[3] Univ Doha Sci & Technol, 24449 Arab League St, Doha, Qatar
[4] Univ Alberta, 116 St & 85 Ave, Edmonton, AB, Canada
[5] Polish Acad Sci, PL-00901 Warsaw, Poland
[6] Istinye Univ, Vadistanbul 4A Blok, TR-34396 Istanbul, Turkiye
[7] King Abdulaziz Univ, Jeddah 21589, Saudi Arabia
基金
加拿大自然科学与工程研究理事会;
关键词
Multi-valued model checking; IoT's; Intelligent systems (IS) Commitment; Lattice-valued propositional logics; Uncertainty; Inconsistency; VERIFICATION; FUSION;
D O I
10.1016/j.inffus.2023.102048
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In today's world of connectivity, various domains use different multi-sensor Internet of Things (IoT) and Intelligent Systems (IS) applications. These applications involve extensive interactions between thousands or millions of components in open environments, which challenges verifying their reliability and efficiency. This paper introduces the first investigation in verifying IoT applications and intelligent systems in multi-source data settings with multi-agent commitment protocols in uncertain or inconsistent environments. Specifically, we present original and efficient solutions for modeling and verifying these systems with conditional and unconditional commitment protocols under uncertain or inconsistent settings. We introduce 4v-CTLc and 4v-CTLcc, multi-valued logics of commitment for reasoning about inconsistency over these systems that expand 3v-CTLc and 3v-CTLcc for reasoning about uncertainty. Moreover, we introduce new reduction algorithms for reducing our multi-valued model checking problems to the two-valued ones. To implement these algorithms, we develop two new automatic verification tools. The first tool translates the multi-valued logics to CTL and automatically interacts with the NuSMV model checker. The second tool translates these logics to the two-valued versions, CTLc and CTLcc, and automatically interacts with the MCMAS+ model checker. We apply our verification approaches to a Smart Home, a Smart Hospital and a Smart Mortgage system with multi-source data as case studies using sets of properties, including safety, liveness and reachability. The experimental results obtained by the proposed multi-valued model checking techniques proved these techniques' high efficiency and applicability to modeling and verifying intelligent and autonomous multi-source data systems.
引用
收藏
页数:27
相关论文
共 50 条
[21]   Transformation-based model checking temporal trust in multi-agent systems [J].
Drawel, Nagat ;
Laarej, Amine ;
Bentahar, Jamal ;
El Menshawy, Mohamed .
JOURNAL OF SYSTEMS AND SOFTWARE, 2022, 192
[22]   Formal Specification and Automatic Verification of Conditional Commitments [J].
El Kholy, Warda ;
El Menshawy, Mohamed ;
Bentahar, Jamal ;
Qu, Hongyang ;
Dssouli, Rachida .
IEEE INTELLIGENT SYSTEMS, 2015, 30 (02) :36-44
[23]   Conditional Commitments: Reasoning and Model Checking [J].
El Kholy, Warda ;
Bentahar, Jamal ;
El Menshawy, Mohamed ;
Qu, Hongyang ;
Dssouli, Rachida .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2014, 24 (02)
[24]   Model checking real-time conditional commitment logic using transformation [J].
El Menshawy, Mohamed ;
Bentahar, Jamal ;
El Kholy, Warda ;
Laarej, Amine .
JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 138 :189-205
[25]   Reducing model checking commitments for agent communication to model checking ARCTL and GCTL [J].
El Menshawy, Mohamed ;
Bentahar, Jamal ;
El Kholy, Warda ;
Dssouli, Rachida .
AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS, 2013, 27 (03) :375-418
[26]   Verifying conformance of multi-agent commitment-based protocols [J].
El-Menshawy, Mohamed ;
Bentahar, Jamal ;
El Kholy, Warda ;
Dssouli, Rachida .
EXPERT SYSTEMS WITH APPLICATIONS, 2013, 40 (01) :122-138
[27]  
El-Menshawy M, 2011, LECT NOTES ARTIF INT, V6619, P185, DOI 10.1007/978-3-642-20715-0_11
[28]   A model checking-based security analysis framework for IoT systems [J].
Fang, Zheng ;
Fu, Hao ;
Gu, Tianbo ;
Qian, Zhiyun ;
Jaeger, Trent ;
Hu, Pengfei ;
Mohapatra, Prasant .
HIGH-CONFIDENCE COMPUTING, 2021, 1 (01)
[29]   AI, Blockchain, and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions [J].
Hammoud, Ahmad ;
Sami, Hani ;
Mourad, Azzam ;
Otrok, Hadi ;
Mizouni, Rabeb ;
Bentahar, Jamal .
IEEE Internet of Things Magazine, 2020, 3 (02) :68-73
[30]  
Hanes D., 2017, IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things