Reasoning about Uncertainty over IoT Systems

被引:5
作者
Alwhishi, Ghalya [1 ]
Bentahar, Jamal [1 ]
Drawel, Nagat [1 ]
机构
[1] Concordia Univ, CIISE, Montreal, PQ, Canada
来源
2022 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC | 2022年
关键词
IoT; Smart home; Three-valued model checking; MODEL; COMMITMENTS;
D O I
10.1109/IWCMC55113.2022.9824136
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The advent of the Internet of Things (IoT) has led to a rapid increase in the number of applications that are deployed within open and uncertain physical environments. The main challenge that faces IoT applications is how to ensure the reliability of the interaction between its different components. In this paper, we propose a practical and scalable approach that involves reasoning about uncertainty of these applications using multi-valued model checking. We introduce a building block for formal specification and automatic verification of IoT services in uncertain settings. After modeling and simulating a smart home framework behavior, we introduce a set of system specifications and verify whether the given framework meets those specifications. Finally, we present the experimental results obtained using a transformation algorithm and the NuSMV tool.
引用
收藏
页码:306 / 311
页数:6
相关论文
共 25 条
[1]   Model checking temporal knowledge and commitments in multi-agent systems using reduction [J].
Al-Saqqar, Faisal ;
Bentahar, Jamal ;
Sultan, Khalid ;
Wan, Wei ;
Asl, Ehsan Khosrowshahi .
SIMULATION MODELLING PRACTICE AND THEORY, 2015, 51 :45-68
[2]  
Baier C, 2008, PRINCIPLES OF MODEL CHECKING, P1
[3]   Specifying and verifying contract-driven service compositions using commitments and model checking [J].
Bataineh, Ahmed Saleh ;
Bentahar, Jamal ;
El Menshawy, Mohamed ;
Dssouli, Rachida .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 74 :151-184
[4]  
Belnap N. D., 1977, Modern Uses Of Multiple-Valued Logic, DOI [10.1007/978-94-010-1161-7_2, DOI 10.1007/978-94-010-1161-7_2]
[5]  
Bruns G., 1999, Computer Aided Verification. 11th International Conference, CAV'99. Proceedings (Lecture Notes in Computer Science Vol.1633), P274
[6]   Multi-valued symbolic model-checking [J].
Chechik, M ;
Devereux, B ;
Easterbrook, S ;
Gurfinkel, A .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2003, 12 (04) :371-408
[7]  
Clarke E.M., 2018, Handbook of model checking, DOI [DOI 10.1007/978-3-319-10575-8, 10.1007/978-3-319-10575-8]
[8]   Formal verification of group and propagated trust in multi-agent systems [J].
Drawel, Nagat ;
Bentahar, Jamal ;
Laarej, Amine ;
Rjoub, Gaith .
AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS, 2022, 36 (01)
[9]   AI, Blockchain, and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions [J].
Hammoud, Ahmad ;
Sami, Hani ;
Mourad, Azzam ;
Otrok, Hadi ;
Mizouni, Rabeb ;
Bentahar, Jamal .
IEEE Internet of Things Magazine, 2020, 3 (02) :68-73
[10]   Stable federated fog formation: An evolutionary game theoretical approach [J].
Hammoud, Ahmad ;
Otrok, Hadi ;
Mourad, Azzam ;
Dziong, Zbigniew .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 124 :21-32