Model-Driven Engineering for Mission-Critical IoT Systems

Slides:



Advertisements
Similar presentations
1 From Grids to Service-Oriented Knowledge Utilities research challenges Thierry Priol.
Advertisements

Guaranteed Component Assembly with Round Trip Analysis for Energy Efficient High-integrity Multi-core Systems Artemis-AAL day 7 May, Budapest 1BME and.
KAIS T The Vision of Autonomic Computing Jeffrey O. Kephart, David M Chess IBM Watson research Center IEEE Computer, Jan 발표자 : 이승학.
LIFE CYCLE MODELS FORMAL TRANSFORMATION
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Presented by: Thabet Kacem Spring Outline Contributions Introduction Proposed Approach Related Work Reconception of ADLs XTEAM Tool Chain Discussion.
Variability Oriented Programming – A programming abstraction for adaptive service orientation Prof. Umesh Bellur Dept. of Computer Science & Engg, IIT.
. Smart Cities and the Ageing Population Sustainable smart cities: from vision to reality 13 October ITU, Geneva Knud Erik Skouby, CMI/ Aalborg University-Cph.
Software Engineering for Real- Time: A Roadmap H. Kopetz. Technische Universitat Wien, Austria Presented by Wing Kit Hor.
Software Testing and Quality Assurance
23/03/2007 mail-to: site: A Security Framework for Smart Ubiquitous.
Soft. Eng. II, Spring 02Dr Driss Kettani, from I. Sommerville1 CSC-3325: Chapter 6 Title : The Software Reuse Reading: I. Sommerville, Chap. 20.
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
Course Instructor: Aisha Azeem
Cloud Usability Framework
Towards a Distributed, Service-Oriented Control Infrastructure for Smart Grid ASU - Cyber Physical Systems Lab Professor G. Fainekos Presenter: Ramtin.
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
VTT-STUK assessment method for safety evaluation of safety-critical computer based systems - application in BE-SECBS project.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
Software Agents: An Overview by Hyacinth S. Nwana and Designing Behaviors for Information Agents by Keith Decker, Anandeep Pannu, Katia Sycara and Mike.
Distributed Systems: Concepts and Design Chapter 1 Pages
Composing Adaptive Software Authors Philip K. McKinley, Seyed Masoud Sadjadi, Eric P. Kasten, Betty H.C. Cheng Presented by Ana Rodriguez June 21, 2006.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
© 2012 xtUML.org Bill Chown – Mentor Graphics Model Driven Engineering.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Survival by Defense- Enabling Partha Pal, Franklin Webber, Richard Schantz BBN Technologies LLC Proceedings of the Foundations of Intrusion Tolerant Systems(2003)
Integrated Systems Division Service-Oriented Programming Guy Bieber, Lead Architect Motorola ISD C4I 2000 OOPSLA Jini Pattern Language Workshop Guy Bieber,
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
Unit 2 Architectural Styles and Case Studies | Website for Students | VTU NOTES | QUESTION PAPERS | NEWS | RESULTS 1.
Copyright © Richard N. Taylor, Nenad Medvidovic, and Eric M. Dashofy. All rights reserved. NFP Design Techniques Software Architecture Lecture 20.
Copyright © Richard N. Taylor, Nenad Medvidovic, and Eric M. Dashofy. All rights reserved. NFP Design Techniques Software Architecture Lecture 20.
Internet of Things (Ref: Slideshare)
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
System Monitoring using Constraint Checking as part of Model Based System Management 2007 Monitoring using Constraint Checking as part.
Towards an IoT Ecosystem Flavia C. Delicato 1, Paulo F. Pires 1, Thais Batista 2, Everton Cavalcante 2, Bruno Costa 1, Thomaz Barros 1 1 Department of.
Context-Aware Middleware for Resource Management in the Wireless Internet US Lab 신현정.
Washington, D.C., U.S.A May Some concepts of systems architectures Industrialization of statistics and software architecture Study cases.
Advanced Software Engineering Dr. Cheng
Chapter 12: Other Quality Attributes
Mohd Rozaini Bin Abd Rahim, Norsheila Fisal, Rozeha A
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
CompSci 280 S Introduction to Software Development
Chapter 1 Characterization of Distributed Systems
Review of last class Software Engineering Modeling Problem Solving
The Development Process of Web Applications
ASSET - Automotive Software cyber SEcuriTy
Complexity Time: 2 Hours.
Distribution and components
Biomedical Signal processing Chapter 1 Introduction
Security Engineering.
Software Quality Engineering
Manufacturing system design (MSD)
Model-Driven Analysis Frameworks for Embedded Systems
The Extensible Tool-chain for Evaluation of Architectural Models
Analysis and Understanding
Internet-based monitoring and control of embedded systems
Biomedical Signal processing Chapter 1 Introduction
The Vision of Autonomic Computing
Software Architecture Lecture 20
Securing Home IoT Environments with Attribute-Based Access Control
An Introduction to Software Architecture
Chapter 7 –Implementation Issues
3rd Studierstube Workshop TU Wien
Automated Analysis and Code Generation for Domain-Specific Models
Biomedical Signal processing Chapter 1 Introduction
Self-Managed Systems: an Architectural Challenge
Presentation transcript:

Model-Driven Engineering for Mission-Critical IoT Systems CSC2125 –Topics in Software Engineering, Or Aharoni setting and discussing technological challenges of MC-IOT critically analysing model-driven engineering as a possible candidate methodology to better support the adoption of MC-IOT.

Internet of Things Connect Smart object from different domain Software/ Application Hardware Protocols Storage Users Security

Model Driven Engineering The model in terms of the user's domain, abstracting away software- technology concepts MDE helps in tackling challenges and supporting the lifecycle of IoT system. Metadata Model Transformation MDE4IoT: Supporting the Internet of Things with Model-Driven Engineering

Characteristics of mission critical in IoT systems Dependability User can trust a system (reliability and availability). Max availability - 98.57%, Probability of failure - 0.45% Safety Ability to detect and prevent unintended behavior. Security Deal with malicious attacks, system-level trust, and privacy. Solutions: encryptions, communication protocols, and sensor data protection. Real-time System IoT system’s correctness relies on the system components’ functional behavior, ex. output, and the timing of their action, how long is the information is available. MC-IoT characteristics Dependability Security Real-Time System Safety Failure of Mission-critical systems can cause significant economic, human, or environmental losses. In the article they explored project of : Smart energy Smart Living Smart transportation Smart cities Smart Healthcare Smart learning Security systems

Concept model of mission-critical IoT system computation Sensor Device Context IoT Application Communicate by protocols Thinks – large variety of devices hosting a number of Resources and running different IoT Applications

MC- IoT system Challenges Heterogeneity Large scale & Emergent properties Context Awareness Dynamic environment Reusability Security and Trust Platform Neutrality (Protocols, HW, SW, etc.) Large scale Manually identify critical section is complex and hard to follow Emergent properties compromise system safety Dynamic context changes leads to runtime failure New system ,unknown, recovered devices Program, protocols, support reusability Decentralize architecture Efficient privacy and trust management Identify communication and adjust Semantic reusability standardization Manage and detect actions Automatic scale

Study Case: Applying MDE Smart surveillance system that aims to detect intruders Drones; Moving cameras; Fixed sensors; and Human guards observing the entire system.

Applying MDE: Heterogeneity Domain-Specific Modeling Language (DSMLs) use the same abstract modeling language to configure the surveillance system’s drones and sensors and specify their behavior, no matter who made them one place heterogeneous systems Models can become complex and hard to grasp, even for experts. Currently no precise way to verify the consistency of the implicit

Applying MDE: Large-Scale and Emergent Properties MC-IoT systems can reach the size of tens or hundreds of distributed things. How can you deal with a suspicious behavior of a single device - camera, drone, or a sensor – and it became unavailable when it is need. Models@runtime techniques allows to reallocate the functionality of each device. Uses abstractions of the runtime system and environment to effectively manage the complexity of evolving behaviors during execution You can view MC-IoT systems as a specialization of dynamically adaptive systems (DASs) WHAT IS A MODEL@RUN.TIME? In MDE, a model is an abstraction or reduced representation of a system that is built for specific purposes. The models@run.time community shares this view of what constitutes a model and seeks an understanding of the roles that such models can play at runtime.

Applying MDE: Context Awareness and Uncertainty Drones can suddenly crash or battery failure, or something blocking camera movement or view. MC-IoT systems will need more powerful, fully automated mechanisms for selecting the most suitable configuration, as well as self-reconfiguration capabilities

Applying MDE: Dynamic Discoverability of Resources new drones & sensors might be added to increase surveillance possibilities. Using Service-oriented modeling and service-oriented architectures (SOAs) allows to define the use of models and model transformations for identifying, specifying, realizing, composing, and orchestrating services. This could be done by using WADE (Workflows and Agents Development Environment) platform. WADE – domain independent platform, build on open source middleware (JADE 5). But it would require global standards

Applying MDE: Reusability MDE usually is combined with Component-Based Software Engineering Allowing to define reusable replaceable model entities throughout the system Involved entities can be modeled as different components, which can be manipulated through dedicated model transformation and analysis tools “MC-IoT systems have an inherent issue in trading off the use of components, which is common in other domains, with the system’s high variability and the need for self-adaptation.”

Applying MDE: Security and Trust Model-driven mechanisms grant access on the basis of trust established through negotiation between the service requester and the service provider. service providers might not know the service requesters’ identity in advance owing to ubiquitous and emergent services. In the surveillance system example MDE facilitates the definition and enforcement of user-friendly, precise, and effective security and privacy specification policies. MDE also looks at how violation of policies may affect the system’s parts.

Strengths Weaknesses Provide global idea how to look at MC-IoT Provided an example of surveillance system as a walk through Weaknesses Solutions stayed at a high level and in some case it needs to get into further detail. How to implement the ideas. Comparison in different IoT area of industry (finance, health, etc.) MDE and DSMLs only The solution relays on different research that were made but it did not explain why they decide to use it.

Conclusion Setting and discussing technological challenges of MC-IOT Critically analysing model-driven engineering as a possible candidate methodology to better support the adoption of MC-IOT.

Discussion Is this a good taxonomy paper? Why did they use MDE? Is there any other Modeling platform can we use? Any metrics for the quantifiable criteria? Are we developing correct system? Is it performing the way it should? Dose it comply with standards?