*-aware Software for Cyber Physical Systems John A. Stankovic BP America Professor University of Virginia Feb 3, 2012.

Slides:



Advertisements
Similar presentations
Cyber-Physical Systems: Aspects as a Basis for Robustness and Openness John A. Stankovic Department of Computer Science University of Virginia March 2009.
Advertisements

Feedback Control Real-Time Scheduling: Framework, Modeling, and Algorithms Chenyang Lu, John A. Stankovic, Gang Tao, Sang H. Son Presented by Josh Carl.
1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
The Self-Programming Thermostat: using occupancy to optimize setback schedules Kamin Whitehouse Joint work with: Gao GeBuildSys University of Virginia.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Sensor Network Platforms and Tools
Introduction to Cyber Physical Systems Yuping Dong Sep. 21, 2009.
MotoHawk Training Model-Based Design of Embedded Systems.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
Software Engineering for Real- Time: A Roadmap H. Kopetz. Technische Universitat Wien, Austria Presented by Wing Kit Hor.
Quality of Service in IN-home digital networks Alina Albu 22 July 2003.
Wireless Sensor Networks Haywood Ho
Presenter : Shih-Tung Huang Tsung-Cheng Lin Kuan-Fu Kuo 2015/6/15 EICE team Model-Level Debugging of Embedded Real-Time Systems Wolfgang Haberl, Markus.
Cross Layer Design in Wireless Networks Andrea Goldsmith Stanford University Crosslayer Design Panel ICC May 14, 2003.
Issues for Large Scale WSN for Medical Care John A. Stankovic Department of Computer Science University of Virginia
Ritu Varma Roshanak Roshandel Manu Prasanna
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Design of Fault Tolerant Data Flow in Ptolemy II Mark McKelvin EE290 N, Fall 2004 Final Project.
1 Research Profile Guoliang Xing Assistant Professor Department of Computer Science and Engineering Michigan State University.
Location Systems for Ubiquitous Computing Jeffrey Hightower and Gaetano Borriello.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
The Bio-Networking Architecture: An Infrastructure of Autonomic Agents in Pervasive Networks Jun Suzuki netresearch.ics.uci.edu/bionet/
Strategic Directions in Real- Time & Embedded Systems Aatash Patel 18 th September, 2001.
Report WG1 Software-Intensive Systems and New Computing Paradigms Cannes November 12-14, 2008 WG Leader: Martin Wirsing WG Depu ty Leaders: Jean-Pierre.
Misconceptions About Real-time Computing : A Serious Problem for Next-generation Systems J. A. Stankovic, Misconceptions about Real-Time Computing: A Serious.
Research Directions for the Internet of Things Supervised by: Dr. Nouh Sabry Presented by: Ahmed Mohamed Sayed.
Wireless Sensor Networks Smart Environments: Technologies, Protocols, and Applications ed. D.J. Cook and S.K. Das, John Wiley, New York, B.Devi
Sharena Paripatyadar.  What are the differences?
Home Health Care and Assisted Living John Stankovic, Sang Son, Kamin Whitehouse A.Wood, Z. He, Y. Wu, T. Hnat, S. Lin, V. Srinivasan AlarmNet is a wireless.
Learning Micro-Behaviors In Support of Cognitive Assistance AlarmNet is a wireless sensor network (WSN) system for smart health-care that opens up new.
Anthony D. Wood, John A. Stankovic, Gilles Virone, Leo Selavo, Zhimin He, Qiuhua Cao, Thao Doan, Yafeng Wu, Lei Fang, and Radu Stoleru University of Virginia.
BAND-AiDe: A Tool for Cyber-Physical Oriented Analysis and Design of Body Area Networks and Devices Authors: Ayan Banerjee, Sailesh Kandula, Tridib Mukherjee.
Wireless Sensor Networks Self-Healing Professor Jack Stankovic University of Virginia 2005.
Snooping based privacy attacks based on transmission timing and wireless fingerprinting Master’s project presentation Vijay Srinivasan University of Virginia.
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Summary Alan S. Willsky SensorWeb MURI Review Meeting September 22, 2003.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
University of Virginia Wireless Sensor Networks August, 2006 University of Virginia Jack Stankovic.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
NEST 1 NEST System Working Group Meeting #1 Jack Stankovic University of Virginia September 2001 Boeing Huntington Beach, CA.
Optimal Power Control, Rate Adaptation and Scheduling for UWB-Based Wireless Networked Control Systems Sinem Coleri Ergen (joint with Yalcin Sadi) Wireless.
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Communication Networks (Kommunikationsnetværk) Specialisations: Distributed Application Engineering Network Planning & Management Ole Brun Madsen Professor.
Tufts University School Of Engineering Tufts Wireless Laboratory TWL Direction Almir Davis 09/28/20091.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
2 nd Annual review Florence 15 th November 2013 Railway security demonstrator.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Model Checking and Model-Based Design Bruce H. Krogh Carnegie Mellon University.
A. Haeberlen Fault Tolerance and the Five-Second Rule 1 HotOS XV (May 18, 2015) Ang Chen Hanjun Xiao Andreas Haeberlen Linh Thi Xuan Phan Department of.
High-integrity Sensor Networks Mani Srivastava UCLA.
Achieving Long-Term Surveillance in VigilNet Tian He, Pascal Vicaire, Ting Yan, Qing Cao, Gang Zhou, Lin Gu, Liqian Luo, Radu Stoleru, John A. Stankovic,
Programming Sensor Networks Andrew Chien CSE291 Spring 2003 May 6, 2003.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Real-Time Systems, Events, Triggers. Real-Time Systems A system that has operational deadlines from event to system response A system whose correctness.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
What’s Ahead for Embedded Software? (Wed) Gilsoo Kim
Wireless sensor and actor networks: research challenges
Embedded, Real-Time and Wireless Systems Professor Jack Stankovic Department of Computer Science University of Virginia June 2, 2005.
Wireless Sensor Networks
University of Virginia Full Life Cycle Analysis for Wireless Sensor Networks January 10, 2007 Computer Science University of Virginia Jack Stankovic.
Adaptable and Reactive Security for Wireless Sensor Networks John A. Stankovic Department of Computer Science University of Virginia.
Embedded System Design and Development Introduction to Embedded System.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
In the name of God.
Albert M. K. Cheng Embedded Real-Time Systems
Providing Robustness in Cyber Physical Systems
Presentation transcript:

*-aware Software for Cyber Physical Systems John A. Stankovic BP America Professor University of Virginia Feb 3, 2012

What is a CPS? Isn’t is just an embedded system? Not the main question Simply parsing “CPS” -> Many systems are CPS, but that is not the issue REALLY INTERESTED IN –New research needed for the next generation of physical-cyber systems

Confluence of Key Areas Real-Time Control Cost Form Factor Severe Constraints Small Scale Closed Scheduling Fault Tolerance Wired networks Level of Uncertainty Noisy C. Sensing Scale Real-Time/Actuation Open Wireless Sensor Networks Embedded Systems Linear Adaptive Distributed Decentralized Open Human Models ArchitecturePrinciples

What’s New Openness Scale –World covered by trillions of sensors Systems of systems Confluence of physical, wireless and computing Human (in the loop) Participation

Theme How can we build practical cyber physical systems of the future? 3 Critical (Foundational) Issues: must be addressed together –Robustness –Real-Time –Openness

Foundational Principle Scientific and systematic approach for the impact of the physical on the cyber Propose: –Physically-aware SW –Validate-aware SW –Privacy/security aware SW Real-time aware SW

“Open” Smart Living Space Eavesdrop Building HVAC

Openness Typical embedded systems closed systems design not applicable Added value Systems interact with other systems Evolve over long time Physical system itself changes High levels of uncertainty: Guarantees

Computing in Physical Systems Body Networks Road and Street Networks Battlefield Networks Vehicle Networks Industrial Networks Building Networks Environmental Networks Open, Heterogeneous Wireless Networks with Sensors and Actuators

Outline Physically-aware software Validate-aware software Real-Time-aware software Privacy-aware software

Physically Aware: Impact of the Physical For Wireless Communications (things we know) –Noise –Bursts –Fading –Multi-path –Location (on ground) –Interference –Orientation of Antennas –Weather –Obstacles –Energy –Node failures

Asymmetry B, C, and D are the same distance from A. Note that this pattern changes over time. Irregular Range of A A and B are asymmetric

Routing DSR, LAR: –Path-Reversal technique Impact on Path-Reversal Technique

Uncertainties -Voids Destination Source VOID Left Hand Rule Physically-aware SW

Cyber-Physical Dependencies Sensing –Sensor properties –Target Properties –Environmental interference

1. An unmanned plane (UAV) deploys motes 2. Motes establish an sensor network with power management 3.Sensor network detects vehicles and wakes up the sensor nodes Zzz... Energy Efficient Surveillance System Sentry

Tracking –Magnetic sensor takes 35 ms to stabilize affects real-time analysis affects sleep/wakeup logic –Target itself might block messages needed for fusion algorithms Tank blocks messages

Environmental Abstraction Layer (EAL) Wireless CommunicationSensing and Actuation Interference Burst Losses Weak Links Fading … Target Properties WeatherObstacles Wake Up Delays … Not HW-SW co-design, but rather Cyber-Physical co-design

Open Q: Environment How to model How to know we have all the issues covered Design Tools Impact of the Physical on the Cyber

Open Q: Correctness What does correctness mean in an open system Formal Methods Don’t Address

Validate Aware: Run Time Assurance (RTA) Safety Critical Long Lived Validated Re-validated Dynamics of Environmental Changes Influence Correctness See Run Time Assurance paper in IPSN 2010.

RTA Goals Validate and Re-validate that system is still operational (at semantics level) Anticipatory RTA –Before problems arise Robust to evolutionary changes Validate-aware software

RTA Solution Emulate sensor readings Reduce tests to focus on key functionality Overlap tests and system operation Evolve required tests

Current Solutions Prior deployment analysis –Testing –Debugging Post mortem analysis –Debugging Monitoring low-level components of the system –System health monitoring Necessary, but not sufficient

RTA Formally specify application level semantics (of correctness) Ability to demonstrate that correctness over time

RTA Framework Inputs RTA framework

Model-based Specification Sensor Network Event Description Language (SNEDL) Smoke Temperature >80°C > 30°C > x

Test Specification //Declare the basic elements of the language Time T1; Region R1, R2; Event FireEvent; //Define the elements (time and place) T1=07:00:00, */1/2010; //first day of month R1={Room1}; R2={Room2}; FireEvent = T1;

Token Flow Smoke Temperature >80°C >30°C > x

Code Generation Code is automatically generated from the formal model Advantages of the token – flow model: –efficiently supports self-testing at run time –it is easy to monitor execution states and collect running traces –we can easily distinguish between real and test events

Validate-aware SW High level spec on “function” Runtime SW that targets demonstrating “validation” SW design for ease of validation Framework – to load, run, display tests System: Aware of validation mode

Open Q: Run Time Assurance Open system evolves Validate and re-validate (more than monitoring) –Limit number of tests Level of detail Safety Analysis

Real-Time Aware Hard deadlines Hard deadlines and safety critical Soft deadlines Time based QoS Dynamically changing platform (HW and SW)

Example: Group Management (Tracking) Base Station

Deadlines If we have enough late messages within groups we can lose the track –Not straightforward deadline –Tied to redundancy, speed of target If messages don’t make it to base station in hard deadline we miss activating “IR camera” If we don’t act by Deadline D truck carrying bomb explodes – safety critical

Real-Time Scheduling TasksDeadlines TIME Algorithm EDF Schedulable Yes Order 1,2,3 How robust? CF=1

Robust RT Scheduling For Real World CPS TasksDeadlines TIME Algorithm EDF Schedulable Yes Order 1,2,3 How robust? 1.8 CF (1.8)

Real-Time Technology Three possible approaches –Velocity Monotonic –Exact Characterization –SW-based Control Theory

Feedback Control Front-End –feedback loops based on real world control –generate timing requirements/rates –generally fixed –handed to scheduling algorithm P1 P2 P3 P4 SchedulingAlgSchedulingAlg

FC-EDF Scheduling PID Controller Service Level Controller Admission Controller EDF Scheduler CPU FC-EDF Accepted Tasks Submitted Tasks MissRatio s MissRatio(t)  CPU o Completed Tasks  CPU i Real-Time aware SW

Open Q: Control With humans in the loop –New system models Robustness (and Sensitivity Analysis) New on-line system ID techniques Interacting (dependency among) Control Loops

Privacy-aware: Fingerprint And Timing-based Snoop attack Front Door Living Room Kitchen Bathroom Bedroom #1 Bedroom #2 Adversary Fingerprint and Timestamp Snooping Device T1 T2 T3 … … TimestampsFingerprints Locations and Sensor Types ? ? ? … V. Srinivasan, J. Stankovic, K. Whitehouse, Protecting Your Daily In-Home Activity Information fron a Wireless Snooping Attack, Ubicomp, 2007.

Performance 8 homes - different floor plans –Each home had 12 to 22 sensors 1 week deployments 1, 2, 3 person homes Violate Privacy - Techniques Created –80-95% accuracy of AR via 4 Tier Inference FATS solutions –Reduces accuracy of AR to 0-15%

ADL ADLs inferred: –Sleeping, Home Occupancy –Bathroom and Kitchen Visits –Bathroom Activities: Showering, Toileting, Washing –Kitchen Activities: Cooking High level medical information inference possible HIPAA requires healthcare providers to protect this information Adversary Fingerprint and Timestamp Snooping Device T1 T2 T3 … … TimestampsFingerprints Locations and Sensor Types ???…???…

Solutions Periodic Delay messages Add extra cloaking messages Eliminate electronic fingerprint –Potentiometer Etc. Privacy-aware software

Open Q: Privacy Eavesdropping Access to information (in DB) Power of inference over time Opt-in Strategies Public Places

Summary Robustness – to deal with uncertainties: (major environment and system evolution) Real-Time – for dynamic and open systems Openness – great value, but difficult Physically-aware Validate-aware Real-Time-aware Privacy/security-aware Diversity – coverage of assumptions EAL *aware CPS-aware