• Keine Ergebnisse gefunden

Cyber Physical Systems for *-aware Software

N/A
N/A
Protected

Academic year: 2021

Aktie "Cyber Physical Systems for *-aware Software"

Copied!
37
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

*-aware Software for

Cyber Physical Systems

John A. Stankovic BP America Professor

University of Virginia

(2)

Theme

• How can we build practical cyber physical systems of the future?

• 3 Critical (Foundational) Issues: must be addressed together

– Robustness – Real-Time – Openness

(3)

Foundational Principle

• Scientific and systematic approach for the impact of the physical on the cyber

• Propose:

– Physically-aware SW – Validate-aware SW

– Privacy/security aware SW

Real-time

aware

(4)

“Open” Smart Living Space

Eavesdrop Building HVAC

(5)

Openness

• Typical embedded systems closed systems design not applicable

• Added value

• Systems interact with other systems

• Evolve over long time

• Physical system itself changes

• High levels of uncertainty: Guarantees

(6)

Outline

• Physically-aware software

• Validate-aware software

• Real-Time-aware software

• Privacy-aware software

(7)

Physically Aware: Impact of the Physical

• For Wireless Communications (things we know)

– Noise – Bursts – Fading

– Multi-path

– Location (on ground) – Interference

– Orientation of Antennas – Weather

– Obstacles – Energy

– Node failures

(8)

Asymmetry

A C

D

B beacon

X

data beacon

data

beacon data

B, C, and D are the same distance from A.

Note that this pattern changes over time.

Irregular Range of A

A and B are asymmetric

(9)

Routing

• DSR, LAR:

– Path-Reversal technique

Source A

B Dest.

RREQ RREQ

RREP

RREP

X

Impact on Path-Reversal Technique

(10)

Uncertainties -Voids

Destination

Source

VOID

Left Hand Rule

Physically-aware SW

(11)

Cyber-Physical Dependencies

• Sensing

– Sensor properties – Target Properties

– Environmental interference

(12)

1. An unmanned plane (UAV) deploys motes

2. Motes establish an sensor network with power management

3. Sensor network detects vehicles and wakes up the sensor nodes

Zzz...

Energy Efficient Surveillance System

Sentry

(13)

Tracking

– Magnetic sensor takes 35 ms to stabilize

• affects real-time analysis

• affects sleep/wakeup logic

– Target itself might block messages needed for fusion algorithms

• Tank blocks messages

(14)

Environmental

Abstraction Layer (EAL)

Wireless Communication Sensing and Actuation

Interference Burst

Losses Weak

Links Fading Target

Properties Weather Obstacles Wake

Up Delays

Not HW-SW co-design, but rather Cyber-Physical co-design

(15)

Validate Aware: Run Time Assurance (RTA)

• Safety Critical

• Long Lived

• Validated

• Re-validated

• Dynamics of Environmental

Changes Influence Correctness

See Run Time Assurance paper in IPSN 2010.

(16)

RTA Goals

• Validate and Re-validate that system is still operational (at semantics level)

• Anticipatory RTA

– Before problems arise

• Robust to evolutionary changes

Validate-aware software

(17)

RTA Solution

• Emulate sensor readings

• Reduce tests to focus on key functionality

• Overlap tests and system operation

• Evolve required tests

(18)

Current Solutions

• Prior deployment analysis

– Testing

– Debugging

• Post mortem analysis

– Debugging

• Monitoring low-level components of the system

– System health monitoring

Necessary, but not sufficient

(19)

RTA Framework

Formal application model

RTA test

specifications Network

database

Test generation

Test execution support

Inputs

RTA framework

Code generation

(20)

Model-based Specification

S1

S2

Fire

Smoke alarm

Temp.

alarm

Sensor Network Event Description Language (SNEDL)

Smoke

Temperature

>80°C

> 30°C

> x

(21)

Test Specification

//Declare the basic elements of the language

Time T1;

Region R1, R2;

Event FireEvent;

//Define the elements (time and place)

T1=07:00:00, */1/2010; //first day of month R1={Room1};

R2={Room2};

FireEvent = Fire @ T1;

(22)

Token Flow

S1

S2

Fire

Smoke alarm

Temp.

alarm

Smoke

Temperature

>80°C

>30°C

> x

(23)

Code Generation

• Code is automatically generated from the formal model

• Advantages of the token – flow model:

– efficiently supports self-testing at run time

– it is easy to monitor execution states and collect running traces

– we can easily distinguish between real and test events

(24)

Validate-aware SW

• High level spec on “function”

• Runtime SW that targets demonstrating “validation”

• SW design for ease of validation

• Framework – to load, run, display tests

• System: Be aware of validation mode

(25)

Real-Time Aware

• Hard deadlines

• Hard deadlines and safety critical

• Soft deadlines

• Time based QoS

• Dynamically changing platform (HW and

SW)

(26)

Example: Group

Management (Tracking)

Base Station

(27)

Deadlines

• If we have enough late messages within groups we can lose the track

– Not straightforward deadline

– Tied to redundancy, speed of target

• If messages don’t make it to base station in hard deadline we miss activating “IR camera”

• If we don’t act by Deadline D truck carrying bomb explodes – safety critical

(28)

Real-Time Scheduling

1 2 3

1 2 3

Tasks Deadlines

TIME Algorithm

EDF

Schedulable Yes

Order 1,2,3

How robust?

CF=1

(29)

Robust RT Scheduling For Real World CPS

1 2 3

1 2 3

Tasks Deadlines

TIME Algorithm

EDF

Schedulable Yes

Order 1,2,3

How robust?

1.8 CF

(1.8)

(30)

Real-Time Technology

• Three possible approaches

– Velocity Monotonic

– Exact Characterization

– SW-based Control Theory

(31)

Feedback Control

• Front-End

– feedback loops

based on real world control

– generate timing

requirements/rates – generally fixed

– handed to

scheduling algorithm

P1 P2 P3 P4

S c h e d u l i n g

A l g

(32)

FC-EDF Scheduling

PID Controller Service Level Controller

Admission Controller

EDF

Scheduler CPU

FC-EDF

Accepted Tasks

Submitted Tasks

MissRatios MissRatio(t)

CPUo

Completed Tasks

CPUi

Real-Time aware SW

(33)

Privacy-aware: Fingerprint And Timing-based Snoop attack

Front Door

Living Room Kitchen

Bathroom

Bedroom #1 Bedroom #2

Adversary

Fingerprint and Timestamp Snooping Device

T1 T2 T3

Timestamps Fingerprints Locations and Sensor Types

?

?

?

V. Srinivasan, J. Stankovic, K. Whitehouse, Protecting Your Daily In-Home Activity Information fron a Wireless Snooping Attack, Ubicomp, 2007.

(34)

Performance

• 8 homes - different floor plans

– Each home had 12 to 22 sensors

• 1 week deployments

• 1, 2, 3 person homes

• Violate Privacy - Techniques Created

– 80-95% accuracy of AR via 4 Tier Inference

• FATS solutions

– Reduces accuracy of AR to 0-15%

(35)

ADL

ADLs inferred:

– Sleeping, Home Occupancy – Bathroom and Kitchen Visits

– Bathroom Activities: Showering, Toileting, Washing

– Kitchen Activities: Cooking

• High level medical information inference possible

• HIPAA requires healthcare providers to protect this information

Adversary

Fingerprint and Timestamp Snooping Device

T1 T2 T3

Timestamps Fingerprints Locations and Sensor Types

?

?

?

(36)

Solutions

• Periodic

• Delay messages

• Add extra cloaking messages

• Eliminate electronic fingerprint

– Potentiometer

• Etc.

Privacy-aware software

(37)

Summary

• Robustness – to deal with uncertainties: (major environment and system evolution)

• Real-Time – for dynamic and open systems

• Openness – great value, but difficult

• Physically-aware

• Validate-aware

• Real-Time-aware

• Privacy/security-aware

• Diversity – coverage of assumptions

• EAL

*aware

CPS-aware

Referenzen

ÄHNLICHE DOKUMENTE

COmmunications Management User's Guide binder for more specific information about remote access connections and setups using the optional AT&T UNIX PC

The parameters you can change in set up include communication and printing features, and also such functions as terminal control mode, display characteristics,

CP/M has several control characters and single-key commands that allow you to edi t a complex command line before you send it to the computer with a

TeleVideo Systems, Inc.. Inserts a line consisting of spaces at the cursor position when used in the sequence, SHIFT/LOC ESC, LINE INSERT. Deletes the character

The Setup Program allows you to quickly and easily change the baud rate, and the printer and modem port data format to adapt to a variety of peripherals.. A

header files, and NQS executables with a filename extension containing the current date; then it will copy the 6.1.1 patch release software into the appropriate

The software repairs in this release are described in the README file included on the tape. Create a directory, cd into it and extract the software from the

WARNING: The equipment described in this document generates, uses, and can radiate radio frequency energy, and if not installed in accordance with instructions