System Verification and Runtime Monitoring with Multiple Weakly-Hard Constraints
-
Published:2023-07-13
Issue:3
Volume:7
Page:1-28
-
ISSN:2378-962X
-
Container-title:ACM Transactions on Cyber-Physical Systems
-
language:en
-
Short-container-title:ACM Trans. Cyber-Phys. Syst.
Author:
Hsieh Yi-Ting1ORCID,
Chang Tzu-Tao1ORCID,
Tsai Chen-Jun1ORCID,
Wu Shih-Lun1ORCID,
Bai Ching-Yuan1ORCID,
Chang Kai-Chieh1ORCID,
Lin Chung-Wei1ORCID,
Kang Eunsuk2ORCID,
Huang Chao3ORCID,
Zhu Qi4ORCID
Affiliation:
1. National Taiwan University, Taiwan
2. Carnegie Mellon University, USA
3. University of Liverpool, UK
4. Northwestern University, USA
Abstract
A weakly-hard fault model can be captured by an
(m,k)
constraint, where 0≤
m
≤
k
, meaning that there are at most
m
bad events (faults) among any
k
consecutive events. In this article, we use a weakly-hard fault model to constrain the occurrences of faults in system inputs. We develop approaches to verify properties for all possible values of
(m,k)
, where
k
is smaller than or equal to a given
K
, in an exact and efficient manner. By verifying all possible values of
(m,k)
, we define weakly-hard requirements for the system environment and design a runtime monitor based on counting the number of faults in system inputs. If the system environment satisfies the weakly-hard requirements, then the satisfaction of desired properties is guaranteed; otherwise, the runtime monitor can notify the system to switch to a safe mode. This is especially essential for cyber-physical systems that need to provide guarantees with limited resources and the existence of faults. Experimental results with discrete second-order control, network routing, vehicle following, and lane changing demonstrate the generality and the efficiency of the proposed approaches.
Funder
Asian Office of Aerospace Research and Development
Office of Naval Research Global
Taiwan Ministry of Education
Taiwan National Science and Technology Council
US National Science Foundation
Office of Naval Research
Publisher
Association for Computing Machinery (ACM)
Subject
Artificial Intelligence,Control and Optimization,Computer Networks and Communications,Hardware and Architecture,Human-Computer Interaction
Reference28 articles.
1. L. Ahrendts, S. Quinton, T. Boroske, and R. Ernst. 2018. Verifying weakly-hard real-time properties of traffic streams in switched networks. In Euromicro Conference on Real-Time Systems, Vol. 106. 15:1–15:22.
2. Weakly hard real-time systems
3. G. Bernat and R. Cayssials. 2001. Guaranteed on-line weakly-hard real-time systems. In IEEE Real-Time Systems Symposium. IEEE, 22–35.
4. Towards Networked Control Systems with guaranteed stability: Using weakly hard real-time constraints to model the loss process
5. H. Choi, H. Kim, and Q. Zhu. 2019. Job-class-level fixed priority scheduling of weakly-hard real-time systems. In IEEE Real-Time Technology and Applications Symposium. IEEE, 241–253.