for Cyber Physical Systems John A. Stankovic BP America Professor - - PowerPoint PPT Presentation

for
SMART_READER_LITE
LIVE PREVIEW

for Cyber Physical Systems John A. Stankovic BP America Professor - - PowerPoint PPT Presentation

*-aware Software for Cyber Physical Systems John A. Stankovic BP America Professor University of Virginia Theme How can we build practical cyber physical systems of the future? 3 Critical (Foundational) Issues: must be addressed


slide-1
SLIDE 1

*-aware Software for Cyber Physical Systems

John A. Stankovic BP America Professor University of Virginia

slide-2
SLIDE 2

Theme

  • How can we build practical cyber

physical systems of the future?

  • 3 Critical (Foundational) Issues: must

be addressed together

– Robustness – Real-Time – Openness

slide-3
SLIDE 3

Foundational Principle

  • Scientific and systematic approach for

the impact of the physical on the cyber

  • Propose:

– Physically-aware SW – Validate-aware SW – Privacy/security aware SW Real-time aware

slide-4
SLIDE 4

“Open” Smart Living Space

Eavesdrop Building HVAC

slide-5
SLIDE 5

Openness

  • Typical embedded systems closed

systems design not applicable

  • Added value
  • Systems interact with other systems
  • Evolve over long time
  • Physical system itself changes
  • High levels of uncertainty: Guarantees
slide-6
SLIDE 6

Outline

  • Physically-aware software
  • Validate-aware software
  • Real-Time-aware software
  • Privacy-aware software
slide-7
SLIDE 7

Physically Aware: Impact of the Physical

  • For Wireless Communications (things we know)

– Noise – Bursts – Fading – Multi-path – Location (on ground) – Interference – Orientation of Antennas – Weather – Obstacles – Energy – Node failures

slide-8
SLIDE 8

Asymmetry

A C D B beacon

X

data beacon data beacon data

B, C, and D are the same distance from A. Note that this pattern changes over time.

Irregular Range

  • f A

A and B are asymmetric

slide-9
SLIDE 9

Routing

  • DSR, LAR:

– Path-Reversal technique

Source A B Dest. RREQ RREQ RREP RREP

X

Impact on Path-Reversal Technique

slide-10
SLIDE 10

Uncertainties -Voids

Destination Source

VOID Left Hand Rule Physically-aware SW

slide-11
SLIDE 11

Cyber-Physical Dependencies

  • Sensing

– Sensor properties – Target Properties – Environmental interference

slide-12
SLIDE 12
  • 1. An unmanned plane (UAV) deploys motes
  • 2. Motes establish an sensor network

with power management 3. Sensor network detects vehicles and wakes up the sensor nodes

Zzz...

Energy Efficient Surveillance System

Sentry

slide-13
SLIDE 13

Tracking

– Magnetic sensor takes 35 ms to stabilize

  • affects real-time analysis
  • affects sleep/wakeup logic

– Target itself might block messages needed for fusion algorithms

  • Tank blocks messages
slide-14
SLIDE 14

Environmental Abstraction Layer (EAL)

Wireless Communication Sensing and Actuation Interference Burst Losses Weak Links Fading

Target Properties Weather Obstacles Wake Up Delays

Not HW-SW co-design, but rather Cyber-Physical co-design

slide-15
SLIDE 15

Validate Aware: Run Time Assurance (RTA)

  • Safety Critical
  • Long Lived
  • Validated
  • Re-validated
  • Dynamics of

Environmental Changes Influence Correctness

See Run Time Assurance paper in IPSN 2010.

slide-16
SLIDE 16

RTA Goals

  • Validate and Re-validate that system is

still operational (at semantics level)

  • Anticipatory RTA

– Before problems arise

  • Robust to evolutionary changes

Validate-aware software

slide-17
SLIDE 17

RTA Solution

  • Emulate sensor readings
  • Reduce tests to focus on key

functionality

  • Overlap tests and system operation
  • Evolve required tests
slide-18
SLIDE 18

Current Solutions

  • Prior deployment analysis

– Testing – Debugging

  • Post mortem analysis

– Debugging

  • Monitoring low-level components of the system

– System health monitoring

Necessary, but not sufficient

slide-19
SLIDE 19

RTA Framework

Formal application model RTA test specifications Network database

Test generation Test execution support

Inputs RTA framework

Code generation

slide-20
SLIDE 20

Model-based Specification

S1 S2

Fire

Smoke alarm Temp. alarm

Sensor Network Event Description Language (SNEDL)

Smoke Temperature >80°C > 30°C > x

slide-21
SLIDE 21

Test Specification

//Declare the basic elements of the language

Time T1; Region R1, R2; Event FireEvent;

//Define the elements (time and place)

T1=07:00:00, */1/2010; //first day of month R1={Room1}; R2={Room2}; FireEvent = Fire @ T1;

slide-22
SLIDE 22

Token Flow

S1 S2

Fire

Smoke alarm Temp. alarm

Smoke Temperature >80°C >30°C > x

slide-23
SLIDE 23

Code Generation

  • Code is automatically generated from the

formal model

  • Advantages of the token – flow model:

– efficiently supports self-testing at run time – it is easy to monitor execution states and collect running traces – we can easily distinguish between real and test events

slide-24
SLIDE 24

Validate-aware SW

  • High level spec on “function”
  • Runtime SW that targets

demonstrating “validation”

  • SW design for ease of validation
  • Framework – to load, run, display tests
  • System: Be aware of validation mode
slide-25
SLIDE 25

Real-Time Aware

  • Hard deadlines
  • Hard deadlines and safety critical
  • Soft deadlines
  • Time based QoS
  • Dynamically changing platform (HW and

SW)

slide-26
SLIDE 26

Example: Group Management (Tracking)

Base Station

slide-27
SLIDE 27

Deadlines

  • If we have enough late messages within

groups we can lose the track

– Not straightforward deadline – Tied to redundancy, speed of target

  • If messages don’t make it to base station in

hard deadline we miss activating “IR camera”

  • If we don’t act by Deadline D truck carrying

bomb explodes – safety critical

slide-28
SLIDE 28

Real-Time Scheduling

1 2 3 1 2 3 Tasks Deadlines TIME Algorithm EDF Schedulable Yes Order 1,2,3 How robust? CF=1

slide-29
SLIDE 29

Robust RT Scheduling For Real World CPS

1 2 3 1 2 3 Tasks Deadlines TIME Algorithm EDF Schedulable Yes Order 1,2,3 How robust? 1.8 CF (1.8)

slide-30
SLIDE 30

Real-Time Technology

  • Three possible approaches

– Velocity Monotonic – Exact Characterization – SW-based Control Theory

slide-31
SLIDE 31

Feedback Control

  • Front-End

– feedback loops based on real world control – generate timing requirements/rates – generally fixed – handed to scheduling algorithm P1 P2 P3 P4 S c h e d u l i n g A l g

slide-32
SLIDE 32

FC-EDF Scheduling

PID Controller Service Level Controller Admission Controller EDF Scheduler

CPU

FC-EDF

Accepted Tasks Submitted Tasks

MissRatios MissRatio(t)

CPUo

Completed Tasks

CPUi

Real-Time aware SW

slide-33
SLIDE 33

Privacy-aware: Fingerprint And Timing-based Snoop attack

Front Door

Living Room Kitchen

Bathroom

Bedroom #1 Bedroom #2

Adversary

Fingerprint and Timestamp Snooping Device

T1 T2 T3 … …

Timestamps Fingerprints Locations and Sensor Types

? ? ? …

  • V. Srinivasan, J. Stankovic, K. Whitehouse, Protecting Your Daily In-Home

Activity Information fron a Wireless Snooping Attack, Ubicomp, 2007.

slide-34
SLIDE 34

Performance

  • 8 homes - different floor plans

– Each home had 12 to 22 sensors

  • 1 week deployments
  • 1, 2, 3 person homes
  • Violate Privacy - Techniques Created

– 80-95% accuracy of AR via 4 Tier Inference

  • FATS solutions

– Reduces accuracy of AR to 0-15%

slide-35
SLIDE 35

ADL

  • ADLs inferred:

– Sleeping, Home Occupancy – Bathroom and Kitchen Visits – Bathroom Activities: Showering, Toileting, Washing – Kitchen Activities: Cooking

  • High level medical information

inference possible

  • HIPAA requires healthcare

providers to protect this information

Adversary

Fingerprint and Timestamp Snooping Device

T1 T2 T3 … …

Timestamps Fingerprints Locations and Sensor Types

? ? ? …

slide-36
SLIDE 36

Solutions

  • Periodic
  • Delay messages
  • Add extra cloaking messages
  • Eliminate electronic fingerprint

– Potentiometer

  • Etc.

Privacy-aware software

slide-37
SLIDE 37

Summary

  • Robustness – to deal with uncertainties: (major

environment and system evolution)

  • Real-Time – for dynamic and open systems
  • Openness – great value, but difficult
  • Physically-aware
  • Validate-aware
  • Real-Time-aware
  • Privacy/security-aware
  • Diversity – coverage of assumptions
  • EAL

*aware CPS-aware