Synthesis of Minimum-Cost Shields for Multi-agent Systems

In this paper, we propose a general approach to derive runtime enforcement implementations for multiagent systems, called shields, from temporal logical specifications. Each agent of the multi-agent system is monitored, and if needed corrected, by the shield, such that a global specification is always satisfied. The different ways of how a shield can interfere with each agent in the system in case of an error introduces the need for quantitative objectives. This work is the first to discuss the shield synthesis problem with quantitative objectives. We provide several cost functions that are utilized in the multi-agent setting and provide methods for the synthesis of cost-optimal shields and fair shields, under the given assumptions on the multi-agent system. We demonstrate the applicability of our approach via a detailed case study on UAV mission planning for warehouse logistics and simulating the shielded multi-agent system on ROS/Gazebo.

[1]  Lujo Bauer,et al.  Run-Time Enforcement of Nonsafety Policies , 2009, TSEC.

[2]  Thomas Wilke,et al.  Automata logics, and infinite games: a guide to current research , 2002 .

[3]  Martin Leucker,et al.  Runtime Verification for LTL and TLTL , 2011, TSEM.

[4]  Jin Hock Ong,et al.  Multi-UAV System for Inventory Automation , 2007, 2007 1st Annual RFID Eurasia.

[5]  Grigore Rosu,et al.  EnforceMOP: a runtime property enforcement system for multithreaded programs , 2013, ISSTA.

[6]  Adrian Francalanza,et al.  Synthesising correct concurrent runtime monitors , 2015, Formal Methods Syst. Des..

[7]  Derek Kingston,et al.  A Brief Introduction to Unmanned Systems Autonomy Services (UxAS) , 2018, 2018 International Conference on Unmanned Aircraft Systems (ICUAS).

[8]  Tariq Samad,et al.  Network-Centric Systems for Military Operations in Urban Terrain: The Role of UAVs , 2007, Proceedings of the IEEE.

[9]  César Sánchez,et al.  Runtime Verification for Decentralised and Distributed Systems , 2018, Lectures on Runtime Verification.

[10]  Hadas Kress-Gazit,et al.  Shortcut through an evil door: Optimality of correct-by-construction controllers in adversarial environments , 2013, 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[11]  Yliès Falcone,et al.  You Should Better Enforce Than Verify , 2010, RV.

[12]  Thanh-Hung Nguyen,et al.  Runtime Verification of Component-Based Systems , 2011, SEFM.

[13]  Yliès Falcone,et al.  What can you verify and enforce at runtime? , 2012, International Journal on Software Tools for Technology Transfer.

[14]  D. Ghose,et al.  Multi-UAV Task Allocation using Team Theory , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.

[15]  Amir Pnueli,et al.  The temporal logic of programs , 1977, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977).

[16]  Sven Schewe,et al.  Synthesis of Distributed Systems , 2018 .

[17]  Ufuk Topcu,et al.  Shield synthesis , 2017, Formal Methods Syst. Des..

[18]  Michal Pechoucek,et al.  Autonomous UAV Surveillance in Complex Urban Environments , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.

[19]  Fred B. Schneider,et al.  Enforceable security policies , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[20]  Han-Lim Choi,et al.  Real-Time Multi-UAV Task Assignment in Dynamic and Uncertain Environments , 2009 .

[21]  Yliès Falcone,et al.  Decentralised LTL monitoring , 2016, Formal Methods Syst. Des..