Formal Analysis of Pervasive Computing Systems

Pervasive computing systems are heterogenous and complex as they usually involve human activities, various sensors and actuators as well as middleware for system controlling. Therefore, analyzing such systems is highly non-trivial. In this work, we propose to use formal methods for analyzing pervasive computing systems. Firstly, a formal modeling framework is proposed to cover main characteristics of pervasive computing systems (e.g., context-awareness, concurrent communications, layered architectures). Secondly, we identify the safety requirements (e.g., free of deadlock and conflicts etc.) and propose their specifications as safety and liveness properties. Finally, we demonstrate our ideas using a case study of a smart nursing home system. Experimental results show the effectiveness of our approach in exploring system behaviors and revealing system design flaws such as information inconsistency and conflicting reminder services.

[1]  Peter Csaba Ölveczky,et al.  Formal modeling, performance estimation, and model checking of wireless sensor network algorithms in Real-Time Maude , 2009, Theor. Comput. Sci..

[2]  Amitava Mukherjee,et al.  Pervasive Computing: A Paradigm for the 21st Century , 2003, Computer.

[3]  Jun Sun,et al.  Context Awareness Systems Design and Reasoning , 2006, Second International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (isola 2006).

[4]  Adrian Giurca,et al.  Handbook of Research on Emerging Rule-based Languages and Technologies: Open Solutions and Approaches , 2009 .

[5]  Marta Z. Kwiatkowska,et al.  PRISM 4.0: Verification of Probabilistic Real-Time Systems , 2011, CAV.

[6]  Jun Sun,et al.  Model Checking Hierarchical Probabilistic Systems , 2010, ICFEM.

[7]  Jun Sun,et al.  Integrating Specification and Programs for System Modeling and Verification , 2009, 2009 Third IEEE International Symposium on Theoretical Aspects of Software Engineering.

[8]  Mark Ryan,et al.  Towards the Verification of Pervasive Systems , 2009, Electron. Commun. Eur. Assoc. Softw. Sci. Technol..

[9]  Rajeev Alur,et al.  Timed Automata , 1999, CAV.

[10]  Luca Cardelli,et al.  Mobile Ambients , 1998, FoSSaCS.

[11]  Edmund M. Clarke,et al.  Model Checking , 1999, Handbook of Automated Reasoning.

[12]  Jin Song Dong,et al.  Mild Dementia Care at Home - Integrating Activity Monitoring, User Interface Plasticity and Scenario Verification , 2010, ICOST.

[13]  Ling Shi,et al.  Modeling and verifying hierarchical real-time systems using stateful timed CSP , 2013, TSEM.

[14]  Jun Sun,et al.  PAT: Towards Flexible Verification under Fairness , 2009, CAV.

[15]  David S. Rosenblum,et al.  Context-Aware Adaptive Applications: Fault Patterns and Their Automated Identification , 2010, IEEE Transactions on Software Engineering.

[16]  Grzegorz J. Nalepa,et al.  Rules Verification and Validation , 2009 .

[17]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[18]  Somesh Jha,et al.  Model Checking for Security Protocols , 1997 .

[19]  CoronatoAntonio,et al.  Formal specification of wireless and pervasive healthcare applications , 2010 .

[20]  Giuseppe De Pietro,et al.  Formal specification of wireless and pervasive healthcare applications , 2010, TECS.

[21]  W. Keith Edwards,et al.  At Home with Ubiquitous Computing: Seven Challenges , 2001, UbiComp.

[22]  Jin Song Dong,et al.  Blending Object-Z and Timed CSP: an introduction to TCOZ , 1998, Proceedings of the 20th International Conference on Software Engineering.

[23]  Xingshe Zhou,et al.  Handling conflicts of context-aware reminding system in sensorised home , 2011, Cluster Computing.