Self-Adaptation with Imperfect Monitoring in Solar Energy Harvesting Systems

Ubiquitous and perpetual nature of cyber-physical systems (CPSs) have made them mostly battery-operated in many applications. The batteries need recharge via environmental energy sources. Solar energy harvesting is a conventional source for CPSs, whereas it is not perfectly predictable due to environmental changes. Thus, the system needs to adaptively control its consumption with respect to the energy harvesting. In this paper, we propose a model-driven approach for analyzing self-adaptive solar energy harvesting systems; it uses a feedback control loop to monitor and analyze the behavior of the system and the environment, and decides which adaptation action must be triggered against the changes. We elaborate a data-driven method to come up with the prediction of the incoming changes, especially those from the environment. The method takes the energy harvesting data for prediction purposes, and models the environment as a Markov chain. We empower the proposed system against the runtime monitoring faults as well. In this regard, the system is able to verify an incomplete model, i.e. when some data is missed. To this aim, we propose a pattern-matching system that simulates the current behavior of the system using random walk, and matches it with the history to estimate the omitted data. The results show an accuracy of at least 96% when decisions are made by imperfect monitoring.

[1]  Gongjun Yan,et al.  Towards intelligent transportation Cyber-Physical Systems: Real-time computing and communications perspectives , 2015, SoutheastCon 2015.

[2]  L. Asz Random Walks on Graphs: a Survey , 2022 .

[3]  Fathiyeh Faghih,et al.  Probabilistic analysis of self-stabilizing systems: A case study on a mutual exclusion algorithm , 2018, 2018 Real-Time and Embedded Systems and Technologies (RTEST).

[4]  Hassaan Khaliq Qureshi,et al.  ASIM: Solar Energy Availability Model for Wireless Sensor Networks , 2015, ENSsys@SenSys.

[5]  Simos Gerasimou,et al.  Runtime quantitative verification of self-adaptive systems , 2016 .

[6]  Bradley R. Schmerl,et al.  Efficient Decision-Making under Uncertainty for Proactive Self-Adaptation , 2016, 2016 IEEE International Conference on Autonomic Computing (ICAC).

[7]  Sofie Haesaert,et al.  Automated Experiment Design for Data-Efficient Verification of Parametric Markov Decision Processes , 2017, QEST.

[8]  Gabriel A. Moreno Adaptation Timing in Self-Adaptive Systems , 2017 .

[9]  Marta Z. Kwiatkowska,et al.  PRISM 4.0: Verification of Probabilistic Real-Time Systems , 2011, CAV.

[10]  László Lovász,et al.  Random Walks on Graphs: A Survey , 1993 .

[11]  Sheldon M. Ross,et al.  Stochastic Processes , 2018, Gauge Integral Structures for Stochastic Calculus and Quantum Electrodynamics.

[12]  Fathiyeh Faghih,et al.  Probabilistic approximation of runtime quantitative verification in self-adaptive systems , 2020, Microprocess. Microsystems.

[13]  Manuel Núñez,et al.  Formal Methods for Industrial Critical Systems , 2015, Lecture Notes in Computer Science.

[14]  N. Madras,et al.  THE SELF-AVOIDING WALK , 2006 .

[15]  Gordon Slade,et al.  The self-avoiding walk: A brief survey , 2011 .

[16]  Mona Ghassemian,et al.  An Adaptive Algorithm to Improve Energy Efficiency in Wearable Activity Recognition Systems , 2017, IEEE Sensors Journal.

[17]  Radek Pelánek,et al.  Fighting State Space Explosion: Review and Evaluation , 2009, FMICS.

[18]  Radu Calinescu,et al.  Efficient runtime quantitative verification using caching, lookahead, and nearly-optimal reconfiguration , 2014, SEAMS 2014.

[19]  Carlo Ghezzi,et al.  Self-adaptive software needs quantitative verification at runtime , 2012, CACM.

[20]  S. A. Imam,et al.  Energy-Efficient Communication Methods in Wireless Sensor Networks: A Critical Review , 2012 .

[21]  Rodolfo E. Haber,et al.  Self-adaptive systems: A survey of current approaches, research challenges and applications , 2013, Expert Syst. Appl..

[22]  Alison L Gibbs,et al.  On Choosing and Bounding Probability Metrics , 2002, math/0209021.

[23]  Behnam Bahrak,et al.  Detecting new generations of threats using attribute-based attack graphs , 2019, IET Inf. Secur..

[24]  Kristofer S. J. Pister,et al.  Wireless Gas Leak Detection and Localization , 2016, IEEE Transactions on Industrial Informatics.

[25]  Hongyang Qu,et al.  Incremental quantitative verification for Markov decision processes , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN).

[26]  Radu Calinescu,et al.  FACT: A Probabilistic Model Checker for Formal Verification with Confidence Intervals , 2016, TACAS.

[27]  Peter A. Dinda,et al.  An Extensible Toolkit for Resource Prediction In Distributed Systems , 1999 .