Efficient System Verification with Multiple Weakly-Hard Constraints for Runtime Monitoring

A weakly-hard fault model can be captured by an (m, k) constraint, where \(0\le m\le k\), meaning that there are at most m bad events (faults) among any k consecutive events. In this paper, we use a weakly-hard fault model to constrain the occurrences of faults in system inputs. We develop approaches to verify properties for all possible values of (m, k), where k is smaller than or equal to a given K, in an exact and efficient manner. By verifying all possible values of (m, k), we define weakly-hard requirements for the system environment and design a runtime monitor based on counting the number of faults in system inputs. If the system environment satisfies the weakly-hard requirements, the satisfaction of desired properties is guaranteed; otherwise, the runtime monitor can notify the system to switch to a safe mode. Experimental results with a discrete second-order controller demonstrate the efficiency of the proposed approaches.

[1]  Yeqiong Song,et al.  Providing Real-Time Applications With Graceful Degradation of QoS and Fault Tolerance According to$(m, k)$-Firm Model , 2006, IEEE Transactions on Industrial Informatics.

[2]  Marco Di Natale,et al.  Weakly Hard Schedulability Analysis for Fixed Priority Scheduling of Periodic Real-Time Tasks , 2017, ACM Trans. Embed. Comput. Syst..

[3]  Rolf Ernst,et al.  Verifying Weakly-Hard Real-Time Properties of Traffic Streams in Switched Networks , 2018, ECRTS.

[4]  Parameswaran Ramanathan,et al.  A Dynamic Priority Assignement Technique for Streams with (m, k)-Firm Deadlines , 1995, IEEE Trans. Computers.

[5]  Rolf Ernst,et al.  Bounding deadline misses in weakly-hard real-time systems with task dependencies , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.

[6]  Wenchao Li,et al.  Formal verification of weakly-hard systems , 2019, HSCC.

[7]  Alan Burns,et al.  Weakly Hard Real-Time Systems , 2001, IEEE Trans. Computers.

[8]  Frank Allgöwer,et al.  Stabilization of networked control systems with weakly hard real-time dropout description , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[9]  Wenchao Li,et al.  Exploring weakly-hard paradigm for networked systems , 2019, DESTION@CPSIoTWeek.

[10]  Goran Frehse,et al.  Formal Analysis of Timing Effects on Closed-Loop Properties of Control Software , 2014, 2014 IEEE Real-Time Systems Symposium.

[11]  Vuk Lesi,et al.  Network Scheduling for Secure Cyber-Physical Systems , 2017, 2017 IEEE Real-Time Systems Symposium (RTSS).

[12]  Chung-Wei Lin,et al.  SAW: A Tool for Safety Analysis of Weakly-Hard Systems , 2020, CAV.

[13]  Qi Zhu,et al.  Job-Class-Level Fixed Priority Scheduling of Weakly-Hard Real-Time Systems , 2019, 2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS).

[14]  Luca Schenato,et al.  To Zero or to Hold Control Inputs With Lossy Links? , 2009, IEEE Transactions on Automatic Control.

[15]  Guillem Bernat,et al.  Guaranteed on-line weakly-hard real-time systems , 2001, Proceedings 22nd IEEE Real-Time Systems Symposium (RTSS 2001) (Cat. No.01PR1420).

[16]  Antoine Girard,et al.  SpaceEx: Scalable Verification of Hybrid Systems , 2011, CAV.

[17]  Rolf Ernst,et al.  Budgeting Under-Specified Tasks for Weakly-Hard Real-Time Systems , 2017, ECRTS.

[18]  Qi Zhu,et al.  Security-Driven Codesign with Weakly-Hard Constraints for Real-Time Embedded Systems , 2019, 2019 IEEE 37th International Conference on Computer Design (ICCD).

[19]  Mahesh Viswanathan,et al.  Analyzing Real Time Linear Control Systems Using Software Verification , 2015, 2015 IEEE Real-Time Systems Symposium.

[20]  Frank Allgöwer,et al.  Towards Networked Control Systems with guaranteed stability: Using weakly hard real-time constraints to model the loss process , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[21]  Rolf Ernst,et al.  Generalized Weakly-Hard Constraints , 2012, ISoLA.

[22]  Rolf Ernst,et al.  Improved Deadline Miss Models for Real-Time Systems Using Typical Worst-Case Analysis , 2015, 2015 27th Euromicro Conference on Real-Time Systems.

[23]  Anton Cervin,et al.  DMAC: Deadline-Miss-Aware Control , 2019, ECRTS.