Models and analysis for user-driven reconfiguration of rule-based IoT applications

被引:3
|
作者
Duran, Francisco [1 ]
Krishna, Ajay [2 ,4 ]
Le Pallec, Michel [3 ]
Mateescu, Radu [2 ,4 ]
Salaun, Gwen [2 ,4 ]
机构
[1] Univ Malaga, ITIS Software, Malaga, Spain
[2] Univ Grenoble Alpes, LIG, Grenoble INP, CNRS,Inria, F-38000 Grenoble, France
[3] Nokia Bell Labs, Nozay, France
[4] Univ Grenoble Alpes, Inst Engn, Grenoble, France
关键词
IoT; Reconfiguration; Verification; Web of Things;
D O I
10.1016/j.iot.2022.100515
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Introduction: The Internet of Things consists of devices and software interacting altogether in order to build powerful and added-value services. One of the main challenges in this context is to support end users with simple, user-friendly, and automated techniques to design such applications. IFTTT-style rules are a popular way to build IoT applications as it addresses this challenge. Problem statement: Given the dynamicity of IoT applications, these techniques should also consider that these applications are in most cases not built once and for all. They can evolve over time and objects may be added or removed for several reasons (replacement, loss of connectivity, upgrade, failure, etc.). There is a need for techniques and tools supporting the reconfiguration of rule-based IoT applications to ensure certain correctness properties during this update tasks. Methodology: In this paper, we propose new techniques for supporting the reconfiguration of running IoT applications, represented as a set of coordinated rules acting on devices. These techniques compare two versions of an application (before and after reconfiguration) to check if several functional and quantitative properties are satisfied. This information can be used by the user to decide whether the actual deployment of the new application should be triggered or not. Contributions and results: The analysis techniques have been implemented using encodings into formal specification languages and verification is carried out using corresponding analysis frameworks. All these techniques for designing new applications, analysing the aforementioned reconfiguration properties, and deploying the new applications have been integrated into the WebThings platform and applied on real-world examples for validation of the approach.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] Rule-based epidemic models
    Waites, W.
    Cavaliere, M.
    Manheim, D.
    Panovska-Griffiths, J.
    Danos, V.
    JOURNAL OF THEORETICAL BIOLOGY, 2021, 530
  • [22] Containment in Rule-Based Models
    Thompson-Walsh, C. D.
    Hayman, J.
    Winskel, G.
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2012, 284 : 125 - 137
  • [23] CuLLR me collaboration: Models and tools for user-driven eLibraries
    Dietrich, Dianne
    McEwen, Leah R.
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2013, 245
  • [24] A rule-based analysis method for cooperative business applications
    Lee, Y
    Choi, E
    Min, DK
    GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS, 2005, 3795 : 1155 - 1160
  • [25] A user-driven adaptation strategy for mobile video streaming applications
    Cotroneo, D
    Paolillo, G
    Pirro, C
    Russo, S
    25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, 2005, : 338 - 344
  • [26] Parameter Synthesis and Robustness Analysis of Rule-Based Models
    Trojak, Matej
    Safranek, David
    Mertova, Lukrecia
    Brim, Lubos
    NASA FORMAL METHODS (NFM 2020), 2020, 12229 : 41 - 59
  • [27] Rule-based dependency models for security protocol analysis
    Chen, Qingfeng
    Zhang, Shichao
    Chen, Yi-Ping Phoebe
    INTEGRATED COMPUTER-AIDED ENGINEERING, 2008, 15 (04) : 369 - 380
  • [28] Reinforced rule-based fuzzy models: Design and analysis
    Kim, Eun-Hu
    Oh, Sung-Kwun
    Pedrycz, Witold
    KNOWLEDGE-BASED SYSTEMS, 2017, 119 : 44 - 58
  • [29] Counterfactual Resimulation for Causal Analysis of Rule-Based Models
    Laurent, Jonathan
    Yang, Jean
    Fontana, Walter
    PROCEEDINGS OF THE TWENTY-SEVENTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2018, : 1882 - 1890
  • [30] A user-driven transmission scheme for voice over IP applications
    Bai, Yan
    Sue, Xiao
    2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 935 - +