請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/20466
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 施吉昇(Chi-Sheng Shih) | |
dc.contributor.author | Chen-Hao Chang | en |
dc.contributor.author | 張振豪 | zh_TW |
dc.date.accessioned | 2021-06-08T02:49:41Z | - |
dc.date.copyright | 2017-08-24 | |
dc.date.issued | 2017 | |
dc.date.submitted | 2017-08-16 | |
dc.identifier.citation | [1] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,” Computer networks, vol. 54, no. 15, pp. 2787–2805, 2010.
[2] “The internet of things 2017 report: How the iot is improving lives to transform the world.” [Online]. Available: http://www.businessinsider.com/the-internet-of-things- 2017-report-2017-1 [3] R.N.Charette,“Whysoftwarefails[softwarefailure],”IeeeSpectrum,vol.42,no.9, pp. 42–49, 2005. [4] K. Sandler, L. Ohrstrom, L. Moy, and R. McVay, “Killed by code: Software trans- parency in implantable medical devices,” 2010. [5] J. P. Morrison, “Flow-based programming,” in Proc. 1st International Workshop on Software Engineering for Parallel and Distributed Systems, 1994, pp. 25–29. [6] K.-J. Lin, N. Reijers, Y.-C. Wang, C.-S. Shih, and J. Y. Hsu, “Building smart m2m applications using the wukong profile framework,” in Green Computing and Com- munications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Comput- ing. IEEE, 2013, pp. 1175–1180. [7] “Node-red.” [Online]. Available: http://nodered.org/ [8] G. J. Holzmann, “The model checker spin,” IEEE Transactions on software engi-neering, vol. 23, no. 5, pp. 279–295, 1997. [9] K. L. McMillan, Model checking. John Wiley and Sons Ltd., 2003. [10] M. Kwiatkowska, “Model checking for probability and time: from theory to prac- tice,” in Logic in Computer Science, 2003. Proceedings. 18th Annual IEEE Sympo- sium on. IEEE, 2003, pp. 351–360. [11] H. Hansson and B. Jonsson, “A logic for reasoning about time and reliability,” For- mal aspects of computing, vol. 6, no. 5, pp. 512–535, 1994. [12] M. Kwiatkowska, G. Norman, and D. Parker, “Prism: Probabilistic symbolic model checker,” in International Conference on Modelling Techniques and Tools for Com- puter Performance Evaluation. Springer, 2002, pp. 200–204. [13] ——, “Prism 4.0: Verification of probabilistic real-time systems,” in Computer aided verification. Springer, 2011, pp. 585–591. [14] D. Knuth and A. Yao, Algorithms and Complexity: New Directions and Recent Re- sults. Academic Press, 1976, ch. The complexity of nonuniform random number generation. [15] L. Li, Z. Jin, G. Li, L. Zheng, and Q. Wei, “Modeling and analyzing the reliability and cost of service composition in the iot: A probabilistic approach,” in Web Services (ICWS), 2012 IEEE 19th International Conference on. IEEE, 2012, pp. 584–591. [16] A.E.Susu,A.Acquaviva,D.Atienza,andG.DeMicheli,“Stochasticmodelingand analysis for environmentally powered wireless sensor nodes,” in Modeling and Op- timization in Mobile, Ad Hoc, and Wireless Networks and Workshops, 2008. WiOPT 2008. 6th International Symposium on. IEEE, 2008, pp. 125–134. [17] E. A. Lee and S. A. Seshia, Introduction to embedded systems: A cyber-physical systems approach. MIT Press, 2016, ch. Quantitative Analysis. [18] S. Yi and R. Kravets, “Moca: Mobile certificate authority for wireless ad hoc net- works,” Tech. Rep., 2004. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/20466 | - |
dc.description.abstract | 近年來有許多的作品致力於降低設計物聯網應用程式的難度。
例如 Node-RED 與 Wukong 專案所採用的資料流程式設計就是將物聯網元件與資料流以抽象的方式表現。 使用者在設計物聯網應用程式時可以將元件視為黑盒子,如此便可快速的打造出應用程式的原型。 即使能夠很方便地設計出物聯網應用,但要形式化量化其服務品質仍是一個隱晦難解的問題。 我們的研究動機是利用機率模型檢查以使用形式化的將物聯網應用建構成正規的數學模型,並且利用機率模型檢查器來計算其服務品質。 在這份研究中,我們所考慮的是資料流程式設計所描述的物聯網應用。 我們設計了一套工具將給定的物聯網應用轉換成了數學模型,再利用機率模型檢查器來計算其量化性質,確保其服務品質符合原先規範。 由於資料流程式所規範的格式是個樹狀結構,我們可以將元件間的溝通關係建圖並加以分析。 再給定一些額外描述元件行為的參數,我們可以將資料流程式轉換成形式化數學模型。 利用最直接的方法將每個元件轉換成個別的模組,狀態空間會隨元件數量指數級的增長。 我們將重複的元件縮減為一個模組,利用一個模組來表達多個元件的行為,大幅減少了狀態空間。 實驗結果顯示,隨著重複元件數量的增加,狀態空間會以線性成長而狀態轉移數量會以平方成長。 | zh_TW |
dc.description.abstract | In recent years, many efforts have been devoted to making it more convenient to design an Internet of Things (IoT) application.
For example, Flow-Based Programming (FBP) adopted by Node-RED and Wukong abstracts the component in and data flow with boxes and arrows. While designing an IoT applications, users can treat each component as a black-box and quickly make a prototype. As there are many factors related to the qualities of the applications. it is obscure to analyze the quantitative properties in an IoT application. Our motivation is to evaluate the quantitative properties in an IoT application formally using probabilistic model checking that models an application in a mathematical model and checks its properties using formal logic such as probabilistic computation tree logic. In this work, we consider IoT applications described with FBP, and we design a tool to automatically convert the given application to a mathematical model and use a probabilistic model checker to verify whether it meets its requirements. The formats of FBP flows are regulated, so it is feasible to analyze the flow and construct the communication graph. Given the application-related and environmental parameters, we can convert the flow-based application into a mathematical model. The naive conversion generates one module for each component, making the state space grow exponentially. With our duplicate reduction technique, the duplicated components are merged, which reduces the state spaces. The experiments show that the optimization makes the state space grows linearly and the number of transitions grows quadratically as the number of duplicated components grows. | en |
dc.description.provenance | Made available in DSpace on 2021-06-08T02:49:41Z (GMT). No. of bitstreams: 1 ntu-106-R04922032-1.pdf: 2160164 bytes, checksum: b060da808b8c41927f9f9bebf2966642 (MD5) Previous issue date: 2017 | en |
dc.description.tableofcontents | 1 Introduction 1
1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Contribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.3 Thesis Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2 Background and Related Works 5 2.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.1.1 Probabilistic Model Checking . . . . . . . . . . . . . . . . . . . 5 2.1.2 Probabilistic Temporal Logic . . . . . . . . . . . . . . . . . . . . 6 2.1.3 PRISM Model Checker . . . . . . . . . . . . . . . . . . . . . . . 7 2.1.4 Flow-based Programming . . . . . . . . . . . . . . . . . . . . . 12 2.1.5 Wukong IoT Middleware . . . . . . . . . . . . . . . . . . . . . . 12 2.2 Related Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3 Target Problem and System Architecture 14 3.1 Target Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.2 Preliminary Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 3.2.1 Properties of Flow-based Programming . . . . . . . . . . . . . . 16 3.2.2 Properties of Internet of Things . . . . . . . . . . . . . . . . . . 17 3.3 System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 4 Design and Implementation 19 4.1 Flow Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 4.2 Flow Analyzer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 4.3 Code Generator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 4.3.1 Prefabricated Modules . . . . . . . . . . . . . . . . . . . . . . . 22 4.3.2 Code Generation . . . . . . . . . . . . . . . . . . . . . . . . . . 24 4.3.3 Duplicated Component Fusion . . . . . . . . . . . . . . . . . . . 28 4.4 PRISM Runtime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 5 Experiment 32 5.1 MOCA - distributed authentication protocol . . . . . . . . . . . . . . . . 32 5.1.1 Application Parameters . . . . . . . . . . . . . . . . . . . . . . . 34 5.2 Model Conversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 5.2.1 Correctness of the target codes . . . . . . . . . . . . . . . . . . . 34 5.2.2 Performance of the target codes . . . . . . . . . . . . . . . . . . 34 5.3 Security Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 5.4 Weather alarm system . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 6 Conclusion 39 Bibliography 40 | |
dc.language.iso | en | |
dc.title | 利用機率模型檢查之物聯網應用程式服務品質分析 | zh_TW |
dc.title | Quality of Service Analysis for Internet of Things Applications with Probabilistic Model Checking | en |
dc.type | Thesis | |
dc.date.schoolyear | 105-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 逄愛君(Ai-Chun Pang),王佑中(Yu-Chung Wang) | |
dc.subject.keyword | 機率模型檢測,物聯網, | zh_TW |
dc.subject.keyword | Probabilistic model checking,Internet of Things, | en |
dc.relation.page | 41 | |
dc.identifier.doi | 10.6342/NTU201703695 | |
dc.rights.note | 未授權 | |
dc.date.accepted | 2017-08-17 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
顯示於系所單位: | 資訊工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-106-1.pdf 目前未授權公開取用 | 2.11 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。