Hierarchical modeling and analysis of TCC subsystem in CTCS level 3 using UPPAAL

Author(s):  
Yang Liu ◽  
Daming Jiang ◽  
Shenghua Dai ◽  
Zhengjiao Li
Electronics ◽  
2020 ◽  
Vol 9 (1) ◽  
pp. 155 ◽  
Author(s):  
Tuan Anh Nguyen ◽  
Dugki Min ◽  
Eunmi Choi

Modeling a complete Internet of Things (IoT) infrastructure is crucial to assess its availability and security characteristics. However, modern IoT infrastructures often consist of a complex and heterogeneous architecture and thus taking into account both architecture and operative details of the IoT infrastructure in a monolithic model is a challenge for system practitioners and developers. In that regard, we propose a hierarchical modeling framework for the availability and security quantification of IoT infrastructures in this paper. The modeling methodology is based on a hierarchical model of three levels including (i) reliability block diagram (RBD) at the top level to capture the overall architecture of the IoT infrastructure, (ii) fault tree (FT) at the middle level to elaborate system architectures of the member systems in the IoT infrastructure, and (iii) continuous time Markov chain (CTMC) at the bottom level to capture detailed operative states and transitions of the bottom subsystems in the IoT infrastructure. We consider a specific case-study of IoT smart factory infrastructure to demonstrate the feasibility of the modeling framework. The IoT smart factory infrastructure is composed of integrated cloud, fog, and edge computing paradigms. A complete hierarchical model of RBD, FT, and CTMC is developed. A variety of availability and security measures are computed and analyzed. The investigation of the case-study’s analysis results shows that more frequent failures in cloud cause more severe decreases of overall availability, while faster recovery of edge enhances the availability of the IoT smart factory infrastructure. On the other hand, the analysis results of the case-study also reveal that cloud servers’ virtual machine monitor (VMM) and virtual machine (VM), and fog server’s operating system (OS) are the most vulnerable components to cyber-security attack intensity. The proposed modeling and analysis framework coupled with further investigation on the analysis results in this study help develop and operate the IoT infrastructure in order to gain the highest values of availability and security measures and to provide development guidelines in decision-making processes in practice.


2014 ◽  
Author(s):  
Sudipto Banerjee ◽  
Bradley P. Carlin ◽  
Alan E. Gelfand

2015 ◽  
Vol 12 (2) ◽  
pp. 603-659 ◽  
Author(s):  
Lucian P. Smith ◽  
Michael Hucka ◽  
Stefan Hoops ◽  
Andrew Finney ◽  
Martin Ginkel ◽  
...  

Summary Constructing a model in a hierarchical fashion is a natural approach to managing model complexity, and offers additional opportunities such as the potential to re-use model components. The SBML Level 3 Version 1 Core specification does not directly provide a mechanism for defining hierarchical models, but it does provide a mechanism for SBML packages to extend the Core specification and add additional syntactical constructs. The SBML Hierarchical Model Composition package for SBML Level 3 adds the necessary features to SBML to support hierarchical modeling. The package enables a modeler to include submodels within an enclosing SBML model, delete unneeded or redundant elements of that submodel, replace elements of that submodel with element of the containing model, and replace elements of the containing model with elements of the submodel. In addition, the package defines an optional “port” construct, allowing a model to be defined with suggested interfaces between hierarchical components; modelers can chose to use these interfaces, but they are not required to do so and can still interact directly with model elements if they so chose. Finally, the SBML Hierarchical Model Composition package is defined in such a way that a hierarchical model can be “flattened” to an equivalent, non-hierarchical version that uses only plain SBML constructs, thus enabling software tools that do not yet support hierarchy to nevertheless work with SBML hierarchical models.


2003 ◽  
Vol 91 (1) ◽  
pp. 11-28 ◽  
Author(s):  
R. Alur ◽  
Thao Dang ◽  
J. Esposito ◽  
Yerang Hur ◽  
F. Ivancic ◽  
...  

Author(s):  
Sudipto Banerjee ◽  
Bradley P. Carlin ◽  
Alan E. Gelfand ◽  
Sudipto Banerjee

Sign in / Sign up

Export Citation Format

Share Document