Skip to main content

A Simplex Architecture for Hybrid Systems Using Barrier Certificates

  • Conference paper
  • First Online:
Computer Safety, Reliability, and Security (SAFECOMP 2017)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 10488))

Included in the following conference series:

Abstract

This paper shows how to use Barrier Certificates (BaCs) to design Simplex Architectures for hybrid systems. The Simplex architecture entails switching control of a plant over to a provably safe Baseline Controller when a safety violation is imminent under the control of an unverified Advanced Controller. A key step of determining the switching condition is identifying a recoverable region, where the Baseline Controller guarantees recovery and keeps the plant invariably safe. BaCs, which are Lyapunov-like proofs of safety, are used to identify a recoverable region. At each time step, the switching logic samples the state of the plant and uses bounded-time reachability analysis to conservatively check whether any states outside the zero-level set of the BaCs, which therefore might be non-recoverable, are reachable in one decision period under control of the Advanced Controller. If so, failover is initiated.

Our approach of using BaCs to identify recoverable states is computationally cheaper and potentially more accurate (less conservative) than existing approaches based on state-space exploration. We apply our technique to two hybrid systems: a water tank pump and a stop-sign-obeying controller for a car.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Asarin, E., Dang, T., Girard, A.: Reachability analysis of nonlinear systems using conservative approximation. In: Maler, O., Pnueli, A. (eds.) HSCC 2003. LNCS, vol. 2623, pp. 20–35. Springer, Heidelberg (2003). doi:10.1007/3-540-36580-X_5

    Chapter  Google Scholar 

  2. Bak, S.: Verifiable COTS-Based Cyber-Physical Systems. Ph.D. thesis, University of Illinois at Urbana-Champaign (2013)

    Google Scholar 

  3. Bak, S., Manamcheri, K., Mitra, S., Caccamo, M.: Sandboxing controllers for cyber-physical systems. In: Proceedings of the 2011 IEEE/ACM International Conference on Cyber-Physical Systems, ICCPS, pp. 3–12. IEEE Computer Society (2011)

    Google Scholar 

  4. Boyd, S.P., El Ghaoui, L., Feron, E., Balakrishnan, V.: Linear Matrix Inequalities in System and Control Theory, vol. 15. SIAM, Philadelphia (1994)

    Book  MATH  Google Scholar 

  5. Chen, X., Sankaranarayanan, S.: Decomposed reachability analysis for nonlinear systems. In: Real-Time Systems Symposium (RTSS), pp. 13–24. IEEE (2016)

    Google Scholar 

  6. Chutinan, A., Krogh, B.H.: Computational techniques for hybrid system verification. IEEE Trans. Autom. Control 48(1), 64–75 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  7. Dang, T., Maler, O.: Reachability analysis via face lifting. In: Henzinger, T.A., Sastry, S. (eds.) HSCC 1998. LNCS, vol. 1386, pp. 96–109. Springer, Heidelberg (1998). doi:10.1007/3-540-64358-3_34

    Chapter  Google Scholar 

  8. Glavaski, S., Papachristodoulou, A., Ariyur, K.: Safety verification of controlled advanced life support system using barrier certificates. In: Morari, M., Thiele, L. (eds.) HSCC 2005. LNCS, vol. 3414, pp. 306–321. Springer, Heidelberg (2005). doi:10.1007/978-3-540-31954-2_20

    Chapter  Google Scholar 

  9. Johnson, T.T., Bak, S., Caccamo, M., Sha, L.: Real-time reachability for verified simplex design. ACM Trans. Embed. Comput. Syst. (TECS) 15(2), 26 (2016)

    Google Scholar 

  10. Loechner, V.: Polylib: A library for manipulating parameterized polyhedra (1999)

    Google Scholar 

  11. Murthy, A., Bartocci, E., Zadok, E., Stoller, S., Smolka, S., Grosu, R.: Simplex architecture for run time assurance of hybrid systems. In: Safe and Secure Systems and Software Symposium (S5) (2012)

    Google Scholar 

  12. Murthy, A., Islam, M.A., Smolka, S.A., Grosu, R.: Computing bisimulation functions using SOS optimization and \(\delta \)-decidability over the reals. In: Proceedings of the 18th International Conference on Hybrid Systems: Computation and Control, pp. 78–87. ACM, New York (2015)

    Google Scholar 

  13. Murthy, A., Islam, M.A., Smolka, S.A., Grosu, R.: Computing compositional proofs of input-to-output stability using sos optimization and \(\delta \)-decidability. Nonlinear Anal. Hybrid Syst. 23, 272–286 (2017)

    Article  MathSciNet  MATH  Google Scholar 

  14. Papachristodoulou, A., Anderson, J., Valmorbida, G., Prajna, S., Seiler, P., Parrilo, P.A.: SOSTOOLS: Sum of squares optimization toolbox for MATLAB (2013)

    Google Scholar 

  15. Platzer, A.: Logical Analysis of Hybrid Systems: Proving Theorems for Complex Dynamics. Springer, Heidelberg (2010)

    Book  MATH  Google Scholar 

  16. Prajna, S., Jadbabaie, A.: Safety verification of hybrid systems using barrier certificates. In: Alur, R., Pappas, G.J. (eds.) HSCC 2004. LNCS, vol. 2993, pp. 477–492. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24743-2_32

    Chapter  Google Scholar 

  17. Prajna, S., Jadbabaie, A., Pappas, G.J.: A framework for worst-case and stochastic safety verification using barrier certificates. IEEE Trans. Autom. Control 52(8), 1415–1429 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  18. Quesel, J.D., Mitsch, S., Loos, S., Aréchiga, N., Platzer, A.: How to model and prove hybrid systems with keymaera: a tutorial on safety. Int. J. Softw. Tools Technol. Transf. 18(1), 67–91 (2016)

    Article  Google Scholar 

  19. Seto, D., Sha, L.: An engineering method for safety region development. Technical Report CMU/SEI-99-TR-018, Software Engineering Institute (1999)

    Google Scholar 

  20. Sha, L.: Using simplicity to control complexity. IEEE Softw. 18(4), 20–28 (2001)

    Article  MathSciNet  Google Scholar 

  21. Tomlin, C.J., Mitchell, I., Bayen, A.M., Oishi, M.: Computational techniques for the verification of hybrid systems. Proc. IEEE 91(7), 986–1001 (2003)

    Article  Google Scholar 

  22. Wang, L., Ames, A.D., Egerstedt, M.: Multi-objective compositions for collision-free connectivity maintenance in teams of mobile robots. CoRR abs/1608.06887 (2016)

    Google Scholar 

Download references

Acknowledgments

Author Abhishek Murthy contributed to this research as part of his doctoral studies at Stony Book University. This work is supported in part by AFOSR Grant FA9550-14-1-0261, NSF Grants IIS-1447549, CNS-1421893, CNS-1446832, CNS-1445770, CNS-1445770, and CCF-1414078, and ONR Grant N00014-15-1-2208. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of these organizations.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Junxing Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Yang, J., Islam, M.A., Murthy, A., Smolka, S.A., Stoller, S.D. (2017). A Simplex Architecture for Hybrid Systems Using Barrier Certificates. In: Tonetta, S., Schoitsch, E., Bitsch, F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2017. Lecture Notes in Computer Science(), vol 10488. Springer, Cham. https://doi.org/10.1007/978-3-319-66266-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-66266-4_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-66265-7

  • Online ISBN: 978-3-319-66266-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics