Applying Evolutionary Computation to Mitigate Uncertainty in Dynamically-Adaptive, High-Assurance Middleware

Applying Evolutionary Computation to Mitigate Uncertainty in Dynamically-Adaptive, High-Assurance Middleware

J Internet Serv Appl (2012) 3:51–58 DOI 10.1007/s13174-011-0049-4 SI: FOME - THE FUTURE OF MIDDLEWARE Applying evolutionary computation to mitigate uncertainty in dynamically-adaptive, high-assurance middleware Philip K. McKinley · Betty H.C. Cheng · Andres J. Ramirez · Adam C. Jensen Received: 31 October 2011 / Accepted: 12 November 2011 / Published online: 3 December 2011 © The Brazilian Computer Society 2011 Abstract In this paper, we explore the integration of evolu- systems need to perform complex, distributed tasks despite tionary computation into the development and run-time sup- lossy wireless communication, limited resources, and uncer- port of dynamically-adaptable, high-assurance middleware. tainty in sensing the environment. However, even systems The open-ended nature of the evolutionary process has been that operate entirely within cyberspace need to account for shown to discover novel solutions to complex engineering changing network and load conditions, component failures, problems. In the case of high-assurance adaptive software, and exposure to a wide variety of cyber attacks. however, this search capability must be coupled with rigor- A dynamically adaptive system (DAS) monitors itself and ous development tools and run-time support to ensure that its execution environment at run time. This monitoring en- the resulting systems behave in accordance with require- ables a DAS not only to detect conditions warranting a re- ments. Early investigations are reviewed, and several chal- configuration, but also to determine when and how to safely lenging problems and possible research directions are dis- reconfigure itself in order to deliver acceptable behavior be- cussed. fore, during, and after adaptation [2]. Middleware has been shown to be an ideal location for adaptive functionality [3], Keywords Middleware · Adaptive software · since in many cases the adaptation can take place “below” High-assurance · Evolutionary computation · Uncertainty the end application. Within the context of a DAS, uncertainty arises from unanticipated environmental conditions as well as inaccu- 1 Introduction racy or imprecision of sensed values. Unfortunately, this un- certainty can compromise the decision-making capabilities Increasingly, computer systems need to adapt to their en- of a DAS. Moreover, it is often infeasible for a human to vironment as they execute [1]. This need is most apparent know and/or enumerate all possible combinations of system in systems that interact with the physical world, such as and environmental conditions that a DAS may encounter [4]. sensor networks and swarms of autonomous robots. Such As a result, automated methods are needed to explore this adaptation space, not only during execution, but also dur- ing the early stages of software development, where there P.K. McKinley () · B.H.C. Cheng · A.J. Ramirez · A.C. Jensen is greater flexibility for resolving obstacles that prevent the Department of Computer Science and Engineering, Michigan satisfaction of goals. State University, 3115 Engineering Building, East Lansing, MI, USA Our research applies evolutionary computation (EC) to e-mail: [email protected] the design of high-assurance, self-adaptive software. EC B.H.C. Cheng methods, which codify the basic principles of genetic evo- e-mail: [email protected] lution in computer software [5], are particularly effective A.J. Ramirez at producing solutions to problems with large, multidimen- e-mail: [email protected] sional search spaces. Indeed, the open-ended nature of the A.C. Jensen evolutionary process has been shown to discover novel e-mail: [email protected] solutions to complex engineering problems, rivaling and 52 J Internet Serv Appl (2012) 3:51–58 even surpassing human designers [6]. In the case of high- Evolutionary computation An alternative is to harness the assurance software, however, these techniques must be inte- process that has produced robust behaviors in the natural grated with rigorous development tools and run-time support world, evolution, and apply it to the development of adaptive to ensure the resulting systems behaves in accordance with computational systems. The most well-known EC method is requirements. the genetic algorithm (GA) [17], an iterative search tech- In this paper, we discuss two main areas where evolution- nique in which the individuals in a population are encodings ary computation can support high-assurance adaptive sys- of candidate solutions to an optimization problem. In each tems: (1) Development tools and methods, including specifi- generation, the most promising prospective solutions are se- cation of requirements that explicitly address adaptation and lected and randomly mutated to create further diversity. Ge- environmental uncertainty, while identifying latent proper- netic programming (GP) [18] is a related method where the ties of software that could potentially lead to failures dur- individuals are actual computer programs. Both GAs and ing run-time adaptation; and (2) Run-time support to enable GPs have been shown to be effective in a wide variety of adaptive monitoring of software requirements and environ- science and engineering domains. digital evo- mental conditions, effective decision-making in the pres- In contrast to these optimization techniques, lution [19] is intended to explore the evolutionary process ence of uncertainty, and dynamic reconfiguration of soft- itself. In this method, self-replicating computer programs ware components. In each case, results of preliminary in- exist in a user-defined computational environment and are vestigations are described, followed by discussion of the subject to mutations and natural selection. Over generations, remaining challenges and possible directions for future re- these “digital organisms” can evolve to survive, and thrive, search. under dynamic and adverse conditions. The open-ended na- Many of our own research activities have been conducted ture of digital evolution enables biologists to investigate fun- in the context of robotics. Experiments are conducted on damental questions that are difficult or impossible to study a testbed, called Evolution Park, depicted in Fig. 1.The in natural systems [20]. Recently, digital evolution has also testbed includes a heterogeneous swarm of mobile robots, been shown to be effective in evolving robust communica- parallel computing facilities for evolution runs and physics- tion protocols [21], in some cases revealing strikingly clever based simulations, and a school of robotic fish in a large, solutions that might otherwise not occur to human design- custom-built water tank. In addition to the components ers. This topic is discussed later. showninFig.1, a 3D printer enables fabrication of robot Some EC approaches lie on the boundary between har- components that evolve concurrently with their control sys- nessing the power of natural selection and remaining teth- tems. This infrastructure supports evolution and experimen- ered to biological principles. For example, neuroevolu- tal evaluation of both individual and cooperative behaviors, tion [22] is a machine learning method in which GAs are and is ideal for developing and testing the adaptive software used to train artificial neural networks (ANNs), which in technologies discussed in the remainder of this paper. turn can control systems such as robots. ANNs are particu- larly attractive for controllers because the inputs and outputs can directly correspond to sensors and actuators, respec- 2 Background tively. In evolutionary robotics [23], an artificial genome encodes a robot’s control system and possibly its morphol- ogy. The control program is downloaded into a real or sim- The research community has responded to the demand ulated robot, which is then let “loose” in an environment. for robust computational systems by producing a vari- The fitness of the system is evaluated with respect to per- ety of technologies for developing high-assurance, self- forming tasks. The most fit individuals in the population are adaptive software. Examples include adaptive software allowed to reproduce, with random mutations and recombi- mechanisms [3, 7–9]; dynamic service composition [10], nation, to form the next generation. This cycle is repeated software-architecture-based techniques for supporting dy- until a satisfactory solution evolves. namic adaptation [11, 12]; and requirements-level and for- Despite the contributions of EC to many fields, from mal methods-based techniques [13–16]. physical design, to robotics, to biology, its potential in terms Despite these advances, however, we are still far from of constructing high-assurance software systems remains producing software systems that exhibit adaptability, secu- largely untapped. While natural systems have evolved to rity, and survival “instincts” analogous to those found in adapt to adverse conditions in remarkable ways, in order to natural organisms. Indeed, many researchers have sought in- produce similarly robust software that is also assured,EC spiration from nature to help design resilient computational methods must be coupled with rigorous software engineer- systems. One approach is biomimetic design, which takes a ing methods. Such an integration will enable developers to structure or behavior found in nature and attempts to repli- exploit the tremendous search capability of EC while be- cate it in an artificial system. ing able to ensure that essential properties of the system are J Internet Serv Appl (2012) 3:51–58 53 Fig. 1 Components of Evolution Park testbed:

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us