Checking consistency of agent designs against interaction protocols for early-phase defect location

نویسندگان

  • Yoosef Abushark
  • John Thangarajah
  • Tim Miller
  • James Harland
چکیده

Multi-agent systems are increasingly being used in complex applications due to features such as autonomy, proactivity, flexibility, robustness and social ability. However, these very features also make verifying multi-agent systems a challenging task. In this paper, we propose a mechanism, including automated tool support, for early phase defect detection by comparing agent interaction specifications with the detailed design of the agents participating in the interactions. The basic intuition of our approach is to extract sets of possible traces from the agent design and to verify whether these traces conform to the protocol specifications. Our approach is based on the Prometheus agent design methodology but is applicable to other similar methodologies. Our initial evaluation shows that even simple protocols developed by relatively experienced developers are prone to defects, and our approach is successful in uncovering some of these defects.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Checking The Correctness of Agent Designs Against Model-Based Requirements

Agent systems are used for a wide range of applications, and techniques to detect and avoid defects in such systems are valuable. In particular, it is desirable to detect issues as early as possible in the software development lifecycle. We describe a technique for checking the plan structures of a BDI agent design against the requirements models, specified in terms of scenarios and goals. This...

متن کامل

A Systematic Approach for Detecting Defects in Agent Designs: (Doctoral Consortium)

Multi-agent systems are increasingly being used in complex applications due to features such as autonomy, proactivity, flexibility, robustness and social ability. Thus, techniques to detect and avoid defects in such systems are valuable. In particular, it is desirable to detect issues as early as possible in the development lifecycle. This research aims to find ways in which to ensure the corre...

متن کامل

Designing and Verifying Core Protocols for Location Privacy

Geographic privacy services provide location information on roaming targets to location recipients via location servers, in a way that protects the privacy of the individuals involved. In this paper we propose and discuss new protocols representing the core of Geopriv, with particular focus on the security requirements stated in the IETF’s RFC 3693. Using the AVISPA tool, we check that these re...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

Verifying Conformance of Commitment Protocols via Symbolic Model Checking

Commitment protocols have been widely used to capture flexible and rich interactions among agents in multi-agent systems. Although there are several approaches specifying commitment protocols, none of them synthesize formal specification and automatic verification of these protocols within the same framework. This paper presents a new approach to automatically verify the conformance of commitme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014