Checking consistency of agent designs against interaction protocols for early-phase defect location
نویسندگان
چکیده
Multi-agent systems are increasingly being used in complex applications due to features such as autonomy, proactivity, flexibility, robustness and social ability. However, these very features also make verifying multi-agent systems a challenging task. In this paper, we propose a mechanism, including automated tool support, for early phase defect detection by comparing agent interaction specifications with the detailed design of the agents participating in the interactions. The basic intuition of our approach is to extract sets of possible traces from the agent design and to verify whether these traces conform to the protocol specifications. Our approach is based on the Prometheus agent design methodology but is applicable to other similar methodologies. Our initial evaluation shows that even simple protocols developed by relatively experienced developers are prone to defects, and our approach is successful in uncovering some of these defects.
منابع مشابه
Checking The Correctness of Agent Designs Against Model-Based Requirements
Agent systems are used for a wide range of applications, and techniques to detect and avoid defects in such systems are valuable. In particular, it is desirable to detect issues as early as possible in the software development lifecycle. We describe a technique for checking the plan structures of a BDI agent design against the requirements models, specified in terms of scenarios and goals. This...
متن کاملA Systematic Approach for Detecting Defects in Agent Designs: (Doctoral Consortium)
Multi-agent systems are increasingly being used in complex applications due to features such as autonomy, proactivity, flexibility, robustness and social ability. Thus, techniques to detect and avoid defects in such systems are valuable. In particular, it is desirable to detect issues as early as possible in the development lifecycle. This research aims to find ways in which to ensure the corre...
متن کاملDesigning and Verifying Core Protocols for Location Privacy
Geographic privacy services provide location information on roaming targets to location recipients via location servers, in a way that protects the privacy of the individuals involved. In this paper we propose and discuss new protocols representing the core of Geopriv, with particular focus on the security requirements stated in the IETF’s RFC 3693. Using the AVISPA tool, we check that these re...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملVerifying Conformance of Commitment Protocols via Symbolic Model Checking
Commitment protocols have been widely used to capture flexible and rich interactions among agents in multi-agent systems. Although there are several approaches specifying commitment protocols, none of them synthesize formal specification and automatic verification of these protocols within the same framework. This paper presents a new approach to automatically verify the conformance of commitme...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014