• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yang Bo, Guo Haoran, Feng Junhui, Li Ge, Jin Zhi. A Rule Conflict Detection Approach for Intelligent System of Internet of Things[J]. Journal of Computer Research and Development, 2023, 60(3): 592-605. DOI: 10.7544/issn1000-1239.202110941
Citation: Yang Bo, Guo Haoran, Feng Junhui, Li Ge, Jin Zhi. A Rule Conflict Detection Approach for Intelligent System of Internet of Things[J]. Journal of Computer Research and Development, 2023, 60(3): 592-605. DOI: 10.7544/issn1000-1239.202110941

A Rule Conflict Detection Approach for Intelligent System of Internet of Things

Funds: This work was supported by the Fundamental Research Funds for the Central Universities (BLX202003), the National Natural Science Foundation of China (62072007, 62192733, 61832009,62192730, 61772078, 61502011), and the Focus Tracking Project of Beijing Forestry University (BLRD202124).
More Information
  • Received Date: September 14, 2021
  • Revised Date: June 18, 2022
  • Available Online: February 26, 2023
  • The core of the Internet of things (IoT) system architecture is the logic controller. The logic controller uses rules to control the business logic, which reduces the development and maintenance costs of the IoT system and improves the flexibility of the IoT devices. As the scale of the IoT system expands, the relationship between the rules becomes complicated. This may cause rule conflicts. In response to this problem, some researchers have proposed some detection methods for rule conflicts. However, the existing rule conflict detection methods still have some problems, such as incomplete analysis of rule conflict types and low accuracy of detection results. For these reasons, a formal rule conflict detection (FRCD) method for the control logic of the IoT intelligent system is proposed. This method formalizes the structure of rules, and defines rules as a combination of control subjects, actions, trigger conditions, and symbols. Then according to the influence of the rules on the system and the structural characteristics of the rules, 7 types of rule conflicts are summarized. Finally, an algorithm for rule conflict detection is designed, and the detailed process of rule conflict detection is introduced. We carry out experiments on two IoT systems and compare them with three typical IoT rule conflict detection methods. These three methods are the formal rule model conflict detection method based user, triggers, environment entities, and actuators (UTEA), semantic web-based policy interaction detection with rules (SPIDER), identifying requirements interactions using semiformal (IRIS). The experimental results show that the formal rule conflict detection method in this paper is more effective.

  • [1]
    Engels D W, Foley J T, Waldrop J, et al. The networked physical world: An automated identification architecture[C] //Proc of the 2nd IEEE Workshop on Internet Applications. Piscataway, NJ: IEEE, 2001: 76–77
    [2]
    王若思. 智能楼宇中规则验证方法的研究[D]. 北京: 北京邮电大学, 2014

    Wang Ruosi. Research on rule verification method in intelligent building[D]. Beijing: Beijing University of Posts and Telecommunications, 2014 (in Chinese)
    [3]
    李戈,魏强,李力行,等. 物联网服务建模: 一种基于环境建模的方法[J]. 中国科学:信息科学,2013,43(10):1198−1218 doi: 10.1360/N112013-00031

    Li Ge, Wei Qiang, Li Lixing. Environment based modeling approach for services in the Internet of things[J]. SCIENTIA SINICA Informationis, 2013, 43(10): 1198−1218 (in Chinese) doi: 10.1360/N112013-00031
    [4]
    Lu Yangyang, Li Ge, Jin Zhi, et al. A know ware based infrastructure for rule based control systems in smart spaces[G] //LNCS 7925: Proc of Int Conf of Safe and Secure Software Reuse. Berlin: Springer, 2013: 289–294
    [5]
    Shehara M, Eberlein A, Fapojuwo A. IRIS: A semi-formal approach for detecting requirements interactions[C] //Proc of the 11th IEEE Int Conf and Workshop on the Engineering of Computer-Based Systems. Piscataway, NJ: IEEE, 2004: 273–281
    [6]
    Hu Haibo, Yang Dan, Fu Li, et al. Semantic web-based policy interaction detection method with rules in smart home for detecting interaction among user policies[J]. IET Communications, 2011, 5(17): 2451−2460 doi: 10.1049/iet-com.2010.0615
    [7]
    Protégé: A free, open-source ontology editor and framework for building intelligent systems [EB/OL]. [2021-08-16]. https://protege.stinford.edu/
    [8]
    Jess. The rule engine for the JavaTM platform [EB/OL]. [2020-08-16]. https://jess.sandia.gov
    [9]
    Sun Yan, Wang Xukai, Luo Hong, et al. Conflict detection scheme based on formal rule model for smart building systems[J]. IEEE Transactions on Human-Machine Systems, 2015, 45(2): 215−227 doi: 10.1109/THMS.2014.2364613
    [10]
    Kim J. Authorization conflict problems in combining RIF rules with RDF data[J]. IEICE Transactions on Information and Systems, 2015, 98-D(4): 863−871
    [11]
    W3C. RIF core dialect W3C recommendation[EB/OL]. [2021-08-16]. http://www.w3.org/TR/2010/REC-rif-core-20100622/
    [12]
    W3C. RDF semantics W3C recommendation[EB/OL]. [2021-08-16]. http://www.w3.org/TR/rdf-mt/
    [13]
    Yu W D, Nayak E. An algorithmic approach to authorization rules conflict resolution in software security[C] //Proc of the 32nd Annual IEEE Int Computer Software and Applications Conf. Piscataway, NJ: IEEE, 2008: 32–35
    [14]
    Fisler K, Krishnamurthi S, Meyerovich L A, et al. Verification and change-impact analysis of access-control policies[C] //Proc of the 27th Int Conf on Software Engineering. New York: ACM, 2005: 196−205
    [15]
    Abdullah A F, Ehab A, Thomas M, et al. IoTC2: A formal method approach for detecting conflicts in large scale IoT systems[C] //Proc of the IFIP/IEEE Symp on Integrated Network and Service Management (IM). Piscataway, NJ: IEEE, 2019: 442–447
    [16]
    Wang Qi, Hassan W U, Bates A, et al. Fear and logging in the Internet of things[C/OL] //Proc of the Network and Distributed System Security Symp. San Diego, CA: Internet Society, 2018 [2021-08-16].https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018_01A-2_Wang_paper.pdf
    [17]
    Bu Lei, Xiong Wen, Liang C J M, et al. Systematically ensuring the confidence of real-time home automation IoT systems[J]. ACM Transactions on Cyber-Physical Systems, 2018, 2(3): 1−23
    [18]
    Ma Jun, Lu Jie, Zhang Guangquan. A rule-map based technique for information inconsistency verification[C] //Proc of the Information, Decision and Control. Piscataway, NJ: IEEE, 2007: 296–301
    [19]
    Nandi C. Automatic trigger generation for end user written rules for home automation[C] //Proc of the 24th ACM SIGSOFT Int Symp on Foundations of Software Engineering. New York: ACM, 2016: 1109–1111
    [20]
    Abe M, Yamamoto G, Furuichi S, et al. Automated detection of rule conflicts for enterprise IOT[C] //Proc of the IEEE Int Congress on Internet of Things (ICIOT). Piscataway, NJ: IEEE, 2019: 9–16
    [21]
    Yang S J H, Tsai J J P, Chen Chyun-Chyi. Fuzzy rule base systems verification using high-level Petri nets[J]. IEEE Transactions on Knowledge and Data Engineering, 2003, 15(2): 457−473
    [22]
    Wang Qi, Datta P, Yang Wei, et al. Charting the attack surface of trigger-action IoT platforms[C] //Proc of the ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2019: 1439–1453
    [23]
    Fang Yang, Lu Yiqin. Checking int-switch conflicts of rules during preprocessing of network verification in SDN[J]. IEEE Communications Letters, 2019, 23(9): 1547−1550 doi: 10.1109/LCOMM.2019.2923622
    [24]
    Cui Jie, Zhou Sheng, Zhong Hong, et al. Transaction-based flow rule conflict detection and resolution in SDN[C/OL] //Proc of the 27th Int Conf on Computer Communication and Networks (ICCCN). Piscataway, NJ: IEEE, 2018[2021-08-16]. https://doi.org/10.1109/ICCCN.2018.8487415
    [25]
    Batisra B, Campos G, Fernandez M P. Flow-based conflict detection in OpenFlow networks using first-order logic[C/OL] //Proc of the IEEE Symp on Computers and Communications (ISCC). Piscataway, NJ: IEEE, 2014 [2021-08-16]. https://doi.org/10.1109/ISCC.2014.6912577
    [26]
    Magill E, Blum J. Exploring conflicts in rule-based sensor networks[J]. Pervasive and Mobile Computing, 2016, 27: 133−154 doi: 10.1016/j.pmcj.2015.08.005
    [27]
    Born K, Arendt T, Hess F, et al. Analyzing conflicts and dependencies of rule-based transformations in henshin[C] //LNCS 9033: Proc of the 18th Int Conf of Fundamental Approaches to Software Engineering. Berlin: Springer, 2015: 165–168
    [28]
    Jiang Jie, Pitt J, Diaconescu A. Rule conflicts in holonic institutions[C] //Proc of the Int Conf on Self-Adaptive and Self-Organizing Systems Workshops. Piscataway, NJ: IEEE, 2015: 49–54
    [29]
    Zhang Hengqi, Li Xiang, Deng Xinyang, et al. A novel method of evidential network reasoning based on the logical reasoning rules and conflict measure[J]. IEEE Access, 2020, 8: 78015−78028 doi: 10.1109/ACCESS.2020.2988726
    [30]
    Diller M, Wyaner A, Strass H. Making sense of conflicting (defeasible) rules in the controlled natural language ACE: Design of a system with support for existential quantification using skolemization[C] //Proc of the 13th Int Conf on Computional Semantics: Short Papers. Stroudsburg, PA: ACL, 2019: 32–37
    [31]
    Shehati M, Eberlein A, Fapojuwo A. IRIS: A semi-formal approach for detecting requirements interactions[C] //Proc of the 11th IEEE Int Conf and Workshop on the Engineering of Computer-Based Systems. Piscataway, NJ: IEEE, 2004: 273–281
    [32]
    Shah T, Venkatesan S, Ngo T, et al. Conflict detection in rule based IoT systems[C] //Proc of the 10th IEEE Annual Information Technology, Electronics and Mobile Communication Conf (IEMCON). Piscataway, NJ: IEEE, 2019: 0276–0284
    [33]
    李秀. 基于知识图谱的智能家居设备控制冲突检测技术研究[D]. 杭州: 浙江大学, 2018

    Li Xiu. Research on conflict detection technology of smart home equipment control based on knowledge graph[D]. Hangzhou: Zhejiang University , 2018 (in Chinese)
    [34]
    Lin Zhaowen, Wu Tinyu, Sun Yan, et al. A TAS-model-based algorithm for rule redundancy detection and scene scheduling in smart home systems[J]. IEEE Systems Journal, 2018, 12(3): 3018−3029 doi: 10.1109/JSYST.2017.2771349
    [35]
    Goutte C, Gaussier E. A probabilistic interpretation of precision, recall and F-score, with implication for evaluation[G] ///LNCS 3408: Advances in Information Retrieval. Berlin: Springer, 2005: 345–359
  • Related Articles

    [1]Sun Yong, Tan Wenan. Cross-Organizational Workflow Task Allocation Algorithms for Socially Aware Collaborative Computing[J]. Journal of Computer Research and Development, 2017, 54(9): 1865-1879. DOI: 10.7544/issn1000-1239.2017.20160513
    [2]Zhao Chuanjun, Wang Suge, Li Deyu, Li Xin. Cross-Domain Text Sentiment Classification Based on Grouping-AdaBoost Ensemble[J]. Journal of Computer Research and Development, 2015, 52(3): 629-638. DOI: 10.7544/issn1000-1239.2015.20140156
    [3]Zhang Qikun, Wang Ruifang, Tan Yu'an. Identity-Based Authenticated Asymmetric Group Key Agreement[J]. Journal of Computer Research and Development, 2014, 51(8): 1727-1738. DOI: 10.7544/issn1000-1239.2014.20121165
    [4]Li Zhetao, Wang Zhiqiang, Zhu Gengming, Li Renfa. A Data Gathering MAC Protocol Based on State Translation and Grouping for WSN[J]. Journal of Computer Research and Development, 2014, 51(6): 1167-1175.
    [5]Zhang Jianpei, Xie Jing, Yang Jing, and Zhang Bing. A t-closeness Privacy Model Based on Sensitive Attribute Values Semantics Bucketization[J]. Journal of Computer Research and Development, 2014, 51(1): 126-137.
    [6]Zhang Wei, Zeng Liang, Zhang Hui, Li Sikun. Collaboration in Digital Games: An Approach to the Description Logic of Tasks[J]. Journal of Computer Research and Development, 2012, 49(7): 1507-1513.
    [7]Li Shaofang, Hu Shanli, Shi Chunyi. An Anytime Coalition Structure Generation Based on the Grouping Idea of Cardinality Structure[J]. Journal of Computer Research and Development, 2011, 48(11): 2047-2054.
    [8]Jiang Jianjin, Yang Guangwen. Replication Strategies in Data Grid Systems with Clustered Demands[J]. Journal of Computer Research and Development, 2009, 46(2): 186-193.
    [9]Xu Lei, Xiao Baihua, Dai Ruwei, and Wang Chunheng. A Fast Classification Strategy for Large Class Sets[J]. Journal of Computer Research and Development, 2008, 45(4): 588-595.
    [10]Wang Wentao, Wu Junmin, Xu Yinlong, Li Huanghai, and Bao Chunjian. A Hierarchical Group Communication Protocol for Scalable Total Ordering[J]. Journal of Computer Research and Development, 2006, 43(10): 1775-1781.

Catalog

    Article views (241) PDF downloads (108) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return