scholarly journals A goal-based modeling approach to develop security requirements of fault tolerant security-critical systems

Author(s):  
Davoud Mougouei ◽  
Mohammad Moghtadaei ◽  
Somayeh Moradmand
2015 ◽  
Vol 13 (3-4) ◽  
pp. 34-45
Author(s):  
Mariya Hristova

Abstract The software and hardware of Safety Critical Systems - SCS, which control special critical technology process or operation, are subject of enhanced requirements for reliability and inadmissibility of any incorrect controlling influences (safety) after failures. This paper suggests and investigates a hybrid computerbased fail-safe/fault-tolerance FST-structure with single reservation, which has the qualities to meet these requirements. The base system 2 ∨ 2, based on which it is built, is studied in the previous edition of Information Technjlogies and Control. For derivation of probabilistic models through which to establish the efficiency of the strutucral redundancy in a fault-tolerant structure, in this paper are used the published results. Formulas are derived for the probability of failure-free operation (availability coefficient), for safe failure and for unidentified (dangerous) failure. Models are found for calculation of the enhancement of reliability and the variation of safety relative to the base system 2 ∨ 2. Subject of analysis are type software and hardware modifications of the proposed general scheme used in the practice of different companies, which manufacture and operate SCSs. It is proven that at the expense of acceptable hardware redundancy and insignificant increase of dangerous failures the probability of interruption of the operation of the FST- system and its down-time due to failure may decrease by tenths of thousands of times.


Author(s):  
Gabriella Carrozza ◽  
Roberto Natella

This paper proposes an approach to software faults diagnosis in complex fault tolerant systems, encompassing the phases of error detection, fault location, and system recovery. Errors are detected in the first phase, exploiting the operating system support. Faults are identified during the location phase, through a machine learning based approach. Then, the best recovery action is triggered once the fault is located. Feedback actions are also used during the location phase to improve detection quality over time. A real world application from the Air Traffic Control field has been used as case study for evaluating the proposed approach. Experimental results, achieved by means of fault injection, show that the diagnosis engine is able to diagnose faults with high accuracy and at a low overhead.


Author(s):  
Gabriella Carrozza ◽  
Roberto Natella

This paper proposes an approach to software faults diagnosis in complex fault tolerant systems, encompassing the phases of error detection, fault location, and system recovery. Errors are detected in the first phase, exploiting the operating system support. Faults are identified during the location phase, through a machine learning based approach. Then, the best recovery action is triggered once the fault is located. Feedback actions are also used during the location phase to improve detection quality over time. A real world application from the Air Traffic Control field has been used as case study for evaluating the proposed approach. Experimental results, achieved by means of fault injection, show that the diagnosis engine is able to diagnose faults with high accuracy and at a low overhead.


2010 ◽  
Vol 439-440 ◽  
pp. 510-515
Author(s):  
Lian Xing Zhang

Wireless sensor network (WSN) is an emerging class of systems made possible by cheap hardware, advanced programming tools, complex algorithms, long lasting power sources and energy efficient radio interfaces. Wireless sensor network is a new paradigm in designing fault tolerant mission critical systems, to enable varied applications like threat detection, environmental monitoring, traditional sensing and actuation and much more. The algorithmic approach to WSN differentiates itself from the protocol approach by the fact that the mathematical models used are more abstract, more general, but sometimes less realistic than the models used for protocol design. Experimental results prove that the scheme can get better effect.


Author(s):  
Wenbing Zhao

The use of good random numbers is crucial to the security of many mission-critical systems. However, when such systems are replicated for Byzantine fault tolerance, a serious issue arises, i.e., how do we preserve the integrity of the systems while ensuring strong replica consistency? Despite the fact that there exists a large body of work on how to render replicas deterministic under the benign fault model, the solutions regarding the random number control are often overly simplistic without regard to the security requirement, and hence, they are not suitable for practical Byzantine fault tolerance. In this chapter, we present a novel integrity-preserving replica coordination algorithm for Byzantine fault tolerant systems. The central idea behind our CD-BFT algorithm is that all random numbers to be used by the replicas are collectively determined, based on the contributions made by a quorum of replicas, at least f+1 of which are not faulty.


Sign in / Sign up

Export Citation Format

Share Document