Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A knowledge-in-the-loop approach to integrated safety & security for cooperative system-of-systems
RISE, SP – Sveriges Tekniska Forskningsinstitut.
Show others and affiliations
2015 (English)In: 2015 IEEE 7th International Conference on Intelligent Computing and Information Systems, ICICIS 2015, 2015, 13-20 p.Conference paper, Published paper (Refereed)
Abstract [en]

A system-of-systems (SoS) is inherently open in configuration and evolutionary in lifecycle. For the next generation of cooperative cyber-physical system-of-systems, safety and security constitute two key issues of public concern that affect the deployment and acceptance. In engineering, the openness and evolutionary nature also entail radical paradigm shifts. This paper presents one novel approach to the development of qualified cyber-physical system-of-systems, with Cooperative Intelligent Transport Systems (C-ITS) as one target. The approach, referred to as knowledge-in-the-loop, aims to allow a synergy of well-managed lifecycles, formal quality assurance, and smart system features. One research goal is to enable an evolutionary development with continuous and traceable flows of system rationale from design-time to post-deployment time and back, supporting automated knowledge inference and enrichment. Another research goal is to develop a formal approach to risk-aware dynamic treatment of safety and security as a whole in the context of system-of-systems. Key base technologies include: (1) EAST-ADL for the consolidation of system-wide concerns and for the creation of an ontology for advanced run-time decisions, (2) Learning Based-Testing for run-time and post-deployment model inference, safety monitoring and testing, (3) Provable Isolation for run-time attack detection and enforcement of security in real-time operating systems. © 2015 IEEE.

Place, publisher, year, edition, pages
2015. 13-20 p.
Keyword [en]
cyber-physical system, knowledge modeling, machine learning, model-based development, ontology, quality-of-service, safety, security, systems-of-systems, verification and validation
National Category
Natural Sciences
Identifiers
URN: urn:nbn:se:ri:diva-27659DOI: 10.1109/IntelCIS.2015.7397237Scopus ID: 2-s2.0-84969949567ISBN: 9781509019496 (print)OAI: oai:DiVA.org:ri-27659DiVA: diva2:1059333
Conference
7th IEEE International Conference on Intelligent Computing and Information Systems, ICICIS 2015, 12 December 2015 through 14 December 2015
Note

References: Maier, M.W., Architecting principles for systems-of-systems (1998) Systems Engineering, 1 (4), pp. 267-284; Sage, A.P., Cuppan, C.D., On the systems engineering and management of systems of systems and federations of systems (2001) Information, Knowledge, Systems Management, 2 (4), pp. 325-345. , December, Volume 2 Issue 4; Intelligent Transport Systems, , http://ec.europa.eu/transportlthemes/its/road/index_en.htm, European Commission'; SAFER-Vehicle and Traffic Safety Centre 'Safe Future in Business and Society. RESEARCH and INNOVATION AGENDA for TRAFFIC and VEHICLE SAFETY, , http://documen!.chaImers.se/downIoad?docid=424a3e2a-b53e-4786-9465-3dcd8ed7d922; Robinson-Mallett, C., Safety and security for networked vehicles (2014) Journal ATZ Worldwide, 116 (10), pp. 34-37. , Springer Automotive Media; International Electrotechnical Commission 'Iec 61508 Functional Safety, , http://www.iec.ch/functionalsafety/; https:!/www.iso.org/obp/ui/#iso:std:iso:26262:-1:ed-I:vl:en, ISO 'IS026262Swaminathan, S., The event sequence diagram framework for dynamic probabilistic risk assessment (1999) Reliability Engineering and Systems Safety, 63, pp. 73-90; Simoncic, M., A Bayesian network model of two-car accidents (2004) Journal of Transportation and Statistics, 7 (2-3); Biess, A., (2015) Dynamic Safety Shilds for Situation Assessment and Decision Making in Collision Avoidance Tasks, , United States Patent Application Publication, Pub; (2014) Electronics Architecture and Software Technology-Architecture Description Language. EAST-ADL Domain Model Specification, Version M. 2. 1. 12, , http://www.eastadl.info/; Chen, D., Integrated safety and architecture modeling for automotive embedded systems (2011) E&I, 128 (6). , Springer; Chen, D., An architectural approach to the analysis, verification and validation of software intensive embedded systems (2013) Computing, 95 (8). , Springer; Ostberg, K., Intelligent transport systems - The role of a safety loop for holistic safety management (2014) SAFECOMP 2014 Workshops, LNCS, 8696, pp. 3-10. , Springer International Publishing Switzerland; Larue, G.S., Methodology to assess safety effects of future intelligent transport systems on railway level crossings (2012) Proceedings of Australasian Road Safety Research, Policing and Education Conference, , 4-6 October, Wellington, New Zealand; Szita, I., Learning to play using low-complexity rule-based policies: Illustrations through Ms. Pac-Man (2007) Journal of Artificial Intelligence Research., pp. 659-684; Wardzinski, A., Dynamic risk assessment in autonomous vehicles motion planning (2008) Proceedings of the First International Conference on Information Technology, , Gdansk, Poland; Cheng, H., Interactive road situation analysis for driver assistance and safety warning systems: Framework and algorithms (2007) IEEE Transaction on Intelligent Transpor-tation System, 8 (1), pp. 157-167; Fuerstenberg, K., (2008) Results of the EC-Project INTERSAFE' Advanced Microsystems for Automotive Applications VDI-Buch, pp. 91-102; Meel, A., Plant-specific dynamic failure assessment using Bayesian theory (2006) Chemical Engineering Science, 61, pp. 7036-7056; Xu, H., Combining dynamic fault trees and event trees for probabilistic risk assessment (2004) Reliability and Maintainability, Annual Symposium-RAMS, pp. 214-219; (2007) Cooperative Systems for Road Safety; SPI SAFEPROBE, , SAFES POT; Deliverable DI. 3. 3; Mooij, J., (2008) Understanding and Improving Belief Propagation, , Doctoral Thesis, Radboud University; Eze, T.O., Autonomic computing in the first decade: Trends and direction (2012) The Eighth International Conference on Autonomic and Autonomous Systems (LCAS 2012), pp. 80-85. , St. Maarten, Netherlands Antilles IARIA, March 25-20; Pelc, M., Policy supervised exact state reconstruction in realtime embedded control systems (2009) Proceedings of ACD2009, , Zielona Gora, Poland (electronic materials); Pelc, M., Architecture for hierarchical policy-supervised fault detection component i middleware (2011) Proceedings of DPS. i I, Measurements Automatic and Control Journal, (9), pp. 1005-1010. , Gliwice, Poland; Bencomo, N., Modelsrun. Time foundations, applications, and roadmaps (2014) Programming and Software Engineering, Series, 8378. , Springer; Bevier, W.R., Kit: A study in operating system verification (1989) Software Engineering, IEEE Transactions on, 15 (2), pp. 1382-1396. , Nov; Ram, S.R., Security challenges, issues and their solutions for vanet (2013) International Journal of Network Security and Its Applications (IJNSA), 5, pp. 95-105. , September; Marwa, A., A survey of vehicular ad hoc networks routing protocols (2013) International Journal of Innovation and Applied Studies, 3, pp. 829-846. , July; Bonnefoi, F., Design, modeling and analysis of ITS using UML and Petri Nets (2007) IEEE Intelligent Transportation Systems Conference; Flammini, F., Model-driven v&v processes for computer based control systems: A unifying perspective (2012) ISoLA, (2), pp. 190-204; Althoff, M., Online Verification of Automated Road Vehicles Using Reachability Analysis; Meinke, K., Incremental learning-based testing for reactive systems (2014) Proc. Int. Conf on Tests and Proofs TAP 2011, LNCS 6706, 30 (4), pp. 903-918. , Springer Verlag, 2011. IEEE Transactions on Robotics; Feng, L., Case studies in learning-based testing (2013) Proc. 25th IFIP Int. Conf on Testing Software and Systems (LCTSS 2013), LNCS, 8254. , Springer Verlag; Meinke, K., Lbtest: A learning-based testing tool for reactive systems (2013) Proc. 6th Tnt. IEEE Conf on Software Testing, Verification and Validation (ISCT-2013); Hoppe, T., Security threats to automotive CAN networkspractical examples and selected short-term countermeasures (2008) Computer Safety, Reliability, and Security., pp. 235-248. , Springer Berlin Heidelberg; Koscher, K., Experimental security analysis of a modern automobile (2010) Security and Privacy (SP), 2010 IEEE Symposium on. IEEE; Miller, C., Adventures in automotive networks and control units (2013) DEF CON 21 Hacking Conference, , Las Vegas, NV DEF CON; Petit, J., Potential cyberattacks on automated vehicles (2015) Intelligent Transportation Systems, IEEE Transactions on, 16 (2), pp. 546-556; Wolf, M., Security engineering for vehicular it systems (2009) Improving the Trustworthiness and Dependability of Automotive IT Applications, , Vieweg+ Teubner; Marko, W., Security in automotive bus systems (2004) Proceedings of the Workshop on Embedded Security in Cars (escar)'04; Wolf, M., Design, implementati, and evaluation of a vehicular hardware security module (2011) 14t International Conference on Information Security and Cryptology, , Seoul, South Korea, November/December; Wang, Q., VeCure: A practical security framework to protect the CAN bus of vehicles (2014) Internet of Things (LOT), 2014 International Conference on the, pp. 13-18. , 6-8 Oct; (2010) ETSI TS 102 731 Vl. L. I-intelligent Transport Systems (ITS); Security; Security Services and Architecture, , ETSI TC ITS Standard, TC ITS; Strobl, M., Towards automotive virtualization (2013) Applied Electronics (AE), 2013 International Conference on, pp. I-6. , 10-I2 Sept; Beyer, S., Towards the formal verification of lower system layers in automotive systems (2005) Computer DeSign: VLSI in Computers and Processors, 2005. ICCD 2005. Proceedings. 2005 IEEE International Conference on, pp. 317-324. , 2-5 Oct; Dam, M., Formal verification of information 1low security for a simple ARM-based separation kernel (2013) Proceedings of the 2013 A CM SIGSA C Conference on Computer & Communications Security ACM; Klein, G., SeL4: Formal verification of an OS kernel (2009) Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles. ACM; Leinenbach, D., VerifYing the Microsoft Ryper-V hypervisor with VCC (2009) FM 2009: Formal Methods, pp. 806-809. , Springer Berlin Heidelberg; Denney, E., Dynamic safety cases for through-life safety assurance (2015) 37th International Conference on Software Engineering (LCSE 20 i 5}-New Ideas and Emerging Results (NIER); Guiochet, J., A model for safety case confidence assessment (2015) Computer Safety, Reliability, and Security, pp. 313-327. , Springer International Publishing; Chfouka, R., Trustworthy prevention of code injection in Linux on embedded devices (2015) 20th European Symposium on Research in Computer Security (ESORICS), , to appear

Available from: 2016-12-22 Created: 2016-12-21 Last updated: 2016-12-22Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full textScopus
By organisation
SP – Sveriges Tekniska Forskningsinstitut
Natural Sciences

Search outside of DiVA

GoogleGoogle Scholar

Altmetric score

Total: 34 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
v. 2.27.0