Application of the D3H2 Methodology for the Cost-Effective Design of Dependable Systems

被引:11
作者
Aizpurua, Jose Ignacio [1 ,2 ]
Muxika, Enaut [2 ]
Papadopoulos, Yiannis [3 ]
Chiacchio, Ferdinando [4 ]
Manno, Gabriele [5 ]
机构
[1] Univ Strathclyde, Dept Elect & Elect Engn, Inst Energy & Environm, 99 George St, Glasgow G1 1RD, Lanark, Scotland
[2] Mondragon Univ, Elect & Comp Dept, Goiru Kalea 2, Arrasate Mondragon 20500, Spain
[3] Univ Hull, Dept Comp Sci, Cottingham Rd, Kingston Upon Hull HU6 7RX, N Humberside, England
[4] Univ Catania, Dept Ind Engn, Viale Andrea Doria 6, I-95125 Catania, Italy
[5] DNV GL, Strateg Res & Innovat, Veritasveien 1, N-1363 Hovik, Norway
关键词
heterogeneous redundancies; cost reduction; dependability assessment; criticality analysis; uncertainty analysis;
D O I
10.3390/safety2020009
中图分类号
R1 [预防医学、卫生学];
学科分类号
1004 ; 120402 ;
摘要
The use of dedicated components as a means of achieving desirable levels of fault tolerance in a system may result in high costs. A cost effective way of restoring failed functions is to use heterogeneous redundancies: components that, besides performing their primary intended design function, can also restore compatible functions of other components. In this paper, we apply a novel design methodology called D3H2 (aDaptive Dependable Design for systems with Homogeneous and Heterogeneous redundancies) to assist in the systematic identification of heterogeneous redundancies, the design of hardware/software architectures including fault detection and reconfiguration, and the systematic dependability and cost assessments of the system. D3H2 integrates parameter uncertainty and criticality analyses to model inexact failure data in dependability assessment. The application to a railway case study is presented with a focus on analysing different reconfiguration strategies as well as types and levels of redundancies.
引用
收藏
页数:25
相关论文
共 43 条
[1]   An approach to optimization of fault tolerant architectures using HiP-HOPS [J].
Adachi, Masakazu ;
Papadopoulos, Yiannis ;
Sharvia, Septavera ;
Parker, David ;
Tohdo, Tetsuya .
SOFTWARE-PRACTICE & EXPERIENCE, 2011, 41 (11) :1303-1327
[2]  
Adler R, 2010, IEEE INT C ENG COMP, P21, DOI [10.1109/ICECCS.2010.12, 10.1109/ICECCS.2010.22]
[3]  
Aizpurua J. I., 2014, P PSAM 12 HON HI US
[4]  
Aizpurua J. I., 2013, INT J ADV SECURITY, V6, P12
[5]  
Aizpurua JI, 2015, THESIS
[6]  
Aizpurua JI, 2014, SAFETY, RELIABILITY AND RISK ANALYSIS: BEYOND THE HORIZON, P1763
[7]  
Asim M., 2014, CYBERPATTERNS, P235
[8]   Basic concepts and taxonomy of dependable and secure computing [J].
Avizienis, A ;
Laprie, JC ;
Randell, B ;
Landwehr, C .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) :11-33
[9]   THE N-VERSION APPROACH TO FAULT-TOLERANT SOFTWARE [J].
AVIZIENIS, A .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1985, 11 (12) :1491-1501
[10]  
Blanke M., 2011, P SPEC INT C COMPL S, P89