Skip to main content

2011 | OriginalPaper | Buchkapitel

6. Dependability

verfasst von : Hermann Kopetz

Erschienen in: Real-Time Systems

Verlag: Springer US

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

It is said that Nobel Laureate Hannes Alfven once remarked that in Technology Paradise no acts of God can be permitted and everything happens according to the blueprints. The real world is no technology paradise – components can fail and blueprints (software) can contain design errors. This is the subject of this chapter. The chapter introduces the notions of fault, error, and failure and discusses the important concept of a fault-containment unit. It then proceeds to investigate the topic of security and argues that a security breach can compromise the safety of a safety-critical embedded system. The direct connection of many embedded systems to the Internet – the Internet of Things (IoT) – makes it possible for a distant attacker to search for vulnerabilities, and, if the intrusion is successful, to exercise remote control over the physical environment. Security is thus becoming a prime concern in the design of embedded systems that are connected to the Internet. The following section deals with the topic of anomaly detection. An anomaly is an out-of-norm behavior that indicates that some exceptional scenario is evolving. Anomaly detection can help to detect the early effects of a random failure or the activities of an intruder that tries to exploit system vulnerabilities. Whereas an anomaly lies in the grey zone between correct behavior and failure, an error is an incorrect state that requires immediate action to mitigate the consequences of the error.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
[Arl03]
Zurück zum Zitat Arlat, J. et al. (2003). Comparison of Physical and Software-Implemented Fault Injection Techniques. IEEE Trans. on Computers. Vol. 52(9). (pp. 1115-1133).CrossRef Arlat, J. et al. (2003). Comparison of Physical and Software-Implemented Fault Injection Techniques. IEEE Trans. on Computers. Vol. 52(9). (pp. 1115-1133).CrossRef
[Avi04]
Zurück zum Zitat Avizienis, A., et al., (2004). Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. on Dependable and Secure Computing. Vol. 1(1). (pp. 11-33).CrossRef Avizienis, A., et al., (2004). Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. on Dependable and Secure Computing. Vol. 1(1). (pp. 11-33).CrossRef
[Bea09]
Zurück zum Zitat Beautement, A., M.A. Sasse, & M. Wonham. (2009). The Compliance Budget: Managing Security Behavior in Organizations. Proc of NSPW 08. ACM Press. (pp. 47-58). Beautement, A., M.A. Sasse, & M. Wonham. (2009). The Compliance Budget: Managing Security Behavior in Organizations. Proc of NSPW 08. ACM Press. (pp. 47-58).
[Car08]
Zurück zum Zitat Cardenas, A., A., S. Amin, & S. Shastry. (2008). Research Challenges for the Security of Control Systems. Proc. of the Workshop on Hot Topics in Security. Usenix Association. URL: http://portal.acm.org/citation.cfm?id=1496671.1496677 Cardenas, A., A., S. Amin, & S. Shastry. (2008). Research Challenges for the Security of Control Systems. Proc. of the Workshop on Hot Topics in Security. Usenix Association. URL: http://​portal.​acm.​org/​citation.​cfm?​id=​1496671.​1496677
[Cha09]
Zurück zum Zitat Chandola, V., A. Banerjee & V. Kumar. (2009). Anomaly Detection: A Survey. ACM Computing Surveys. Vol. 41(3). (pp. 15.1-15.58.)CrossRef Chandola, V., A. Banerjee & V. Kumar. (2009). Anomaly Detection: A Survey. ACM Computing Surveys. Vol. 41(3). (pp. 15.1-15.58.)CrossRef
[Con02]
Zurück zum Zitat Constantinescu, C. (2002). Impact of Deep Submicron Technology on Dependability of VLSI Circuits. Proc. of DSN 2002. IEEE Press. (pp. 205-209). Constantinescu, C. (2002). Impact of Deep Submicron Technology on Dependability of VLSI Circuits. Proc. of DSN 2002. IEEE Press. (pp. 205-209).
[Cum10]
Zurück zum Zitat Cumming, D.M. (2010). Haven’t found that software glitch, Toyota? Keep trying. Los Angeles Times. March 11, 2010. Cumming, D.M. (2010). Haven’t found that software glitch, Toyota? Keep trying. Los Angeles Times. March 11, 2010.
[Dri03]
Zurück zum Zitat Driscoll, K. et. a. (2003). Byzantine Fault-Tolerance: From Theory to Reality. Proc. of SAFECOMP 2003. LNCS 2788. Springer Verlag. (pp. 235-248). Driscoll, K. et. a. (2003). Byzantine Fault-Tolerance: From Theory to Reality. Proc. of SAFECOMP 2003. LNCS 2788. Springer Verlag. (pp. 235-248).
[Fel04a]
Zurück zum Zitat Feldhofer, M., S. Dominikus, & J. Wokerstorfer. (2004). Strong Authentication for RFID Systems Using the AES Algorithms. LCNS 3156. Springer Verlag. (pp. 357-370). Feldhofer, M., S. Dominikus, & J. Wokerstorfer. (2004). Strong Authentication for RFID Systems Using the AES Algorithms. LCNS 3156. Springer Verlag. (pp. 357-370).
[Gra85]
Zurück zum Zitat Gray, J. (1985). Why do Computers Stop and What can be done about it? Tandem Technical Report TR85.7. Cupertino, CA. Gray, J. (1985). Why do Computers Stop and What can be done about it? Tandem Technical Report TR85.7. Cupertino, CA.
[Hop78]
Zurück zum Zitat Hopkins, A.L., T.B. Smith, & J.H. Lala. (1978). FTMP: A Highly Reliable Fault-Tolerant Multiprocessor for Aircraft Control. Proc. IEEE. Vol 66(10). (pp. 1221-1239).CrossRef Hopkins, A.L., T.B. Smith, & J.H. Lala. (1978). FTMP: A Highly Reliable Fault-Tolerant Multiprocessor for Aircraft Control. Proc. IEEE. Vol 66(10). (pp. 1221-1239).CrossRef
[Kar95]
Zurück zum Zitat Karlson, J. et al. (1995). Integration and Comparison of Three Physical Fault-Injection Experiments. In: Predictably Dependable Computing Systems. Springer Verlag. Karlson, J. et al. (1995). Integration and Comparison of Three Physical Fault-Injection Experiments. In: Predictably Dependable Computing Systems. Springer Verlag.
[Koo04]
Zurück zum Zitat Koopman, P. (2004). Embedded System Security. IEEE Computer, (July 2004). (pp. 95-97.) Koopman, P. (2004). Embedded System Security. IEEE Computer, (July 2004). (pp. 95-97.)
[Kop91]
Zurück zum Zitat Kopetz, H., G. Grünsteidl, & J. Reisinger. (1991). Fault-Tolerant Membership Service in a Synchronous Distributed Real-Time System. In: Dependable Computing for Critical Applications. Springer-Verlag. (pp. 411-429). Kopetz, H., G. Grünsteidl, & J. Reisinger. (1991). Fault-Tolerant Membership Service in a Synchronous Distributed Real-Time System. In: Dependable Computing for Critical Applications. Springer-Verlag. (pp. 411-429).
[Kop93]
Zurück zum Zitat Kopetz, H. & G. Gruensteidl. (1993). TTP - A Time-Triggered Protocol for Fault-Tolerant Real-Time Systems. Proc. FTCS-23. IEEE Press. (pp. 524-532) Kopetz, H. & G. Gruensteidl. (1993). TTP - A Time-Triggered Protocol for Fault-Tolerant Real-Time Systems. Proc. FTCS-23. IEEE Press. (pp. 524-532)
[Lal94]
Zurück zum Zitat Lala, J.H. & R.E. Harper. (1994). Architectural Principles for Safety-Critical Real-Time Applications. Proc. of the IEEE. Vol. 82(1). (pp. 25-40).CrossRef Lala, J.H. & R.E. Harper. (1994). Architectural Principles for Safety-Critical Real-Time Applications. Proc. of the IEEE. Vol. 82(1). (pp. 25-40).CrossRef
[Lan81]
Zurück zum Zitat Landwehr, C.E. (1981). Formal Models for Computer Security. ACM Computing Suverys. Vol. 13(3). (pp. 248-278). Landwehr, C.E. (1981). Formal Models for Computer Security. ACM Computing Suverys. Vol. 13(3). (pp. 248-278).
[Neu94]
Zurück zum Zitat Neuman, B.C. & T. Ts’o. (1994). Kerberos--An Authentication Service for Computer Networks. IEEE Communication Magazine. Vol. 32(9). (pp. 33-38).CrossRef Neuman, B.C. & T. Ts’o. (1994). Kerberos--An Authentication Service for Computer Networks. IEEE Communication Magazine. Vol. 32(9). (pp. 33-38).CrossRef
[Pau98]
Zurück zum Zitat Pauli, B., A. Meyna, & P. Heitmann. (1998). Reliability of Electronic Components and Control Units in Motor Vehicle Applications. Verein Deutscher Ingenieure (VDI). (pp. 1009-1024). Pauli, B., A. Meyna, & P. Heitmann. (1998). Reliability of Electronic Components and Control Units in Motor Vehicle Applications. Verein Deutscher Ingenieure (VDI). (pp. 1009-1024).
[Pea80]
Zurück zum Zitat Pease, M., R. Shostak, & L. Lamport, Reaching Agreement in the Presence of Faults. Journal of the ACM, 1980. 27(2): pp. 228-234.MathSciNetMATHCrossRef Pease, M., R. Shostak, & L. Lamport, Reaching Agreement in the Presence of Faults. Journal of the ACM, 1980. 27(2): pp. 228-234.MathSciNetMATHCrossRef
[Ran75]
Zurück zum Zitat Randell, B. (1975). System Structure for Software Fault Tolerance. IEEE Trans. on Software Engineering, Vol. SE-1(2). (pp. 220-232).CrossRef Randell, B. (1975). System Structure for Software Fault Tolerance. IEEE Trans. on Software Engineering, Vol. SE-1(2). (pp. 220-232).CrossRef
[Riv78]
Zurück zum Zitat Rivest, R.L., A. Shamir, & L. Adleman. (1978). A Method for Obtaining Signatures and Public-Key Cryptosystems. Comm. of the ACM. Vol. 21(2). (pp. 120-126).MathSciNetMATHCrossRef Rivest, R.L., A. Shamir, & L. Adleman. (1978). A Method for Obtaining Signatures and Public-Key Cryptosystems. Comm. of the ACM. Vol. 21(2). (pp. 120-126).MathSciNetMATHCrossRef
[Rom07]
Zurück zum Zitat Roman, R., C. Alcarez, & J. Lopez. (2007). A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes. Mobile Network Applications. Vol. 12. (pp. 231-244). Springer Verlag. Roman, R., C. Alcarez, & J. Lopez. (2007). A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes. Mobile Network Applications. Vol. 12. (pp. 231-244). Springer Verlag.
[Sal10]
Zurück zum Zitat Salfner, F., Lenk, M., and Malek, M. (2010). A Survey of Online Failure Prediction Methods. ACM Computing Surveys. Vol. 42(3). (pp. 10.10-10.42).CrossRef Salfner, F., Lenk, M., and Malek, M. (2010). A Survey of Online Failure Prediction Methods. ACM Computing Surveys. Vol. 42(3). (pp. 10.10-10.42).CrossRef
[Tai03]
Zurück zum Zitat Taiani, F., J.C. Fabre, & M.O. Killijian. (2003). Towards Implementing Multi-Layer Reflection for Fault-Tolerance. Proc. of the DSN 2003. IEEE Press. (pp. 435-444). Taiani, F., J.C. Fabre, & M.O. Killijian. (2003). Towards Implementing Multi-Layer Reflection for Fault-Tolerance. Proc. of the DSN 2003. IEEE Press. (pp. 435-444).
[Tel09]
Zurück zum Zitat Telecom Japan. (2009). Cyber-Clean Center (CCC) Project for Anti-Bot Countermeasures in Japan. Proc. of the Second Japan-EU Symposium on the Future Internet. European Communities Brussels. (pp. 212-220). Telecom Japan. (2009). Cyber-Clean Center (CCC) Project for Anti-Bot Countermeasures in Japan. Proc. of the Second Japan-EU Symposium on the Future Internet. European Communities Brussels. (pp. 212-220).
Metadaten
Titel
Dependability
verfasst von
Hermann Kopetz
Copyright-Jahr
2011
Verlag
Springer US
DOI
https://doi.org/10.1007/978-1-4419-8237-7_6

Premium Partner