Skip to main content
Top

2011 | OriginalPaper | Chapter

6. Dependability

Author : Hermann Kopetz

Published in: Real-Time Systems

Publisher: Springer US

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

It is said that Nobel Laureate Hannes Alfven once remarked that in Technology Paradise no acts of God can be permitted and everything happens according to the blueprints. The real world is no technology paradise – components can fail and blueprints (software) can contain design errors. This is the subject of this chapter. The chapter introduces the notions of fault, error, and failure and discusses the important concept of a fault-containment unit. It then proceeds to investigate the topic of security and argues that a security breach can compromise the safety of a safety-critical embedded system. The direct connection of many embedded systems to the Internet – the Internet of Things (IoT) – makes it possible for a distant attacker to search for vulnerabilities, and, if the intrusion is successful, to exercise remote control over the physical environment. Security is thus becoming a prime concern in the design of embedded systems that are connected to the Internet. The following section deals with the topic of anomaly detection. An anomaly is an out-of-norm behavior that indicates that some exceptional scenario is evolving. Anomaly detection can help to detect the early effects of a random failure or the activities of an intruder that tries to exploit system vulnerabilities. Whereas an anomaly lies in the grey zone between correct behavior and failure, an error is an incorrect state that requires immediate action to mitigate the consequences of the error.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
[Arl03]
go back to reference Arlat, J. et al. (2003). Comparison of Physical and Software-Implemented Fault Injection Techniques. IEEE Trans. on Computers. Vol. 52(9). (pp. 1115-1133).CrossRef Arlat, J. et al. (2003). Comparison of Physical and Software-Implemented Fault Injection Techniques. IEEE Trans. on Computers. Vol. 52(9). (pp. 1115-1133).CrossRef
[Avi04]
go back to reference Avizienis, A., et al., (2004). Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. on Dependable and Secure Computing. Vol. 1(1). (pp. 11-33).CrossRef Avizienis, A., et al., (2004). Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. on Dependable and Secure Computing. Vol. 1(1). (pp. 11-33).CrossRef
[Bea09]
go back to reference Beautement, A., M.A. Sasse, & M. Wonham. (2009). The Compliance Budget: Managing Security Behavior in Organizations. Proc of NSPW 08. ACM Press. (pp. 47-58). Beautement, A., M.A. Sasse, & M. Wonham. (2009). The Compliance Budget: Managing Security Behavior in Organizations. Proc of NSPW 08. ACM Press. (pp. 47-58).
[Car08]
go back to reference Cardenas, A., A., S. Amin, & S. Shastry. (2008). Research Challenges for the Security of Control Systems. Proc. of the Workshop on Hot Topics in Security. Usenix Association. URL: http://portal.acm.org/citation.cfm?id=1496671.1496677 Cardenas, A., A., S. Amin, & S. Shastry. (2008). Research Challenges for the Security of Control Systems. Proc. of the Workshop on Hot Topics in Security. Usenix Association. URL: http://​portal.​acm.​org/​citation.​cfm?​id=​1496671.​1496677
[Cha09]
go back to reference Chandola, V., A. Banerjee & V. Kumar. (2009). Anomaly Detection: A Survey. ACM Computing Surveys. Vol. 41(3). (pp. 15.1-15.58.)CrossRef Chandola, V., A. Banerjee & V. Kumar. (2009). Anomaly Detection: A Survey. ACM Computing Surveys. Vol. 41(3). (pp. 15.1-15.58.)CrossRef
[Con02]
go back to reference Constantinescu, C. (2002). Impact of Deep Submicron Technology on Dependability of VLSI Circuits. Proc. of DSN 2002. IEEE Press. (pp. 205-209). Constantinescu, C. (2002). Impact of Deep Submicron Technology on Dependability of VLSI Circuits. Proc. of DSN 2002. IEEE Press. (pp. 205-209).
[Cum10]
go back to reference Cumming, D.M. (2010). Haven’t found that software glitch, Toyota? Keep trying. Los Angeles Times. March 11, 2010. Cumming, D.M. (2010). Haven’t found that software glitch, Toyota? Keep trying. Los Angeles Times. March 11, 2010.
[Dri03]
go back to reference Driscoll, K. et. a. (2003). Byzantine Fault-Tolerance: From Theory to Reality. Proc. of SAFECOMP 2003. LNCS 2788. Springer Verlag. (pp. 235-248). Driscoll, K. et. a. (2003). Byzantine Fault-Tolerance: From Theory to Reality. Proc. of SAFECOMP 2003. LNCS 2788. Springer Verlag. (pp. 235-248).
[Fel04a]
go back to reference Feldhofer, M., S. Dominikus, & J. Wokerstorfer. (2004). Strong Authentication for RFID Systems Using the AES Algorithms. LCNS 3156. Springer Verlag. (pp. 357-370). Feldhofer, M., S. Dominikus, & J. Wokerstorfer. (2004). Strong Authentication for RFID Systems Using the AES Algorithms. LCNS 3156. Springer Verlag. (pp. 357-370).
[Gra85]
go back to reference Gray, J. (1985). Why do Computers Stop and What can be done about it? Tandem Technical Report TR85.7. Cupertino, CA. Gray, J. (1985). Why do Computers Stop and What can be done about it? Tandem Technical Report TR85.7. Cupertino, CA.
[Hop78]
go back to reference Hopkins, A.L., T.B. Smith, & J.H. Lala. (1978). FTMP: A Highly Reliable Fault-Tolerant Multiprocessor for Aircraft Control. Proc. IEEE. Vol 66(10). (pp. 1221-1239).CrossRef Hopkins, A.L., T.B. Smith, & J.H. Lala. (1978). FTMP: A Highly Reliable Fault-Tolerant Multiprocessor for Aircraft Control. Proc. IEEE. Vol 66(10). (pp. 1221-1239).CrossRef
[Kar95]
go back to reference Karlson, J. et al. (1995). Integration and Comparison of Three Physical Fault-Injection Experiments. In: Predictably Dependable Computing Systems. Springer Verlag. Karlson, J. et al. (1995). Integration and Comparison of Three Physical Fault-Injection Experiments. In: Predictably Dependable Computing Systems. Springer Verlag.
[Koo04]
go back to reference Koopman, P. (2004). Embedded System Security. IEEE Computer, (July 2004). (pp. 95-97.) Koopman, P. (2004). Embedded System Security. IEEE Computer, (July 2004). (pp. 95-97.)
[Kop91]
go back to reference Kopetz, H., G. Grünsteidl, & J. Reisinger. (1991). Fault-Tolerant Membership Service in a Synchronous Distributed Real-Time System. In: Dependable Computing for Critical Applications. Springer-Verlag. (pp. 411-429). Kopetz, H., G. Grünsteidl, & J. Reisinger. (1991). Fault-Tolerant Membership Service in a Synchronous Distributed Real-Time System. In: Dependable Computing for Critical Applications. Springer-Verlag. (pp. 411-429).
[Kop93]
go back to reference Kopetz, H. & G. Gruensteidl. (1993). TTP - A Time-Triggered Protocol for Fault-Tolerant Real-Time Systems. Proc. FTCS-23. IEEE Press. (pp. 524-532) Kopetz, H. & G. Gruensteidl. (1993). TTP - A Time-Triggered Protocol for Fault-Tolerant Real-Time Systems. Proc. FTCS-23. IEEE Press. (pp. 524-532)
[Lal94]
go back to reference Lala, J.H. & R.E. Harper. (1994). Architectural Principles for Safety-Critical Real-Time Applications. Proc. of the IEEE. Vol. 82(1). (pp. 25-40).CrossRef Lala, J.H. & R.E. Harper. (1994). Architectural Principles for Safety-Critical Real-Time Applications. Proc. of the IEEE. Vol. 82(1). (pp. 25-40).CrossRef
[Lan81]
go back to reference Landwehr, C.E. (1981). Formal Models for Computer Security. ACM Computing Suverys. Vol. 13(3). (pp. 248-278). Landwehr, C.E. (1981). Formal Models for Computer Security. ACM Computing Suverys. Vol. 13(3). (pp. 248-278).
[Neu94]
go back to reference Neuman, B.C. & T. Ts’o. (1994). Kerberos--An Authentication Service for Computer Networks. IEEE Communication Magazine. Vol. 32(9). (pp. 33-38).CrossRef Neuman, B.C. & T. Ts’o. (1994). Kerberos--An Authentication Service for Computer Networks. IEEE Communication Magazine. Vol. 32(9). (pp. 33-38).CrossRef
[Pau98]
go back to reference Pauli, B., A. Meyna, & P. Heitmann. (1998). Reliability of Electronic Components and Control Units in Motor Vehicle Applications. Verein Deutscher Ingenieure (VDI). (pp. 1009-1024). Pauli, B., A. Meyna, & P. Heitmann. (1998). Reliability of Electronic Components and Control Units in Motor Vehicle Applications. Verein Deutscher Ingenieure (VDI). (pp. 1009-1024).
[Pea80]
[Ran75]
go back to reference Randell, B. (1975). System Structure for Software Fault Tolerance. IEEE Trans. on Software Engineering, Vol. SE-1(2). (pp. 220-232).CrossRef Randell, B. (1975). System Structure for Software Fault Tolerance. IEEE Trans. on Software Engineering, Vol. SE-1(2). (pp. 220-232).CrossRef
[Riv78]
go back to reference Rivest, R.L., A. Shamir, & L. Adleman. (1978). A Method for Obtaining Signatures and Public-Key Cryptosystems. Comm. of the ACM. Vol. 21(2). (pp. 120-126).MathSciNetMATHCrossRef Rivest, R.L., A. Shamir, & L. Adleman. (1978). A Method for Obtaining Signatures and Public-Key Cryptosystems. Comm. of the ACM. Vol. 21(2). (pp. 120-126).MathSciNetMATHCrossRef
[Rom07]
go back to reference Roman, R., C. Alcarez, & J. Lopez. (2007). A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes. Mobile Network Applications. Vol. 12. (pp. 231-244). Springer Verlag. Roman, R., C. Alcarez, & J. Lopez. (2007). A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes. Mobile Network Applications. Vol. 12. (pp. 231-244). Springer Verlag.
[Sal10]
go back to reference Salfner, F., Lenk, M., and Malek, M. (2010). A Survey of Online Failure Prediction Methods. ACM Computing Surveys. Vol. 42(3). (pp. 10.10-10.42).CrossRef Salfner, F., Lenk, M., and Malek, M. (2010). A Survey of Online Failure Prediction Methods. ACM Computing Surveys. Vol. 42(3). (pp. 10.10-10.42).CrossRef
[Tai03]
go back to reference Taiani, F., J.C. Fabre, & M.O. Killijian. (2003). Towards Implementing Multi-Layer Reflection for Fault-Tolerance. Proc. of the DSN 2003. IEEE Press. (pp. 435-444). Taiani, F., J.C. Fabre, & M.O. Killijian. (2003). Towards Implementing Multi-Layer Reflection for Fault-Tolerance. Proc. of the DSN 2003. IEEE Press. (pp. 435-444).
[Tel09]
go back to reference Telecom Japan. (2009). Cyber-Clean Center (CCC) Project for Anti-Bot Countermeasures in Japan. Proc. of the Second Japan-EU Symposium on the Future Internet. European Communities Brussels. (pp. 212-220). Telecom Japan. (2009). Cyber-Clean Center (CCC) Project for Anti-Bot Countermeasures in Japan. Proc. of the Second Japan-EU Symposium on the Future Internet. European Communities Brussels. (pp. 212-220).
Metadata
Title
Dependability
Author
Hermann Kopetz
Copyright Year
2011
Publisher
Springer US
DOI
https://doi.org/10.1007/978-1-4419-8237-7_6

Premium Partner