2019 4th International Conference on System Reliability and Safety (ICSRS)最新文献

筛选
英文 中文
Tool-Supported Dependability Analysis of Semi-Markov Processes with Application to Autonomous Driving 工具支持的半马尔可夫过程可靠性分析及其在自动驾驶中的应用
2019 4th International Conference on System Reliability and Safety (ICSRS) Pub Date : 2019-11-01 DOI: 10.1109/ICSRS48664.2019.8987701
Stefan Kaalen, M. Nyberg, Carl Bondesson
{"title":"Tool-Supported Dependability Analysis of Semi-Markov Processes with Application to Autonomous Driving","authors":"Stefan Kaalen, M. Nyberg, Carl Bondesson","doi":"10.1109/ICSRS48664.2019.8987701","DOIUrl":"https://doi.org/10.1109/ICSRS48664.2019.8987701","url":null,"abstract":"For all safety-critical systems, modelling approaches allowing accurate dependability analysis is of utmost importance. Moreover, in order to accurately and realistically model the real-world behaviour of safety-critical systems, Semi-Markov Processes (SMPs) are highly useful. SMPs generalize Markov processes to give more freedom in how a system can be modelled. While SMPs are highly useful, previous literature fail to provide an intuitive modelling approach for them. As the first contribution, an intuitive novel modelling approach based on transition timers is presented. Once the systems of interest has been modelled as a SMP the problem still remains to analyze the model. As the second contribution, the Matlab app “SMP-tool” is presented. SMP-tool can analyze SMPs in several manners, perhaps most importantly by performing a dependability analysis through calculating the reliability and availability. Both contributions are applied to Highway Pilot, a typical system for autonomous driving.","PeriodicalId":430931,"journal":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120856031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Lightweight Ciphers in Automotive Networks: A Preliminary Approach 汽车网络中的轻量级密码:初步方法
2019 4th International Conference on System Reliability and Safety (ICSRS) Pub Date : 2019-11-01 DOI: 10.1109/ICSRS48664.2019.8987693
Arcangelo Castiglione, F. Palmieri, F. Colace, Marco Lombardi, D. Santaniello
{"title":"Lightweight Ciphers in Automotive Networks: A Preliminary Approach","authors":"Arcangelo Castiglione, F. Palmieri, F. Colace, Marco Lombardi, D. Santaniello","doi":"10.1109/ICSRS48664.2019.8987693","DOIUrl":"https://doi.org/10.1109/ICSRS48664.2019.8987693","url":null,"abstract":"Nowadays, the growing need to connect modern vehicles through computer networks leads to increased risks of cyberattacks. The internal network, which governs the several electronic components of a vehicle, is becoming increasingly overexposed to external attacks. The Controller Area Network (CAN) protocol, used to interconnect those devices is the key point of the internal network of modern vehicles. Therefore, securing such protocol is crucial to ensure a safe driving experience. However, the CAN is a standard that has undergone little changes since it was introduced in 1983. More precisely, in an attempt to reduce latency, the transfer of information remains unencrypted, which today represents a weak point in the protocol. Hence, the need to protect communications, without introducing low-level alterations, while preserving the performance characteristics of the protocol. In this work, we investigate the possibility of using symmetric encryption algorithms for securing messages exchanged by CAN protocol. In particular, we evaluate the using of lightweight ciphers to secure CAN-level communication. Such ciphers represent a reliable solution on hardware-constrained devices, such as microcontrollers.","PeriodicalId":430931,"journal":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133038699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Condition Based Maintenance for Industrial Labeling Machine 工业贴标机的状态维护
2019 4th International Conference on System Reliability and Safety (ICSRS) Pub Date : 2019-11-01 DOI: 10.1109/ICSRS48664.2019.8987687
A. Acernese, C. D. Vecchio, M. Tipaldi, L. Glielmo
{"title":"Condition Based Maintenance for Industrial Labeling Machine","authors":"A. Acernese, C. D. Vecchio, M. Tipaldi, L. Glielmo","doi":"10.1109/ICSRS48664.2019.8987687","DOIUrl":"https://doi.org/10.1109/ICSRS48664.2019.8987687","url":null,"abstract":"This paper reports the outcome of an industrial research on data-driven Condition Based Maintenance (CBM) for the film cutting group of labeling production lines. Objective of the study has been the prediction of erroneous labels cut. The large number of variables involved in thin labels cut (thickness comprised within 30μm and 38 μm) and the high throughput make the prediction of non conforming labels a difficult goal. To this aim, we developed a complete CBM strategy for film cutting groups. To identify failure signature, an exhaustive assessment on indices suggested in literature was done, but none of them were suitable to satisfy problem constraints. Thus we customized the most promising one (namely the root mean square value of the vibration measures) to our setting obtaining notable results. Given the lack of contributions in CBM in thin film cutting, we believe this paper might be of interest for academic researchers or people from industry dealing with similar problems.","PeriodicalId":430931,"journal":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114529306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the Chairman 主席致辞
2019 4th International Conference on System Reliability and Safety (ICSRS) Pub Date : 2019-11-01 DOI: 10.1109/icsrs48664.2019.8987720
Denis O'Brien
{"title":"Message from the Chairman","authors":"Denis O'Brien","doi":"10.1109/icsrs48664.2019.8987720","DOIUrl":"https://doi.org/10.1109/icsrs48664.2019.8987720","url":null,"abstract":"","PeriodicalId":430931,"journal":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115049029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implicit 4DVar Particle Filter State Estimation of Dynamic Power Systems: Preliminary Results 动态电力系统隐式4DVar粒子滤波状态估计:初步结果
2019 4th International Conference on System Reliability and Safety (ICSRS) Pub Date : 2019-11-01 DOI: 10.1109/ICSRS48664.2019.8987651
B. Uzunoğlu
{"title":"Implicit 4DVar Particle Filter State Estimation of Dynamic Power Systems: Preliminary Results","authors":"B. Uzunoğlu","doi":"10.1109/ICSRS48664.2019.8987651","DOIUrl":"https://doi.org/10.1109/ICSRS48664.2019.8987651","url":null,"abstract":"Dynamic state estimation for near real-time applications in power systems is becomingly increasingly important with the integration of variable wind and solar power generation that can be employed even at disaster conditions. New advanced state estimation tools that will replace the old generation must be developed in a general mathematical framework to assess complexity tradeoffs and addressing nonlinearity and non-normal behaviour while exploiting legacy software. Such a framework must also satisfy the power industry requirement for cautious evolutionary change rather than a revolutionary approach. Implicit Particle Filtering (IPF) is a sequential Monte Carlo method for data assimilation that uses an implicit step to select particles from the high-probability region of the implicit distribution. This work develops the formulation of IPF as for the estimation of the states of a power system and presents the first IPF application study on a power system state estimation. The approach is analyzed using a simulation of a three-node benchmark power system. For implicit function four dimensional variational data assimilation is used. The proposed algorithm is also non-intrusive for communications since the algorithm developed will have the flexibility to address multilevel heterogeneous wireless networks in the integration of different data packets.","PeriodicalId":430931,"journal":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131964415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilience Assessment of China's Natural Gas Supply System Based on Ecological Network Analysis 基于生态网络分析的中国天然气供应系统弹性评价
2019 4th International Conference on System Reliability and Safety (ICSRS) Pub Date : 2019-11-01 DOI: 10.1109/ICSRS48664.2019.8987713
Xueyi Li, Jinjun Zhang, Huai Su, E. Zio
{"title":"Resilience Assessment of China's Natural Gas Supply System Based on Ecological Network Analysis","authors":"Xueyi Li, Jinjun Zhang, Huai Su, E. Zio","doi":"10.1109/ICSRS48664.2019.8987713","DOIUrl":"https://doi.org/10.1109/ICSRS48664.2019.8987713","url":null,"abstract":"Natural gas is of vital importance to China's economy and social stability. Faced with the current severe situation of tight balance of natural gas supply in China, given the high complexity and uncertainty of the natural gas supply system, the stable supply of natural gas faces enormous challenges. How to improve its supply resilience is the key to be solved urgently. In this paper, the connotation of natural gas supply resilience is defined and a systematic resilience assessment method is proposed based on ecological network analysis. All results are calculated by publicly available data. From the static perspective, it is found that the Chinese natural gas supply resilience increases during 2016–2020. From the dynamic perspective, the characteristics of the restoration of Chinese natural gas supply system is revealed. Based on the results, suggestions are proposed to improve China's natural gas supply resilience. The ENA model developed in this paper is a new perspective for natural gas supply resilience assessment, which can be used as guidance for policy making.","PeriodicalId":430931,"journal":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116771822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Embedded Intrusion Detection System for Detecting Attacks over CAN-BUS 基于can总线的嵌入式入侵检测系统
2019 4th International Conference on System Reliability and Safety (ICSRS) Pub Date : 2019-11-01 DOI: 10.1109/ICSRS48664.2019.8987605
M. Casillo, Simone Coppola, M. D. Santo, F. Pascale, Emanuele Santonicola
{"title":"Embedded Intrusion Detection System for Detecting Attacks over CAN-BUS","authors":"M. Casillo, Simone Coppola, M. D. Santo, F. Pascale, Emanuele Santonicola","doi":"10.1109/ICSRS48664.2019.8987605","DOIUrl":"https://doi.org/10.1109/ICSRS48664.2019.8987605","url":null,"abstract":"The increasing number of connected cars introduced new cyber-attacks strategies that give life to potentially devastating scenarios on everyday life. In fat, the connected cars show many vulnerabilities and are not conform to the policies defined in the AIC Model (availability, integrity and confidentiality). On the other hand, the advantages related to cars connected are very useful for implementing new innovative scenarios providing, for example, context and situation awareness in some operative scenarios. The main problem relies in the introduction of effective techniques that works in well-known framework (PC, Smartphone, …) in a real challenging environment as the automotive. In this scenario, the main parameter to consider is that of the quick ability to identify and react a possible attack. So in this paper, an embedded Intrusion Detection System for Automotive is introduced. It works adopting a Bayesian Network approach for the quick identification of malicious messages on the controller Area Network (CAN-Bus). The first experimental results, obtained in a real scenario, seems to be real interesting.","PeriodicalId":430931,"journal":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126215795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Selective Duplication and Selective Comparison for Data Flow Error Detection 数据流错误检测的选择性复制和选择性比较
2019 4th International Conference on System Reliability and Safety (ICSRS) Pub Date : 2019-11-01 DOI: 10.1109/ICSRS48664.2019.8987731
Venu Babu Thati, J. Vankeirsbilck, J. Boydens, D. Pissoort
{"title":"Selective Duplication and Selective Comparison for Data Flow Error Detection","authors":"Venu Babu Thati, J. Vankeirsbilck, J. Boydens, D. Pissoort","doi":"10.1109/ICSRS48664.2019.8987731","DOIUrl":"https://doi.org/10.1109/ICSRS48664.2019.8987731","url":null,"abstract":"Embedded systems' hardware can be impacted by soft errors, which can cause data flow errors in the systems' software. In this paper, we present a novel software-based approach to counter data flow errors, called Selective Duplication and Selective Comparison (SDSC). First, we validated our SDSC technique by implementing it for six case studies and submitting it to a fault injection campaign. Next, we measured its execution time overhead. To put the measured results into perspective, we compared them to those of two established techniques, called Critical Block Duplication (CBD) and near Zero silent Data Corruption (nZDC). The results show that our SDSC technique has a higher error detection ratio with a lower silent data corruption compared to both the CBD and nZDC techniques. This does, however, come with a slightly higher execution time overhead.","PeriodicalId":430931,"journal":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132641986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
About Spare Parts Cannibalization for Rotable Items a Preliminary Approach for Inventory Control 关于可循环项目的备件拆分——库存控制的初步方法
2019 4th International Conference on System Reliability and Safety (ICSRS) Pub Date : 2019-11-01 DOI: 10.1109/ICSRS48664.2019.8987640
G. D. Gravio, L. Venanzi, F. Costantino, R. Patriarca, M. Tronci
{"title":"About Spare Parts Cannibalization for Rotable Items a Preliminary Approach for Inventory Control","authors":"G. D. Gravio, L. Venanzi, F. Costantino, R. Patriarca, M. Tronci","doi":"10.1109/ICSRS48664.2019.8987640","DOIUrl":"https://doi.org/10.1109/ICSRS48664.2019.8987640","url":null,"abstract":"Inventory management is a core business activity especially in case of high-value spare-parts. An optimal inventory management strategy can generate relevant savings, while ensuring high service levels. This research aims to develop a systemic approach to combine reliability and maintainability parameters and define optimal stock levels for rotable items. The research starts from the METRIC (Multi-Echelon Technique for Recoverable Item Control), and enhances its formulation through a cannibalization modelling perspective. Cannibalization is a policy used as a complementary approach to traditional spare parts management usually adopted in case of inventory shortage. This research aims at modelling cannibalization in a systemic model in order to estimate its benefits in terms of stock reduction. This paper presents a METRIC-like analytical formulation and tests it in a real case scenario. The preliminary case study refers to an inventory management problem for a civil aviation company and confirms the benefits of the proposed cannibalization approach.","PeriodicalId":430931,"journal":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128747739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic Mapping for Model Transformation Between AADL2 and HiP-HOPS AADL2和hip - hop之间模型转换的语义映射
2019 4th International Conference on System Reliability and Safety (ICSRS) Pub Date : 2019-11-01 DOI: 10.1109/ICSRS48664.2019.8987619
Zhibao Mian, Y. Gao, Xiaodong Shi, Cairong Tang
{"title":"Semantic Mapping for Model Transformation Between AADL2 and HiP-HOPS","authors":"Zhibao Mian, Y. Gao, Xiaodong Shi, Cairong Tang","doi":"10.1109/ICSRS48664.2019.8987619","DOIUrl":"https://doi.org/10.1109/ICSRS48664.2019.8987619","url":null,"abstract":"Currently, AADL has gradually become as one of the standards for the architecture design of complex embedded system. It is widely used in aerospace, automotive electronics and other fields for the design and analysis of high dependability-critical systems. Although the Error Model annex (EMA) of AADL can well support AADL error modeling, there is still a lack of technical method for multiobjective (based on dependability and cost) architecture optimisation analysis for dependable system. In order to achieve the optimisation analysis of AADL model, an effective method is to transform the AADL model into other equivalent models. This paper introduces the preliminary work of transforming AADL2 dependability model into a mature optimisation analysis tool model –– HiP-HOPS model, and analyses the semantic mapping relationship between the two different models. Model transformation can not only integrate the dependability modeling field to the analysis field, but also enables the optimisation analysis process simple and effective. This also brings good technical and engineering value under the current economic and technological situation.","PeriodicalId":430931,"journal":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128117904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信