Skip to main content

Timed Hazard Analysis of Self-healing Systems

  • Chapter
Book cover Assurances for Self-Adaptive Systems

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 7740))

Abstract

Self-healing can be used to reduce hazards in embedded real-time systems which are applied in safety-critical environments. These systems may react to failures by a structural reconfiguration of the architecture during runtime. This means the exchange of components or the modification of the components’ connections, in order to avoid that a failure results in a hazard. This reaction is subject to hard real-time constraints because reacting too late does not yield the intended effects. Consequently, it is necessary to analyze the propagation of failures in the architectural configuration over time with respect to the structural reconfiguration. However, current approaches do not take into account the timing properties of the failure propagation and the structural reconfiguration. In this paper, we present a hazard analysis approach which specifically considers these timing properties. We illustrate our approach by an example case study from the RailCab project. Further, we demonstrate the scalability of the approach by experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abdelwahed, S., Karsai, G., Nagabhushan, M., Ofsthun, S.C.: Practical implementation of diagnosis systems using timed failure propagation graph models. IEEE Transactions on Instrumentation and Measurement 58(2), 240–247 (2009)

    Article  Google Scholar 

  2. Alur, R.: Timed Automata. In: Halbwachs, N., Peled, D.A. (eds.) CAV 1999. LNCS, vol. 1633, pp. 8–22. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  3. Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secur. Comput. 1(1), 11–33 (2004)

    Article  Google Scholar 

  4. Bengtsson, J., Yi, W.: Timed Automata: Semantics, Algorithms and Tools. In: Desel, J., Reisig, W., Rozenberg, G. (eds.) Lectures on Concurrency and Petri Nets. LNCS, vol. 3098, pp. 87–124. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  5. Brayton, R.K., Sangiovanni-Vincentelli, A.L., McMullen, C.T., Hachtel, G.D.: Logic Minimization Algorithms for VLSI Synthesis (1984)

    Google Scholar 

  6. Cassez, F., Roux, O.-H.: Structural translation from time petri nets to timed automata. Electron. Notes Theor. Comput. Sci. 128, 145–160 (2005)

    Article  MATH  Google Scholar 

  7. Cheng, B.H.C., de Lemos, R., Giese, H., Inverardi, P., Magee, J., Andersson, J., Becker, B., Bencomo, N., Brun, Y., Cukic, B., Di Marzo Serugendo, G., Dustdar, S., Finkelstein, A., Gacek, C., Geihs, K., Grassi, V., Karsai, G., Kienle, H.M., Kramer, J., Litoiu, M., Malek, S., Mirandola, R., Müller, H.A., Park, S., Shaw, M., Tichy, M., Tivoli, M., Weyns, D., Whittle, J.: Software Engineering for Self-Adaptive Systems: A Research Roadmap. In: Cheng, B.H.C., de Lemos, R., Giese, H., Inverardi, P., Magee, J. (eds.) Software Engineering for Self-Adaptive Systems. LNCS, vol. 5525, pp. 1–26. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  8. Colvin, R., Grunske, L., Winter, K.: Timed behavior trees for failure mode and effects analysis of time-critical systems. J. Syst. Softw. 81, 2163–2182 (2008)

    Article  Google Scholar 

  9. de Kler, J., Mackworth, A.K., Reiter, R.: Characterizing dianosis and systems. Artifical Intelligence 56 (1992)

    Google Scholar 

  10. Eckardt, T., Heinzemann, C., Henkler, S., Hirsch, M., Priesterjahn, C., Schäfer, W.: Modeling and verifying dynamic communication structures based on graph transformations. In: Computer Science – Research and Development, Springer (2011)

    Google Scholar 

  11. Ehrig, H., Ehrig, K., Prange, U., Taentzer, G.: Fundamentals of Algebraic Graph Transformation. Monographs in Theoretical Computer Science. Springer (2006)

    Google Scholar 

  12. Fenelon, P., McDermid, J.A.: An integrated tool set for software safety analysis. Journal of Systems and Software 21(3), 279–290 (1993)

    Article  Google Scholar 

  13. Fenelon, P., McDermid, J.A., Nicolson, M., Pumfrey, D.J.: Towards integrated safety analysis and design. ACM SIGAPP Applied Computing Review 2(1), 21–32 (1994)

    Article  Google Scholar 

  14. Giese, H., Tichy, M.: Component-based hazard analysis: Optimal designs, product lines, and online-reconfiguration. In: Proc. of the 25th International Conference on Computer Safety, Security and Reliability, Gdansk, Poland (2006)

    Google Scholar 

  15. Giese, H., Tichy, M., Schilling, D.: Compositional hazard analysis of uml components and deployment models. In: Proc. of the 23rd SAFECOMP, Potsdam, Germany (2004)

    Google Scholar 

  16. Grunske, L.: Annotation of Component Specifications with Modular Analysis Models for Safety Properties. In: Overhage, S., Turowski, K. (eds.) Proc. of the 1st Int. Workshop on Component Engineering Methodology, Erfurt, Germany (2003)

    Google Scholar 

  17. Grunske, L., Kaiser, B., Papadopoulos, Y.: Model-Driven Safety Evaluation with State-Event-Based Component Failure Annotations. In: Heineman, G.T., Crnković, I., Schmidt, H.W., Stafford, J.A., Ren, X.-M., Wallnau, K. (eds.) CBSE 2005. LNCS, vol. 3489, pp. 33–48. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  18. Güdemann, M., Ortmeier, F.: Probabilistic model-based safety analysis. In: Pierro, A.D., Norman, G. (eds.) Proceedings Eighth Workshop on Quantitative Aspects of Programming Languages. EPTCS, vol. 28, pp. 114–128 (2010)

    Google Scholar 

  19. Henke, C., Tichy, M., Böcker, J., Schäfer, W.: Organization and control of autonomous railway convoys. In: Proceedings of the 9th International Symposium on Advanced Vehicle Control, Kobe, Japan (October 2008)

    Google Scholar 

  20. International Electrotechnical Commission, Geneva, Switzerland. International Standard IEC 61025. Fault Tree Analysis, FTA (1990)

    Google Scholar 

  21. Kaiser, B., Gramlich, C., Förster, M.: State/event fault trees–A safety analysis model for software-controlled systems. Reliability Engineering & System Safety 92(11), 1521–1537 (2007)

    Article  Google Scholar 

  22. Kaiser, B., Liggesmeyer, P., Maeckel, O.: A New Component Concept for Fault Trees. In: Proceedings of the 8th National Workshop on Safety Critical Systems and Software (SCS 2003), Canberra, Australia. Research and Practice in Information Technology, vol. 33 (October 9-10, 2003)

    Google Scholar 

  23. Leveson, N.G.: Safeware: System Safety and Computers. ACM (1995)

    Google Scholar 

  24. Magott, J., Skrobanek, P.: A method of analysis of fault trees with time dependencies. In: Koornneef, F., van der Meulen, M.J.P. (eds.) SAFECOMP 2000. LNCS, vol. 1943, pp. 176–186. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  25. McCluskey, E.J.: Minimization of Boolean Functions. Bell System Technical Journal 35 (1956)

    Google Scholar 

  26. McKinley, P.K., Sadjadi, S.M., Kasten, E.P., Cheng, B.H.C.: Composing adaptive software. Computer 37(7), 56–64 (2004)

    Article  Google Scholar 

  27. Oreizy, P., Medvidovic, N., Taylor, R.N.: Architecture-based runtime software evolution. In: ICSE, pp. 177–186 (1998)

    Google Scholar 

  28. Ortmeier, F., Reif, W., Schellhorn, G.: Deductive cause-consequence analysis. In: Proceedings of the 16th IFAC World Congress (2006)

    Google Scholar 

  29. Palshikar, G.K.: Temporal fault trees. Information and Software Technology 44(3), 137–150 (2002)

    Article  Google Scholar 

  30. Papadopoulos, Y., McDermid, J.A., Sasse, R., Heiner, G.: Analysis and synthesis of the behaviour of complex programmable electronic systems in conditions of failure. Int. Journal of Reliability Engineering and System Safety 71(3), 229–247 (2001)

    Article  Google Scholar 

  31. Priesterjahn, C.: Hazard analysis of self-optimizing mechatronic systems. In: Proc. of the Doctoral Symposium of the 7th ESEC-FSE, Amsterdam, The Netherlands (2009)

    Google Scholar 

  32. Priesterjahn, C., Heinzemann, C., Schäfer, W.: From timed automata to timed failure propagation graphs. Technical Report tr-ri-12-325, Software Engineering Group, Heinz Nixdorf Institute, University of Paderborn (2012), http://www.cs.uni-paderborn.de/uploads/tx_sibibtex/PHS12_ag.pdf

  33. Priesterjahn, C., Steenken, D., Tichy, M.: Component-based timed hazard analysis of self-healing systems. In: Proceedings of the 8th Workshop on Assurances for self-Adaptive Systems, ASAS 2011, pp. 34–43. ACM, New York (2011)

    Google Scholar 

  34. Rauzy, A., Dutuit, Y.: Exact and truncated computations of prime implicants of coherent and non-coherent fault trees within Aralia. Reliability Engineering & System Safety 58(2), 127–144 (1997)

    Article  Google Scholar 

  35. Reiter, R.: A theory of diagnosis from first principles. Artifical Intelligence 32(1), 57–95 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  36. Reutenauer, C.: The mathematics of Petri nets. Prentice-Hall, Inc., Upper Saddle River (1990)

    Google Scholar 

  37. Rozenberg, G.: Handbook of Graph Grammars and Computing by Graph Transformation, Volume 1: Foundations. Foundations, vol. 1. World Scientific (1997)

    Google Scholar 

  38. Rudell, R.L.: Multiple-Value Logic Minimization for PLA Synthesis. Technical Report M86/65, University of California at Berkeley, USA (June 1984)

    Google Scholar 

  39. Seda, M.: Heuristic Set-Covering-Based Postprocessing for Improving the Quine-McCluskey Method. International Journal of Computational Intelligence (IJCI) 4(2), 139–143 (2008)

    Google Scholar 

  40. Storey, N.: Safety-Critical Computer Systems. Addison Wesley (1996)

    Google Scholar 

  41. Tichy, M., Henkler, S., Holtmann, J., OberthĂĽr, S.: Component story diagrams: A transformation language for component structures in mechatronic systems. In: Postproc. of the 4th Workshop OMER, Paderborn, Germany. HNI Verlagsschriftenreihe (2008)

    Google Scholar 

  42. van Orman Quine, W.: A Way to Simplify Truth Functions. The American Mathematical Monthly 62 (1955)

    Google Scholar 

  43. Walker, M., Bottaci, L., Papadopoulos, Y.: Compositional Temporal Fault Tree Analysis. In: Saglietti, F., Oster, N. (eds.) SAFECOMP 2007. LNCS, vol. 4680, pp. 106–119. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  44. Wallace, M.: Modular architectural representation and analysis of fault propagation and transformation. Electronic Notes in Theoretical Computer Science 141, 53–71 (2005)

    Article  Google Scholar 

  45. Weber, J., Wotawa, F.: Diagnosis and repair of dependent failures in the control system of a mobile autonomous robot. Appl. Intell. 36(3), 511–528 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Priesterjahn, C., Steenken, D., Tichy, M. (2013). Timed Hazard Analysis of Self-healing Systems. In: Cámara, J., de Lemos, R., Ghezzi, C., Lopes, A. (eds) Assurances for Self-Adaptive Systems. Lecture Notes in Computer Science, vol 7740. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36249-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36249-1_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36248-4

  • Online ISBN: 978-3-642-36249-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics