Research on the Survivability of Embedded Real-time System

Introducing survivability into embedded real-time system (ERTS) can improve the survivability power of the system. This paper mainly discusses about the survivability of ERTS. The first is the survivability origin of ERTS. The second is survivability analysis. According to the definition of survivability based on survivability specification and division of the entire survivability analysis process for ERTS, a survivability analysis profile is presented. The quantitative analysis model of this profile is emphasized and illuminated in detail, the quantifying analysis of system was showed helpful to evaluate system survivability more accurate. The third is platform design of survivability analysis. In terms of the profile, the analysis process is encapsulated and assembled into one platform, on which quantification, standardization and simplification of survivability analysis are all achieved. The fourth is survivability design. According to character of ERTS, strengthened design method is selected to realize system survivability design. Through the analysis of embedded mobile video-on-demand system, intrusion tolerant technology is introduced in whole survivability design. Keywords—ERTS (embedded real-time system), survivability, quantitative analysis, survivability specification , intrusion tolerant

[1]  Matti A. Hiltunen,et al.  Building Survivable Services Using Redundancy and Adaptation , 2003, IEEE Trans. Computers.

[2]  A. S. Thoke,et al.  International Journal of Electrical and Computer Engineering 3:16 2008 Fault Classification of Double Circuit Transmission Line Using Artificial Neural Network , 2022 .

[3]  D. L. Simms,et al.  Normal Accidents: Living with High-Risk Technologies , 1986 .

[4]  Nancy R. Mead,et al.  Survivable Network System Analysis: A Case Study , 1999, IEEE Softw..

[5]  Xinyu Wang,et al.  Survivability analysis of distributed systems using attack tree methodology , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[6]  Woon Kiong Survivability Assessment : Modelling Dependencies in Information Systems , .

[7]  Zhang Le The Research Summarization of Technology of Network System Survivability Evaluation and Enhancement , 2007 .

[8]  Farokh B. Bastani,et al.  An adaptive multiparty protocol for secure data protection , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).

[9]  Nancy R. Mead,et al.  Requirements definition for survivable network systems , 1998, Proceedings of IEEE International Symposium on Requirements Engineering: RE '98.

[10]  Prem Uppuluri,et al.  Building survivable systems: an integrated approach based on intrusion detection and damage containment , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[11]  Somesh Jha,et al.  Survivability analysis of network specifications , 2000, Proceeding International Conference on Dependable Systems and Networks. DSN 2000.

[12]  Upkar Varshney,et al.  Reliability and Survivability of Wireless and Mobile Networks , 2000, Computer.

[13]  Kevin J. Sullivan,et al.  Towards a rigorous definition of information system survivability , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[14]  John McHugh,et al.  Survivable Network Analysis Method , 2000 .

[15]  A. J. Grimes Normal Accidents: Living with High Risk Technologies , 1985 .