Skip to main content

A Safety Roadmap to Cyber-Physical Systems

  • Chapter
  • First Online:
Perspectives on the Future of Software Engineering

Abstract

In recent years, the term cyber-physical systems has emerged to characterize a new generation of embedded systems. In cyber-physical systems, embedded systems will be open in the sense that they will dynamically interconnect with other systems and will be able to dynamically adapt to changing runtime contexts. Such open adaptive systems provide a huge potential for society and for the economy. On the other hand, however, openness and adaptivity make it hard or even impossible for developers to predict a system’s dynamic structure and behavior. This impedes the assurance of important system quality properties, especially safety and reliability. Safety assurance of cyber-physical systems will therefore be both one of the most urgent and one of the most challenging research questions of the next decade. This chapter analyzes the state of the art in order to identify open gaps and suggests a runtime safety assurance framework for cyber-physical systems to structure ongoing and future research activities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    An AC never contains mandatory instruction, but advice. In this case, the AC provides one, but not the only, possible means for developing reusable software components.

  2. 2.

    IMA: Integrated Modular Avionics.

References

  1. IEC 61508: Functional Safety of Electrical/Electronic/Programmable Electronic Safety Related Systems. International Electrotechnical Commission (1999)

    Google Scholar 

  2. Fenn, J.L., Hawkins, R.D., Williams, P.J., Kelly, T.P., Banner, M.G., Oakshott, Y.: The who, where, how, why and when of modular and incremental certification. In: Proceedings of the 2007 2nd Institution of Engineering and Technology International Conference on System Safety, vol., no., pp. 135–140. 22–24 Oct 2007

    Google Scholar 

  3. FAA AC 20–148: Reusable Software Components. AC 20–148 (2004)

    Google Scholar 

  4. ISO/CD 26262: Road vehicles, Functional Safety Part 6: Product development at the software level, Part 10 – ‘Guidelines’ (2011)

    Google Scholar 

  5. Faller R., Dr. Goble, W.M.: Open IEC 61508 Certification of Products, exida GmbH (2007)

    Google Scholar 

  6. Rushby, J.: Modular Certification. NASA Contractor Report CR-2002-212130. NASA Langley Research Center (2002)

    Google Scholar 

  7. RTCA DO-297: Integrated Modular Avionics (IMA) – Development Guidance and Certification Considerations, RTCA/DO-297 (2005)

    Google Scholar 

  8. DECOS: Dependable Embedded Components and Systems, Integrated Project within the EU Framework Programme 6, http://www.decos.at. Last visited June 2012

  9. Kelly, T.: Concepts and Principles of Compositional Safety Case Construction. University of York (2001)

    Google Scholar 

  10. Bate I., Kelly T.: Architectural considerations in the certification of modular systems. In: Proceedings of the 21st International Conference on Computer Safety, Reliability and Security (SAFECOMP‘02), pp. 303–324. Springer (2002)

    Google Scholar 

  11. Kelly, T.: Using software architecture techniques to support the modular certification of safety-critical systems. In: Proceedings of the eleventh Australian workshop on Safety critical systems and software, vol. 69, pp. 53–65. Australian Computer Society, Inc (SCS’06), Darlinghurst (2006)

    Google Scholar 

  12. Fenn, J., Hawkins, R., Kelly, T.P., Williams, P.: Safety case composition using contracts – refinements based on feedback from an Industrial Case Study. In: 15th Safety Critical Systems Symposium. (2007)

    Google Scholar 

  13. Despotou, G., Kelly, T.: Investigating the use of argument modularity to optimise through-life system safety assurance. In: 3rd IET International Conference on: System Safety, pp. 1–6. (2008)

    Google Scholar 

  14. Zimmer, B., Bürklen, S., Knoop, M., Höfflinger, J., Trapp M. : Vertical Safety interfaces – improving the efficiency of modular certification. In: Proceedings of the 30th International Conference of Computer Safety, Reliability, and Security (SAFECOMP 2011)

    Google Scholar 

  15. Domis, D., Forster, M., Kemmann, S., Trapp, M., Safety Concept Trees. In: Reliability and Maintainability Symposium, 2009. RAMS 2009. Annual, vol., no., pp. 212–217. 26–29 Jan 2009. doi:10.1109/RAMS.2009.4914677

    Google Scholar 

  16. Adler, R., Kemmann, S, Liggesmeyer, P., Schwinn, P.: Model-based development of a safety concept. In: Proceedings of PSAM 11 & ESREL 2012, (2012)

    Google Scholar 

  17. Lisagor, O., McDermid, J.A., Pumfrey, D.J.: Towards a practicable process for automated safety analysis. In: 24th International System Safety Conference, pp. 596–607. (2006)

    Google Scholar 

  18. Papadopoulos, Y., McDermid, J.: Hierarchically performed hazard origin and propagation studies. In: Proceedings of the 18th International Conference on Computer Safety, Reliability and Security, Lecture Notes in Computer Science, vol. 1608, pp. 139–152. (1999)

    Google Scholar 

  19. Biehl, M., DeJiu, C.,Törngren, M.: Integrating safety analysis into the model-based development toolchain of automotive embedded systems. In Proceedings of the ACM SIGPLAN/SIGBED 2010 Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES ‘10), pp. 125–132. ACM, New York (2010)

    Google Scholar 

  20. Kaiser, B., Liggesmeyer, P., Mäckel, O.: A new component concept for fault trees. In: Lindsay, P., Cant, T. (eds.) Proceedings of the Conferences in Research and Practice in Information Technology, vol. 33, pp. 37–46. ACS (2004)

    Google Scholar 

  21. Adler, R., Domis, D., Höfig, K., Kemmann, S., Kuhn, T., Schwinn, J.P., Trapp, M.: Integration of component fault trees into the UML. Model. Softw. Eng. 312–327 (2011), Springer

    Google Scholar 

  22. Domis, D., Trapp M.: Integrating safety analyses and component-based design. In: Harrison M.D., Sujan M.-A. (eds.) SAFECOMP 2008, Lecture Notes in Computer Science, vol. 5219. pp. 58–71. (2008)

    Google Scholar 

  23. Domis, D., Trapp, M.: Component-based abstraction in fault tree analysis. In: Computer Safety, Reliability, and Security, pp. 297–310. Springer (2009)

    Google Scholar 

  24. Rushby, J.: Just-in-Time certification. In: Proceedings of the 12th IEEE International Conference on the Engineering of Complex Computer Systems (ICECCS), pp. 15–24. Auckland (2007)

    Google Scholar 

  25. Rushby, J.: Runtime Certification. In: Runtime Verification, 8th International Workshop, RV 2008, Budapest, 30 Mar 2008

    Google Scholar 

  26. Schneider, D., Trapp, M.: A safety engineering framework for open adaptive systems. In: Proceedings of the Fifth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, Ann Arbor 3–7 Oct 2011

    Google Scholar 

  27. Schneider, D., Trapp, M.: Conditional safety certificates in open systems. In: Proceedings of the 1st Workshop on Critical Automotive applications: Robustness & Safety (CARS), pp. 57–60. ACM, New York (2010)

    Google Scholar 

  28. Schneider D., Trapp M.: Conditional Safety Certification of Open Adaptive Systems, To be published in ACM Transactions on Autonomous and Adaptive Systems (TAAS) (2013)

    Google Scholar 

  29. Blair, G., Coulson, G., Robin, P.: Papathomas, M.: An architecture for next generation middleware. In: Davies, S.J., N.A.J. Raymond, K. (eds.) IFIP International Conference on Distributed Systems Platforms and Open Distributed Processing (Middleware’98) (1998)

    Google Scholar 

  30. Capra, L., Blair, G., Mascolo, C., Emmerich, W., Grace, P.: Exploiting reflection in mobile computing middleware. ACM SIGMOBILE Mobile Comput.Commun. Rev. 6, 34–44 (2002)

    Article  Google Scholar 

  31. Zhang, J., Cheng, B.H.C.: Specifying adaptation semantics. In: Workshop on Architecting Dependable Systems (WADS’05), pp. 1–7. ACM, St. Louis (2005)

    Google Scholar 

  32. Leucker, M., Schallhart, C.: A brief account of runtime verification. J.Logic.Algebr. Program. 78(5), 293–303 (2009)

    Article  MATH  Google Scholar 

  33. Goldsby, H.J., Cheng, B.H., Zhang, J.: AMOEBA-RT: run-time verification of adaptive software. In: Giese, H. (ed.) Models in Software Engineering. Lecture notes in computer science, vol. 5002. Springer, Berlin/Heidelberg (2008)

    Chapter  Google Scholar 

  34. Cheng, B.H. et al.: Software Engineering for Self-Adaptive Systems: A Research Roadmap, vol. 5525, pp. 1–26. (2009

    Google Scholar 

  35. http://www.self-adaptive.org/. Last visited in June 2012

  36. http://www.saso-conference.org/. Last visited in June 2012

  37. Gordon Blair et al.: Models@Run.Time. IEEE Comput. (2010)

    Google Scholar 

  38. Dagstuhl Seminar on Models@run.time: http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=11481. Last visited June 2012

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mario Trapp .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Trapp, M., Schneider, D., Liggesmeyer, P. (2013). A Safety Roadmap to Cyber-Physical Systems. In: Münch, J., Schmid, K. (eds) Perspectives on the Future of Software Engineering. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37395-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37395-4_6

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37394-7

  • Online ISBN: 978-3-642-37395-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics