Research on the Survivability of Embedded Real-time System

Introducing survivability into embedded real-time system (ERTS) can improve the survivability power of the system. This paper mainly discusses about the survivability of ERTS. The first is the survivability origin of ERTS. The second is survivability analysis. According to the definition of survivability based on survivability specification and division of the entire survivability analysis process for ERTS, a survivability analysis profile is presented. The quantitative analysis model of this profile is emphasized and illuminated in detail, the quantifying analysis of system was showed helpful to evaluate system survivability more accurate. The third is platform design of survivability analysis. In terms of the profile, the analysis process is encapsulated and assembled into one platform, on which quantification, standardization and simplification of survivability analysis are all achieved. The fourth is survivability design. According to character of ERTS, strengthened design method is selected to realize system survivability design. Through the analysis of embedded mobile video-on-demand system, intrusion tolerant technology is introduced in whole survivability design.


Authors:



References:
[1] Barnes A, Hollway A, Neumman P G. Survivable
computer-communication systems: The problem and working group
recommendations(R). Washington: US Army Research Laboratory, 1993.
[2] Mead N R., Ellison RJ, Linger R C, et al. Survivable Network Analysis
Method(R). Carnegie Mellon University: Software Engineering
Institute Technical Report, 2000.9.
[3] Knight J C, Strunk E A, Sullivan K J. Towards a Rigorous Definition of
Information System Survivability. Proc. of DARPA Information
Survivability Conference and Exposition(C). IEEE Computer Society
Press, 2003:78-89.
[4] Fung C, Chen Y L, Wang X Y, et al. Survivability analysis of distributed
systems using attack tree methodology. Proc. of the IEEE Military
Communications (C). IEEE Computer Society Press, 2005: 583-589.
[5] Hiltunen M A, Schliching R D, Ugarte C A. Building survivable services
using redundancy and adaptation(J). IEEE Trans. on Computers,
2003,52(2):181-194.
[6] Bowen T, Chee D, Segal M, et al. Building survivable systems: An
integrated approach based on intrusion detection and damage
containment. Proc. of the DARPA Information Survivability Conference
and Exposition(C). IEEE Computer Society Press, 2000: 25-27.
[7] Jha S, Wing J, Linger R, Longstaff T. Survivability analysis of network
specifications. Proc. of the Dependable Systems and Networks(C). IEEE
Computer Society Press, 2000: 613-622.
[8] Snow A P, Varshney U, Malloy A D. Reliability and survivability of
wireless and mobile networks(J). IEEE Computer, 2000,33(7): 449-454.
[9] Gao Z X, Ong C H, Tan W K Survivability assessment: modeling
dependences in information system. Proceeding of 4th IEEE/CMU/SEI
Information Survivability Workshop(C). Vancouver, Canada, 2001.2-8.
[10] Ellison R, Fisher D, et al. Survivable Network System Analysis: A Case
Study(J). Software, IEEE,1999, 16(4):70~77.
[11] Ma Q K, Xiao L L, Yen I L, et al. An adaptive multiparty protocol for
secure data protection. Proc. of the Parallel and Distributed Systems(C).
IEEE Computer Society Press, 2005. 43-49.
[12] Zhang L J, Guo L, Wang W. The Research Summarization of Technology
of Network System Survivability Evaluation and Enhancement (J).
Computer Science, 2007,34(8):30-33. (in Chinese)
[13] Perrow C. Normal Accidents: Living with High-Risk Technologies (M).
Princeton University Press: Princeton, New Jersey, 1999.
[14] Lin X G, Xu R S, Xiong H. A Framework of Quantitative Analysis for
Information System Survivability (J). Journal of Electronics &
Information Technology, 2006,28(9):1721-1726.(in Chinese)
[15] Linger R C, Mead N R, Lipson H F. Requirements Definition for
Survivable Network Systems (R). (s. l.): System Design Laboratory, SRI
International Press, 2002.