On end-to-end safety for mobile COTS devices
نویسنده
چکیده
Today, ubiquitous mobile devices have not only arrived but entered the safety critical domain. There, systems are about to be controlled where human health or even human life is put at risk. For example, in automation systems first ideas surface to control parts of the system via a COTS smartphone. Another example is the idea to control the autonomous parking function of a car via a COTS smartphone too. As beneficial and convenient these ideas are on the first thought, on the second thought, dangers of these approaches become obvious. Especially in case of failures the system’s safety has to be maintained. The open question is how to achieve this mandatory requirement with COTS components, e.g. smartphones that are not developed following the development process necessary for safetycritical systems. This paper presents a concept to reliably detect human interaction while activating safety critical functions via COTS mobile devices. Thus a means is provided to detect erroneous activation requests for the safetycritical function.
منابع مشابه
Contract-Based Justification for COTS Component within Safety Critical Applications
Commercial-Off-The-Shelf (COTS) software components are being used within complex safety-critical applications. However, to use them with confidence, it is necessary to ensure that potential failures of the COTS component does not contribute to system level hazards. To this end, we have established a contract-based approach to capture the application-specific safety requirements, and correspond...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملUse of COTS Software in Safety-Critical Systems
The use of COTS (Commercial-Off-The-Shelf) software in safety-critical systems is increasing due to the potential for reduced development costs, reduced development time, reduced time to market and increased quality of the end product. Developing safetycritical systems using COTS software raise some new challenges. This essay investigates the appropriateness of using COTS in safety-critical sys...
متن کاملConnection Interface Designing for Grid and Mobile Devices
There area lot of mobile computer devices with a variety of applications and users Tend to use them more. Due to the limitations of mobile devices, running most of the procedures are impossible. To resolve this problem, mobile devices can be connected to the grid, to use the facilities of grid. On the other hand the communication mechanisms are different for each device and they cannot be c...
متن کاملMaximum Allowable Dynamic Load of Flexible 2-Link Mobile Manipulators Using Finite Element Approach
In this paper a general formulation for finding the maximum allowable dynamic load (MADL) of flexible link mobile manipulators is presented. The main constraints used for the algorithm presented are the actuator torque capacity and the limited error bound for the end-effector during motion on the given trajectory. The precision constraint is taken into account with two boundary lines in plane w...
متن کامل