Pub Date : 2018-11-01DOI: 10.1109/ICSRS.2018.8688851
M. Batteux, T. Prosvirnova, A. Rauzy, Liu Yang
In this article, we show how phased-mission systems can be described and assessed by means of the AltaRica 3.0 technology. AltaRica 3.0 is a formal, object-oriented modeling language dedicated to probabilitic risk/safety analyses. We illustrate here its power by introducing a modeling pattern making it possible to represent phased-mission systems in an elegant way. This modeling pattern fits with the CESAMES framework for systems engineering. We show that AltaRica 3.0 models for phased-mission systems can be assessed efficiently by means of the stepwise simulator and the stochastic simulator we developed for the language.
{"title":"Reliability Assessment of Phased-Mission Systems with AltaRica 3.0","authors":"M. Batteux, T. Prosvirnova, A. Rauzy, Liu Yang","doi":"10.1109/ICSRS.2018.8688851","DOIUrl":"https://doi.org/10.1109/ICSRS.2018.8688851","url":null,"abstract":"In this article, we show how phased-mission systems can be described and assessed by means of the AltaRica 3.0 technology. AltaRica 3.0 is a formal, object-oriented modeling language dedicated to probabilitic risk/safety analyses. We illustrate here its power by introducing a modeling pattern making it possible to represent phased-mission systems in an elegant way. This modeling pattern fits with the CESAMES framework for systems engineering. We show that AltaRica 3.0 models for phased-mission systems can be assessed efficiently by means of the stepwise simulator and the stochastic simulator we developed for the language.","PeriodicalId":166131,"journal":{"name":"2018 3rd International Conference on System Reliability and Safety (ICSRS)","volume":"290 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123917514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICSRS.2018.8688859
Tobias Schmid, Stefanie Schraufstetter, S. Wagner
Introducing highly automated driving requires to overcome many challenges. Regarding functional safety, the shift from a fail-safe to a fail-operational vehicle control system is necessary to resume the driving task even in the case of a failure. This necessitates a completely new, multi-channel vehicle architecture including enhanced methods for safety analysis and the collating of single analyses on the system level. We introduce an approach based on a system level fault-tree analysis to ensure completeness of the safety analysis and to deduce suitable methods for detailed analysis of each type of fault, such as random hardware or systematic faults, correlating with branches of the fault-tree. Furthermore, we identify components with the necessity of absence of common cause failures.
{"title":"An Approach for Structuring a Highly Automated Driving Multiple Channel Vehicle System for Safety Analysis","authors":"Tobias Schmid, Stefanie Schraufstetter, S. Wagner","doi":"10.1109/ICSRS.2018.8688859","DOIUrl":"https://doi.org/10.1109/ICSRS.2018.8688859","url":null,"abstract":"Introducing highly automated driving requires to overcome many challenges. Regarding functional safety, the shift from a fail-safe to a fail-operational vehicle control system is necessary to resume the driving task even in the case of a failure. This necessitates a completely new, multi-channel vehicle architecture including enhanced methods for safety analysis and the collating of single analyses on the system level. We introduce an approach based on a system level fault-tree analysis to ensure completeness of the safety analysis and to deduce suitable methods for detailed analysis of each type of fault, such as random hardware or systematic faults, correlating with branches of the fault-tree. Furthermore, we identify components with the necessity of absence of common cause failures.","PeriodicalId":166131,"journal":{"name":"2018 3rd International Conference on System Reliability and Safety (ICSRS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134417031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICSRS.2018.8688870
Loay Abdelrazek, Marianne A. Azer
Current security issues in mobile networks have great impact on user privacy. With the focus directed to signaling protocols security, network security and air interface encryption, critical configurations and design flaws that would impact user privacy can be overlooked. The leakage of IMSI on the broadcast channels during network paging is a privacy issue worth considering. In this paper, we present an experimental analysis for the IMSI leakage in the GSM broadcast channels during the paging procedure and the impact of this type of passive attack on user's privacy.
{"title":"User Privacy in Legacy Mobile Network Protocols","authors":"Loay Abdelrazek, Marianne A. Azer","doi":"10.1109/ICSRS.2018.8688870","DOIUrl":"https://doi.org/10.1109/ICSRS.2018.8688870","url":null,"abstract":"Current security issues in mobile networks have great impact on user privacy. With the focus directed to signaling protocols security, network security and air interface encryption, critical configurations and design flaws that would impact user privacy can be overlooked. The leakage of IMSI on the broadcast channels during network paging is a privacy issue worth considering. In this paper, we present an experimental analysis for the IMSI leakage in the GSM broadcast channels during the paging procedure and the impact of this type of passive attack on user's privacy.","PeriodicalId":166131,"journal":{"name":"2018 3rd International Conference on System Reliability and Safety (ICSRS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134429621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICSRS.2018.8688853
M. Hayashi
This paper proposes a new way to evaluate the time-specific failure/success frequencies of a system; such measures are important when designing telecommunications networks as they affect the telecom customers' satisfaction level. Our approach used a 3 by 3 matrix that enables the algorithm for evaluating the availability of system to be transformed into one for evaluating the corresponding time-specific failure/success frequencies by replacing the parameters and operations of the algorithm with matrix parameters and operations. The computational complexity of the algorithm after transformation is the same as (linear with respect to) that of the original availability algorithm. This implies that our method can be easily used in actual situations.
{"title":"Transformation from Availability Expression to Time-Specific Failure/Success Frequency Expressions","authors":"M. Hayashi","doi":"10.1109/ICSRS.2018.8688853","DOIUrl":"https://doi.org/10.1109/ICSRS.2018.8688853","url":null,"abstract":"This paper proposes a new way to evaluate the time-specific failure/success frequencies of a system; such measures are important when designing telecommunications networks as they affect the telecom customers' satisfaction level. Our approach used a 3 by 3 matrix that enables the algorithm for evaluating the availability of system to be transformed into one for evaluating the corresponding time-specific failure/success frequencies by replacing the parameters and operations of the algorithm with matrix parameters and operations. The computational complexity of the algorithm after transformation is the same as (linear with respect to) that of the original availability algorithm. This implies that our method can be easily used in actual situations.","PeriodicalId":166131,"journal":{"name":"2018 3rd International Conference on System Reliability and Safety (ICSRS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123256079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICSRS.2018.8688845
Zhiguo Zeng, E. Zio
In this paper, an optimization model is developed for optimal design of the safety barriers in a nuclear power plant. By applying the developed model, safety barriers of different natures, i.e., the prevention, mitigation, emergency and recovery measures, can be optimized jointly for business continuity. A hierarchical numerical optimization method based on golden search and genetic algorithm is developed to obtain the optimal solutions. A numerical case study regarding the allocation of resources among the safety barriers prevention, mitigation and emergency in a nuclear power plant is worked out to maximize business continuity against the threat of steam generator tube ruptures.
{"title":"Joint Optimization of Business Continuity by Designing Safety Barriers for Accident Prevention, Mitigation and Emergency Responses","authors":"Zhiguo Zeng, E. Zio","doi":"10.1109/ICSRS.2018.8688845","DOIUrl":"https://doi.org/10.1109/ICSRS.2018.8688845","url":null,"abstract":"In this paper, an optimization model is developed for optimal design of the safety barriers in a nuclear power plant. By applying the developed model, safety barriers of different natures, i.e., the prevention, mitigation, emergency and recovery measures, can be optimized jointly for business continuity. A hierarchical numerical optimization method based on golden search and genetic algorithm is developed to obtain the optimal solutions. A numerical case study regarding the allocation of resources among the safety barriers prevention, mitigation and emergency in a nuclear power plant is worked out to maximize business continuity against the threat of steam generator tube ruptures.","PeriodicalId":166131,"journal":{"name":"2018 3rd International Conference on System Reliability and Safety (ICSRS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124995305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICSRS.2018.8688875
Z. Lajic, Ioannis Filippopoulos, A. Senteris, M. Pearson
In this paper a new adaptive GLR (generalized likelihood ratio) detector which is able to detect the stable periods of the operation of a vessel has been presented. To assess the performance of a vessel, the stable periods of navigation can be used only. Therefore, having only sensor measurements from the stable periods as the inputs to the system is crucial for proper functioning of an auto logged vessel performance monitoring system. Removing the “contaminated” signals by ship maneuvering, changes in the weather condition or vessel speed would lead to an increase of the reliability of the system. The results from two VLCCs (Very Large Crude Carrier) with high and low frequency data will be shown.
{"title":"Adaptive GLR Change Detector for Increasing Reliability of Vessel Performance System","authors":"Z. Lajic, Ioannis Filippopoulos, A. Senteris, M. Pearson","doi":"10.1109/ICSRS.2018.8688875","DOIUrl":"https://doi.org/10.1109/ICSRS.2018.8688875","url":null,"abstract":"In this paper a new adaptive GLR (generalized likelihood ratio) detector which is able to detect the stable periods of the operation of a vessel has been presented. To assess the performance of a vessel, the stable periods of navigation can be used only. Therefore, having only sensor measurements from the stable periods as the inputs to the system is crucial for proper functioning of an auto logged vessel performance monitoring system. Removing the “contaminated” signals by ship maneuvering, changes in the weather condition or vessel speed would lead to an increase of the reliability of the system. The results from two VLCCs (Very Large Crude Carrier) with high and low frequency data will be shown.","PeriodicalId":166131,"journal":{"name":"2018 3rd International Conference on System Reliability and Safety (ICSRS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121320828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICSRS.2018.8688829
Yoni Huaynacho, Abel S. Huaynacho
The improvement of software processes plays an important role in the developing of systems that obtain a higher quality product. Redesigning software takes a considerable amount of time. Even making a small change is a difficult task and it takes a long time to obtain better results. Moreover, if the software tools that help this change are not properly managed, the improvement in the development of the System could be stopped. This paper presents a process of changing a web system which uses an initial complex design to another one that uses a simpler and improved development tools such as the ZK and Hibernate Framework, which final result is indeed improved Software.
{"title":"Application of the ZK and Hibernate Framework for the Development of an Educational Web System Using a Local Server","authors":"Yoni Huaynacho, Abel S. Huaynacho","doi":"10.1109/ICSRS.2018.8688829","DOIUrl":"https://doi.org/10.1109/ICSRS.2018.8688829","url":null,"abstract":"The improvement of software processes plays an important role in the developing of systems that obtain a higher quality product. Redesigning software takes a considerable amount of time. Even making a small change is a difficult task and it takes a long time to obtain better results. Moreover, if the software tools that help this change are not properly managed, the improvement in the development of the System could be stopped. This paper presents a process of changing a web system which uses an initial complex design to another one that uses a simpler and improved development tools such as the ZK and Hibernate Framework, which final result is indeed improved Software.","PeriodicalId":166131,"journal":{"name":"2018 3rd International Conference on System Reliability and Safety (ICSRS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125910882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Industrial Internet of things is becoming a boon to Original Equipment Manufacturers (OEMs) offering after-sales services such as condition-based maintenance and extended warranty for their products. These companies leverage novel digital information infrastructures to improve daily industrial activities, including data collection, remote monitoring and advanced condition-based maintenance services. The emergence of digital infrastructure and new business prospects via servi-tization and quality services encourage companies to collect vast amounts of data that have been generated in different stages of product lifecycles. Despite of the potential benefits, companies are unable to fully harness the opportunities presented by digital information infrastructure because there exist several platforms with variations in technologies and standards resulting in interoperability challenges. This becomes particularly critical when a company sells its products to several clients with different technologies. To overcome such challenges, we investigate the Open Messaging Interface (O-MI) and Open Data Format (O-DF), flexible messaging and data exchange standards that enable seamless integration of different systems. These standards enable interoperability and support time-centric, event-centric, and rate-centric modes of data exchange.
{"title":"Data Exchange Standard for Industrial Internet of Things","authors":"Manik Madhikermi, Narges Yousefnezhad, Kary Främling","doi":"10.1109/ICSRS.2018.8688847","DOIUrl":"https://doi.org/10.1109/ICSRS.2018.8688847","url":null,"abstract":"Industrial Internet of things is becoming a boon to Original Equipment Manufacturers (OEMs) offering after-sales services such as condition-based maintenance and extended warranty for their products. These companies leverage novel digital information infrastructures to improve daily industrial activities, including data collection, remote monitoring and advanced condition-based maintenance services. The emergence of digital infrastructure and new business prospects via servi-tization and quality services encourage companies to collect vast amounts of data that have been generated in different stages of product lifecycles. Despite of the potential benefits, companies are unable to fully harness the opportunities presented by digital information infrastructure because there exist several platforms with variations in technologies and standards resulting in interoperability challenges. This becomes particularly critical when a company sells its products to several clients with different technologies. To overcome such challenges, we investigate the Open Messaging Interface (O-MI) and Open Data Format (O-DF), flexible messaging and data exchange standards that enable seamless integration of different systems. These standards enable interoperability and support time-centric, event-centric, and rate-centric modes of data exchange.","PeriodicalId":166131,"journal":{"name":"2018 3rd International Conference on System Reliability and Safety (ICSRS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132736802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/icsrs.2018.8688841
Fatima Sifou, M. Marwan, A. Hammouch
Security and privacy are the main challenges in the internet of things (IoT) environment. With devices are interconnected and connected to the internet in this open environment, unauthorized alteration, access to confidential data, or even denial of service frequently occurr. To address those vulnerabilities, it is necessary to implement an access. Previous research shows that OM-AM is appropriate for architecture handling security problems in a dynamic environment such as IoT. This framework comprises four layers, i.e. objective, model, architecture and mechanism. Our contribution consists in applying OM-AM to an Attribute-based access control (ABAC) model to protect IoT device ‘data in cloud resources.
{"title":"Applying OM-AM Reference to an ABAC Model for Securing Cloud-Enabled Internet of Things","authors":"Fatima Sifou, M. Marwan, A. Hammouch","doi":"10.1109/icsrs.2018.8688841","DOIUrl":"https://doi.org/10.1109/icsrs.2018.8688841","url":null,"abstract":"Security and privacy are the main challenges in the internet of things (IoT) environment. With devices are interconnected and connected to the internet in this open environment, unauthorized alteration, access to confidential data, or even denial of service frequently occurr. To address those vulnerabilities, it is necessary to implement an access. Previous research shows that OM-AM is appropriate for architecture handling security problems in a dynamic environment such as IoT. This framework comprises four layers, i.e. objective, model, architecture and mechanism. Our contribution consists in applying OM-AM to an Attribute-based access control (ABAC) model to protect IoT device ‘data in cloud resources.","PeriodicalId":166131,"journal":{"name":"2018 3rd International Conference on System Reliability and Safety (ICSRS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129873686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/icsrs.2018.8688714
{"title":"Reviewers ICSRS 2018","authors":"","doi":"10.1109/icsrs.2018.8688714","DOIUrl":"https://doi.org/10.1109/icsrs.2018.8688714","url":null,"abstract":"","PeriodicalId":166131,"journal":{"name":"2018 3rd International Conference on System Reliability and Safety (ICSRS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131115824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}