Pub Date : 2018-06-01DOI: 10.1109/SYSOSE.2018.8428763
A. Reineix, C. Guiffaut
The objective of the proposed method is to model embedded emitting antennas placed on a large dimension platform (vehicle, boat,,..). In the proposed approach, the complex far field radiation pattern of the alone antenna is supposed to be known in three dimensional space. Then a model of the antenna constituted by a distribution of elementary electrical dipoles is built and optimized. For such a model, the constraint is to have the same radiation pattern as the original antenna in all the directions. The optimization is made by an extended Ant Colony Optimization (ACO) algorithm. The model is meshless, i.e., it can be integrated in a fullwave method without the need to conform to the meshing which will be therefore dedicated to the carrier modeling. Finite Difference Time Domain (FDTD) method is used to evaluate the dipolar model and its integration with a carrier. Hence, one main interest of such an approach is to derive a model of the antenna decorrelated of the Cartesian grid. The powerful of the approach will be shown on a simple example.
{"title":"Equivalent dipole model optimized by Ant Colony Optimization Algorithm for modeling antennas in their context","authors":"A. Reineix, C. Guiffaut","doi":"10.1109/SYSOSE.2018.8428763","DOIUrl":"https://doi.org/10.1109/SYSOSE.2018.8428763","url":null,"abstract":"The objective of the proposed method is to model embedded emitting antennas placed on a large dimension platform (vehicle, boat,,..). In the proposed approach, the complex far field radiation pattern of the alone antenna is supposed to be known in three dimensional space. Then a model of the antenna constituted by a distribution of elementary electrical dipoles is built and optimized. For such a model, the constraint is to have the same radiation pattern as the original antenna in all the directions. The optimization is made by an extended Ant Colony Optimization (ACO) algorithm. The model is meshless, i.e., it can be integrated in a fullwave method without the need to conform to the meshing which will be therefore dedicated to the carrier modeling. Finite Difference Time Domain (FDTD) method is used to evaluate the dipolar model and its integration with a carrier. Hence, one main interest of such an approach is to derive a model of the antenna decorrelated of the Cartesian grid. The powerful of the approach will be shown on a simple example.","PeriodicalId":314200,"journal":{"name":"2018 13th Annual Conference on System of Systems Engineering (SoSE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122761188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/SYSOSE.2018.8428776
Jamal El Hachem, Vanea Chiprianov, V. V. G. Neto, P. Aniorté
Security is an important concern for software-intensive Systems-of-Systems (SoS). Architectural analysis for SoS secturity assessment should be performed at early stages of development. Such activity could prevent vulnerabilities and avoid potential cascading attack emergent behaviors, i.e., a succession of security vulnerabilities that emerge from individual constituents security fragilities, potentially causing interruption and collapse of SoS operation. Model simulation can prevent these issues by predicting, at design-time, how SoS will behave regarding its reaction to potential attacks. As security is a quality attribute, i.e., a property that comes up from the relation between software parts, software architecture analysis and simulation are an additional support for the prediction of SoS security. However, despite recent advances in such area, few simulation approaches have tackled simulation of secure SoS architectures where the basis of the described models are the SoS behavior or the interactions among the SoS Constituent Systems (CS). The main contribution of this paper is offering a big picture of how recent advances on SoS security analysis via simulations can form a robust framework for SoS security prediction. We argue the pertinence of Multi-Agent Systems (MAS) for SoS simulation due to similarities between MAS and SoS concepts, and we report how MAS simulation enables the visualization of emergent behaviors and how they impact the SoS security. Our results to foster SoS security analysis include (i) an extension of a MAS conceptual model and platform to include security concepts, (ii) a Model-Driven Engineering (MDE) approach that adopts automatic mappings between secure SoS architecture modeled using an existing SysML-based modeling language, namely the SoSSecML, and (iii) a MAS platform to support such analysis.
{"title":"Extending a Multi-Agent Systems Simulation Architecture for Systems-of-Systems Security Analysis","authors":"Jamal El Hachem, Vanea Chiprianov, V. V. G. Neto, P. Aniorté","doi":"10.1109/SYSOSE.2018.8428776","DOIUrl":"https://doi.org/10.1109/SYSOSE.2018.8428776","url":null,"abstract":"Security is an important concern for software-intensive Systems-of-Systems (SoS). Architectural analysis for SoS secturity assessment should be performed at early stages of development. Such activity could prevent vulnerabilities and avoid potential cascading attack emergent behaviors, i.e., a succession of security vulnerabilities that emerge from individual constituents security fragilities, potentially causing interruption and collapse of SoS operation. Model simulation can prevent these issues by predicting, at design-time, how SoS will behave regarding its reaction to potential attacks. As security is a quality attribute, i.e., a property that comes up from the relation between software parts, software architecture analysis and simulation are an additional support for the prediction of SoS security. However, despite recent advances in such area, few simulation approaches have tackled simulation of secure SoS architectures where the basis of the described models are the SoS behavior or the interactions among the SoS Constituent Systems (CS). The main contribution of this paper is offering a big picture of how recent advances on SoS security analysis via simulations can form a robust framework for SoS security prediction. We argue the pertinence of Multi-Agent Systems (MAS) for SoS simulation due to similarities between MAS and SoS concepts, and we report how MAS simulation enables the visualization of emergent behaviors and how they impact the SoS security. Our results to foster SoS security analysis include (i) an extension of a MAS conceptual model and platform to include security concepts, (ii) a Model-Driven Engineering (MDE) approach that adopts automatic mappings between secure SoS architecture modeled using an existing SysML-based modeling language, namely the SoSSecML, and (iii) a MAS platform to support such analysis.","PeriodicalId":314200,"journal":{"name":"2018 13th Annual Conference on System of Systems Engineering (SoSE)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124989953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/SYSOSE.2018.8428779
Alejandro Garcia Garcia, Megane Beldjelali Labro, Firas Farhat, Jean-Baptiste Pérot, Q. Dermigny, M. Dufresne, J. Grosset, F. Bedoui, C. Legallais
Biomimetic approaches in tissue engineering consist in collecting knowledge for native tissues or organs to propose novel solutions to reconstruct them in vitro. As an example, the musculo-skeletal continuum can be described using a system of system vision. An engineered musculo-skeletal tissue can thus be analyzed as a technological system of system, combining different types of cells and materials, whose properties at different scales are interdependent and affected by changes observed in the different component systems. We propose here to reconstruct the major components, having in mind the objective of their further integration in the final product. The final biohybrid bone-tendon-muscle continuum could thus be very useful as organ substitute, but also as relevant in vitro model to investigate scientific questions such as tissue healing or aging.
{"title":"Multi-scale approach to reconstruct a bioartificial system of system: the example of the bone-tendon-muscle continuum","authors":"Alejandro Garcia Garcia, Megane Beldjelali Labro, Firas Farhat, Jean-Baptiste Pérot, Q. Dermigny, M. Dufresne, J. Grosset, F. Bedoui, C. Legallais","doi":"10.1109/SYSOSE.2018.8428779","DOIUrl":"https://doi.org/10.1109/SYSOSE.2018.8428779","url":null,"abstract":"Biomimetic approaches in tissue engineering consist in collecting knowledge for native tissues or organs to propose novel solutions to reconstruct them in vitro. As an example, the musculo-skeletal continuum can be described using a system of system vision. An engineered musculo-skeletal tissue can thus be analyzed as a technological system of system, combining different types of cells and materials, whose properties at different scales are interdependent and affected by changes observed in the different component systems. We propose here to reconstruct the major components, having in mind the objective of their further integration in the final product. The final biohybrid bone-tendon-muscle continuum could thus be very useful as organ substitute, but also as relevant in vitro model to investigate scientific questions such as tissue healing or aging.","PeriodicalId":314200,"journal":{"name":"2018 13th Annual Conference on System of Systems Engineering (SoSE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128793310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/SYSOSE.2018.8428765
Duncan Ki-Aries, Shamal Faily, H. Dogan, Christopher Williams
System of Systems (SoS) is a term often used to describe the coming together of independent systems, collaborating to achieve a new or higher purpose. However, clarity is needed when using this term given that operational areas may be unfamiliar with the terminology. In this paper, we present an approach for refining System and SoS descriptions to aid multistakeholder communication and understanding; building on previous work, we illustrate an example of characterising a likely SoS. By identifying key stakeholders, systems, management and control, this approach supports the initial steps of a SoS security risk assessment approach using a tool-supported framework that supports operational needs towards requirements engineering.
系统的系统(System of Systems, SoS)是一个术语,通常用于描述独立系统的结合,协作以实现新的或更高的目标。然而,考虑到操作领域可能不熟悉该术语,在使用该术语时需要明确。在本文中,我们提出了一种改进系统和SoS描述的方法,以帮助多利益相关者沟通和理解;在之前工作的基础上,我们举例说明了一个可能的SoS的特征。通过识别关键涉众、系统、管理和控制,该方法支持SoS安全风险评估方法的初始步骤,使用支持需求工程操作需求的工具支持框架。
{"title":"System of Systems Characterisation assisting Security Risk Assessment","authors":"Duncan Ki-Aries, Shamal Faily, H. Dogan, Christopher Williams","doi":"10.1109/SYSOSE.2018.8428765","DOIUrl":"https://doi.org/10.1109/SYSOSE.2018.8428765","url":null,"abstract":"System of Systems (SoS) is a term often used to describe the coming together of independent systems, collaborating to achieve a new or higher purpose. However, clarity is needed when using this term given that operational areas may be unfamiliar with the terminology. In this paper, we present an approach for refining System and SoS descriptions to aid multistakeholder communication and understanding; building on previous work, we illustrate an example of characterising a likely SoS. By identifying key stakeholders, systems, management and control, this approach supports the initial steps of a SoS security risk assessment approach using a tool-supported framework that supports operational needs towards requirements engineering.","PeriodicalId":314200,"journal":{"name":"2018 13th Annual Conference on System of Systems Engineering (SoSE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122006068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/SYSOSE.2018.8428707
Niping Jia, Zhiwei Yang, Tianjun Liao, Yajie Dou, Kewei Yang
Recently, the swarming unmanned aerial vehicles (UAVs) air combat is becoming a new efficient combat pattern in the battle. Assessing the role of UAVs in swarming air combat system, as well as analyzing corresponding combat factors is a crucial part in weapon development evaluation and military equipment system construction. System Dynamics (SD) theory is a good method to study the defense system by analyzing the feedbacks of the battle, but at present the application of SD theory in defense is limited. This paper established a SD model by dividing the attack weapons into Red and Blue army for swarming UAVs air combat system to simulate the combat process. Taking the characteristics of swarming UAVs into consideration and drawing lessons to the concept of Lanchester equation and operational loop, the causality diagrams and the stock-flow chart are constructed in the SD model. The simulation results reflect that the UAVs play an important role and can share the responsibility of high-value weapons in the air combat system. Eventually, some influencing factors are studied in parameter sensitivity analysis, which has great significance in identifying important battlefield factors and enhancing combat efficiency.
{"title":"A System Dynamics Model for Analyzing Swarming UAVs Air Combat System","authors":"Niping Jia, Zhiwei Yang, Tianjun Liao, Yajie Dou, Kewei Yang","doi":"10.1109/SYSOSE.2018.8428707","DOIUrl":"https://doi.org/10.1109/SYSOSE.2018.8428707","url":null,"abstract":"Recently, the swarming unmanned aerial vehicles (UAVs) air combat is becoming a new efficient combat pattern in the battle. Assessing the role of UAVs in swarming air combat system, as well as analyzing corresponding combat factors is a crucial part in weapon development evaluation and military equipment system construction. System Dynamics (SD) theory is a good method to study the defense system by analyzing the feedbacks of the battle, but at present the application of SD theory in defense is limited. This paper established a SD model by dividing the attack weapons into Red and Blue army for swarming UAVs air combat system to simulate the combat process. Taking the characteristics of swarming UAVs into consideration and drawing lessons to the concept of Lanchester equation and operational loop, the causality diagrams and the stock-flow chart are constructed in the SD model. The simulation results reflect that the UAVs play an important role and can share the responsibility of high-value weapons in the air combat system. Eventually, some influencing factors are studied in parameter sensitivity analysis, which has great significance in identifying important battlefield factors and enhancing combat efficiency.","PeriodicalId":314200,"journal":{"name":"2018 13th Annual Conference on System of Systems Engineering (SoSE)","volume":"15 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114132491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/sysose.2018.8428743
{"title":"SoSE 2018 Index","authors":"","doi":"10.1109/sysose.2018.8428743","DOIUrl":"https://doi.org/10.1109/sysose.2018.8428743","url":null,"abstract":"","PeriodicalId":314200,"journal":{"name":"2018 13th Annual Conference on System of Systems Engineering (SoSE)","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126992954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/SYSOSE.2018.8428717
T. McDermott
This paper presents the use of the U.S. Healthcare Systems as an application example for a large sociotechnical systems architecture in a class on system architecture fundamentals. Although the complexity of the U.S. healthcare system is too great to support detailed analysis in a class setting, it is excellent system to introduce concepts such as sensemaking, heuristics, boundary setting, analysis of context, and strategy definition. The exercise starts with a set of narratives that have been selected to introduce a breadth of perspectives to the students. From these, the students select a set of relevant heuristics that guide architectural descriptions. In a facilitated exercise the students brainstorm and document the structure and relationships in the system guided by selected long-term outcomes. The knowledge gained sets the stage for a more detailed study of an existing healthcare system architecture such as an electronic patient records system, or a complex set of medical equipment. The use of specific systems thinking tools in this process leads the students to a more holistic view of the healthcare system-of-systems architecture. The paper presents the case study, the systems thinking tools employed, and observed impacts on the mindset of the students in a professional Masters degree program in Systems Engineering.
{"title":"Developing Systems Thinking Skills using Healthcare as a Case Study","authors":"T. McDermott","doi":"10.1109/SYSOSE.2018.8428717","DOIUrl":"https://doi.org/10.1109/SYSOSE.2018.8428717","url":null,"abstract":"This paper presents the use of the U.S. Healthcare Systems as an application example for a large sociotechnical systems architecture in a class on system architecture fundamentals. Although the complexity of the U.S. healthcare system is too great to support detailed analysis in a class setting, it is excellent system to introduce concepts such as sensemaking, heuristics, boundary setting, analysis of context, and strategy definition. The exercise starts with a set of narratives that have been selected to introduce a breadth of perspectives to the students. From these, the students select a set of relevant heuristics that guide architectural descriptions. In a facilitated exercise the students brainstorm and document the structure and relationships in the system guided by selected long-term outcomes. The knowledge gained sets the stage for a more detailed study of an existing healthcare system architecture such as an electronic patient records system, or a complex set of medical equipment. The use of specific systems thinking tools in this process leads the students to a more holistic view of the healthcare system-of-systems architecture. The paper presents the case study, the systems thinking tools employed, and observed impacts on the mindset of the students in a professional Masters degree program in Systems Engineering.","PeriodicalId":314200,"journal":{"name":"2018 13th Annual Conference on System of Systems Engineering (SoSE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117258212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/SYSOSE.2018.8428723
Federico Camarda, F. Davoine, V. Berge-Cherfaoui
In the field of autonomous navigation, perception of the driving scene is one of the essential elements. Existing solutions combine on-board exteroceptive sensors, and are capable of understanding some of the near vehicle’s dynamic surrounding environment. Furthermore, the perception capability of each vehicle can be enhanced by wireless information sharing if vehicles in the neighborhood transmit pertinent information. The primary benefit of such approach is to enable and improve the performance-safety of cooperative autonomous driving. The introduction of such a vehicle-to-vehicle communication leads to think of the global architecture as a system of systems. In this work, we address the task of evidential occupancy grid fusion so that a given vehicle can refine and complete its occupancy grid with the help of grids received from other near vehicles. The communication channel is supposed to be ideal, noiseless with infinite capacity. We focus on the fusion framework itself, using the theory of belief functions for reasoning with uncertainties on the relative poses of the vehicles and on the exchanged sensor measurement data. We evaluate the fusion system with real data acquired on public roads, with two connected vehicles.
{"title":"Fusion of evidential occupancy grids for cooperative perception","authors":"Federico Camarda, F. Davoine, V. Berge-Cherfaoui","doi":"10.1109/SYSOSE.2018.8428723","DOIUrl":"https://doi.org/10.1109/SYSOSE.2018.8428723","url":null,"abstract":"In the field of autonomous navigation, perception of the driving scene is one of the essential elements. Existing solutions combine on-board exteroceptive sensors, and are capable of understanding some of the near vehicle’s dynamic surrounding environment. Furthermore, the perception capability of each vehicle can be enhanced by wireless information sharing if vehicles in the neighborhood transmit pertinent information. The primary benefit of such approach is to enable and improve the performance-safety of cooperative autonomous driving. The introduction of such a vehicle-to-vehicle communication leads to think of the global architecture as a system of systems. In this work, we address the task of evidential occupancy grid fusion so that a given vehicle can refine and complete its occupancy grid with the help of grids received from other near vehicles. The communication channel is supposed to be ideal, noiseless with infinite capacity. We focus on the fusion framework itself, using the theory of belief functions for reasoning with uncertainties on the relative poses of the vehicles and on the exchanged sensor measurement data. We evaluate the fusion system with real data acquired on public roads, with two connected vehicles.","PeriodicalId":314200,"journal":{"name":"2018 13th Annual Conference on System of Systems Engineering (SoSE)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134160509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/SYSOSE.2018.8428695
S. Mili, Nga Nguyen, Rachid Chelouah
In the development process of critical systems, one of the main challenges is to provide early system validation and verification against vulnerabilities in order to reduce cost caused by late error detection. We propose in this paper an approach that, firstly allows formally describe system security specifications, thanks to our suggested extended attack tree. Secondly, static and dynamic system modeling by using a SysML connectivity profile to model error propagation is introduced. Finally, a model checker has been used in order to validate system specifications.
{"title":"Attack Modeling and Verification for Connected System Security","authors":"S. Mili, Nga Nguyen, Rachid Chelouah","doi":"10.1109/SYSOSE.2018.8428695","DOIUrl":"https://doi.org/10.1109/SYSOSE.2018.8428695","url":null,"abstract":"In the development process of critical systems, one of the main challenges is to provide early system validation and verification against vulnerabilities in order to reduce cost caused by late error detection. We propose in this paper an approach that, firstly allows formally describe system security specifications, thanks to our suggested extended attack tree. Secondly, static and dynamic system modeling by using a SysML connectivity profile to model error propagation is introduced. Finally, a model checker has been used in order to validate system specifications.","PeriodicalId":314200,"journal":{"name":"2018 13th Annual Conference on System of Systems Engineering (SoSE)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131716979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
System of systems (SoS) failures can sometimes be traced to a system within the SoS behaving in unexpected ways. Due to their emergent complexity, these types of failures are notoriously challenging to foresee. This paper presents a method to aid in predicting unknown unknowns in a SoS. Irrationality initiators – failure flows emanating from one system that serve as unexpected initiating events in another system – are introduced into quantitative risk analysis methods such as the Failure Flow Identification and Propagation framework and Probabilistic Risk Assessment. Analysis of models built using this approach yield a probability distribution of failure paths through a system within the SoS that are initiated by unexpected behaviors of other systems within the SoS. The method is demonstrated using an example of an autonomous vehicle network operating in a partially denied environment with hostile forces present. Using the concept of irrationality initiators, it is possible to identify and prioritize vulnerabilities in the system of interest in the SoS.
{"title":"Irrational System Behavior in a System of Systems","authors":"Douglas L. Van Bossuyt, B. O’Halloran, R. Arlitt","doi":"10.1002/sys.21520","DOIUrl":"https://doi.org/10.1002/sys.21520","url":null,"abstract":"System of systems (SoS) failures can sometimes be traced to a system within the SoS behaving in unexpected ways. Due to their emergent complexity, these types of failures are notoriously challenging to foresee. This paper presents a method to aid in predicting unknown unknowns in a SoS. Irrationality initiators – failure flows emanating from one system that serve as unexpected initiating events in another system – are introduced into quantitative risk analysis methods such as the Failure Flow Identification and Propagation framework and Probabilistic Risk Assessment. Analysis of models built using this approach yield a probability distribution of failure paths through a system within the SoS that are initiated by unexpected behaviors of other systems within the SoS. The method is demonstrated using an example of an autonomous vehicle network operating in a partially denied environment with hostile forces present. Using the concept of irrationality initiators, it is possible to identify and prioritize vulnerabilities in the system of interest in the SoS.","PeriodicalId":314200,"journal":{"name":"2018 13th Annual Conference on System of Systems Engineering (SoSE)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134014280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}