• Title/Summary/Keyword: Safety critical systems

Search Result 480, Processing Time 0.026 seconds

A Method to Specify and Verify Requirements for Safety Critical System (안전 필수 시스템을 위한 요구사항 명세 및 검증 방법)

  • Lim, Hye Sun;Lee, Seok-Won
    • Journal of KIISE
    • /
    • v.44 no.9
    • /
    • pp.893-907
    • /
    • 2017
  • In safety-critical systems, software defects may have serious consequences. Therefore, defects should be considered during the requirements specification process, which is the first step of a software development lifecycle. Stakeholder requirements that are usually written in natural language are difficult to derived, and there may also be defects due to ambiguity and inaccuracy. To address these issues, we propose a requirement specification method using a standardized Boilerplate and a GSN Model. The Boilerplate is a semi-standard language that follows a predefined format. Due to its ability to provide a consistent representation of the requirements, boilerplate helps stakeholders avoid ambiguities about what they mean and to define the exact meaning of the requirement. Meanwhile, GSN is recognized notation to prepare a Safety Case to prove to authorities that a system is safe. It can be expressed as a functional goal, e.g., Safety Evidence, etc. The proposed study allows an analyst to easily identify a fault from the early stage of the software development lifecycle. The Boilerplate and GSN Model are designed to specify the requirements of safety critical systems and to prove safety conformity through a connection with Safety Evidence. In addition, the proposed approach is also useful to develop secure software by correcting deficiencies in the requirements found during this process.

EPC Sensor Network-based Product and Process Traceability System in the Food Supply Chain

  • Chun, Jung-Woo;Oh, Ji-Sung;Rho, Jae-Jueng;Lee, Jung-Wook
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.184-189
    • /
    • 2007
  • Concerns about food safety continue to rise and under this situation, governments of some countries have reinforced their regulations more strictly for food safety. In order to prevent food safety incidents or, at least to minimize the impact, the preparedness is very important. As a consequence of this, traceability system has become an essential tool for food safety. Recently, it requires more prevention-based food safety control system. One of the most generally used systems for food safety control is Hazard Analysis and Critical Control Point (HACCP). Both traceability and HACCP systems can be integrated through Electronic Product Code (EPC) Sensor Network technologies which have four value propositions. In this paper, we will introduce the concept of product and process traceability system (P2TS) through the integration of three systems to improve food safety management. The final aim is to find out the added values of the P2TS.

  • PDF

Hazard Analysis and Risk Assessments for Industrial Processes Using FMEA and Bow-Tie Methodologies

  • Afefy, Islam H.
    • Industrial Engineering and Management Systems
    • /
    • v.14 no.4
    • /
    • pp.379-391
    • /
    • 2015
  • Several risk assessment techniques have been presented and investigated in previous research, focusing mainly on the failure mode and effect analysis (FMEA). FMEA can be employed to determine where failures can occur within industrial systems and to assess the impact of such failures. This research proposes a novel methodology for hazard analysis and risk assessments that integrates FMEA with the bow-tie model. The proposed method has been applied and evaluated in a real industrial process, illustrating the effectiveness of the proposed method. Specifically, the bowtie diagram of the critical equipment in the adopted plant in the case study was built. Safety critical barriers are identified and each of these is assigned to industrial process with an individual responsible. The detection rating to the failure mode and the values of risk priority number (RPN) are calculated. The analysis shows the high values of RPN are 500 and 490 in this process. A global corrective actions are suggested to improve the RPN measure. Further managerial insights have been provided.

Software Reliability of Safety Critical FPGA-based System using System Engineering Approach

  • Pradana, Satrio;Jung, Jae Cheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.14 no.2
    • /
    • pp.49-57
    • /
    • 2018
  • The main objective of this paper is come up with methodology approach for FPGA-based system in verification and validation lifecycle regarding software reliability using system engineering approach. The steps of both reverse engineering and re-engineering are carried out to implement an FPGA-based of safety critical system in Nuclear Power Plant. The reverse engineering methodology is applied to elicit the requirements of the system as well as gain understanding of the current life cycle and V&V activities of FPGA based-system. The re-engineering method is carried out to get a new methodology approach of software reliability, particularly Software Reliability Growth Model. For measure the software reliability of a given FPGA-based system, the following steps are executed as; requirements definition and measurement, evaluation of candidate reliability model, and the validation of the selected system. As conclusion, a new methodology approach for software reliability measurement using software reliability growth model is developed.

A Case Study on the Application of Configuration Management Process for the Development of High-Safety Railway Signaling System Based on International Standards (국제표준기반의 고안전성 철도신호시스템 개발을 위한 형상관리프로세스 적용사례 연구)

  • Choi, Yo Chul
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.15 no.2
    • /
    • pp.108-115
    • /
    • 2019
  • The activities of managing and controlling the configuration of a system component over its life cycle are critical tasks in developing a high safety system as well as general system development. These configuration management activities should be defined through the management plan at the beginning of the life cycle, and should be performed continuously and systematically until the end of the project after the system or product development is completed. In this study, the configuration management process applied in the development of high safety railway signaling system was introduced and an efficient application proposals of it was proposed. In particular, configuration management through the establishment of a configuration management system based on computer tools is one of the important activities of maintaining the configuration integrity of the system or product.

Condition Monitoring of Reliability-Critical Components in Power Electronic Systems (전력전자 시스템에서 신뢰성 취약 소자의 상태 모니터링 방법)

  • Choi, Ui-Min;Lee, June-Seok
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.24 no.4
    • /
    • pp.244-258
    • /
    • 2019
  • The reliability of power electronic systems becomes increasingly important, as power electronic systems have gradually gained an essential status in a wide range of industrial applications. Accordingly, recent research has made an effort to improve the reliability of power electronic systems to comply with stringent constraints on safety, cost, and availability. The condition monitoring of power electronic components is one of the main topics in the research area of the reliability of power electronic systems. In this paper, condition-monitoring methods of reliability-critical components in power electronic systems are discussed to provide the current state of knowledge by organizing and evaluating current representative literature.

A Systems Engineering Approach for CEDM Digital Twin to Support Operator Actions

  • Mousa, Mostafa Mohammed;Jung, Jae Cheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.16 no.2
    • /
    • pp.16-26
    • /
    • 2020
  • Improving operator performance in complex and time-critical situations is critical to maintain plant safety and operability. These situations require quick detection, diagnosis, and mitigation actions to recover from the root cause of failure. One of the key challenges for operators in nuclear power plants is information management and following the control procedures and instructions. Nowadays Digital Twin technology can be used for analyzing and fast detection of failures and transient situations with the recommender system to provide the operator or maintenance engineer with recommended action to be carried out. Systems engineering approach (SE) is used in developing a digital twin for the CEDM system to support operator actions when there is a misalignment in the control element assembly group. Systems engineering is introduced for identifying the requirements, operational concept, and associated verification and validation steps required in the development process. The system developed by using a machine learning algorithm with a text mining technique to extract the required actions from limiting conditions for operations (LCO) or procedures that represent certain tasks.

A Study on the Methods of Fault Analysis to Improve Safety in U-Healthcare System for Managing Emergency Rescue for Seniors (시니어들의 응급구난 관리를 위한 U-Healthcare시스템에서 안전성 개선을 위한 결함 분석 방법에 관한 연구)

  • Kim, Gyu-A;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.2
    • /
    • pp.170-179
    • /
    • 2014
  • Recently the U-Healthcare system has been rapidly advanced to manage emergence rescue for seniors. We can access emergency rescue systems with high quality services anytime, anywhere under ubiquitous healthcare systems. The more the various systems develop, the more software security systems become important. Therefore, the safety-critical system has been widely spread to the world by advancement of the information and communication technologies. There are a lot kind of fault analysis methods to evaluate software security systems. However due to characteristics of software that is not applied by human error, it can be prevented the enormous damages and losses from improving the safety of safety-critical system. So this paper proposes an integration method of FTA and Forward and Backward FMECA. This method has each strength of FTA and FMECA which is visual and numeric in normalization. First, by use of FTA, we can redraw FTA with Forward FMECA and Backward FMECA in consideration of occurrence, severity, detection, correctness, robustness, and security. Also according to value of NRVP at each event, we can modify FTA diagrams as shown critical paths given by severity and occurrence. Also, we propose the improved emergency rescue service platform of ubiquitous healthcare systems through identifying priorities of the criticality according to normalized risk priority values (NRPV).

A new perspective towards the development of robust data-driven intrusion detection for industrial control systems

  • Ayodeji, Abiodun;Liu, Yong-kuo;Chao, Nan;Yang, Li-qun
    • Nuclear Engineering and Technology
    • /
    • v.52 no.12
    • /
    • pp.2687-2698
    • /
    • 2020
  • Most of the machine learning-based intrusion detection tools developed for Industrial Control Systems (ICS) are trained on network packet captures, and they rely on monitoring network layer traffic alone for intrusion detection. This approach produces weak intrusion detection systems, as ICS cyber-attacks have a real and significant impact on the process variables. A limited number of researchers consider integrating process measurements. However, in complex systems, process variable changes could result from different combinations of abnormal occurrences. This paper examines recent advances in intrusion detection algorithms, their limitations, challenges and the status of their application in critical infrastructures. We also introduce the discussion on the similarities and conflicts observed in the development of machine learning tools and techniques for fault diagnosis and cybersecurity in the protection of complex systems and the need to establish a clear difference between them. As a case study, we discuss special characteristics in nuclear power control systems and the factors that constraint the direct integration of security algorithms. Moreover, we discuss data reliability issues and present references and direct URL to recent open-source data repositories to aid researchers in developing data-driven ICS intrusion detection systems.

AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS

  • Song, Jae-Gu;Lee, Jung-Woon;Park, Gee-Yong;Kwon, Kee-Choon;Lee, Dong-Young;Lee, Cheol-Kwon
    • Nuclear Engineering and Technology
    • /
    • v.45 no.5
    • /
    • pp.637-652
    • /
    • 2013
  • Instrumentation and control systems in nuclear power plants have been digitalized for the purpose of maintenance and precise operation. This digitalization, however, brings out issues related to cyber security. In the most recent past, international standard organizations, regulatory institutes, and research institutes have performed a number of studies addressing these systems cyber security.. In order to provide information helpful to the system designers in their application of cyber security for the systems, this paper presents methods and considerations to define attack vectors in a target system, to review and select the requirements in the Regulatory Guide 5.71, and to integrate the results to identify applicable technical security control requirements. In this study, attack vectors are analyzed through the vulnerability analyses and penetration tests with a simplified safety system, and the elements of critical digital assets acting as attack vectors are identified. Among the security control requirements listed in Appendices B and C to Regulatory Guide 5.71, those that should be implemented into the systems are selected and classified in groups of technical security control requirements using the results of the attack vector analysis. For the attack vector elements of critical digital assets, all the technical security control requirements are evaluated to determine whether they are applicable and effective, and considerations in this evaluation are also discussed. The technical security control requirements in three important categories of access control, monitoring and logging, and encryption are derived and grouped according to the elements of attack vectors as results for the sample safety system.