Diversity for Safety and Security of Autonomous Vehicles against Accidental and Deliberate Faults
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33104
Diversity for Safety and Security of Autonomous Vehicles against Accidental and Deliberate Faults

Authors: Anil Ranjitbhai Patel, Clement John Shaji, Peter Liggesmeyer

Abstract:

Safety and security of Autonomous Vehicles (AVs) is a growing concern, first, due to the increased number of safety-critical functions taken over by automotive embedded systems; second, due to the increased exposure of the software-intensive systems to potential attackers; third, due to dynamic interaction in an uncertain and unknown environment at runtime which results in changed functional and non-functional properties of the system. Frequently occurring environmental uncertainties, random component failures, and compromise security of the AVs might result in hazardous events, sometimes even in an accident, if left undetected. Beyond these technical issues, we argue that the safety and security of AVs against accidental and deliberate faults are poorly understood and rarely implemented. One possible way to overcome this is through a well-known diversity approach. As an effective approach to increase safety and security, diversity has been widely used in the aviation, railway, and aerospace industries. Thus, paper proposes fault-tolerance by diversity model taking into consideration the mitigation of accidental and deliberate faults by application of structure and variant redundancy. The model can be used to design the AVs with various types of diversity in hardware and software-based multi-version system. The paper evaluates the presented approach by employing an example from adaptive cruise control, followed by discussing the case study with initial findings.

Keywords: Autonomous vehicles, diversity, fault-tolerance, adaptive cruise control, safety, security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 488

References:


[1] Avizienis, Algirdas, J-C. Laprie, Brian Randell, and Carl Landwehr. ”Basic concepts and taxonomy of dependable and secure computing.” IEEE transactions on dependable and secure computing 1, no. 1 (2004): 11-33.
[2] Avizienis, Algirdas, and J-C. Laprie. ”Dependable computing: From concepts to design diversity.” Proceedings of the IEEE 74, no. 5 (1986): 629-638.
[3] Avizienis, Algirdas, and John PJ Kelly. ”Fault tolerance by design diversity: Concepts and experiments.” Computer 8 (1984): 67-80.
[4] Wood, Richard Thomas, Randy Belles, Mustafa Sacit Cetiner, David Eugene Holcomb, Kofi Korsah, Andy Loebl, Gary T. Mays et al. Diversity strategies for nuclear power plant instrumentation and control systems. No. ORNL/TM–2009/302. Oak Ridge National Laboratory (United States). Funding organisation: ORNL work for others (United States), 2010.
[5] Koopman, Phil. ”An Overview of Draft UL 4600: Standard for Safety for the Evaluation of Autonomous Products.” Medium, Jun (2019).
[6] IEC: Functional safety of electrical/electronic/programmable electronic safety-related systems, IEC 61508:2010.
[7] ISO: Road Vehicles – Functional Safety ISO 26262:2018.
[8] Avizienis, Algirdas. ”The N-version approach to fault-tolerant software.” IEEE Transactions on software engineering 12 (1985): 1491-1501.
[9] Randell, Brian. ”Reliable computing systems.” In Operating systems, pp. 282-391. Springer, Berlin, Heidelberg, 1978.
[10] Hiltunen, Matti A., Richard D. Schlichting, Carlos A. Ugarte, and Gary T. Wong. ”Survivability through customization and adaptability: The cactus approach.” In Proceedings DARPA Information Survivability Conference and Exposition. DISCEX’00, vol. 1, pp. 294-307. IEEE, 2000.
[11] Baudry, Benoit, and Martin Monperrus. ”The multiple facets of software diversity: Recent developments in year 2000 and beyond.” ACM Computing Surveys (CSUR) 48, no. 1 (2015): 1-26.
[12] Deswarte, Yves, Karama Kanoun, and J-C. Laprie. ”Diversity against accidental and deliberate faults.” In Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No. 98EX358), pp. 171-181. IEEE, 1998.
[13] Kharchenko, V. ”Diversity for Safety of Systems and Software in Context of the Standard ISO/IEC26262.” In 13th Workshop on Automotive on Software and Systems. 2015.
[14] Liu, Alex X., and Mohamed G. Gouda. ”Diverse firewall design.” IEEE Transactions on Parallel and Distributed Systems 19, no. 9 (2008): 1237-1251.
[15] Garcia, Miguel, Alysson Bessani, Ilir Gashi, Nuno Neves, and Rafael Obelheiro. ”Analysis of operating system diversity for intrusion tolerance.” Software: Practice and Experience 44, no. 6 (2014): 735-770.
[16] Kharchenko, Vyacheslav. ”Diversity for safety and security of embedded and cyber physical systems: Fundamentals review and industrial cases.” In 2016 15th Biennial Baltic Electronics Conference (BEC), pp. 17-26. IEEE, 2016.
[17] Brezhnev, E., V. Kharchenko, A. Boyarchuk, and J. Vain. ”Cyber diversity for security of digital substations under uncertainties: assurance and assessment.” In Proceedings of the 19th Internation Conference on Conference on Circuits, Systems, Communications and Computers, CSCC2015. 2015.
[18] Avizienis, Algirdas. ”The methodology of n-version programming.” Software fault tolerance 3 (1995): 23-46.
[19] Hayama, Ryouhei, Masayasu Higashi, Sadahiro Kawahara, Shirou Nakano, and Hiromitsu Kumamoto. ”Fault-tolerant automobile steering based on diversity of steer-by-wire, braking and acceleration.” Reliability Engineering and System Safety 95, no. 1 (2010): 10-17.
[20] Yastrebenetsky, Michael, ed. Nuclear power plant instrumentation and control systems for safety and security. IGI Global, 2014.
[21] Kumamoto, Hiromitsu. Satisfying safety goals by probabilistic risk assessment. Springer Science and Business Media, 2007.
[22] Chattopadhyay, Anupam, Kwok-Yan Lam, and Yaswanth Tavva. ”Autonomous vehicle: Security by design.” IEEE Transactions on Intelligent Transportation Systems (2020).
[23] Thing, Vrizlynn LL, and Jiaxi Wu. ”Autonomous vehicle security: A taxonomy of attacks and defences.” In 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 164-170. IEEE, 2016.
[24] Dosovitskiy, Alexey, German Ros, Felipe Codevilla, Antonio Lopez, and Vladlen Koltun. ”CARLA: An open urban driving simulator.” arXiv preprint arXiv:1711.03938 (2017).
[25] Mavrogiannopoulos, Nikos, Nessim Kisserli, and Bart Preneel. ”A taxonomy of self-modifying code for obfuscation.” Computers and Security 30, no. 8 (2011): 679-691.