Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30184
Research on the Survivability of Embedded Real-time System

Authors: YongXian, JIN


Introducing survivability into embedded real-time system (ERTS) can improve the survivability power of the system. This paper mainly discusses about the survivability of ERTS. The first is the survivability origin of ERTS. The second is survivability analysis. According to the definition of survivability based on survivability specification and division of the entire survivability analysis process for ERTS, a survivability analysis profile is presented. The quantitative analysis model of this profile is emphasized and illuminated in detail, the quantifying analysis of system was showed helpful to evaluate system survivability more accurate. The third is platform design of survivability analysis. In terms of the profile, the analysis process is encapsulated and assembled into one platform, on which quantification, standardization and simplification of survivability analysis are all achieved. The fourth is survivability design. According to character of ERTS, strengthened design method is selected to realize system survivability design. Through the analysis of embedded mobile video-on-demand system, intrusion tolerant technology is introduced in whole survivability design.

Keywords: ERTS (embedded real-time system), survivability, quantitative analysis, survivability specification, intrusion tolerant

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 922


[1] Barnes A, Hollway A, Neumman P G. Survivable computer-communication systems: The problem and working group recommendations(R). Washington: US Army Research Laboratory, 1993.
[2] Mead N R., Ellison RJ, Linger R C, et al. Survivable Network Analysis Method(R). Carnegie Mellon University: Software Engineering Institute Technical Report, 2000.9.
[3] Knight J C, Strunk E A, Sullivan K J. Towards a Rigorous Definition of Information System Survivability. Proc. of DARPA Information Survivability Conference and Exposition(C). IEEE Computer Society Press, 2003:78-89.
[4] Fung C, Chen Y L, Wang X Y, et al. Survivability analysis of distributed systems using attack tree methodology. Proc. of the IEEE Military Communications (C). IEEE Computer Society Press, 2005: 583-589.
[5] Hiltunen M A, Schliching R D, Ugarte C A. Building survivable services using redundancy and adaptation(J). IEEE Trans. on Computers, 2003,52(2):181-194.
[6] Bowen T, Chee D, Segal M, et al. Building survivable systems: An integrated approach based on intrusion detection and damage containment. Proc. of the DARPA Information Survivability Conference and Exposition(C). IEEE Computer Society Press, 2000: 25-27.
[7] Jha S, Wing J, Linger R, Longstaff T. Survivability analysis of network specifications. Proc. of the Dependable Systems and Networks(C). IEEE Computer Society Press, 2000: 613-622.
[8] Snow A P, Varshney U, Malloy A D. Reliability and survivability of wireless and mobile networks(J). IEEE Computer, 2000,33(7): 449-454.
[9] Gao Z X, Ong C H, Tan W K Survivability assessment: modeling dependences in information system. Proceeding of 4th IEEE/CMU/SEI Information Survivability Workshop(C). Vancouver, Canada, 2001.2-8.
[10] Ellison R, Fisher D, et al. Survivable Network System Analysis: A Case Study(J). Software, IEEE,1999, 16(4):70~77.
[11] Ma Q K, Xiao L L, Yen I L, et al. An adaptive multiparty protocol for secure data protection. Proc. of the Parallel and Distributed Systems(C). IEEE Computer Society Press, 2005. 43-49.
[12] Zhang L J, Guo L, Wang W. The Research Summarization of Technology of Network System Survivability Evaluation and Enhancement (J). Computer Science, 2007,34(8):30-33. (in Chinese)
[13] Perrow C. Normal Accidents: Living with High-Risk Technologies (M). Princeton University Press: Princeton, New Jersey, 1999.
[14] Lin X G, Xu R S, Xiong H. A Framework of Quantitative Analysis for Information System Survivability (J). Journal of Electronics & Information Technology, 2006,28(9):1721-1726.(in Chinese)
[15] Linger R C, Mead N R, Lipson H F. Requirements Definition for Survivable Network Systems (R). (s. l.): System Design Laboratory, SRI International Press, 2002.