Methodology for Calculating Availability as a Function of the Safety Monitor of a Dynamic Technical System
- Authors: Jharko E.P.1, Abdulova E.A.1, Promyslov V.G.1, Semenkov K.V.1
-
Affiliations:
- V.A. Trapeznikov Institute of Control Sciences of Russian Academy of Sciences
- Issue: No 3 (2024)
- Pages: 60-72
- Section: Information processing and data analysis
- URL: https://journals.rcsi.science/2071-8632/article/view/286116
- DOI: https://doi.org/10.14357/20718632240306
- EDN: https://elibrary.ru/OCGVBA
- ID: 286116
Cite item
Abstract
The paper considers the classification of safety functions of dynamic technical systems (DTS) according to various criteria and shows the connection with the main tasks of a safety monitor. It presents accessibility as a critical property of DTS safety and proposes a risk-based methodology for calculating accessibility as a function of DTS safety in an intelligent transport environment.
About the authors
Elena Ph. Jharko
V.A. Trapeznikov Institute of Control Sciences of Russian Academy of Sciences
Author for correspondence.
Email: zharko@ipu.ru
кандидат технических наук, старший научный сотрудник
Russian Federation, MoscowEkaterina A. Abdulova
V.A. Trapeznikov Institute of Control Sciences of Russian Academy of Sciences
Email: zharko@ipu.ru
научный сотрудник
Russian Federation, MoscowVitaly G. Promyslov
V.A. Trapeznikov Institute of Control Sciences of Russian Academy of Sciences
Email: vp@ipu.ru
кандидат физико-математических наук, ведущий научный сотрудник
Russian Federation, MoscowKirill V. Semenkov
V.A. Trapeznikov Institute of Control Sciences of Russian Academy of Sciences
Email: semenkov@ipu.ru
кандидат физико-математических наук, старший научный сотрудник
Russian Federation, MoscowReferences
- Gaidar S.M., et al. Mathematical Method for Optimising the Transport and Logistics Industry // 2022 Systems of Signals Generating and Processing in the Field of on Board Communications, Moscow, Russian Federation. 2022. P. 1–5.
- Jharko E., et al. Some Safety Issues in an Intelligent Transport Environment // 2023 International Russian Automation Conference (RusAutoCon), Sochi, Russian Federation. 2023. P. 453–459.
- Blanchard, B.S., Fabrycky W. Systems Engineering and Analysis (5th Edition). Prentice-Hall International Series in Industrial and Systems Engineering. 2013. 846 p.
- Mynuddin M., et al. Automatic Network Intrusion Detection System Using Machine Learning and Deep Learning // 2024 IEEE International Conference on Artificial Intelligence and Mechatronics Systems (AIMS), Bandung, Indonesia. 2024. P. 1–9.
- Smith R.E. A Contemporary Look at Saltzer and Schroeder’s 1975 Design Principles // IEEE Security & Privacy. 2012; 10(6):20–25.
- Maconachy W.V., et al. A Model for Information Assurance: An Integrated Approach // 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY. 2001. P. 306–310.
- GOSR R 27.102-2021. Dependability in technics. Dependability of item. Terms and definitions. Moscow: Rossiyskiy institut standartizatsii. 2021. 40 p.
- GOST R 56205-2014. Industrial communication networks. Network and system security. Part 1-1. Terminology, concepts and models. . Moscow: Standardinform. 2014. 77 p.
- Kalashnikov A.O., Anikina A.V. Information risk management models of complex systems // Informatsiya i bezopasnost'. 2020; 23(2(4)):191-202 (In Russ).
- Le Boudec J.-Y., Thiran P. Network Calculus: A Theory of Deterministic Queuing Systems for the Internet // Lecture Notes in Computer Science. 2001; 2050. 274 p.
- Vishnevskiy V.M. Theoretical foundations of computer network design. Moscow: Tekhnosfera. 2003. 512 p.
- Промыслов В.Г., Семенков К.В. Применение метода Network Calculus для расчета временных характеристик систем управления с циклическим алгоритмом работы // Проблемы управления. 2021. N4. С. 50-65.
- GOST R 59346-2021. System engineering. Protection of information in system requirements definition process. Moscow: Standardinform. 2021. 66 p.
- Cruz R.L. A calculus for network delay. II. Network analysis // IEEE Transactions on Information Theory. 1991; 37(1):132-141.
Supplementary files
