Computer Science ›› 2017, Vol. 44 ›› Issue (2): 182-191.doi: 10.11896/j.issn.1002-137X.2017.02.029

Previous Articles     Next Articles

Fault Tree Generation Based on Fault Configuration

HUANG Ming-yu, WEI Ou and HU Jun   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Fault tree analysis is an effective method to improve system safety and reliability.However,traditional ma-nual fault tree generation is difficult to solve the problem of large scale and complexity of system and error-prone.In order to systematically support system faults modeling and formal analysis,a fault tree generation method based on fault configuration was proposed in this paper by introducing variability management form software product line into system faults modeling.Firstly,we defined fault feature diagram for describing the constraints among faults and proposed fault labeled transition system based on Kripke structure to describe system behavior.Secondly,a model checking procedure of generating fault tree was established based on the model semantics.Finally,using model checker SNIP,the safety properties specified with temporal logic were verified and fault tree was generated based on the result.Case study shows the effectiveness of the proposed approach.

Key words: Fault tree,Fault configuration,Model checking

[1] JAHANIAN F,MOK A K.Safety analysis of timing properties in real-time systems[J].IEEE Transactions on Software Engineering,1986,12(9):890-904.
[2] VESELY W E,GOLDBERG F F,ROBERTS N H,et al.Fault tree handbook[R].DTIC Document,1981.
[3] LIGGESMEYER P,ROTHFELDER M.Improving system re-liability with automatic fault tree generation[C]∥The Twenty-Eighth Annual International Symposium on Fault-Tolerant Computing (FTCS 28).Piscataway,N.J.:IEEE Computer Socie-ty,1998:90-98.
[4] JOSHI A,MILLER S P,WHALEN M,et al.A proposal formodel-based safety analysis[C]∥Proceedings of Digital Avioni-cs Systems Conference 2005 (DASC 2005).Piscataway,N.J.:IEEE,2005.
[5] BeERNARD R,AUBERT J J,BIEBER P,et al.E xperiments in Model Based Safety Analysis:Flight ontrols[J].Dependable Control of Discrete Systems,2007,1(1):43-48.
[6] AKERLUND O,BIEBER P,BOEDE E,et al.ISAAC,a framework for integrated safety analysis of functional,geometrical and human aspects[C]∥Proceedings of the European Congress on Embedded Real Time Software (ERTS 2006).Berlin Heidelberg:Springer,2006:1-11.
[7] KOH K Y,SEONG P H.SMV model-based safety analysis of software requirements[J].Reliability Engineering & System Safety,2009,94(2):320-331.
[8] LISAGOR O,KELLY T,NIU R.Model-based safety assess-ment:Review of the discipline and its challenges[C]∥Procee-dings of 9th International Conference on Reliability,Maintai-nability and Safety (ICRMS 2011).Piscataway,N.J.:IEEE,2011:625-632.
[9] CLARKE E M,GRUMBERG O,PELED D.Model checking[M].Boston,USA:MIT press,1999.
[10] NORTHROP L M.SEI’s software product line tenets[J].IEEE Software,2002,19(4):32-40.
[11] KANG K,COHEN S G,HESS J A,et al.Feature Oriented Domain Analysis (FODA)-Feasibility Study[J].Feature-Oriented Domain Analysis (FODA) Feasibility Study,1990,4(4):206-207.
[12] NIE K M,ZHANG Li,FAN Z Q.Systematic Literarture Review of Software Product Line Variability Modeling Techniques[J].Journal of Software,2013,24(9):2001-2019.(in Chinese) 聂坤明,张莉,樊志强.软件产品线可变性建模技术系统综述[J].软件学报,2013,24(9):2001-2019.
[13] CORDY M,SCHOBBENS P Y,HEYMANS P,et al.Towardsan incremental automata-based approach for software product-line model checking[C]∥Proceedings of 16th International Software Product Line Conference (SPLC 12).Los Angeles,CA,USA:ACM,2012:74-81.
[14] CLASSEN A,CORDY M,HEYMANS P,et al.Model checking software product lines with SNIP[J].International Journal on Software Tools for Technology Transfer,2012,14(5):589-612.
[15] CLASSEN A,HEYMANS P,SCHOBBENS P,et al.Modelchecking lots of systems:efficient verification of temporal pro-perties in software product lines[C]∥Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering (ICSE 2010).Los Angeles,CA,USA:ACM,2010:335-344.
[16] PNUELI A.The Temporal Logic of Programs[C]∥Proceedings of 18th Annual Symposium on Foundations of Computer Scien-ce.Piscataway,N.J.:IEEE,1977:46-57.
[17] BOZZANO M,CIMATTI A,KATOEN J P,et al.Safety,Dependability and Performance Analysis of Extended AADL Mo-dels[J].Computer Journal,2011,54(5):754-775.
[18] Nguyen V Y.Trustworthy Spacecraft Design Using FormalMethods[R].RWTH Aachen,2013.
[19] SISTLA A P,VARDI M Y,WOLPER P.The complementation problem for Büchi automata with applications to temporal logic[J].Theoretical Computer Science,1987,49(2):217-237.
[20] VAURIO J K.Treatment of general dependencies in systemfault-tree and risk analysis[J].IEEE Transactions on Reliability,2002,51(3):278-287.
[21] BROWNE M C,CLARKE E M,GR MBERG O.Characterizing finite Kripke structures in propositional temporal logic[J].Theo-retical Computer Science,1988,59(1):115-131.
[22] GASTIN P,ODDOUX D.Fast LTL to Büchi Automata Translation[J].Lecture Notes in Computerence,2002,2102:53-65.
[24] RAUZY A,DUTUIT Y.Exact and truncated computations of prime implicants of coherent and non-coherent fault trees within Aralia[J].Reliability Engineering & System Safety,1997,58(2):127-144.
[25] CLASSEN A,BOUCHER Q,HEYMANS P.A text-based ap-proach to feature modelling:Syntax and semantics of TVL[J].Science of Computer Programming,2011,76(12):1130-1143.
[26] HOLZMANN G J.The SPIN model checker:Primer and refe-rence manual[M].Boston,USA:Addison-Wesley Reading,2004.
[27] D’ANGELO S,METRA C,SECHI G.Transient and permanentfault diagnosis for FPGA-based TMR systems[C]∥Proceedings of 14th International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 99).Piscataway,N.J.:IEEE,1999:330-338.
[28] RAUZY A.New algorithms for fault tree analysis[J].Reliability Engineering & System Safety,1993,40(3):203-211.
[29] DUGAN J B,BAVUSO S J,BOYD M A.Dynamic fault-treemodels for fault-tolerant computer systems[J].IEEE Transactions on Reliability,1992,41(3):363-377.
[30] DUGAN J B,SULLIVAN K J,COPPIT D.Developing a low-cost high-quality software tool for dynamic fault-tree analysis[J].IEEE Transactions on Reliability,2000,49(1):49-59
[31] MAKAJIC-NIKOLIˇ D,VUJO UJOEVIˇ M,NIKOLIˇN.Minimal cut sets of a coherent fault tree generation using reverse Petri nets[J].Optimization,2013,62(8):1069-1087.
[32] MAJDARA A,WAKABAYASHI T.A new approach for computer-aided fault tree generation[C]∥Proceedings of 3rd An-nual IEEE Systems Conference.Piscataway,N.J.:IEEE,2009:308-312.
[33] MAJDARA A,WAKABAYASHI T.Component-based mode-ling of systems for automated fault tree generation[J].Reliability Engineering & System Safety,2009,94(6):1076-1086.
[34] BOZZANO M,VILLAFIORITA A,KERLUND O,et al.ESACS:an integrated methodology for design and safety analysis of complex systems[C]∥Proceedings of the 13th Annual European Safety and Reliability Conference (ESREL 2003).Boca Raton,Florida:CRC Press,2003:237-245.
[35] BOZZANO M,CAVALLO A,CIFALDI M,et al.ImprovingSafety Assessment of Complex Systems:An Industrial Case Study[C]∥Proceedings of International Symposium of Formal Methods Europe 2003 (FME 2003).Berlin Heidelberg:Sprin-ger,2003:208-222.
[36] BOZZANO M,VILLAFIORITA A.Improving System Reliabili-ty via Model Checking:The FSAP/NuSMV-SA Safety Analysis Platform[C]∥Proceedings of Computer Safety,Reliability,and Security,22nd International Conference (SAFECOMP 2003).Berlin Heidelberg:Springer,2003:49-62.
[37] PAPADOPOULOS Y,MCDERMID J,SASSE R,et al.Analysis and synthesis of the behaviour of complex programmable electronic systems in conditions of failure[J].Reliability Enginee-ring & System Safety,2001,71(3):229-247.
[38] PAPADOPOULOS Y,WALKER M,PARKER D,et al.Engineering failure analysis and design optimisation with HiP-HOPS[J].Engineering Failure Analysis,2011,18(2):590-608.
[39] WANG F,SHEN G H,HUANG Z Q,et al.Method Combining Linear Temporal Logic and Fault Tree for Software Safety Verification[J].Computer Science,2015,42(12):71-75.(in Chinese) 王飞,沈国华,黄志球,等.一种结合线性时序逻辑和故障树的软件安全验证方法[J].计算机科学,2015,42(12):71-75.
[40] ZHOU L,HUANG Z Q,HUANG C L.Construction Methodfor Fault Tree Domain Ontology Supporting SWRL Rules[J].Computer Science,2015,42(8):198-202.(in Chinese) 周亮,黄志球,黄传林.故障树领域本体及SWRL规则的构建方法研究[J].计算机科学,2015,42(8):198-202.
[41] WEI O,SHI Y F,XU B F,et al.Abstract Modeling Formalisms in Software Model Checking[J].Journal of Computer Research and Development,2015,52(7):1580-1603.(in Chinese) 魏欧,石玉峰,徐丙凤,等.软件模型检测中的抽象模型研究综述[J].计算机研究与发展,2015,52(7):1580-1603 .

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .