Open Access
Subscription Access
An Algorithmic Solution to Masquerading Fault in Critical Systems
Critical systems are systems that are not permitted to fail during its operation schedule, this trailed that all its constituent embedded systems (nodes) must be optimized to an appreciable degree of reliable functionality. The requirement constraints of embedded systems application design make software-defect masquerading faults inevitable as the nodes collaboratively relate to ensure a dependable service delivery of the critical systems. This is because embedded systems networks are closed network and therefore masquerading faults only emanates from defects in the software of the nodes. To remedy this attack that threats seriously the critical systems reliability and dependability, an algorithm was proposed. The proposed solution involves three main stages:the pre-authentication stage, authentication stage and the auto-repair stage. This work included the last stage so as to ensure the system auto-repairability from fault state. The network simulation of the proposed solution was conducted. The Simulation results showed that the proposed solution effectively detect and prevent masquerading faults.
Keywords
Algorithm, Critical System, Embedded System, Masquerade Fault, Fault-Tolerant.
User
Font Size
Information
- i. Vipul V., Manohar L. and Sureshchandar G. (2015): A Frame Work For Software Defect Prediction Using Neural Network”, in Journal of Software Engineering and Applications, http:/dx.doi.org/10.4236/jsea.2015.88038, pp 384-394.
- ii. Ademaj A. (2002): “Slightly-Off-Specification Failures in the Time-Triggered Architecture,” Proceedings of the Seventh IEEE International Workshop on High Level Design Validation and Test (HLDVT'02), Cannes, France, pp7-12.
- iii. Ademaj A., Sivencrona H., Bauer G., Torin J. (2003): “Evaluation of Fault Handling of the Time-Triggered Architecture with Bus and Star Topology,” in Proceedingsof the 2003 IEEE International Conference on Dependable Systems and Networks (DSN’03), San Francisco, California, pp123-132.
- iv. Pfeifer H. (2000): “Formal Verification of the TTP Group Membership Algorithm” in IFIP TC6/WG6.1 International Conference on Formal Description Techniques for Distributed Systems and Communication protocols and Protocol Specification, Testing and Verification, FORTE/PSTV 2000, Pisa, Italy, pp3-18.
- v. Sutar T. and Pawar S. (2015): “Security for CAN (controller Area Network) Bus in Vehicle Communication System” in International Journal for Scientific Research and Development Vol. 3, Issue 08, pp551-553.
- vi. Sarika S. and Verghese P. (2013): “Distributed Software agents for antiphishing”, in IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 3, No 2, pp1-4.
- vii. Haiyan L. and Kongjun B. (2016): “ A New Authentication Solution for Prevention of Some Typical Attacks in Ad Hoc Network”, in International Journal of Security and Its Application, Vol. 10, No. 7, pp333-344.
- viii. Manikantan S., Yu C. and Tricha A. (2009): “Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks”, in IEEE global Communication Telecommunication Conference, pp1-6.
- ix. Arif S. and Murat A. (2015): “Fault Tolerance Mechanisms in Distributed Systems”, in International Journal of Communication, Network and System Sciences, Vol. 8, pp471-482
- x. Aghaei S., Khayyambashi M. and NematbakhshM. (2011):”A fault Tolerant Architecture for Web Services”, in Innovations in Information Technology (IIT), International Conference, pp53-56.
- xi. Kopetz H. (2001): “A Comparison of TTP/C and FlexRay”, in TechnischeUniversit atWie, pp1-5.
- xii. Luis A. (2006): “Safety-critical Automotive Systems New developments in CAN”, in W4: Design Issues in Distributed, Communication-Centric Systems, University of Aveiro, LiU-Tek-Lic-2006:58, pp1-7.
Abstract Views: 225
PDF Views: 0