Open Access Open Access  Restricted Access Subscription Access

An Algorithmic Solution to Masquerading Fault in Critical Systems


Affiliations
1 Department of Computer Science and Engineering, Ladoke Akintola University of Technology, Ogbomoso, Nigeria
 

Critical systems are systems that are not permitted to fail during its operation schedule, this trailed that all its constituent embedded systems (nodes) must be optimized to an appreciable degree of reliable functionality. The requirement constraints of embedded systems application design make software-defect masquerading faults inevitable as the nodes collaboratively relate to ensure a dependable service delivery of the critical systems. This is because embedded systems networks are closed network and therefore masquerading faults only emanates from defects in the software of the nodes. To remedy this attack that threats seriously the critical systems reliability and dependability, an algorithm was proposed. The proposed solution involves three main stages:the pre-authentication stage, authentication stage and the auto-repair stage. This work included the last stage so as to ensure the system auto-repairability from fault state. The network simulation of the proposed solution was conducted. The Simulation results showed that the proposed solution effectively detect and prevent masquerading faults.

Keywords

Algorithm, Critical System, Embedded System, Masquerade Fault, Fault-Tolerant.
User
Notifications
Font Size

  • i. Vipul V., Manohar L. and Sureshchandar G. (2015): A Frame Work For Software Defect Prediction Using Neural Network”, in Journal of Software Engineering and Applications, http:/dx.doi.org/10.4236/jsea.2015.88038, pp 384-394.
  • ii. Ademaj A. (2002): “Slightly-Off-Specification Failures in the Time-Triggered Architecture,” Proceedings of the Seventh IEEE International Workshop on High Level Design Validation and Test (HLDVT'02), Cannes, France, pp7-12.
  • iii. Ademaj A., Sivencrona H., Bauer G., Torin J. (2003): “Evaluation of Fault Handling of the Time-Triggered Architecture with Bus and Star Topology,” in Proceedingsof the 2003 IEEE International Conference on Dependable Systems and Networks (DSN’03), San Francisco, California, pp123-132.
  • iv. Pfeifer H. (2000): “Formal Verification of the TTP Group Membership Algorithm” in IFIP TC6/WG6.1 International Conference on Formal Description Techniques for Distributed Systems and Communication protocols and Protocol Specification, Testing and Verification, FORTE/PSTV 2000, Pisa, Italy, pp3-18.
  • v. Sutar T. and Pawar S. (2015): “Security for CAN (controller Area Network) Bus in Vehicle Communication System” in International Journal for Scientific Research and Development Vol. 3, Issue 08, pp551-553.
  • vi. Sarika S. and Verghese P. (2013): “Distributed Software agents for antiphishing”, in IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 3, No 2, pp1-4.
  • vii. Haiyan L. and Kongjun B. (2016): “ A New Authentication Solution for Prevention of Some Typical Attacks in Ad Hoc Network”, in International Journal of Security and Its Application, Vol. 10, No. 7, pp333-344.
  • viii. Manikantan S., Yu C. and Tricha A. (2009): “Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks”, in IEEE global Communication Telecommunication Conference, pp1-6.
  • ix. Arif S. and Murat A. (2015): “Fault Tolerance Mechanisms in Distributed Systems”, in International Journal of Communication, Network and System Sciences, Vol. 8, pp471-482
  • x. Aghaei S., Khayyambashi M. and NematbakhshM. (2011):”A fault Tolerant Architecture for Web Services”, in Innovations in Information Technology (IIT), International Conference, pp53-56.
  • xi. Kopetz H. (2001): “A Comparison of TTP/C and FlexRay”, in TechnischeUniversit atWie, pp1-5.
  • xii. Luis A. (2006): “Safety-critical Automotive Systems New developments in CAN”, in W4: Design Issues in Distributed, Communication-Centric Systems, University of Aveiro, LiU-Tek-Lic-2006:58, pp1-7.

Abstract Views: 190

PDF Views: 0




  • An Algorithmic Solution to Masquerading Fault in Critical Systems

Abstract Views: 190  |  PDF Views: 0

Authors

Olajide Blessing Olajide
Department of Computer Science and Engineering, Ladoke Akintola University of Technology, Ogbomoso, Nigeria
Adeosun Olajide Olusegun
Department of Computer Science and Engineering, Ladoke Akintola University of Technology, Ogbomoso, Nigeria
Adeosun Titilayo Helen
Department of Computer Science and Engineering, Ladoke Akintola University of Technology, Ogbomoso, Nigeria

Abstract


Critical systems are systems that are not permitted to fail during its operation schedule, this trailed that all its constituent embedded systems (nodes) must be optimized to an appreciable degree of reliable functionality. The requirement constraints of embedded systems application design make software-defect masquerading faults inevitable as the nodes collaboratively relate to ensure a dependable service delivery of the critical systems. This is because embedded systems networks are closed network and therefore masquerading faults only emanates from defects in the software of the nodes. To remedy this attack that threats seriously the critical systems reliability and dependability, an algorithm was proposed. The proposed solution involves three main stages:the pre-authentication stage, authentication stage and the auto-repair stage. This work included the last stage so as to ensure the system auto-repairability from fault state. The network simulation of the proposed solution was conducted. The Simulation results showed that the proposed solution effectively detect and prevent masquerading faults.

Keywords


Algorithm, Critical System, Embedded System, Masquerade Fault, Fault-Tolerant.

References