skip to main content
10.1145/3489449.3490014acmotherconferencesArticle/Chapter ViewAbstractPublication PageseuroplopConference Proceedingsconference-collections
research-article
Open Access

Architectural Patterns for Integrating AI Technology into Safety-Critical Systems

Published:23 January 2022Publication History

ABSTRACT

Artificial Intelligence (AI) is widely acknowledged as one of the most disruptive technologies driving the digital transformation of industries, enterprises, and societies in the 21st century. Advances in computing speed, algorithmic improvements, and access to a vast amount of data contributed to the adaption of AI in many different domains. Due to the outstanding performance, AI technology is increasingly integrated into safety-critical applications. However, the established safety engineering processes and practices have been only successfully applied in conventional model-based system development and no commonly agreed approaches for integrating AI technology are available yet. This work presents two architectural patterns that can support designers and engineers in the conception of safety-critical AI-enhanced cyber-physical system (CPS) applications. The first pattern addresses the problem of integrating AI capabilities into safety-critical functions. The second pattern deals with architectural approaches to integrate AI technologies for monitoring and learning system-specific behavior at runtime.

References

  1. Ashraf Armoush. 2010. DesignPatternsforSafety-CriticalEmbeddedSystems. PhD Thesis. RWTH AAchen, Germany. Department of Computer ScienceGoogle ScholarGoogle Scholar
  2. Matthew Arnold, Jeffrey Boston, Michael Desmond, Evelyn Duesterwald, Benjamin Elder, Anupama Murthi, Jiri Navratil, and Darrell Reimer. 2020. Towards Automating the AI Operations Lifecycle. arxiv:2003.12808 [cs.LG]Google ScholarGoogle Scholar
  3. Davide Bacciu, Daniele Di Sarli, Pouria Faraji, Claudio Gallicchio, and Alessio Micheli. 7/18/2021 - 7/22/2021. Federated Reservoir Computing Neural Networks. In 2021 International Joint Conference on Neural Networks (IJCNN). IEEE, 1–7. https://doi.org/10.1109/IJCNN52387.2021.9534035Google ScholarGoogle ScholarCross RefCross Ref
  4. A. Benterki, M. Boukhnifer, V. Judalet, and C. Maaoui. 2020. Artificial Intelligence for Vehicle Behavior Anticipation: Hybrid Approach Based on Maneuver Classification and Trajectory Prediction. IEEE Access 8(2020), 56992–57002. https://doi.org/10.1109/ACCESS.2020.2982170Google ScholarGoogle ScholarCross RefCross Ref
  5. BMW et al.[n.d.]. Safety First for Automated Driving.Google ScholarGoogle Scholar
  6. Mariusz Bojarski, Davide Del Testa, Daniel Dworakowski, Bernhard Firner, Beat Flepp, Prasoon Goyal, Lawrence D. Jackel, Mathew Monfort, Urs Muller, Jiakai Zhang, Xin Zhang, Jake Zhao, and Karol Zieba. 2016. End to End Learning for Self-Driving Cars. http://arxiv.org/pdf/1604.07316v1Google ScholarGoogle Scholar
  7. Vishal Chowdhary, Alok Tongaonkar, and Tzi-cker Chiueh. 2004. Towards Automatic Learning of Valid Services for Honeypots. 469–470. https://doi.org/10.1007/978-3-540-30555-2_55Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ashok Kumar D and Dr Venugopalan S R. 2017. INTRUSION DETECTION SYSTEMS: A REVIEW. International Journal of Advanced Research in Computer Science 8 (10 2017). https://doi.org/10.26483/ijarcs.v8i8.4703Google ScholarGoogle ScholarCross RefCross Ref
  9. Jürgen Dobaj, Damjan Ekert, Jakub Stolfa, Svatopluk Stolfa, Georg Macher, and Richard Messnarz. 2021. Cybersecurity Threat Analysis, Risk Assessment and Design Patterns for Automotive Networked Embedded Systems: A Case Study. JUCS - Journal of Universal Computer Science 27, 8 (2021), 830–849. https://doi.org/10.3897/jucs.72367Google ScholarGoogle ScholarCross RefCross Ref
  10. Jürgen Dobaj, Michael Krisper, and Georg Macher. 2019. Towards Cyber-Physical Infrastructure as-a-Service (CPIaaS) in the Era of Industry 4.0. 310–321. https://doi.org/10.1007/978-3-030-28005-5_24Google ScholarGoogle ScholarCross RefCross Ref
  11. Alexandre Esper, Geoffrey Nelissen, Vincent Nélis, and Eduardo Tovar. 2015. How Realistic is the Mixed-Criticality Real-Time System Model?. In Proceedings of the 23rd International Conference on Real Time and Networks Systems (Lille, France) (RTNS ’15). Association for Computing Machinery, New York, NY, USA, 139–148. https://doi.org/10.1145/2834848.2834869Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Mario Hirz and Bernhard Walzel. 2018. Sensor and object recognition technologies for self-driving cars. Computer-Aided Design and Applications 15 (01 2018), 1–8. https://doi.org/10.1080/16864360.2017.1419638Google ScholarGoogle ScholarCross RefCross Ref
  13. ISO - International Standardization Organisation. 2018. ISO 26262 Road vehicles - Functional Safety.Google ScholarGoogle Scholar
  14. H. Kesuma, S. Ahmadi-Pour, A. Joseph, and P. Weis. 2019. Artificial Intelligence Implementation on Voice Command and Sensor Anomaly Detection for Enhancing Human Habitation in Space Mission. In 2019 9th International Conference on Recent Advances in Space Technologies (RAST). 579–584. https://doi.org/10.1109/RAST.2019.8767447Google ScholarGoogle ScholarCross RefCross Ref
  15. Tian Li, Anit Kumar Sahu, Ameet Talwalkar, and Virginia Smith. 2020. Federated Learning: Challenges, Methods, and Future Directions. IEEE Signal Processing Magazine 37, 3 (2020), 50–60. https://doi.org/10.1109/MSP.2020.2975749Google ScholarGoogle ScholarCross RefCross Ref
  16. Galina Malykhina. 2018. Digital Twin Technology As A Basis Of The Industry In Future. 416–428. https://doi.org/10.15405/epsbs.2018.12.02.45Google ScholarGoogle ScholarCross RefCross Ref
  17. Christopher Preschern. 2014. Pattern-Based Development of Embedded Systems for Safety and Security. Ph.D. Dissertation. Graz University of Technology, Austria. https://permalink.obvsg.at/tug/AC11833515Google ScholarGoogle Scholar
  18. Andreas Riel, Christian Kreiner, Richard Messnarz, and Alexander Much. 2018. An architectural approach to the integration of safety and security requirements in smart products and systems design. CIRP Annals 67, 1 (2018), 173–176. https://doi.org/10.1016/j.cirp.2018.04.022Google ScholarGoogle ScholarCross RefCross Ref
  19. Michael Roemer, Carl Byington, and Michael Schoeller. 2007. Selected Artificial Intelligence Methods Applied within an Integrated Vehicle Health Management System. AAAI Fall Symposium - Technical Report (01 2007).Google ScholarGoogle Scholar
  20. L. Spitzner. 2002. Honeypots: Tracking Hackers.Google ScholarGoogle Scholar
  21. Thomas Uhlemann, Christoph Schock, Christian Lehmann, Stefan Freiberger, and Rolf Steinhilper. 2017. The Digital Twin: Demonstrating the Potential of Real Time Data Acquisition in Production Systems. Procedia Manufacturing 9 (12 2017), 113–120. https://doi.org/10.1016/j.promfg.2017.04.043Google ScholarGoogle ScholarCross RefCross Ref
  22. Gérard Wagener, Radu State, Thomas Engel, and Alexandre Dulaunoy. 2011. Adaptive and self-configurable honeypots.. In Integrated Network Management, Nazim Agoulmine, Claudio Bartolini, Tom Pfeifer, and Declan O’Sullivan (Eds.). IEEE, 345–352. http://dblp.uni-trier.de/db/conf/im/im2011.html#WagenerSED11Google ScholarGoogle Scholar
  23. Wolfgang Wahlster and Christoph Winterhalter. 2020. Deutsche Normungsroadmap Künstliche Intelligenz. (11 2020).Google ScholarGoogle Scholar
  24. Wira Zakaria and ML Kiah. 2012. A review on artificial intelligence techniques for developing intelligent honeypot.Google ScholarGoogle Scholar

Index Terms

  1. Architectural Patterns for Integrating AI Technology into Safety-Critical Systems
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              EuroPLoP '21: Proceedings of the 26th European Conference on Pattern Languages of Programs
              July 2021
              387 pages
              ISBN:9781450389976
              DOI:10.1145/3489449

              Copyright © 2021 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 23 January 2022

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed limited

              Acceptance Rates

              Overall Acceptance Rate216of354submissions,61%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format