ABSTRACT
Artificial Intelligence (AI) is widely acknowledged as one of the most disruptive technologies driving the digital transformation of industries, enterprises, and societies in the 21st century. Advances in computing speed, algorithmic improvements, and access to a vast amount of data contributed to the adaption of AI in many different domains. Due to the outstanding performance, AI technology is increasingly integrated into safety-critical applications. However, the established safety engineering processes and practices have been only successfully applied in conventional model-based system development and no commonly agreed approaches for integrating AI technology are available yet. This work presents two architectural patterns that can support designers and engineers in the conception of safety-critical AI-enhanced cyber-physical system (CPS) applications. The first pattern addresses the problem of integrating AI capabilities into safety-critical functions. The second pattern deals with architectural approaches to integrate AI technologies for monitoring and learning system-specific behavior at runtime.
- Ashraf Armoush. 2010. DesignPatternsforSafety-CriticalEmbeddedSystems. PhD Thesis. RWTH AAchen, Germany. Department of Computer ScienceGoogle Scholar
- Matthew Arnold, Jeffrey Boston, Michael Desmond, Evelyn Duesterwald, Benjamin Elder, Anupama Murthi, Jiri Navratil, and Darrell Reimer. 2020. Towards Automating the AI Operations Lifecycle. arxiv:2003.12808 [cs.LG]Google Scholar
- Davide Bacciu, Daniele Di Sarli, Pouria Faraji, Claudio Gallicchio, and Alessio Micheli. 7/18/2021 - 7/22/2021. Federated Reservoir Computing Neural Networks. In 2021 International Joint Conference on Neural Networks (IJCNN). IEEE, 1–7. https://doi.org/10.1109/IJCNN52387.2021.9534035Google ScholarCross Ref
- A. Benterki, M. Boukhnifer, V. Judalet, and C. Maaoui. 2020. Artificial Intelligence for Vehicle Behavior Anticipation: Hybrid Approach Based on Maneuver Classification and Trajectory Prediction. IEEE Access 8(2020), 56992–57002. https://doi.org/10.1109/ACCESS.2020.2982170Google ScholarCross Ref
- BMW et al.[n.d.]. Safety First for Automated Driving.Google Scholar
- Mariusz Bojarski, Davide Del Testa, Daniel Dworakowski, Bernhard Firner, Beat Flepp, Prasoon Goyal, Lawrence D. Jackel, Mathew Monfort, Urs Muller, Jiakai Zhang, Xin Zhang, Jake Zhao, and Karol Zieba. 2016. End to End Learning for Self-Driving Cars. http://arxiv.org/pdf/1604.07316v1Google Scholar
- Vishal Chowdhary, Alok Tongaonkar, and Tzi-cker Chiueh. 2004. Towards Automatic Learning of Valid Services for Honeypots. 469–470. https://doi.org/10.1007/978-3-540-30555-2_55Google ScholarDigital Library
- Ashok Kumar D and Dr Venugopalan S R. 2017. INTRUSION DETECTION SYSTEMS: A REVIEW. International Journal of Advanced Research in Computer Science 8 (10 2017). https://doi.org/10.26483/ijarcs.v8i8.4703Google ScholarCross Ref
- Jürgen Dobaj, Damjan Ekert, Jakub Stolfa, Svatopluk Stolfa, Georg Macher, and Richard Messnarz. 2021. Cybersecurity Threat Analysis, Risk Assessment and Design Patterns for Automotive Networked Embedded Systems: A Case Study. JUCS - Journal of Universal Computer Science 27, 8 (2021), 830–849. https://doi.org/10.3897/jucs.72367Google ScholarCross Ref
- Jürgen Dobaj, Michael Krisper, and Georg Macher. 2019. Towards Cyber-Physical Infrastructure as-a-Service (CPIaaS) in the Era of Industry 4.0. 310–321. https://doi.org/10.1007/978-3-030-28005-5_24Google ScholarCross Ref
- Alexandre Esper, Geoffrey Nelissen, Vincent Nélis, and Eduardo Tovar. 2015. How Realistic is the Mixed-Criticality Real-Time System Model?. In Proceedings of the 23rd International Conference on Real Time and Networks Systems (Lille, France) (RTNS ’15). Association for Computing Machinery, New York, NY, USA, 139–148. https://doi.org/10.1145/2834848.2834869Google ScholarDigital Library
- Mario Hirz and Bernhard Walzel. 2018. Sensor and object recognition technologies for self-driving cars. Computer-Aided Design and Applications 15 (01 2018), 1–8. https://doi.org/10.1080/16864360.2017.1419638Google ScholarCross Ref
- ISO - International Standardization Organisation. 2018. ISO 26262 Road vehicles - Functional Safety.Google Scholar
- H. Kesuma, S. Ahmadi-Pour, A. Joseph, and P. Weis. 2019. Artificial Intelligence Implementation on Voice Command and Sensor Anomaly Detection for Enhancing Human Habitation in Space Mission. In 2019 9th International Conference on Recent Advances in Space Technologies (RAST). 579–584. https://doi.org/10.1109/RAST.2019.8767447Google ScholarCross Ref
- Tian Li, Anit Kumar Sahu, Ameet Talwalkar, and Virginia Smith. 2020. Federated Learning: Challenges, Methods, and Future Directions. IEEE Signal Processing Magazine 37, 3 (2020), 50–60. https://doi.org/10.1109/MSP.2020.2975749Google ScholarCross Ref
- Galina Malykhina. 2018. Digital Twin Technology As A Basis Of The Industry In Future. 416–428. https://doi.org/10.15405/epsbs.2018.12.02.45Google ScholarCross Ref
- Christopher Preschern. 2014. Pattern-Based Development of Embedded Systems for Safety and Security. Ph.D. Dissertation. Graz University of Technology, Austria. https://permalink.obvsg.at/tug/AC11833515Google Scholar
- Andreas Riel, Christian Kreiner, Richard Messnarz, and Alexander Much. 2018. An architectural approach to the integration of safety and security requirements in smart products and systems design. CIRP Annals 67, 1 (2018), 173–176. https://doi.org/10.1016/j.cirp.2018.04.022Google ScholarCross Ref
- Michael Roemer, Carl Byington, and Michael Schoeller. 2007. Selected Artificial Intelligence Methods Applied within an Integrated Vehicle Health Management System. AAAI Fall Symposium - Technical Report (01 2007).Google Scholar
- L. Spitzner. 2002. Honeypots: Tracking Hackers.Google Scholar
- Thomas Uhlemann, Christoph Schock, Christian Lehmann, Stefan Freiberger, and Rolf Steinhilper. 2017. The Digital Twin: Demonstrating the Potential of Real Time Data Acquisition in Production Systems. Procedia Manufacturing 9 (12 2017), 113–120. https://doi.org/10.1016/j.promfg.2017.04.043Google ScholarCross Ref
- Gérard Wagener, Radu State, Thomas Engel, and Alexandre Dulaunoy. 2011. Adaptive and self-configurable honeypots.. In Integrated Network Management, Nazim Agoulmine, Claudio Bartolini, Tom Pfeifer, and Declan O’Sullivan (Eds.). IEEE, 345–352. http://dblp.uni-trier.de/db/conf/im/im2011.html#WagenerSED11Google Scholar
- Wolfgang Wahlster and Christoph Winterhalter. 2020. Deutsche Normungsroadmap Künstliche Intelligenz. (11 2020).Google Scholar
- Wira Zakaria and ML Kiah. 2012. A review on artificial intelligence techniques for developing intelligent honeypot.Google Scholar
Index Terms
- Architectural Patterns for Integrating AI Technology into Safety-Critical Systems
Recommendations
Artificial Intelligence for Safety-Critical Systems in Industrial and Transportation Domains: A Survey
Artificial Intelligence (AI) can enable the development of next-generation autonomous safety-critical systems in which Machine Learning (ML) algorithms learn optimized and safe solutions. AI can also support and assist human safety engineers in developing ...
Architectural patterns to design software safety based safety-critical systems
ICCCS '11: Proceedings of the 2011 International Conference on Communication, Computing & SecuritySafety-critical systems are embedded systems that may cause injury, loss of human life or great damage to the property if they fail. Architectural Patterns give solutions to the commonly recurring design problems in different applications and help the ...
Human performance and embedded intelligent technology in safety-critical systems
Special issue: Trust and technologyInformation technology continues to evolve rapidly. We see this particularly in the evolution of embedded intelligent systems--knowledge-based systems deployed in larger hosts with real-time response requirements, which provide real-time advice, ...
Comments