Reducing risk by managing software related failures in networked control systems

Girish Baliga, Scott Graham, Carl A. Gunter, P. R. Kumar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Managing risk is a central problem in the design and operation of networked control systems, and due to the increasing role and growing complexity of software in such systems, managing software related failures is becoming a central challenge. Even simple programming errors can cause catastrophic failures [1]. Hence, it is vital to contain risks due to software related failures in such systems. Our main thesis is that most software related failures can be managed through relatively simple and generally applicable strategies, and such strategies can be effectively developed and reused with suitable support from software infrastructure such as middleware. We describe mechanisms in Etherware, our middleware for control over networks [2], for containing software failures, and demonstrate the effectiveness of these mechanisms through experiments in a vehicular control testbed.

Original languageEnglish (US)
Title of host publicationProceedings of the 45th IEEE Conference on Decision and Control 2006, CDC
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2866-2871
Number of pages6
ISBN (Print)1424401712, 9781424401710
DOIs
StatePublished - 2006
Event45th IEEE Conference on Decision and Control 2006, CDC - San Diego, CA, United States
Duration: Dec 13 2006Dec 15 2006

Publication series

NameProceedings of the IEEE Conference on Decision and Control
ISSN (Print)0743-1546
ISSN (Electronic)2576-2370

Other

Other45th IEEE Conference on Decision and Control 2006, CDC
Country/TerritoryUnited States
CitySan Diego, CA
Period12/13/0612/15/06

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Modeling and Simulation
  • Control and Optimization

Fingerprint

Dive into the research topics of 'Reducing risk by managing software related failures in networked control systems'. Together they form a unique fingerprint.

Cite this