https://www.mdu.se/

mdu.sePublications
Change search
Link to record
Permanent link

Direct link
Punnekkat, SasikumarORCID iD iconorcid.org/0000-0001-5269-3900
Alternative names
Publications (10 of 171) Show all publications
Govardhan Rao, S. B., Castellanos Ardila, J. P. & Punnekkat, S. (2024). A Proposal for Enhancing IEC 61508 Methodology for the β-Factor Estimation. In: Communications in Computer and Information Science, vol. 2179: . Paper presented at 31st European Conference on Systems, Software and Services Process Improvement, EuroSPI 2024, Munich, 4 September 2024 through 6 September 2024 (pp. 300-314). Springer Science and Business Media Deutschland GmbH
Open this publication in new window or tab >>A Proposal for Enhancing IEC 61508 Methodology for the β-Factor Estimation
2024 (English)In: Communications in Computer and Information Science, vol. 2179, Springer Science and Business Media Deutschland GmbH , 2024, p. 300-314Conference paper, Published paper (Refereed)
Abstract [en]

The standard IEC 61508 provides a methodology to calculate β, a factor used to estimate the probability of common cause failures (CCF), i.e., failures that result from a single cause. This methodology consists of answering 37 checklist questions, each one providing a scored value that is accumulated in the final β-factor. Those questions cover 8 different defense measures, i.e., practices done to mitigate the CCF against system dependencies. Since the inception of the standard in 2010, there has been evolution regarding both new technologies with an impact on the system dependency factors, as well as new knowledge on how to address them. Hence, it is important to capture these aspects and update the methodology that can be used to reason about CCF’s causes. In this paper, we present an enhanced methodology for estimating the β-factor, which builds upon the core methodology provided by IEC 61508. In particular, we add 33 new questions and provide an estimation method for scoring the β-factor. We also illustrate our methodology by applying it to a realistic system and discuss the findings. Our proposed methodology permits the consideration of aspects not included in the core methodology, such as the level of defense support and safety culture. It also allows practitioners to consider more dependencies, leading to CCF reduction. The rationale is that the more defenses are addressed, the more protection can be achieved against CCF. 

Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH, 2024
Keywords
Common Cause Failure, IEC 61508 standard, Redundancy, System Safety, β-factor, Risk assessment, Defense measures, Estimation methods, IEC 61508, Realistic systems, Safety culture, System dependencies, Β-factor, Safety factor
National Category
Computer Sciences
Identifiers
urn:nbn:se:mdh:diva-68578 (URN)10.1007/978-3-031-71139-8_20 (DOI)001336778900020 ()2-s2.0-85204519218 (Scopus ID)9783031711381 (ISBN)
Conference
31st European Conference on Systems, Software and Services Process Improvement, EuroSPI 2024, Munich, 4 September 2024 through 6 September 2024
Available from: 2024-10-02 Created: 2024-10-02 Last updated: 2024-12-04Bibliographically approved
Nair, A. S., Patil, G., Agarwal, A., Pai, A. V., Raveendran, B. K. & Punnekkat, S. (2024). CAMP: a hierarchical cache architecture for multi-core mixed criticality processors. International Journal of Parallel, Emergent and Distributed Systems
Open this publication in new window or tab >>CAMP: a hierarchical cache architecture for multi-core mixed criticality processors
Show others...
2024 (English)In: International Journal of Parallel, Emergent and Distributed Systems, ISSN 1744-5760, E-ISSN 1744-5779Article in journal (Refereed) Epub ahead of print
Abstract [en]

CAMP proposes a hierarchical cache subsystem for multi-core mixed criticality processors, focusing on ensuring worst-case execution time (WCET) predictability in automotive applications. It incorporates criticality-aware locked L1 and L2 caches, reconfigurable at mode change intervals, along with criticality-aware last level cache partitioning. Evaluation using CACOSIM, Moola Multicore simulator, and CACTI simulation tools confirms the suitability of CAMP for keeping high-criticality jobs within timing budgets. A practical case study involving an automotive wake-up controller using the sniper v7.2 architecture simulator further validates its usability in real-world mixed criticality applications. CAMP presents a promising cache architecture for optimized multi-core mixed criticality systems. 

Place, publisher, year, edition, pages
Taylor and Francis Ltd., 2024
Keywords
cache coherence protocol, cache locking, cache partitioning, hierarchical cache architecture, Mixed-criticality systems, worst-case execution time (WCET), Architecture, Budget control, Cache memory, Computer architecture, Criticality (nuclear fission), Locks (fasteners), Network architecture, Bad-case execution time, Cache architecture, Cache coherence protocols, Hierarchical caches, Multi-cores, Worst-case execution time, Hierarchical systems
National Category
Computer Engineering
Identifiers
urn:nbn:se:mdh:diva-65238 (URN)10.1080/17445760.2023.2293913 (DOI)001130218200001 ()2-s2.0-85180256653 (Scopus ID)
Available from: 2024-01-03 Created: 2024-01-03 Last updated: 2024-01-17Bibliographically approved
Punnekkat, S., Markovic, T., Leon, M., Leander, B., Dehlaghi-Ghadim, A. & Strandberg, P. E. (2024). InSecTT Technologies for the Enhancement of Industrial Security and Safety. In: Studies in Computational Intelligence: (pp. 83-104). Springer Science and Business Media Deutschland GmbH, 1147
Open this publication in new window or tab >>InSecTT Technologies for the Enhancement of Industrial Security and Safety
Show others...
2024 (English)In: Studies in Computational Intelligence, Springer Science and Business Media Deutschland GmbH , 2024, Vol. 1147, p. 83-104Chapter in book (Other academic)
Abstract [en]

The recent advances in digitalization, improved connectivity and cloud based services are making a huge revolution in manufacturing domain. In spite of the huge potential benefits in productivity, these trends also bring in some concerns related to safety and security to the traditionally closed industrial operation scenarios. This paper presents a high-level view of some of the research results and technological contributions of the InSecTT Project for meeting safety/security goals. These technology contributions are expected to support both the design and operational phases in the production life cycle. Specifically, our contributions spans (a) enforcing stricter but flexible access control, (b) evaluation of machine learning techniques for intrusion detection, (c) generation of realistic process control and network oriented datasets with injected anomalies and (d) performing safety and security analysis on automated guided vehicle platoons.

Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH, 2024
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:mdh:diva-68165 (URN)10.1007/978-3-031-54049-3_5 (DOI)2-s2.0-85200487605 (Scopus ID)
Available from: 2024-08-14 Created: 2024-08-14 Last updated: 2024-08-14Bibliographically approved
Ali, N., Punnekkat, S. & Rauf, A. (2024). Modeling and safety analysis for collaborative safety-critical systems using hierarchical colored Petri nets. Journal of Systems and Software, 210, Article ID 111958.
Open this publication in new window or tab >>Modeling and safety analysis for collaborative safety-critical systems using hierarchical colored Petri nets
2024 (English)In: Journal of Systems and Software, ISSN 0164-1212, E-ISSN 1873-1228, Vol. 210, article id 111958Article in journal (Refereed) Published
Abstract [en]

Context: Collaborative systems enable multiple independent systems to work together towards a common goal. These systems can include both human-system and system-system interactions and can be found in a variety of settings, including smart manufacturing, smart transportation, and healthcare. Safety is an important consideration for collaborative systems because one system's failure can significantly impact the overall system performance and adversely affect other systems, humans or the environment. Goal: Fail-safe mechanisms for safety-critical systems are designed to bring the system to a safe state in case of a failure in the sensors or actuators. However, a collaborative safety-critical system must do better and be safe-operational, for e.g., a failure of one of the members in a platoon of vehicles in the middle of a highway is not acceptable. Thus, failures must be compensated, and compliance with safety constraints must be ensured even under faults or failures of constituent systems. Method: In this paper, we model and analyze safety for collaborative safety-critical systems using hierarchical Coloured Petri nets (CPN). We used an automated Human Rescue Robot System (HRRS) as a case study, modeled it using hierarchical CPN, and injected some specified failures to check and confirm the safe behavior in case of unexpected scenarios. Results: The system behavior was observed after injecting three types of failures in constituent systems, and then safety mechanisms were applied to mitigate the effect of these failures. After applying safety mechanisms, the HRRS system's overall behavior was again observed both in terms of verification and validation, and the simulated results show that all the identified failures were mitigated and HRRS completed its mission. Conclusion: It was found that the approach based on formal methods (CPN modeling) can be used for the safety analysis, modeling, validation, and verification of collaborative safety-critical systems like HRRS. The hierarchical CPN provides a rigorous way of modeling to implement complex collaborative systems. 

Place, publisher, year, edition, pages
Elsevier Inc., 2024
Keywords
Colored Petri-nets, Petri nets, Safety analysis, Safety-critical
National Category
Computer Systems
Identifiers
urn:nbn:se:mdh:diva-65686 (URN)10.1016/j.jss.2024.111958 (DOI)001161603900001 ()2-s2.0-85182283594 (Scopus ID)
Available from: 2024-01-24 Created: 2024-01-24 Last updated: 2024-02-26Bibliographically approved
Markovic, T., Leon, M., Buffoni, D. & Punnekkat, S. (2024). Random forest with differential privacy in federated learning framework for network attack detection and classification. Applied intelligence (Boston)
Open this publication in new window or tab >>Random forest with differential privacy in federated learning framework for network attack detection and classification
2024 (English)In: Applied intelligence (Boston), ISSN 0924-669X, E-ISSN 1573-7497Article in journal (Refereed) Published
Abstract [en]

Communication networks are crucial components of the underlying digital infrastructure in any smart city setup. The increasing usage of computer networks brings additional cyber security concerns, and every organization has to implement preventive measures to protect valuable data and business processes. Due to the inherent distributed nature of the city infrastructures as well as the critical nature of its resources and data, any solution to the attack detection calls for distributed, efficient and privacy preserving solutions. In this paper, we extend the evaluation of our federated learning framework for network attacks detection and classification based on random forest. Previously the framework was evaluated only for attack detection using four well-known intrusion detection datasets (KDD, NSL-KDD, UNSW-NB15, and CIC-IDS-2017). In this paper, we extend the evaluation for attack classification. We also evaluate how adding differential privacy into random forest, as an additional protective mechanism, affects the framework performances. The results show that the framework outperforms the average performance of independent random forests on clients for both attack detection and classification. Adding differential privacy penalizes the performance of random forest, as expected, but the use of the proposed framework still brings benefits in comparison to the use of independent local models. The code used in this paper is publicly available, to enable transparency and facilitate reproducibility within the research community.

Place, publisher, year, edition, pages
SPRINGER, 2024
Keywords
Attack detection, Attack classification, Random forest, Federated learning, Differential privacy
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:mdh:diva-67999 (URN)10.1007/s10489-024-05589-6 (DOI)001251526600001 ()2-s2.0-85196625216 (Scopus ID)
Available from: 2024-07-03 Created: 2024-07-03 Last updated: 2024-07-10Bibliographically approved
Castellanos Ardila, J. P., Punnekkat, S., Hansson, H. & Backeman, P. (2024). Safety Argumentation for Machinery Assembly Control Software. In: Lecture Notes in Computer Science, Vol. 14988: . Paper presented at Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 251-266). Springer Science and Business Media Deutschland GmbH
Open this publication in new window or tab >>Safety Argumentation for Machinery Assembly Control Software
2024 (English)In: Lecture Notes in Computer Science, Vol. 14988, Springer Science and Business Media Deutschland GmbH , 2024, p. 251-266Conference paper, Published paper (Refereed)
Abstract [en]

Assemblies of machinery commonly require control systems whose functionality is based on application software. In Europe, such software requires high safety integrity levels in accordance with the Machinery Directive (MD). However, identifying the essential regulatory requirements for the safety approval is not an easy task. To facilitate this job, this paper presents a process for Safety Argumentation for Machinery Assembly Control Software (SAMACS). We are inspired by patterns provided in the Goal Structuring Notation (GSN) and the use of contracts in safety argumentation. SAMACS contribution is aligning those methods with the MD by adopting EN ISO 13849. In particular, we define safety goals based on expected software contribution to control system safety and the standard guidance. Software safety goals are detailed into software safety requirements and expressed further as contracts, which shall be verified with prescribed techniques. We apply SAMACS to a case study from a European mining company and discuss the findings. This work aims at helping practitioners compose the safety case argumentation necessary to support machinery integration approval in Europe. 

Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH, 2024
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 14988 LNCS
Keywords
Control systems, EN ISO 13849, GSN, Software Safety Case, Applications software, Assembly controls, Control software, EN ISO 13849, Goal structuring notation, ISO 13849, Safety case, Safety goals, Software safety
National Category
Computer Systems
Identifiers
urn:nbn:se:mdh:diva-68573 (URN)10.1007/978-3-031-68606-1_16 (DOI)001321528300016 ()2-s2.0-85204566918 (Scopus ID)9783031686054 (ISBN)
Conference
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Available from: 2024-10-02 Created: 2024-10-02 Last updated: 2024-11-06Bibliographically approved
Markovic, T., Leon, M., Leander, B. & Punnekkat, S. (2023). A Modular Ice Cream Factory Dataset on Anomalies in Sensors to Support Machine Learning Research in Manufacturing Systems. IEEE Access, 11, 29744-29758
Open this publication in new window or tab >>A Modular Ice Cream Factory Dataset on Anomalies in Sensors to Support Machine Learning Research in Manufacturing Systems
2023 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 11, p. 29744-29758Article in journal (Refereed) Published
Abstract [en]

A small deviation in manufacturing systems can cause huge economic losses, and all components and sensors in the system must be continuously monitored to provide an immediate response. The usual industrial practice is rather simplistic based on brute force checking of limited set of parameters often with pessimistic pre-defined bounds. The usage of appropriate machine learning techniques can be very valuable in this context to narrow down the set of parameters to monitor, define more refined bounds, and forecast impending issues. One of the factors hampering progress in this field is the lack of datasets that can realistically mimic the behaviours of manufacturing systems. In this paper, we propose a new dataset called MIDAS (Modular Ice cream factory Dataset on Anomalies in Sensors) to support machine learning research in analog sensor data. MIDAS is created using a modular manufacturing simulation environment that simulates the ice cream-making process. Using MIDAS, we evaluated four different supervised machine learning algorithms (Logistic Regression, Decision Tree, Random Forest, and Multilayer Perceptron) for two different problems: anomaly detection and anomaly classification. The results showed that multilayer perceptron is the most suitable algorithm with respect to model accuracy and execution time. We have made the data set and the code for the experiments publicly available, to enable interested researchers to enhance the state of the art by conducting further studies.

Place, publisher, year, edition, pages
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2023
Keywords
Sensors, Temperature sensors, Anomaly detection, Mixers, Manufacturing systems, Behavioral sciences, Cooling, Artificial neural networks, Machine learning, Supervised learning, Anomaly classification, artificial neural network, manufacturing dataset, sensor data
National Category
Computer Sciences
Identifiers
urn:nbn:se:mdh:diva-62361 (URN)10.1109/ACCESS.2023.3252901 (DOI)000965953800001 ()2-s2.0-85149838041 (Scopus ID)
Available from: 2023-05-03 Created: 2023-05-03 Last updated: 2023-05-03Bibliographically approved
Govardhan Rao, S. B., Castellanos Ardila, J. P. & Punnekkat, S. (2023). A Systematic Review of β-factor Models in the Quantification of Common Cause Failures. In: Proc. - Euromicro Conf. Softw. Eng. Adv. Appl., SEAA: . Paper presented at Proceedings - 2023 49th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2023 (pp. 262-269). Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>A Systematic Review of β-factor Models in the Quantification of Common Cause Failures
2023 (English)In: Proc. - Euromicro Conf. Softw. Eng. Adv. Appl., SEAA, Institute of Electrical and Electronics Engineers Inc. , 2023, p. 262-269Conference paper, Published paper (Refereed)
Abstract [en]

Safety systems, i.e., systems whose malfunction can result in catastrophic consequences, are usually designed with redundancy in mind to reach high levels of reliability. However, Common Cause Failures (CCF), i.e., single failure events affecting multiple components or functions in a system, can threaten the desired reliability. To solve this problem, practitioners must use proven methods, such as those recommended by standards, to support CCF quantification. In particular, the β-factor model has become the de-facto model since the safety standard IEC 61508 considers it. As such standard applies to all industries, practitioners must figure out the industrial-specific implementation procedures. In this paper, we conducted a systematic literature review to understand how the β-factor model has been used in practice. As a result, we found 20 different models, which are industry/project-specific extensions of the first β-factor model proposed for the nuclear sector. We further classified those models by considering how the β-factor is estimated, and the level of redundancy support. Tool support for the models and their industrial use are also outlined. Finally, we present a discussion that covers the implication of our findings. Our study targets practitioners and researchers interested in using current β-factor models or evolving new ones for specific project needs.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2023
Keywords
Common Cause Failure, Systematic Literature Review, β-factor model, Safety factor, Catastrophic consequences, Factor model, Failure events, Multiple components, Multiple function, Safety standard, Systematic Review, Β-factor model, Redundancy
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:mdh:diva-65955 (URN)10.1109/SEAA60479.2023.00048 (DOI)2-s2.0-85183323422 (Scopus ID)9798350342352 (ISBN)
Conference
Proceedings - 2023 49th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2023
Available from: 2024-02-07 Created: 2024-02-07 Last updated: 2024-02-07Bibliographically approved
Desai, N., Dobrin, R. & Punnekkat, S. (2023). A Topology-specific Tight Worst-case Analysis of Strict Priority Traffic in Real-time Systems. In: IEEE Int. Conf. Emerging Technol. Factory Autom., ETFA: . Paper presented at IEEE International Conference on Emerging Technologies and Factory Automation, ETFA. Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>A Topology-specific Tight Worst-case Analysis of Strict Priority Traffic in Real-time Systems
2023 (English)In: IEEE Int. Conf. Emerging Technol. Factory Autom., ETFA, Institute of Electrical and Electronics Engineers Inc. , 2023Conference paper, Published paper (Refereed)
Abstract [en]

Tight end-to-end worst-case delay bounds for periodic traffic streams are essential for time sensitive networks. In this paper, we provide an algorithm to compute a tight (and accurate) end-to-end worst-case bound by considering distinct topological patterns and the manner in which streams enter and leave switches. This refined analysis uses non-preemptive, strict-priority arbitration mechanism commonly deployed in Ethernet switches. Compared to the state-of-the-art that considers all higher and equal priority interference as contributing to the worst-case bound, we present an analytical approach for computing a tighter worst-case delay bound and prove through discrete event simulations that only a certain number of equal-priority interference streams can actually affect the worst-case case. Our results enable efficient resource allocation and have implications for online re-configuration mechanisms for time-sensitive factory communication systems.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2023
Keywords
Real-time networks, Strict-priority traffic, TSN, Worst-case delay, Discrete event simulation, Interactive computer systems, Online systems, Topology, Bad-case delay, Delay bound, End to end, Periodic traffic, Real - Time system, Real time network, Traffic streams, Worst-case analysis, Real time systems
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:mdh:diva-64694 (URN)10.1109/ETFA54631.2023.10275348 (DOI)2-s2.0-85175426336 (Scopus ID)9798350339918 (ISBN)
Conference
IEEE International Conference on Emerging Technologies and Factory Automation, ETFA
Available from: 2023-11-09 Created: 2023-11-09 Last updated: 2023-11-09Bibliographically approved
Castellanos Ardila, J. P., Punnekkat, S., Hansson, H. & Grante, C. (2023). Arguing Operational Safety for Mixed Traffic in Underground Mining. In: 2023 18th Annual System of Systems Engineering Conference, SoSe 2023: . Paper presented at 2023 18th Annual System of Systems Engineering Conference, SoSe 2023, Lille 14 June 2023 through 16 June 2023. Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>Arguing Operational Safety for Mixed Traffic in Underground Mining
2023 (English)In: 2023 18th Annual System of Systems Engineering Conference, SoSe 2023, Institute of Electrical and Electronics Engineers Inc. , 2023Conference paper, Published paper (Refereed)
Abstract [en]

Practitioners report improved productivity as one of the main benefits of using autonomous dump trucks in underground mining. However, manned vehicles are still needed to transport materials and personnel in the tunnels, which requires practices that may diminish autonomy benefits. Thus, both fleets shall be efficiently mixed to maximize the autonomy potential. In addition, sufficient safety shall be demonstrated for operations approval. This paper proposes a strategy to populate a GSN (Goal Structuring Notation) structure to argue for the sufficient safety of mixed traffic operations in underground mining. Our strategy considers SoS (System of Systems) concepts to describe the operations baseline and the initial argumentation line, i.e., risk reduction mitigation strategies for existing SoS components. Such a strategy is further detailed with risk reduction mitigation arguments for control systems. Mitigation strategies at both levels are derived from safety analysis supported by STPA (System-Theoretic Process Analysis), a safety analysis technique that aligns well with the SoS perspective. We also incorporate regulatory frameworks addressing machinery to align the arguments with mandatory statements of the machinery directive. Our strategy combines SoS concepts with analysis techniques and regulatory frameworks to facilitate safety case argumentation for operations approval in the European mining context. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2023
Keywords
GSN, Harmonized Standards, Machinery Directive, Mixed Traffic, Safety Case Arguments, SoS, STPA, Mining, Safety engineering, Goal structuring notation, Process analysis, Safety case, Safety case argument, System-of-systems, System-theoretic process analyse, Underground mining, Mine trucks
National Category
Computer Systems
Identifiers
urn:nbn:se:mdh:diva-63961 (URN)10.1109/SoSE59841.2023.10178525 (DOI)2-s2.0-85166732836 (Scopus ID)9798350327236 (ISBN)
Conference
2023 18th Annual System of Systems Engineering Conference, SoSe 2023, Lille 14 June 2023 through 16 June 2023
Available from: 2023-08-16 Created: 2023-08-16 Last updated: 2023-08-16Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-5269-3900

Search in DiVA

Show all publications