用户名: 密码: 验证码:
大型相控阵雷达软件系统安全性研究
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Safety study of large phased array radar software system
  • 作者:夏亮 ; 杨江平 ; 常春贺 ; 王安安
  • 英文作者:XIA Liang;YANG Jiangping;CHANG Chunhe;WANG An'an;Air Defense Early Warning Equipment Department,Air Force Early Warning Academy;
  • 关键词:大型相控阵雷达 ; 软件系统 ; 软件失效模式和影响分析 ; 安全性设计 ; 模糊层次分析法
  • 英文关键词:large phased array radar(LPAR);;software system;;software failure mode and effects analysis(SFMEA);;safety design;;fuzzy analytic hierarchy process(FAHP)
  • 中文刊名:XTYD
  • 英文刊名:Systems Engineering and Electronics
  • 机构:空军预警学院防空预警装备系;
  • 出版日期:2019-06-28 09:46
  • 出版单位:系统工程与电子技术
  • 年:2019
  • 期:v.41;No.479
  • 基金:军内科研项目(ZBBG415238GT)
  • 语种:中文;
  • 页:XTYD201908012
  • 页数:8
  • CN:08
  • ISSN:11-2422/TN
  • 分类号:84-91
摘要
随着软件系统在大型相控阵雷达中的大量应用,软件系统带来的安全性问题也引起广泛关注。针对大型相控阵雷达软件系统的安全性问题,首先利用软件失效模式和影响分析方法进行安全性分析,找出软件系统的薄弱环节;然后进行针对性安全性设计,提出有效的改进措施;最后利用改进模糊层次分析法进行安全性评价,得到安全性评价结果。实例证明,这种方法可以有效分析大型相控阵雷达软件的安全性问题、找出影响安全性的故障原因、对安全性薄弱环节加以改进设计、对整个大型相控阵雷达系统进行安全性评价。
        With the application of the software system in large phased array radar(LPAR),the safety problem caused by the software system has been widely concerned.Aimed at the safety problem of LPAR software system,firstly,the software failure mode and effects analysis method is used to analyze the safety,and the weak links of the systems are found.Then the targeted safety design is carried out and effective improvement measures are put forward.Finally,the improved fuzzy analytic hierarchy process is used to evaluate safety.It is proved that this method can effectively analyze the safety problems of the LPAR software system,find out the failure reasons affecting safety,improve the design of weak links of safety,and evaluate the safety of the whole LPAR software system.
引文
[1]XIANG J,LIU Y,LUO Z P.Flight safety measurements of UAVs in congested airspace[J].Chinese Journal of Aeronautics,2016,29(5):1355-1366.
    [2]HUANG F Q,LIU B.Software defect prevention based on human error theories[J].Chinese Journal of Aeronautics,2017,30(3):1054-1070.
    [3]李亚晖,张亚棣,郭鹏.机载嵌入式软件的安全性机制研究[J].通信学报,2015,36(11):16-21.LI Y H,ZHANG Y D,GUO P.Research on safety methods of airborne embedded software[J].Journal on Communications,2015,36(11):16-21.
    [4]黄志球,徐丙凤,阚双龙,等.嵌入式机载软件安全性分析标准、方法及工具研究综述[J].软件学报,2014,25(2):200-218.HUANG Z Q,XU B F,KAN S L,et al.Survey on embedded software safety analysis standards,methods and tools for airborne system[J].Journal of Software,2014,25(2):200-218.
    [5]FU H P,CHU K K,LIN S W,et al.A study on factors for retailers implementing CPFR-a fuzzy AHP analysis[J].Systems Engineering Society of China,2010,19(2):192-209.
    [6]XIU Z X,LIU B H,XIE Q H,et al.Assessment of structural stability in Bohai sea area based on AHP-GDM model[J].Acta Oceanologica Sinica,2013,32(4):41-48.
    [7]史长亭,张汝波.改进SFMEA的AUV风险评估方法[J].哈尔滨工业大学学报,2011,32(3):345-349.SHI C T,ZHANG R B.Risk assessment of an AUV based on an improved SFMEA method[J].Journal of Harbin Institute of Technology,2011,32(3):345-349.
    [8]石柱,郑重.软件故障树分析实例研究[J].航天控制,2014,32(6):67-71.SHI Z,ZHENG Z.A case study on software fault tree analysis[J].Aerospace Control,2014,32(6):67-71.
    [9]李震,刘斌,苗虹,等.基于本体的软件安全性需求建模和验证[J].北京航空航天大学学报,2012,38(11):1445-1449.LI Z,LIU B,MIAO H,et al.Modeling and verification of software safety requirement based on ontology[J].Journal of Beijing University of Aeronautics and Astronautics,2012,38(11):1445-1449.
    [10]ROSSI R,MALIZIA A,POGGI L A,et al.Flow motion and dust tracking software for PIV and dust PTV[J].Journal of Failure Analysis and Prevention,2016,16(6):951-962.
    [11]MALIK Q,RAAD S A,SARA T.Software randomness analysis and evaluation of lightweight ciphers:the prospective for IoTsecurity[J].Multimedia Tools and Applications,2018,77(14):18415-18449.
    [12]YUCHIA T,FARID N A,ASHFAQ K.A comprehensive 3-dimensional security analysis of a controller in software-defined networking[J].Security and Privacy,2018,1(2):145-152.
    [13]None.New York to test facial recognition software for bridge and tunnel security[J].Biometric Technology Today,2016(11):233-240.
    [14]SAMIR O,MOURAD D.Specification,verification and quantification of security in model-based systems[J].Computing,2015,97(7):691-711.
    [15]SHIMAA M S,HEGAZY,WALID H H,et al.Study on toxigenic fungi in ruminant feeds under desert conditions with special references to its biological control[J].Beni-Suef University Journal of Basic and Applied Sciences,2015,4(2):167-173
    [16]SOLESIO M E,DEMIRKHANYAN L,ZAKHARIAN E,et al.Contribution of inorganic polyphosphate towards regulation of mitochondrial free calcium[J].BBA-General Subjects,2016,1860(6):1317-1325.
    [17]GABRIELA C,STEFANIA K,CARMEN C.Usage of case-based reasoning in FMEA-driven software[J].Procedia CIRP,2014,25:93-99.
    [18]HAASE,WUNDERLICH,DILLENSEGER,et al.Improving multiple sclerosis management and collecting safety information in the real world:the MSDS3Dsoftware approach[J].Expert Opinion on Drug Safety,2018,17(4):369-378.
    [19]HOWARD.Virtual reality interventions for personal development:a meta-analysis of hardware and software[J].Human-Computer Interaction,2019,34(3):205-239.
    [20]JARMO A,EMILIO R M,ALI M,et al.Remote diagnostics application software for remote handling equipment[EB/OL].[2019-07-15].http:∥doi.org/10.1016/j.fusengdes.2019.01.125.
    [21]BIBB A.The role of the FDA in ensuring the safety and efficacy of artificial intelligence software and devices[J].Journal of the American College of Radiology,2019,16(2):208-210.
    [22]MARTIN L,NIINA K,RIKKE B,et al.Iocbio sparks detection and analysis software[J].Biophysical Journal,2019,116(3):384-386.
    [23]RANGANA B C,ABHIRUP D B,ANTONELLA B.Design and analysis of photonic radio frequency multiband generation using transfer function approach in advanced design system software[J].Optik,2019,182:352-356.
    [24]AFSHIN H,MOHAMMAD J A.The seismic analysis of the core structure in a pool-type material test reactor using 3-D finite difference method[J].Progress in Nuclear Energy,2018,106:162-180.
    [25]TAE H W.Analysis of nuclear fire safety by dynamic complex algorithm of fuzzy theory and system dynamics[J].Annals of Nuclear Energy,2018,114:149-153.
    [26]BOPP,STACEY.Dynamic safety analysis of a subcritical advanced burner reactor[J].Nuclear Technology,2017,200(3):250-268.
    [27]赵跃华,朱媛媛.基于故障树分析的软件安全性测试研究[J].计算机应用研究,2013,30(6):1760-1763.ZHAO Y H,ZHU Y Y.Research on software safety testing based on fault tree analysis[J].Application Research of Computers,2013,30(6):1760-1763.
    [28]张仝伟,石柱.SFMEA方法在飞行控制软件中的应用[J].航天控制,2007,25(2):58-63.ZHANG T W,SHI Z.Application of software failure modes and effect analysis approach in flight control software[J].Aerospace Control,2007,25(2):58-63.
    [29]成静,朱怡安,屈华敏,等.一种基于AADL错误模型的软件安全性分析技术研究[J].西北工业大学学报,2014,32(6):1007-1011.CHENG J,ZHU Y A,QU H M,et al.Analyzing software safety with AADL error model[J].Journal of Northwestern Poly technical University,2014,32(6):1007-1011.
    [30]朱和铨,徐浩军,薛源,等.一种半实物仿真试验软件安全性评估方法[J].航空学报,2014,35(6):1703-1713.ZHU H Q,XU H J,XUE Y,et al.A software safety assessment method based on semi-physical simulation test[J].Acta Aeronautica et Astronautica Sinica,2014,35(6):1703-1713.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700