FULLTEXT01
FULLTEXT01
SP Electronics
SP REPORT 2007:13
Safety requirements and validation
methods for safety-related automotive
electronics
Jan Jacobson, SP
Andreas Söderberg, SP
Lars-Åke Johansson, QRtech
Henrik Lönn, Volvo Technology
3
Abstract
Safety requirements and validation methods for safety-
related automotive electronics
Functional safety for automotive embedded systems is a topic of increasing importance.
The report describes the overall safety lifecycle, the functional safety requirements and
validation and verification for safety related automotive systems. Simplified examples are
given to illustrate the development activities.
References are made to standards for functional safety developed by the International
Electrotechnical Commission (IEC) and the International Standardisation Organisation
(ISO).
The report is based on the work of the AutoVal project of the IVSS (Intelligent Vehcle
Safety Systems) research programme.
SP Report 2007:13
ISBN 978-91-85533-83-1
ISSN 0284-5172
Borås 2007
4
Contents
Abstract 3
Contents 4
Preface 7
Summary 8
7.1.8.7 The driving situations and the operating conditions in which the
item can initiate hazards 64
7.2 Hazard and risk analysis 65
7.2.1 Failure modes 65
7.2.2 Driving situations 65
7.2.3 Hazardous situations 65
7.2.4 Hazardous events 66
7.2.5 Hazardous scenarios 66
7.2.5.1 Scenario 1 66
7.2.5.2 Scenario 2 66
7.2.5.3 Scenario 3 66
7.2.5.4 Scenario 4 66
7.2.6 What Causes Analysis 67
7.2.7 Scenario 1: ASIL B 67
7.3 Functional Safety Concept 67
7.3.1 SADS input signal requirements 67
7.3.1.1 Body acceleration sensors 67
7.3.1.2 Steering wheel sensors 68
7.3.1.3 Vehicle dynamics sensors from IMU 68
7.3.2 SADS function implementation requirements 68
7.3.3 SADS output signal requirements 68
7.4 System development 69
7.4.1 Specification of fault detection in a safety-related system 69
9 Conclusions 91
Annex A References 92
A.1 Draft standard ISO 26262 92
A.2 International standard IEC 61508 92
A.3 International safety regulations 92
A.4 Additional documents 93
A.5 AutoVal reports 94
Annex B Glossary 95
7
Preface
New safety functions and the increased complexity of vehicle electronics enhance the
need to demonstrate dependability. Vehicle manufacturers and suppliers must be able to
present a safety argument for the dependability of the product, correct safety requirements
and suitable development methodology.
The objective of the AutoVal project is to develop a methodology for safety validation of
a safety-related function (or safety-related subsystem) of a vehicle. The validation shall
produce results which can be used either as a basis for a whole vehicle type approval
driven by legislation, or for supporting dependability claims according to the guidelines
of the manufacturer.
The AutoVal project is a part of the IVSS (Intelligent Vehicle Safety Systems) research
programme. IVSS aims at systems and smart technologies to reduce fatalities and severe
injuries. This can be done by crash avoidance, injury prevention, mitigation and
upgrading of handling, stability and crash-worthiness of cars and commercial vehicles
enabled by modern IT. Both infrastructure dependent and vehicle autonomous systems
are included as are systems for improved safety for unprotected road – users. The core
technologies of IVSS are:
• Driver support & human – machine interface (HMI) systems
• Communication platforms – external / internal to the vehicles
• Sensor – rich embedded systems
• Intelligent road infrastructure & telematics
• Crashworthiness, bio-mechanics and design of vehicles for crash-
avoidance and injury prevention.
• Dependable systems
• Vehicle dynamic safety systems
Partners of the AutoVal project are Haldex, QRtech, Saab Automobile, SP Technical
Research Institute of Sweden and Volvo AB. The following researchers and engineers
have participated in the AutoVal project:
Mr Henrik Aidnell, Saab Automobile
Mrs Sabine Alexandersson, Haldex Brake Products
Mr Joacim Bergman, QRtech
Mr Per-Olof Brandt, Volvo
Mr Robert Hammarström, SP
Mr Jan Jacobson, SP (project manager)
Dr Lars-Åke Johansson, QRtech
Dr Henrik Lönn, Volvo
Mr Carl Nalin, Volvo
Mr Anders Nilsson, Haldex Brake Products
Dr Magnus Gäfvert, Haldex Brake Products
Mr Josef Nilsson, SP
Mr Lars Strandén, SP
Mr Jan-Inge Svensson, Volvo
Mr Andreas Söderberg, SP
Summary
Increased functionality, increased complexity and dependability requirements must be
combined for automotive electronics. Systematic work according to an overall safety life
cycle will be essential for developing systems with adequate functional safety. The life
cycle has to address the concept, the risk analysis, the system development, the hardware
development and the software development.
This report is based on the work of the AutoVal project of the IVSS (Intelligent Vehicle
Safety Systems) research programme. The aim is to show how safety requirements can be
specified and how safety can be demonstrated. Practical experience and techniques are
prioritised.
References are given to international standards in this report. The standard IEC 61508 is
possible to obtain from the International Electrotechnical Commission (www.iec.ch). The
working documents of the draft standard ISO 26262 are not yet publicly available.
Information on the progress of the standardisation can be given by the International
Standardisation organisation (www.iso.ch) or its national branches. Standards are subject
to copyright.
Most terms and definitions used in this report correspond to the use in IEC standards. But
the reader is advised to check with his application since differences in terminology exist
between standards. Definitions in ISO automotive standards may be different.
This report is the first in a series of three reports. The other two reports are “Methods for
Verification and Validation of Safety” and “Model Driven Software Verification and
Validation”.
9
Many of the functions of a modern car or truck are realised using embedded programm-
able electronic systems. Nearly all the recently developed functions in vehicles would be
impossible without software and electronics. Electronic control units (ECUs) are
embedded all over the vehicle. Drivers and passengers are expecting the electronic
systems to provide at least the same reliability and availability as the mechanical parts of
the vehicle. Most drivers are not even aware of which vehicle functions depend on
embedded systems.
There are safety-related parts of the vehicle where a failure of control would cause a
hazardous situation. An example of such a system is engine control which must not
deliver unexpected engine torque. An unexpected low torque could be hazardous e.g. in
an overtaking situation. An unexpected high torque might cause sudden acceleration and
loss of control of the vehicle. Other examples of safety-related control are door locks,
electronic stability control (ESC) and battery management in hybrid vehicles.
A large number of active safety systems can be expected in future vehicles. Advanced
airbag systems, electronic stability systems, lane departure warning systems, brake
assistance systems and adaptive cruise control systems are already commercially
available. Future active safety systems may include collision avoidance by forced
steering, night vision systems and brake-by-wire systems.
There are also embedded systems that implement functions with minor safety importance.
Malfunction of infotainment systems in the vehicle will be a nuisance, but is unlikely to
be safety-related. Failure of automatic climate control systems will reduce the comfort for
the driver, but will not be safety-related in the short time aspect.
10
More computing power and larger memory capacity enhance the capability in an
automotive embedded system. Performance in computing systems has become affordable
also for the cost-sensitive automotive industry. The increased performance makes it
possible to develop more complex systems.
The different embedded systems of a road vehicle are not isolated. The ECUs are
connected together in vehicle communication networks, and data is exchanged between
them.
The design principle has been to use one ECU for every function in the vehicle, and then
make the ECU work together in a federated way. This will no longer be feasible as the
number of functions grow continuously. New functions will have to be distributed over
existing ECUs. New hardware units cannot be introduced with every new function. This
will lead to increasing complexity. The partitions of an ECU are to be sufficiently isolated
otherwise the functions will interfere with each other. All the ECUs performing a part of
a function have to be available as "members" of the function. This also increases the
complexity.
TaskA
TaskB
TaskC
TaskD
TaskE
Task A
Task B
Task C
Task D
Task E
1.3 Dependability
The safety requirements must be unambiguous, and there must be methods to validate
functional safety.
There are many different risks in technical systems, mechanical risks, chemical risks,
electrical risks, explosive risks etc. When we consider a system, a device or a machine as
safe we mean that all these risks are sufficiently low. Safety means that there are no
unacceptable risks for physical damages or injuries on health neither directly nor
indirectly as a result of damages on property or environment.
Functional safety is part of the overall safety that depends on a system or equipment
operating correctly in response to its inputs. The term "safety validation" in this report
means the activities to demonstrate that the needed functional safety has been achieved.
Functional safety should not be mistaken for other kinds of safety aspects such as
electrical safety or safety in explosive atmospheres. Neither safety nor functional safety
can be determined without considering the system as a whole and the environment with
which it interacts.
The concept of "dependable automotive systems" indicates that the system should not
only be safe, but also cover the other dependability aspects.
It is not trivial to show that a complex system actually is suitable for its intended use.
Careful risk analysis must be made already from the beginning of the development. Every
step of the realisation must be confirmed by verification. At the end of the development,
there shall be an overall safety validation to demonstrate functional safety.
This report addresses validation of dependability and functional safety. Other safety
aspects such as environmental stress, electromagnetic compatibility and electrical safety
are not in focus. Additional validation methods should be applied to cover also those
aspects.
Traditional safety functions are designed with the dedicated purpose to reduce a risk in
the system. A high-pressure relief valve of a boiler in process control is a good example
of a safety function. The valve has the task to open if the pressure of the boiler exceeds
the limit and the risk of an explosion is eminent. Controls in the process industry often
combine sensors, programmable electronic systems and actuators to build safety
functions. Temperature alarms, level gauging and flow control are examples where the
safety function is easily distinguished from the basic process control system. (See figure
2.) This is often not the case in automotive control.
12
Safety function
Vehicle
Figure 2. The safety function is well separated from the basic control functions
Many of the functions of a road vehicle are of minor importance to the safety of the driver
and the passengers. Such “basic control functions” can be exemplified by the continuous
charging of the battery, the engine temperature control and the illumination of the
instruments on the dashboard. But it is possible to imagine situations when also these
functions may affect safety.
What makes automotive electronics special is that almost every function of the car is to
some extent safety-related. The switching on of the headlights is not of primary
importance to safety. But what happens if both headlights are unintentionally switched off
during night driving? The shifting of gear in reverse is uncritical in most driving
situations, but will be safety-related when you have to back out of a dangerous area.
Few functions are safety functions in the original meaning, i.e. functions specifically
designed to handle a hazardous situation. Seat belt pretensioners and airbags are examples
of safety functions.
The advanced driver assistance systems have the safety-related functions as integrated
parts of the system. An example is the electronic stability control (ESC) which operates
the individual brakes of the wheels to improve stability. Incorrect operation of the brakes
is safety-critical. (See figure 3.)
Safety-related
control function
Non safety-related
control functions
Vehicle
The integrity of the safety function is described by four safety integrity levels; SIL 1, 2, 3
and 4. (See figure 4.) SIL 4 provides the most reliable risk reduction. All safety-related
functions are expected to be assigned a SIL. The necessary risk reduction is decided
depending on the severity of an accident, the exposure to the risk, the possibility of the
driver to avoid the situation and the tolerable remaining risk.
SIL 4
SIL 3
SIL 2
SIL 1
The international standard IEC 61508 is accepted as a European standard. It is then called
EN 61508. The standard has also been accepted by national standardisation organisations
(e.g. as DS-EN 61508 in Denmark). The content of the standard is the same in all three
cases. The difference in denomination only shows that it has been accepted by different
standardisation organisations.
Additional information on functional safety is given at the IEC web site. [IEC]
14
An overall safety lifecycle is specified in the standard. It describes phases such as system
definition (concept), hazard analysis and risk assessment, safety requirements, design,
realization and safety validation. The work for functional safety shall be carried out all
through the life cycle. Activities for hardware verification, software verification, safety
validation and functional safety assessment are specified.
The integrity of the safety function is described by four safety integrity levels; ASIL A,
B, C and D. (See figure 5.) ASIL D provides the highest risk reduction. All safety-related
functions are expected to be assigned an ASIL. The necessary risk reduction is decided
depending on the severity of an accident, the exposure to the risk, the possibility of the
driver to control the situation and the tolerable remaining risk. ASIL is not intended as a
probabilistic target value of the item. This is a difference between ASIL of ISO 26262
and SIL of IEC 61508.
ASIL D
ASIL C
ASIL B
ASIL A
Verification and validation activities are listed in the standard and may be used when
considering a performance testing programme.
The ISO 26262 standard will be an automotive derivate of the IEC 61508 standard, but is
intended to be an independent publication without normative references to IEC 61508.
The ISO work is in progress and no working documents are publicly available outside the
standardisation organisations. A draft international standard is planned to be circulated in
2008.
15
The guidelines identify two phases, Preliminary Safety Snalysis (PSA) and Detailed
Safety Analysis (DSA) and propose to use a safety case to collect evidence for the safety
of the analyzed system. Focus in the current version is on the PSA, and the following
activities are suggested for this phase: System Modeling, Hazard Identification, Hazard
Classification, Risk Analysis and Safety Requirements Allocation. The Detailed Safety
Analysis is carried out during the implementation of the system, and techniques such as
FMEA and FTA are suggested. Figure 6 shows the overall steps in the suggested
approach and the required data.
RefinedSafety Envelope
High-Level Safety Requirements
S
Safety Envelope
Preliminary Safety Integrity Level a
Safety Policy Safety Argument
Overall System Requirements Safety Project Safety Plan
f
Environment Analysis Safety Policy e
Overall System Requirements
(PSA) Environment
t
y
C
System
model a
Detailed Low-level Safety Req. s
Safety Hazard Probabilities
Failure Modes e
Analysis
(DSA)
Information on the progress of the development of the guidelines will be given at the
website of MISRA. [MISRAweb]
16
Three different alternative procedures are suggested for type approval. One alternative is
to type approve the vehicle directly. If this procedure is chosen by a vehicle
manufacturer, no separate testing of CEVCSs as ESAs is required.
Another alternative for type approval is to test individual ESAs. The approval for the
vehicle is obtained by demonstrating that all the relevant CEVCSs have been approved.
The CEVCSs must also be installed in accordance with the instructions of the
manufacturer.
The third procedure for type approval is to type approve an ESA to be fitted either to any
vehicle type or to a specific vehicle type requested by the manufacturer. ESAs involved in
the direct control of vehicles will normally receive type approval by agreement with the
vehicle manufacturer.
The work to create good functional safety in automotive systems is a continuous process
starting from the concept phase, all through the development activities and continuing
after start of production. Correction of previous mistakes will be time consuming and
expensive. It is important to design for safety from the beginning.
The safety life cycle starts in the concept phase when the first ideas of a new control
system or a new component start to form. The work with risks continues with the risk
analysis, the functional safety requirements and the technical safety concept before the
detailed design starts.
The realisation phase is the largest part of the work with a new control system. Parallel to
the design of electronics and software the safety life cycle indicates that it is possible to
work with safety based on other technologies (for example mechanical protections) and
external risk reduction measures in order to reduce the risks.
IEC 61508 defines 16 different phases of a safety life cycle for safety functions (see
figure 7):
1 Concept
2 Overall scope definition
3 Hazard and risk analysis
4 Overall safety requirements
5 Safety requirements allocation
6 Overall operation & maintenance planning
7 Overall safety validation planning
8 Overall installation & commissioning planning
9 Realisation (electrical/electronic/programmable electronic control systems)
10 Realisation (other technology)
11 Realisation (external risk reduction)
12 Overall installation & commissioning
13 Overall safety validation
14 Overall operation, maintenance & repair
15 Overall modification & retrofit
16 Decommissioning or disposal
Management responsibilities for functional safety or technical activities are not specified
as phases of the lifecycle, but have nevertheless to be covered. Safety policies, safety
strategies and responsibilities of departments, persons and organisations are important for
the safety management.
19
1 Concept
2 Overall scope
definition
4 Overall safety
requirements
5 Safety req.mnts
allocation
6 7 8 10
1 Overall
2 installation
Extern.
risk
1 Overall safety reduct.
3 validation
11
1 Operation,
4 maintenance Modification
and retrofit
1 Disposal 15
6
The overall safety lifecycle introduced by the IEC 61508 standard is not regarded as
optimal by the automotive industry. The draft standard ISO 26262 introduces an overall
safety life cycle intended for automotive electronics. (See figure 8.) Automotive
components are developed and then put into serial production according to the lifecycle
model.
20
ISO 26262 defines eleven different activities spread over the concept phase, the product
development and after start of production (SOP):
- Item definition
- Initiation of the safety lifecycle
- Hazard analysis and risk assessment
- Functional safety concept
- Product development at system level
- Product development – Hardware
- Product development – Software
- Operation planning
- Production planning
- Production
- Operation, service and decommissioning
The overall life cycle phases can also be divided into parts as shown in figure 9.
This report focuses on seven phases of the overall safety lifecycle. (See figure 10.) A
preliminary safety analysis comprises the item definition, the hazard and risk analysis and
the functional safety concept. A detailed safety analysis is described as development at
system level, development at hardware level, development at software level and safety
validation. A complete overall safety lifecycle must be supplemented with several phases
as described in the standards IEC 61508 and ISO 26262.
Product development
hardware
Initiation Specification of System design Integration Safety validation Functional safety Product release
technical safety assessment
concept
Product development
software
Item definition
Preliminary
Hazard and risk Safety
analysis
Analysis
Functional safety
concept
System
development
Detailed
Hardware Software Safety
development development Analysis
Validation
The purpose of item definition is to collect and produce sufficient material about the
analysis object (item) to adequately define and understand it. The input is existing
documentation and information that is relevant for the item. The output should cover all
relevant aspects of item, and be sufficiently detailed to perform further design and safety
analysis. Examples include:
- Item objectives
The purpose of item in its current context
- Item Realization
A representation of the item that corresponds to a preliminary or actual
realization. Important aspects are structure and behaviour of item and the external
interface.
- Environment of the item
A description of surrounding systems, assumptions regarding physical
environment, vehicle dynamics relevant for item
- Requirements
Functional and non-functional requirements including known safety requirements
- Safety constraints
Safety policy of the company, expected use of the vehicle relevant for item,
known hazards.
In general, the information should correspond to known and fixed properties of the Item.
Implementation decisions that can be revoked should be avoided, while known
constraints and decisions should not be hidden.
In the MISRA Safety Guidelines [MISRA], the item definition corresponds to the System
Modeling activity.
The object to be considered in a hazard and risk analysis is here called the equipment
under control (EUC). In this report the EUC often means the complete vehicle.
A hazardous event is an event that causes a person to be exposed to the hazard which
results in harm.
Example: The design of a headlight control of a car. One obvious hazard that has to be
considered for this control is the high speed (kinetic energy) of the vehicle. Even though
the headlight control is of minor importance during daylight driving, at low speed and
when the car is parked the kinetic energy is vital during night driving and high speed is
therefore an important hazard. Another hazard for this control may be fire due to e.g. heat
from the cablings to the headlight lamps in case of a short circuit.
R=fxC
where f is the frequency of the hazardous event and C is the consequence of the
hazardous event.
The risk cannot be directly measured and is the result of a judgement based on experience
of the hazards and the hazardous situations related to the target EUC. The methods for
evaluating the risk are usually systematic and qualitative and based on the expression R =
f x C. The procedure usually is to consider the EUC (e.g. vehicle dynamic function)
disregarding any protective (safety) measures and then divide the consequence parameter
and the probability of exposure parameter into more fine grained parameters. Examples of
25
such parameters are described in the following three sections of this report. Different
standards for functional safety may use different parameters.
The refined risk associated with an automotive control function may then be described as
Another method to assess the risk is to calculate the quantitative risk measure using e.g.
event trees. If this method is used the above described parameters are not relevant.
The result of a risk assessment may be qualitative or quantitative and is used for
determining the amount of protective measures that have to be added in order to reduce
the risk sufficiently.
4.2.2.1 Severity
This parameter denotes the consequence of a hazardous event. The more injury the
hazardous event causes a person, the higher severity level should be selected. The
severity is usually classified using the following parameters or similar:
S0 – No injuries
S1 – Minor injuries
S2 – Severe and non recoverable injuries
S3 – Fatal injuries
4.2.2.2 Exposure
This parameter denotes how often a person is situated in a hazardous situation and is
usually expressed as a frequency. This measure mitigates the total risk, even though the
severity may be very high for a hazardous event the risk becomes fairly low if it is very
improbable that any person is present in the hazardous situation. For example: If the risk
of failures related to the steering wheel is considered it is more likely that a driver
becomes exposed (and thus injured) to the hazardous event if the failure occurs when the
car has a higher speed than if the speed is lower.
Depending on what type of equipment is under consideration one of the above parameters
will be more applicable than the other.
26
4.2.2.3 Controllability
MISRA argues that the hazard classification suggested in the IEC 61508 standard is
unsuitable for automotive applications [MISRAcontr]. MISRA suggests the concept of
"controllability" to describe the ability of the driver, another vehicle occupant, or another
person interacting with the system to control the safety of the situation following a
failure. (See figure 11.) "Controllability" is recommended to be used for in-vehicle
systems, roadside systems and integrated traffic control systems.
Accident
Loss of control
Safe state
Failure
Figure 11. Event tree describing how a failure may result in an accident
The level of system inter-dependency describes how much other systems are relying on
the correct functioning of the subsystem. Full functional interdependency means that
other systems are operating on data provided by the faulty system. Autonomous system
means that no inter-dependency exists.
The loss of authority or control due to the hazard relates to the faulty system. The effect
ranges from fully lost to no effect on authority/control.
The provision of backup or mitigation relates to other functions outside the faulty system.
Full redundancy or diversity means that other functions are available outside the
boundaries of the faulty system. But if no other functions are available there is no
mitigation or backup.
The reaction time is the speed with which the driver must be able to recognize that a
change has occurred, work out what can be done, and apply corrective actions. In worst
case, the reaction time required will be much faster than humanly possible.
The standard IEC 61508 defines SIL 1 up to SIL 4, where SIL 4 corresponds to the most
severe demands. A safety function that fulfils SIL 4 has a very low probability of not
working correctly and is developed with very great care. In situations with lower risks it
is acceptable to choose a safety function of lower SIL i.e. that is more economic to use.
Therefore, the same device, machine or vehicle can have safety functions with different
SIL demands. If all safety functions are controlled by the same control system the highest
SIL requirement will be the guiding one, i.e. the control system must be designed for the
highest SIL. In certain cases, however, it can be good economy not to design the safety
functions better than they need to be.
The specification of SIL can be based on the assessment of risk parameters [IEC 61508]:
– consequence of the hazardous event (C);
– frequency of, and exposure time in, the hazardous zone (F);
– possibility of failing to avoid the hazardous event (P);
– probability of the unwanted occurrence (W).
28
A risk graph can be used as a qualitative way to specify SIL. (See figure 12.)
The safety levels are defined by means of the probability of a dangerous failure of the
safety function (see table 2) but this is only part of the content of the standard. Great
importance is also attached to methods in order to avoid design faults and methods in
order to deal with faults that occur during operation. The table differs between continuous
use of safety functions and functions that are seldom used.
The draft ISO 26262 expresses the target values for random hardware failures of different
automotive safety integrity levels (ASIL). (See table 3.)
When designing a system there is always to some extent possible to make a choice
between run time concepts and design time methods. If, for example, it was possible to
get error free software, no run time error detection for software errors would be needed.
However, software designed following a good design process will most likely have less
design errors and will therefore require less run time checking in order to fulfil the
requirements of a certain safety integrity level. Methods dealing with minimizing errors at
design time are not further discussed in this chapter.
Functional safety concepts then means that the safety concepts are intended to assure the
safety of a function. However, a function can be small and limited like the measurement
of a sensor value or large and covering a very complex function, like for instance the
complete control of petrol engine.
Normally error detection and some kind of management of errors are used to implement
the functional safety concepts. Fault tolerance for transient or permanent errors might be
necessary. In order to detect errors different levels of independence might be required.
Error management might also imply different levels of independence. A special class of
independence is redundancy.
It is normally a very important design decision to decide the granularity of the functional
safety concepts. Shall they cover small items or large? How shall the functionality of a
system be organised in order to simplify the allocation and design of the safety concepts?
Techniques and guidelines for doing a good design with respect to safety concepts
implementation are not treated in this report.
30
Further a limitation in this chapter is that we only deal with safety concepts for use in
electronic control systems for vehicles i.e. typically a microcontroller, some electronics,
sensors and actuators several ECUs connected with networks etc.
It is also assumed that a function oriented design method for safety critical systems like
proposed in the IEC 61508 standard and the ISO 26262 coming standard is used. It is
assumed that a Preliminary Hazard Analysis is made and that different safety integrity
levels have been allocated to functions with some granularity. IEC 61508 uses SILx and
ISO 26262 uses ASILx to denote different safety integrity levels. The opposite to this is
to first design a system and it´s functions and then afterwards use FMEA or other
methods to analyse the safety of the system.
There are several problems with this approach. One is that a fault tolerant platform can be
very complex and expensive. Another is that it can never be made completely fault
tolerant to all types of errors. What about a software design error in a function or a
requirement error?
Of cause all computing platform must have a certain level of robustness towards errors
but it will still be necessary and more cost efficient to deal with many types of errors at
the functional level. Then only the most safety critical functions have to use the most
costly error detection and handling mechanisms.
The right design process is to always start with a defined fault models coupled to different
integrity levels. Errors can always be detected at different levels in a control system and it
has to be decided where to detect the errors i.e. define the fault model.
A goal for a good fault model is that the likelihood to detect all types of relevant errors
that might lead to a functional failure, is high. A fault model on the other hand must not
be too complicated. Then the implementation of safety concepts will be difficult.
A fault model for functional levels has to make sense for typical functional level items.
For example a bit flip in a program memory cell does not make sense to use in this kind
of fault model. It is hard to make any coupling to how this bit flip affects a function. The
full scale from no effect at all to that the function becomes erroneous and cannot be used
is possible.
31
It might have to be mentioned that the original cause of an error in principle is irrelevant.
If all essential errors can be detected at the functional level, errors occurring at lower
levels are irrelevant. If they do not affect the safety critical functions it is not necessary to
pay any attention to them.
In the same way it is often irrelevant whether the root cause is an electronics hardware
error or a software error. Furthermore, when carefully analysed electronics hardware
errors and software design errors have much more in common that can be expected.
Design errors in well tested software, tends to manifest much like transient errors in
electronics hardware. They occur in very rare use cases and occur very seldom. Transient
errors in electronics hardware, often depends on design errors and occur seldom in rare
driving situation (for example RFI). Today’s microcontrollers are very complex and
there is most likely no existing microcontroller without a lot of remaining design errors.
These errors, behaves just like software design errors.
It is well known that for different parts in a typical vehicle control system different failure
probability levels can be achieved. For example simple pushbutton sensors have a much
higher expected failure probability than for example a MOSFET transistor. There will be
differences between sensors, actuators, ECU electronics, processing within a
microcontroller, data storage, communication in vehicle networks etc.
Therefore different integrity levels will have different failure models. The lowest SIL or
ASIL will have smaller failure models than higher SIL and ASIL levels.
32
Another important aspect is transient and permanent errors. In most control systems
transient errors are much more common than permanent errors. In automotive
applications it is of high importance to recover from transient errors. It will be very costly
for a vehicle manufacturer if transient failure recovery does not work properly. A lot of
vehicles will then be inoperable without any reason.
The ways to detect errors in electronic control systems for vehicles are numerous. Some
methods especially useful to detect errors at functional levels are:
• comparison to static limit values
• comparison to predicted values
• parallel execution of another control algorithm
• check sums on variables
• counters connected to variables
• feed back from actuator behaviour
• feed back from vehicle behaviour
Error detection might also require a certain level of independence as explained below.
The importance of transient error recovery makes it necessary to have specific treatment
of transient errors. Software is often the most efficient way to handle transient errors. A
certain level of independence might be required as explained below.
It is all a matter of the nature of the safety critical function and the characteristics of the
control system. If the control system operates with a much higher control periodicity, than
the reaction time of the mechanics to be controlled, it is often easy to design an efficient
transient handling. Otherwise it might be more complicated.
It is also necessary to recover from an error that has been treated as permanent but
disappears. Again counters can be used together with number of errors or error frequency.
33
The required handling of permanent errors depends on the function to be handled. Often
the function can be shut down. It might be possible to operate the vehicle without it.
Another common situation is that limited functionality can be used. For example a
braking system with ABS can enter a mode where only braking without ABS is possible.
Full functional performance despite the presence of errors and requirements for
redundancy in the control system is rarely necessary in vehicle applications. If possible it
is avoided due to cost. Examples might be that electrical power for electrical braking
systems needs a redundant solution.
Also handling of permanent errors might require independence as discussed below.
4.3.4.3 Independence
Both error detection and error handling might require a certain level of independence at
the concept level. It is a design choice per each SIL or ASIL level what level of
independence that is required.
Many types of independence can also be achieved using diversity during the design
process but as explained earlier this is beyond the scope of this report.
The aim of the functional safety concept is to specify functionality and safety integrity. It
is not aiming at technical design details.
34
This specification of the basic functionalities is called the overall safety requirements by
standard IEC 61508.
The functional safety concept may often be specified in natural language. Mathematical
or formal expressions may also be used. Experience shows that clear and unambiguous
specifications are important. A simple and easy-to-understand specification of the
functions important to safety should be useful for all personnel working in the
development project.
The development, integration and safety validation phases of the overall safety lifecycle
can be seen as a detailed hazard analysis. This report summarises the activities as system
development, hardware development, software development and verification and
validation.
Experience shows that it may be difficult to realize when the functional safety concept
turns into the technical safety concept. The main reason for this is that the development
engineer has prior knowledge of the implementation of similar systems. Too many
technical details seem obvious already at the concept phase.
But technical details should be left to the development phase. The technical safety
concept uses the functional requirements to describe how the technical architecture and
the parts of the system will fulfil the safety requirements.
These failures may be difficult to detect and it is therefore important to start to apply
preventive methods very early in the development in order to reduce the probability of
their occurrence. The methods for handling systematic failures may according to IEC
61508 be categorized in:
Examples of failures that may be introduced during the requirement specification may be
misunderstanding of the result from the hazard and risk analysis or of the intended use of
the target item (vehicle).
Examples of failures that may be introduced during the development are logical design
mistakes in the circuit diagram or mistakes in the layout of the printed circuit board.
Methods for the production of the programmable electronic control system (PES)
The production of the PES is an advanced process related to many potential sources of
failure. The same methods as for the integration (see below) are applied in order to avoid
the introduction of failures.
Examples of failures that may be introduced during the production are that the mounting
machine turns a certain passive component in the wrong direction, the soldering on a
batch of PES is poor and the etching of the PCB is erroneous.
37
Examples of failures introduced during integration of PES may be that an older version of
the PES is installed in the vehicle instead of the intended PES, the installed PES is
supplied from the wrong power line (assuming more than one) or a safety related sensor
is connected to the wrong analogue input of the PES.
One example of a failure that may be caused by the driver is to take advantage of the
vehicle safety systems in order to drive faster. Thus the protection will be lowered.
Another example is if the incorrect version of embedded software is downloaded into the
ECU during service at the garage.
Fault detection
Programmable Electronic Systems (PES) have the potential of detecting faults in the
hardware before a fault is manifested as a failure of the system. The techniques and
measures used focus on different parts of the electronic hardware and may require
different amount of system effort. It is regarded as state-of-the-art to implement
techniques for fault detection in PES used in safety-related applications. The
dependability of a system increases by detection and handling of faults.
The best case is if a fault does not affect any safety-related function, and is detected by
internal self-checks of the system. An example of such a "safe fault" would be if memory
cells containing texts for displays are unintentionally changed, but detected by internal
background checksumming of the memory.
The techniques and measures implemented to find permanent faults in parts of the
hardware will also be efficient to find transient faults. Transient faults due to
environmental disturbances or software failures often have greater failure intensity than
the permanent hardware faults. It will be of secondary importance to state if the measures
are implemented for detection of permanent or transient faults.
38
Control of failures
In certain applications is it enough to detect a permanent hardware fault or a transient
fault and then issuing an alarm. More critical applications require the fault to be handled
before it causes a dangerous failure. This can only be achieved by applying redundancy.
There are different kinds of redundancy:
-Time redundancy (e.g. repeated data processing or reading of an analogue input)
-Information redundancy (e.g. checksums)
-Physical redundancy (e.g. additional hardware)
The selection of redundancy measures for parts of the control system is usually referred
to as architectural constraints. The architectural constraints of the system depend on the
result of the hazard and risk analysis (or on requirements of availability). They are usually
divided into two main issues to determine the level of hardware fault tolerance and the
behaviour at fault.
Behaviour at fault
Defines how the control system shall react when different faults are detected. Usually
there are one or several different so called safe-states defined to be entered when different
types of faults occur. A safe-state is a special operational state in which the system
performs a pre-defined action which is defined as safe and which the system cannot exit
until the fault is removed. Depending on the hazard and risk analysis in conjunction with
the intended basic functionality the most suitable behaviour at fault may be determined,
e.g.
-The safety related control function shuts-down and becomes disengaged.
Such a control system has no availability but usually requires a lesser amount of
redundancy.
-The safety related control function forces the outputs to a predefined value and maintains
this value.
Such a control system has a low level of availability although it usually requires fairly
much redundancy. The operation of the system becomes highly degraded when entering
the safe-state.
-The safety related control function reduces the functionality strongly, only allowing a
very small set of “safe” output combinations.
Such a control system has a medium level of availability and usually requires a lot of
redundancy. The system operation becomes medium degraded when entering the safe-
state.
-The safety related control function disengages the faulty part of the control system and
continues to operate according to the specification.
Such a control system has a high level of availability and usually requires very much
redundancy. The system operation becomes completely or almost non-degraded when
entering the safe-state.
39
The most common fault model used starts with a fault which is the actual defect itself and
which cannot be measured nor predicted. The consequence of this fault leads to an error
(e.g. an erroneous signal state or current) which is measurable. The consequence of this
error is a new functionality (or malfunction) which was not intended or specified. This
new function is called a failure (i.e. the system fails to perform the specified function).
This fault model is recursive so that a failure of a subsystem may be considered as a fault
in a higher system perspective.
Examples of faults:
- the short circuit of a resistor (at a detailed level)
- the omission of a CAN-message (at a sub-system level)
- the loss of one out of two hydraulic brake circuits (at a system level)
The above described fault model is theoretically correct but may in a real development of
a PES be infeasible in order to ensure that enough integrity has been achieved and has to
be complemented with other measures.
For example, consider a microcontroller (or any other complex integrated circuit). Even
though a redundant architecture is used, by a parallel microcontroller, is it impossible to
prove that these two microcontrollers truly are redundant for any internal fault that may
occur: This is due to the complexity of the resulting failure which in some cases is very
difficult to foresee, especially if the function of the software is also regarded. Another
aspect is that the fault model does not regard the quality or the de-rating of the selected
components.
For in-depth information about basic reliability theory, please refer to [MIL-HDBK-
338B] and [Goble].
R(t) + F(t) = 1.
The mean time to repair MTTR [h] (which sometimes is called the mean down time
MDT) is the expected value of the random variable “repair time” and includes both the
time to detect the failure and the actual repair time required to restore the system. The
probability that the system becomes repaired after a failure is defined as
μ = 1/MTTR.
U(t) = 1 – A(t).
Probability distributions
The Probability Density Function (PDF) relates the value of a random variable to the
probability of getting that value or value range.
If the PDF is represented as a continuous function the integral of this function is the
Cumulative Distribution Function (CDF). More generally, the CDF shows how
probabilities are distributed on events, not necessarily due to time. The mathematical
relationship between PDF and CDF is:
x
CDF ( x) = F ( x) =
−∞
∫ PDF ( x)dx where x is a continuous random variable (e.g. time t
for reliability analysis of electronics)
The normal distribution may be applied for e.g. measurements of product strength and
external stress. For example: To determine the probability of deviation from an expected
measure. This distribution provides a non-constant failure rate.
1 t −μ 2
1 − ( )
PDF (t ) = e 2 σ
σ 2π
The lognormal distribution may be applied for modelling the completion of human
activities such as repair rates or to model uncertainty in failure rate information. This
distribution provides a non-constant failure rate.
1 ln( t ) − μ 2
1 ( )
PDF (t ) = e 2 σ
σ ⋅ t 2π
The Weibull distribution is a more general distribution due to its parameters which may
be used for estimating other distributions. An example is when an electronic component
is exposed to e.g. wearing causing a non-constant failure rate.
t −γ
β t − γ β −1 −[( η )β ]
PDF (t ) = ( ) e
η η
42
The exponential distribution is the simplest distribution which has the following
probability density function:
PDF (t ) = λe − λt
and the CDF(t) = the unreliability function F (t ) = 1 − e − λt where λ is the failure rate
(which also is constant, see 5.2.4 below). The reliability function for the exponential
function is R (t ) = e − λt . It can be shown that F (t ) = 1 − e − λt can be approximated with
F (t ) ≈ λt when λt is small. This approximation should be used with caution because it is
only valid when λt is small. However, it may be used in most cases for electronic
components/circuits since their related failure rates often are very small. This may not be
the case for e.g. mechanic or hydraulic systems because their failure rates often are much
larger than for electronic components.
Generally the instantaneous failure rate is λ(t) (which is also known as the hazard rate
d
F (t )
function h(t)) and calculated as: λ (t ) = dt
R (t )
The life of an electronic equipment or system can be shown as a failure rate versus time
curve (which should not be confused with the PDF) which for this type of technology
usually shows the characteristics of a bath-tub as shown in figure 13. Some types of
systems or technologies are characterized by other curves such as the roller-coaster curve,
but the bath-tub curve has been generally accepted for electronics over the years.
Failure
rate
WEAROUT
Time
Infant mortality
Useful life
The bath-tub curve describes the average failure rate of a population of items in time and
is divided into three phases where the first denotes the items failure rate in the early
product life. In this phase several products suffer from e.g. defects introduced by the
manufacturing process. Therefore the failure rate is initially high but decreases rapidly. In
the next phase most of these defects are removed and the failure rate becomes more or
less constant for the population. In the last phase the population has aged by use and the
failure rate increases.
43
The different phases in the bath-tub curve (or any other failure rate versus time curve)
may be characterized by different probability distributions such as:
Infant mortality phase: e.g. Weibull-distributed failure rates
Useful life phase: e.g. Exponentially distributed failure rates
Wear-out phase: e.g. Normal distributed failure rates.
Depending on the engineering practice of the target system/equipment and the source of
failure rate data the different phases are more or less dominant. For electronic
components/circuits the period of more or less constant failure rate is the longest period
and therefore the exponential distribution is most commonly used. For certain
components other distributions may be more suitable, but this is not further considered in
this report.
For most electronic components there is a statistically determined period of time called
useful life (or θ - life expectancy), see figure 13, during which the failure rate is assumed
to be constant. When this time period elapsed the component should be disposed because
of wear-out.
When the wear-out period begins depends on several factors such as how the
equipment/component is used due to its ratings. In a larger system where different
components have different lengths of useful life the different components will cause the
wear-out failures to occur at random times. This results in an overall constant failure rate
and an exponential behaviour.
The proof test interval (T) is the time interval for which the developer ensures that the
estimated failure rate for the product is valid. The proof test is intended for detection of
dangerous failures and in that case to restore the system in an “as new” condition or as
close as practical to this condition. Such a test may however never be exhaustive since it
is not possible to test the reliability of single electronic components. Even though proof
tests are carried out with fairly high frequency the reliability graph of the actual system
will decrease during the mission time as in figure 14.
Figure 14: System reliability with proof tests performed without finding dangerous
failures
Therefore it is in practice common to consider the proof test as the actual mission time
and to replace the system (as many parts as practical) when the proof test interval has
elapsed as shown in the second graph in figure 15.
44
During the development of a safety related control system the most usual means for
obtaining failure rate data for electronic components are to use a reliability prediction
handbook. An example of such a handbook is the [MIL-HDBK-217F]. In time, when the
product has existed on the market, some of the predicted failure rates may be refined due
to statistical testing. It is although important to keep in mind that a major part of any used
reliability data source for a product is predicted (i.e. not measured or observed) and
therefore is related with some uncertainty.
The reliability data prediction handbooks do not guide on how to determine the useful life
time for all categories of component families, so the life time expectancy has in most
cases to be determined by engineering experience or from statistical tests of products.
When the failure rate (λ) of an electronic component is determined the system failures
(effects) caused by the components different fault modes are categorized as safe or
dangerous according to:
- faults leading to a safe state
- faults leading to a dangerous state
The corresponding failure rates may be described as λS ("safe failure rate") and λD
("dangerous failure rate"). (See figure 16.)
λTOTAL = λS + λD
λS λD
It is necessary to categorize the faults into different groups depending on how they affect
the safety function and if they can be detected by self-checks:
- dangerous undetected faults
- dangerous but detected faults
- safe undetected faults
- safe and detected faults
45
The failure intensities of the different types of failures (see figure 17) are called
- λsd ("safe detected")
- λsu ("safe undetected")
- λdd ("dangerous detected")
- λdu ("dangerous undetected")
λS λD
λSD λSU
λDD λDU
Figure 17. The total failure rate divided as “safe”, “dangerous”, “detected” or
“undetected”.
The most cumbersome faults are the faults which are dangerous but undetected.
Failure rate is often expressed in the unit FIT (Failure in Time). One FIT equals
10-9 failures/hour.
∞
The mean time to failure MTTF is defined as: MTTF = R (t )dt∫0
The MTTF is a statistical measure which should be handled carefully and shall not be
confused with the useful life as described in the following example:
A linear circuit has a predicted failure rate of 50 FIT which gives MTTF = 2300 years.
The MTTF should be read as if 2300 such linear circuits operated continuously for one
year is it likely that at least one of them has failed. The MTTF is not a minimum
guaranteed life time of a single component.
46
The value MTBF (Mean Time Between Failures) is used to describe the elapsed time
between failures.
when MTTF >> MTTR (the usual case) will make it possible to approximate
MTBF ≈ MTTF
Calculations regarding dangerous failures often use the value MTTFd ("Mean Time To
Dangerous Failure"). This value describes the mean time to dangerous failure of a
subsystem.
If the failure rate is assumed to be constant the relationship between failure rate and
MTTF is:
1
λ = [failures/hour]
MTTF
Since MTTF >> MTTR (usually), the failure rate may be expressed as
1 1 1
failure rate λ = = ≈ [failures/hour]
MTTF MTBF + MTTR MTBF
The probability of dangerous failure per demand (PFDd) is another commonly used
quantitative measure which applies for systems/functions with non-continuous operation.
Such systems are not so common in road vehicles where most safety-critical systems are
required to be continuous in operation. As for the PFHd the PFDd is a function of the
dangerous failure rate and the mean down time PFDd = f(λd, MTTR) and is calculated by
similar methods as PFHd. Generally the PFDd is the average of the total system
cumulative distribution function over a limited time period. The PFDd calculation may be
carried out using a Markov model for calculating the average probability that a transition
will occur to a specific (dangerous) state e.g. n times during the proof test interval.
47
Self tests are built into systems and operate automatically without being noticed by the
user before a fault is detected. Simple tests will not detect all hardware faults. Elaborate
tests will detect many hardware faults at the cost of much processing effort spent. The
diagnostic coverage, DC, for safety-related applications is defined as the fractional
decrease of the probability of dangerous hardware failure resulting from the operation of
the automatic diagnostic tests. [IEC 61508-4, clause 3.8.6] If the test detects all faults, the
coverage will be 100%. If no faults are detectable, the coverage will be 0%.
The diagnostic coverage is a measure of the efficiency of the self tests. It can be
expressed either for a complete control system or for a subsystem. It may also be
calculated as
diagnostic coverage DC =
∑λ DD
[%]
∑λ D
where λDD is the failure rate for dangerous detected faults and λD is the failure rate for
dangerous failures. A DC=91% means that 91% of the possible dangerous faults will be
detected.
The DC may be expressed for the whole safety-related system, or for parts of the system.
The DC may typically be determined for a sensor, an ECU or for the final control
elements.
It may be hard to find numerical values for the probabilities of different faults. It is
possible to make a numerical calculation of the coverage of some methods. The coverage
of other methods may have to be expressed in qualitative ways such as
”high/medium/low”. An estimation of the diagnostic coverage will be needed to be able
to compare two diagnostic test methods.
Medium
Low High
0 60 90 99 100 [%]
When numerical values are needed in calculations, 60% is used for “low” coverage, 90%
is used for “medium” coverage and 99% is used for “high” coverage. A number of
assumptions are used at the quantification of the diagnostic coverage for different
methods of fault detection. It is not possible to state a probability that will be valid in all
cases for all hardware components. The lack of data concerning the various types of
memory chips, and the assumption that the potential faults are equally distributed
introduce a number of uncertainties. The probability of different faults in the processing
unit will depend on the type of processor, the manufacturer, the production process, the
design etc. Faults in the programme sequence will have different probabilities depending
on the programming language, the experience of the programmer, the testing effort etc.
The most valid estimation of diagnostic coverage for a fault detecting method should at
this stage be limited to one of the three levels referred earlier in this section; low, medium
or high. The level chosen may be different if probability, or numbers of errors, is used for
the definition of diagnostic coverage. However, the level will be the same if all faults are
equally probable.
SFF = (safe failures + dangerous detected failures) / (dangerous failures + safe failures)
λ s + λdd
SFF = [%]
λd + λs
The safe failure fraction is taken into account when determining the architectural
constraints on hardware safety integrity according to standard IEC 61508-2.
49
λS λD
λSD λSU
λDD λDU
”Safe”
The SFF=100% for an ideal system. All faults are regarded as “safe” or as being detected
by the automatic self tests. Such a system hardly exists in reality. But the intention is
always that the majority of faults must not cause a failure of the system.
The techniques and measures will have different coverage. Systems with an expected
high level of risk reduction are expected to use techniques with high coverage, while
systems with an expected moderate risk reduction are expected to use techniques with
low or medium coverage.
System
System
design Validation integration
and test
Validation
Software Sofftware safety
Safety Verification acceptance test
Requirements
Verification
Architecture Software
Verification integration
design and test
Verification
Verification
Implementation
It is difficult to calculate a number for the reliability of a software package. The use of
numerical values to describe the software failure rate should be avoided. The basic
principle used to develop safety-related software is to choose sufficient development
techniques and development methods. The techniques and methods are used to avoid the
introduction of systematic faults in the software. They will also introduce mechanisms to
detect and handle faults during operation of the system. A software package of high
integrity requires stringent development methods to be applied. The application of several
development methods to the same piece of software will also help to increase the
integrity.
A software package with limited influence on functional safety will also require a well-
structured development procedure. But the development techniques applied may require
less effort and leave less support. However, the software is regarded as important to the
functional safety and shall be developed to a certain minimum standard.
Among the items listed in the software safety requirements specification are
[IEC61508-3, clause 7.2.2.11]:
a) functional requirements
– functions to enable the system to achieve or maintain a safe state;
– functions related to the detection, annunciation and management of faults in the
programmable electronics hardware;
– functions related to the detection, annunciation and management of sensor and
actuators faults;
– functions related to the detection, annunciation and management of faults in the
software itself (software self-monitoring);
– functions related to the periodic testing of safety functions on-line;
– functions related to the periodic testing of safety functions off-line;
– functions that allow the system to be safely modified;
– interfaces to non safety-related functions;
– capacity and response time performance;
– interfaces between the software and the electronic control unit.
There are also several techniques and measures available to verify the software safety
requirements specification.
There are also several techniques and measures available to verify the software
architecture and design.
The software implementation techniques can also depend on the size of the system.
Development of small systems may combine the architectural design and the detailed
software implementation.
Computer aided design tools, semi-formal methods, formal methods, design and coding
standards and modelling are examples of applicable techniques and measures.
[IEC61508]
There are also several techniques and measures available to verify the software
implementation.
The testing and integration shall be specified during the architectural and detailed design
phases. A test plan and test specification shall be produced. The performed integration
tests shall be documented.
Functional tests, performance testing, interface test and simulation are examples of
applicable techniques and measures. [IEC61508]
Support of software safety requirements can be found in clause 7.3 of IEC 61508-3 and in
ISO 26262-6.
Support of software architecture and design and software implementation can be found in
clause 7.4 of IEC 61508-3 and in ISO 26262-6.
Support of software integration and test can be found in clause 7.5, 7.7 and 7.9 of IEC
61508-3 and in ISO 26262-6.
53
The overall safety lifecycle specified by the IEC 61508 standard is chosen as a basis for
the validation work. Specifically the following activities are connected to the validation:
The hazard and risk analysis will point out the risks and form the foundation for the
design of the safety-related system.
The safety requirements are needed as input to the validation activities. All safety
functions and their corresponding safety integrity levels must be listed. Unnecessary
requirements should not be introduced. The traceability of sources must be documented to
enable identification of all requirements.
The validation plan is developed in parallel with the realisation. It specifies how the
overall safety validation shall be carried out. Test cases, validation methods, pass/fail
criteria etc. are specified.
The overall safety validation is the activity to confirm that the right system has been built.
54
The safety case collects all safety evidence from the verification and validation. It also
lists the safety requirements. A safety case reports more than the safety evidence
generated by verification and validation. Examples of additional safety arguments are the
use of an adequate development methodology and skilled staff.
Safety requirements
”Toolbox” with
validation methods
Validation plan
Safety Certi-
Documentation of argu- ficate
previously performed ment
verification
Test report
The validation methods have to be combined together in a validation plan. (See figure
21.) The plan shall list requirements and validation methods. A validation procedure is
useless without solid safety requirements. Both the safety functions and a measure of
their performance (or integrity) must be specified. Activities performed earlier during the
verification in earlier phases of the development work may also serve as evidence for
adequate safety.
55
Different validation methods are applicable at different stages of the development life
cycle. The overall safety validation is, according to the overall safety life cycle,
conducted after the realisation and installation of the safety-related system. There are also
other phases of the life-cycle that are important for the validation. Techniques and
measures applied in other phases than "the overall safety validation phase" will contribute
to the safety validation.
The safety validation has also to cope with the fact that the suppliers of the subsystems
perform the validation of the subsystems. The automotive manufacturer will validate the
safety of the total system. Thus the result of the validation of the subsystem will be an
input to the validation of the total system.
A large number of techniques and measures exist for safety validation. It will be
necessary to recommend a limited number for use in automotive applications. But it
cannot be expected to find a set of techniques and measures applicable for all automotive
systems. The different realisation techniques and the different types of systems will
require several available methods.
Overall safety validation is performed as a specific phase after the realisation of the
system, to confirm by examination and provision of objective evidence that the particular
requirements for a specific intended use are fulfilled. [IEC61508-4, clause 3.8.1]
Validation is the activity of demonstrating that the safety-related system under
consideration meets in all respects the safety requirements specification for that safety-
related system.
Results of both the verification and the validation (V&V) may be used as evidence to
demonstrate why a certain device or system may be considered safe enough for its
intended use.
The verification and validation activities of the project are integrated partsof the
development work. Several of the activities have to be performed at a certain phase of the
development life cycle as a confirmation to continue the development work. It may not
always be suitable to wait for confirmation until the overall safety validation. Late design
modifications will be expensive and time-consuming.
Functional safety assessment is not the same as verification and validation. The functional
safety assessment is an independent activity to investigate and arrive at a judgement on
the functional safety achieved by the safety-related systems. It shall be carried out
throughout the lifecycles, and may be carried out after each safety lifecycle phase or after
a number of safety lifecycle phases.
56
The different V&V activities for the system [26262-4], the hardware [26262-5] and the
software [26262-6] are interpreted in the overall safety lifecycle for the automotive
industry and illustrated in figure 22
Compliance with standards for functional safety requires all aspects of the standard to be
considered. Most standards address both the product properties and the properties of the
development process.
Functional safety
assessment
1 Concept
Concept
2 Overall scope
definition
4 Overall safety
requirements
Verification of
5 Safety req.mnts safety requirements
allocation
Software
Safety hardware integration
integration and Overall 9 Realisation Other and test
validation planning E/E/PES tech.
6 7 8 10
Software safety
1 Overall validation
2 installation Product
Extern.
development
risk
1 Overall safety reduct. Safety validation
3 validation
11
1 Operation,
4 maintenance Modification
and retrofit
After
1 Disposal 15 start of
6
production
Figure 22. Verification and validation activities in the IEC 61508 overall safety lifecycle
57
Safety req.
allocation
Description of
architecture V&V
of Reports of tests
Hardware
description hardware and analyses
safety
Hardware integrity
detailed design
V&V
Software of Reports of tests
description and analyses
software
Software detailed safety
design integrity
V&V
of Reports of tests
overall safety and analyses
Functional integrity
description
Assessment
Functional safety
Description of of assessment report
development safety on the overall
process life cycle safety life cycle
The pass/fail criteria shall be listed in the validation plan. Each safety requirement shall
be tested in the validation process and the passing criteria shall be declared. It is also
important to declare the person(s) who make the decision when something unexpected
happens, and to approve the result of the safety validation.
Use of pre-validated components must also be specified. A subsystem may already have
been validated for use with an intended interface. The objective would then be to make
use of the already performed validation of the component. Examples of pre-validated
components may be generic control systems, software packages, sensors or actuators. The
use of pre-validated components requires that they are used according to the specification
and in the way intended.
The validation plan should be developed in parallel to the activities to implement the
hardware and the software of the system.
59
The persons, department or organisation responsible for performing the validation should
be specified in the validation plan. The degree of independence from the design team
should be explained. High-integrity systems may require validation by an independent
organisation. Systems for less critical applications may be sufficiently validated by a
person not taking active part in the realisation of the system. Validation performed by the
design engineer should always be avoided for safety-critical systems.
7.1.1 Objectives
The functional objectives consist of
• Improved dynamic behaviour of the vehicle. The system should adapt to different
driving situations.
• Increased flexibility in terms of vehicle characteristics, allowing for different
driver preferences.
• Improved safety level for all driving situations.
Production objectives are
• Portable and scalable software- and hardware implementation.
• Low-cost solution.
• A control approach that, for any given situation, improves, or at least maintains
the safety level (in the chassis domain).
61
In order to switch between the modes offered by the system, an existing sport/comfort
switch is used. The value of this switch is distributed on CAN. The main part of the
system is the ECU that runs the control algorithms.
7.1.5 Software
7.1.5.1 Architecture
For the embedded ECU software, a general architecture that is heavily inspired by
AUTOSAR is used. An overview of this architecture is shown in figure 25.
Services
packing and unpacking, routing) RTOS
(Basic task
scheduling)
I/O Drivers
Communication Drivers
(MCU modules, PWM, ADC,
(FlexRay, CAN, RS232)
DIO)
Microcontroller
The idea is to deploy high level software components (such as control systems or other
applications) on a highly abstracted interface. The underlying services provide
standardized interfaces to communication, I/O etc.
All control systems are designed in Simulink. There are two such models – one for the
main, global controller and one for the local current loops that control each damper. The
resulting software components are C-language modules generated using Realtime
Workshop with Embedded Coder. They are deployed directly to the software architecture.
As previously described, the control systems require several CAN signals as inputs. To
enable the underlying communication services to extract the relevant signals for this
ECU, a vehicle database is provided. This database defines all the signals needed by the
control system. A tool is used to generate OSEK COM-compatible communication
services out of the signal database. The output from this step is a set of C-language
modules that expose a high-level signal interface to the software components.
Vehicle Signal
C-code CAN
Database, CANdb
Communication Executable Code
CANdb System
OSEK COM-compatible
Generator
C-code ODEEP
RTOS, Hardware
Abstraction Layer
(Drivers, Services, etc.)
This section describes how the item interferes with other systems in the vehicle and how
the item boundary is defined.
The SADS system has a number of electrical dependencies. Those that are not considered
part of the item itself are listed below.
• Power supply – Power is needed for system operation.
• CAN bus – Critical input data is read from the CAN bus.
Furthermore, included in the item itself are the following dependencies.
• CDC dampers – The four damper actuators, one for each wheel.
• Body accelerometers – The three accelerometer sensors that provide important
input data to the system.
Many input signals are read from the CAN bus. This means that SADS, i.e. the item, is
indirectly connected to, and therefore also depends on a number of other vehicle
components. These components are listed below.
• Anti-lock Braking System Module (CAN).
• CAN Interface Module (CAN).
• Engine Control Module (CAN).
• Transmission Control Module (CAN).
• Yaw Rate Module (CAN).
7.1.8.6 The hazards that can affect the safety and reliability of the item
What could affect the safety and reliability of the SADS system is incorrect damper
control. This includes both incorrect and total lack of compensation.
7.1.8.7 The driving situations and the operating conditions in which the
item can initiate hazards
In driving situations where the vehicle chassis is exposed to significant movement, the
SADS system could potentially initiate hazards. These situations are identified and listed
in the next chapter.
65
7.2.5.1 Scenario 1
Incorrect compensation during heavy cornering leads to loss of stability, which leads to a
collision.
[ds_1] x [hs_1] x [he_1] = E3 x C2 x S3
Safety goal: A malfunctioning SADS shall not cause loss of stability. ASIL B
Safe state: The driver shall be notified.
7.2.5.2 Scenario 2
Incorrect compensation during hard braking leads to loss of stability, which leads to a
collision.
[ds_2] x [hs_1] x [he_1] = E2 x C2 x S3
Safety goal: A malfunctioning SADS shall not cause loss of stability ASIL A
Safe state: The driver shall be notified.
7.2.5.3 Scenario 3
Incorrect compensation during hard braking leads to lengthened braking distance, which
leads to a collision.
[ds_2] x [hs_2] x [he_1] = E2 x C2 x S3
Safety goal: A malfunctioning SADS shall not lengthen the braking distance. ASIL A
Safe state: The driver shall be notified.
7.2.5.4 Scenario 4
Incorrect compensation during very rough road conditions leads to loss of stability, which
leads to a collision.
[ds_3] x [hs_1] x [he_1] = E2 x C2 x S3
Safety goal: A malfunctioning SADS shall not cause loss of stability ASIL A
Safe state: The driver shall be notified.
67
The fault tree shows some parts in the SADS-system that need special attention during
design and where design requirements for increased safety have to be set up.
Requirements are specified in standards and may differ between different safety integrity
levels (SIL or ASIL).
The checklists in table 4 and 5 may serve both as a support for specification of the design,
and as a checklist for validation of techniques and measures implemented to control
failures. Some of the listed aspects may not be relevant for all systems and may be listed
as "not applicable" ("N.A.").
System:
Target SIL/ASIL:
Component Ref. Req. App Techniques used DC
IEC ISO /
61508-7 26262-4 N.A.
Failure detection A.1.1 Clause 6
by on-line
monitoring
Comparator A.1.3 “
Majority voter A.1.4 “
Test by A.2.1 “
redundant
hardware
Dynamic A.2.2 “
principles
Monitored A.2.3 “
redundancy
Hardware with A.2.6 “
automatic check
Analogue signal A.2.7 “
monitoring
70
System:
Target SIL/ASIL:
Component Req. Req. App Techniques used DC
IEC ISO /
61508-2 26262-5 N.A.
Bus Annex A
CPU Table A.4 “
Interrupt “
Invariable Table A.5 “
memory
Variable memory Table A.6 “
I/O units and Table A.7 “
interface
Data paths Table A.8 “
Power supply Table A.9 “
Program Table A.10 “
sequence
Ventilation and Table A.11 “
heating
Clock Table A.12 “
Communication Table A.9 “
Mass storage Table A.13 “
Sensors Table A.14 “
Final elements Table A.15 “
71
PSA is a qualitative process, beginning with a model of the system, together with its
functional description, which is subsequently analysed to deduce any hazards associated
with the functionality and the outputs. Each hazard is assigned a Risk Classification, from
which a SIL is formulated for the system as a whole. In addition to the Risk
Classification, a set of High-Level System Safety Requirements is derived from the
analysis results, and this forms one of the outputs of the PSA, and inputs to the DSA
(Detailed Safety Analysis).
System
Functional System
Req. System Model
Modelling
Operating
Environment
Redefined Safety
Safety Envelope Hazard Envelope
Identification Hazard List
High-level safety
Risk Analysis Requirements
and System
SIL
Safety
Requirements Safety Argument
The following chapters are intended to define a set of folders in a PSA project binder.
Each of the folders describes an activity, and defines input and output documents. Major
chapter numbers are related to activities, and minor numbers to documents within the
activities. The documents are described with template forms. Checklists for the activities
provide guidelines on how to produce the outputs.
The table below summarizes the major (mandatory) document outputs. The documents
have a standard format, and are stored electronically in files with name:
[DOCUMENT_NAME]_issue[ISSUE_NUMBER].doc. Printout of each issue of each
document is to be stored in the project binder.
73
- The vehicle is considered to be equipped with all systems, which have electrical
interfaces to the brake system (maximum configuration) and are of interest for the
analysis.
Engine control unit
Automatic gearbox control unit
Instrument control unit
Light control unit
Suspension control unit
Vehicle control unit
- The vehicle is being operated in a manner that conforms with the drivers understanding
of how it should be used.
- The vehicle is not defective in any way other than the issues identified in the safety
analysis.
- The vehicle is being driven in a manner that does not significantly amplify the
consequences of a hazard, or provokes a hazard on its own.
Functional Description
Requirement
Brake control The system shall perform the control of the braking function of the
vehicle. The brake application versus pedal stroke shall be adjustable
by tuning of software parameters in order to meet the customer
demand of different “brake feelings” on different vehicle platforms.
The system shall be configurable to brake the vehicle with
deceleration control or with clamp force control using the same input
signal.
Slip control The wheel brake shall be able to control the wheel slip with an
algorithm based upon the wheel speed information and a calculated
vehicle reference speed.
Load The system shall distribute brake force according to the axle load of
proportioning the vehicle. The level of load proportioning can be based on external
signals or fully by a calculated value.
Parking brake The system shall include a parking brake function.
Battery The system shall know the status of the batteries either by use of an
management external subsystem or by integrated functionality. If the system
detects a low power condition the system shall be able to set itself to
a safe default state.
External brake The system must have an input for an external brake demand.
command
Diagnostics The system shall interact with the vehicle diagnostic system over
standard serial bus or / and be able to control a standard driver
interface with warning / error lamps.
Non-functional Description
Requirement
Brake response The delay time from the initiation of a brake application until the
vehicle starts to brake shall be less than x ms. The brake torque shall
be controlled with the accuracy of + x Nm. The minimum brake
torque (threshold value) shall be less than x Nm. The brake torque
application rate shall be controlled within 0–x kNm/sec.
Failure handling Any single failure in the system may not affect the system more than
it reduces the brake performance of the vehicle by max. 25%. All
brakes shall if possible be released if required. If simultaneous
failures occur in the system they shall not affect the system except
reducing brake performance of the vehicle by max. 50%. Any
multiple faults should be handled in the safest way possible by the
system. An alternative activation of the brakes is in this case allowed,
i.e. if a brake pedal activation results in no braking, use of the parking
activation is allowed.
Lifecycle The expected life of the brake system without any maintenance shall
be more than x years or more than x00 000 km.
Environment The brake system shall operate in ambient temperature from -45°C
(snow and ice) to +125 °C. Altitude up to 2500m. Vibrations to a
level that could be expected in a normal installation shall have no
effect on the brake system.
Regulations The brake system shall comply with regulations ECE-R13.
(71/320/EEG)
76
The objective of the concept phase of the overall safety lifecycle is to develop a level of
understanding of the EUC and its environment (physical, legislative etc.) sufficient to
enable the other safety lifecycle activities to be satisfactorily carried out [IEC 61508,
clause 7.2.1].
The objective of the overall scope definition phase is to determine the boundary of the
EUC and the EUC control system; and to specify the scope of the hazard and risk analysis
(for example process hazards, environmental hazards). [IEC 61508, clause 7.3.1].
By its very nature a model must be an abstraction, since the only “model” that can be
identical to the system is the system itself. It is therefore necessary to choose the
abstractionso that it highlights the features necessary for the particular task. Although
some definitions of a hazard limit themselves to physical situations with a potential for
human injury, in practice one should include all situations that can threaten people,
property and the natural environment; thus any model that is used as a target for a PSA
and/or a PHA should highlight the boundary between the system under consideration and
those enitities that might suffer from the hazard and the interaction between them.
System boundaries
The system components and system boundaries are illustrated in Figure 29. Note that this figure only
shows logical connections without any details of the system realization. The batteries are excluded
from the zone of responsibility since they are likely to be part of several other subsystems (beside the
brake system). It will therefore fall within the responsibility of the vehicle OEM. The target of
evaluation (TOE) includes only parts of the brake units since this safety analysis focuses on system
properties. The electrical/logical parts are included while the mechanical parts are excluded.
System interaction model
The interaction of the system (TOE) with its environment is illustrated in Figure 30. The terminator in
the brake units is defined to be the drive shaft that transfers torque to the gear. The corresponding
boundary elements are, the DC-motor and the electro-magnet that holds the parking-brake spring.
Figure 31 is a passport diagram, which shows how the boundary elements are transferring data (in a
wide sense) to/from the interior of the system.
Wheel Wheel
HMI
Communication
Power
Battery
EBA EBA
Wheel Wheel
Figure 29. System boundaries. Note that power and communication systems are illustrated
schematically. The details on implementation and configuration (redundancy, bus types, etc) is left
open at this stage.
78
Charger
Driver unit
Pedal Battery
HMI
Vehicle Bus
subsystems connector
TOE
Electro-
magnet
PositionSe
nsors
Figure 30. System interaction. Boundary elements within the target of evaluation interact with
terminators outside the TOE boundary.
79
Electric
Battery power
Signals from
HMI switches and
buttons
Pedal Kernel of
the TOE Commands and
Pedal
information
position
from external
systems Bus
connector
Bus Commands
connector and
information
from
external
systems Electric
power
Electrical
actuator
Position Motor
sensors position
Indicator
Force Clamping signals
sensors force HMI
PSA_HAZARD_CLASSIFICATION
Provisional back up
Possibility to avoid
Degree of control
Interdependency
Controllability /
Hazard Name
Reaction time
Hazard ID
Frequency
Severity
Risk
H8 ABS malfunction S1 F1 C3 R1
H9.0 Parking-brake malfunction - - - -
H9.1 Parking-brake uncommanded S2 F1 P2 R3
release
H9.2 Parking-brake stuck S1 F1 P1/C0 R1
H9.3 Parking-brake engaged when S2 F2 C4 R4
moving
Systematic integrity
Random integrity
Hazard Name
requirement
requirement
Hazard ID
Risk class
Risk
2 Prerequisites
- Safety Policy
- Project Safety Plan
3 System Model
4 Safety Envelope
5 Identified Hazards
- Hazards with classification
6 System Analysis
6.1 FTA
6.2 FMEA
7 Requirements
7.1 Safety Requirements
- Requirements for risk mitigation functions
7.2 Safety Integrity Requirements
- Requirements for SIL and failure probability
9 Safety Case
- Safety Argument (link between analysis and requirements)
10 Statement of Compliance
- Summary of previous information:
- Safety Policy
- Project Safety Plan
- Definition of broadly acceptable risk
- Hazards
- Safety requirements
- SIL assignment
85
In this example there are no limitations considered in the applied fault model, so the
example does not e.g. only addresses single point faults or multiple faults. Such
limitations may affect the design of a reliability block diagram.
This example illustrates an electronic brake control system according to figure 32.
NODE 5
BUS 1
NODE 1 NODE 3
BUS 2
NODE 2 NODE 4
The block diagram in figure 32 represents a distributed electronic control system where
nodes 1-4 are used for actuating the brakes and node 5 is an ECU (i.e. a node with higher
performance). The ECU may communicate with the nodes through two physically
separated busses, one for each node pair. No hydraulic or mechanical components are
included.
A detailed FMEA has previously been performed for all nodes in the system. The system
contains several functions (safety functions) intended to prevent faults from propagating
which may result in a dangerous situation. One possible approach is to design an RBD for
each safety related function in order to compose the total reliability of the system. This
example considers only one safety function and is not completed.
The following RBD design serves only as an example that may be performed in different
ways and would be more detailed in a real analysis:
86
(1) If the system in figure 33 has no fault detecting/handling functions employed the RBD
for this particular failure mode becomes:
This implies that the system is solely dependent upon the reliability of that node. When
the node fails, with λN1 , the unwanted failure consequence will occur.
(2) In this example is it however required that a function is added which can detect and
handle this particular failure. This function may be modelled as:
Figure 34. RBD of the target failure and the monitoring function
In order to detect and handle a failure a redundant function is needed which is included in
the RBD as the block MON. A redundant function always adds a probability for common
cause failures (both functions fail simultaneously due to the same cause) which is
modelled as the CCF block. This RBD should be interpreted as: The specified
functionality of this system will be kept if either the brake actuating function (NODE 1)
or the monitoring function (MON) operates correctly and no common cause failure
occurs.
(3) There are no physically separated functions in this example system so the monitoring
function (MON) is integrated in the distributed control system. The required behaviour at
fault is that the other brake actuator (NODE 2) compensates for this failure. In order to
detect the failure the ECU must be able to correctly interpret the erroneous response from
the faulty brake controller via bus 1. In order to handle the failure the ECU (NODE 5)
must correctly recalculate and transmit the adjusted brake demand through bus 2 and the
brake controller (NODE 2) must correctly apply the new brake demand. The monitoring
function may therefore be modelled as:
Figure 35. RBD for the redundant monitoring function (in this example)
For simplification the two bus contributions may be composed into one block and thus
the final RBD is derived for this example according to:
87
When solving the RBD for the combined model the series and parallel formulas for two
element systems are used. The variables used in the calculations address implicitly
dangerous faults which were identified in an assumed previously performed analysis such
as an FMEA.
If all included failure rates are assumed to be constant the reliability function may be
expressed as (if a non constant failure rate is used the following part of this example is
not applicable):
RSYS = e − βλ N 1t (e − λ N 1t + e − ( λ N 5 + λCOM + λ N 2 )t − e − ( λ N 1 + λ N 5 + λCOM + λ N 2 )t )
By using the reliability function and the formula for MTTF the average probability of
dangerous failure per hour may be approximated according to (PFH = 1/MTTF):
1 1 1
PFH SYS = ( + − ) −1
λN 1 + βλ N 1 βλ N 1 + λN 5 + λCOM + λN 2 βλ N 1 + λN 1 + λN 5 + λCOM + λN 2
For simplicity the diagnostic coverage and MTTR are not considered in this example, any
dangerous and detected fault are assumed to be instantly handled by the control system at
any time of occurrence. The vehicle is in that case always put into a safe state with no
time delay.
88
λ1
Vcc
λ2
CAN1
P1 CPU1
λ3
Vcc
λ4
CAN2
P2 CPU2
The first step in the detailed analysis (in this example) is to perform an FMEA. The
analysis is performed by considering one single channel (i.e. without monitoring
functions) in figure 37. This is described in part 1 of the FMEA sheet below. Each fault
effect is divided into a safe fraction and a dangerous fraction. All failure rates used are
assumed to be constant.
A software analysis has been performed and the following diagnostic function used for
monitoring the processor and the potentiometer has been identified (notice that the
communication system is considered as integrated in the CPUs in this example):
Part 1 – Without considering monitoring functions Part 2 – Taking the monitoring functions into
account
Comp. Mode Rate Distr. Effect S D Monitoring function. Coverage
[FITs] [%] [%] [%] [%]
P1 SC [700] 0.5 Either stucked at max or min 10 90 A 90
position, or reduced range of the
potentiometer
λ12 P1
P2
μ
λ23
P3
λ13
AVAILABILITY
By using the FMEA result the transition rates may be determined according to:
After this it is possible to state the mathematical expression of the Markov model where
the transition matrix becomes:
⎡1 − (λ12 + λ13 ) λ12 λ13 ⎤ ⎡(1 − 3976 ⋅ 10−9 ) 3600 ⋅ 10−9 376 ⋅ 10−9 ⎤
⎢ ⎥
T = ⎢⎢ μ 1 − ( μ + λ23 ) λ23 ⎥⎥ = ⎢ 228000 ⋅ 10− 9 (1 − 229147 ⋅ 10− 9 ) 1147 ⋅ 10− 9 ⎥
⎢⎣ 0 0 1 ⎥⎦ ⎢⎣ 0 0 1 ⎥
⎦
The main task in this example is to evaluate the average probability to reach the state P3
per hour (PFHd). A computer aided tool has been used for processing the above T matrix
according to the discrete time method in order to obtain the MTTFd. The result is:
The average probability of dangerous failure per hour then becomes: PFH d = 3.87 ⋅ 10−7
This example is severely simplified and is only intended for demonstrating the principles
for the reliability analysis procedure with Markov modelling.
Description: Programme code and constants will be stored in invariable memory (ROM,
EPROM etc.). A memory map will give an overview of the memory ranges. The
hardware circuit diagram or the microprocessor manual may have to be studied. Software
routines for memory checking and handling of memory faults shall be analysed. The
analysis can be summarised in the following check list:
9 Conclusions
An internationally accepted framework for functional safety in road vehicles is needed.
The use of embedded systems in automotive applications will continue to grow. There is
presently no international guidelines accepted by the automotive industry. Company
internal documents for risk analysis and functional safety exist. The standard IEC 61508
exists since a couple of years, but has not been accepted by the automotive industry. The
development of standard ISO 26262 for functional safety of road vehicles is championed
by the automotive industry, but will not be established before 2008. Safety guidelines
exist from independent organisations such as MISRA.
The allocation of the identified functionality to different parts of the embedded system is
part of the technical safety concept. Specification of the safety integrity level, and
techniques and measures to use are also necessary. A sound architecture is important to a
safe and cost-efficient system, and is thus an important part of the technical safety
concept.
Validation requires the use of several validation methods to show functionality, hardware
safety integrity and software safety integrity. The validation plan should include different
methods for different aspects, and the validation activities should be planned to form an
integrated part of the development work. Calculation of electronic hardware reliability is
new to many automotive engineers. Tools to support reliability calculations are available.
It may be hard to see how faults propagate and how they affect the overall functionality
of a complex system.
This report is hoped to be read and discussed among developers of automotive embedded
systems. International standards are not intended to be read as textbooks. The text and the
examples of this report can be read to explain some of the concepts and issues. It should
also stimulate the debate on concepts used for developing automotive systems.
Further examples of safety analysis and safety validation are available inthe AutoVal
reports concerning validation methods [AutoValSP07:14] and model driven V&V
[AutoVal SP07:15].
92
Annex A References
[IEC]
IEC Functional Safety Zone.
General information on functional safety available at www.iec.ch/functionalsafety .
[ECE-R79]
E/ECE/324, E7ECE/TRANS/505
United Nations Regulations No.79
UNIFORM PROVSIONS CONCERNING THE APPROVAL OF VEHICLES WITH
REGARD TO STEERING EQUIPMENT
[GRRF/2003/27]
TRANS/WP.29/GRRF/2003/27 Proposal for a new draft regulation uniform technical
prescriptions concerning the approval of complex electronic control systems affecting the
direct vehicle control by the driver (Download at
http://www.unece.org/trans/main/welcwp29.htm )
[MISRAcontrol]
Hazard Classification for Moving Vehicle Hazards, Controllability
MISRA Technical Report
Version 1, May 2004
The Motor Industry Software Reliability Association, MISRA
(Download at www.misra.org.)
[MISRAweb]
Web site of The Motor Industry Software Reliability Association
www.misra.org.uk
[Goble]
Control Systems Safety Evaluation & Reliability 2nd Edition
Wiliam M. Goble
ISBN 1-55617-636-8
[MIL-HDBK-217F]
Military Handbook no 217F
Reliability Prediction of Electronic Equipment
[MIL-HDBK-338B]
Military Handbook no 338B
Electronic Reliability Handbook
94
[AutoVal SP07:13]
Jan Jacobson, Andreas Söderberg,
Lars-Åke Johansson QRtech, Henrik Lönn Volvo Technology
Safety requirements and validation methods for safety-related automotive electronics
SP Report 2007:13
[AutoVal SP07:14]
Lars Strandén, Andreas Söderberg, Jan Jacobson, Josef Nilsson
Methods for Verification and Validation of Safety
SP Report 2007:14
[AutoVal SP07:15]
Lars Strandén, Josef Nilsson, Henrik Lönn Volvo Technology
Model Driven Software Verification and Validation
SP Report 2007:15
Annex B Glossary
automotive safety integrity level (ASIL): one of four classes to specify the risk and its
requirements for risk reduction with D representing the highest and A the lowest risk
reduction class.
equipment under control (EUC): equipment, machinery, apparatus or plant used for
manufacturing, process, transportation, medical or other activities
[IEC 61508-4, clause 3.2.3]
functional safety: part of the overall safety relating to the EUC and the EUC control
system which depends on the correct functioning of the E/E/PE safety-related systems,
other technology safety-related systems and external risk reduction facilities
[IEC 61508-4, clause 3.1.9]
safety integrity level (SIL): discrete level (one out of a possible four) for specifying the
safety integrity requirements of the safety functions to be allocated to the E/E/PE safety-
related systems, where safety integrity level 4 has the highest level of safety integrity and
safety integrity level 1 has the lowest [IEC 61508-4, clause 3.5.6]
competitiveness and quality in industry, and for safety, conservation of resources and good
environment in society as a whole. With Swedens widest and most sophisticated range of equip-
ment and expertise for technical investigation, measurement, testing and certfication, we perform
research and development in close liaison with universities, institutes of technology and interna-
tional partners.
SP is a EU-notified body and accredited test laboratory. Our headquarters are in Borås, in the west
part of Sweden.