SlideShare a Scribd company logo
1 of 37
Safety and security in Mission Critical IoT Systems
- Supporting human decision makers in dynamic environments
Einar Landre
Statoil
Motivation
Failed Safety
Critical Decisions
- Situational awareness
- Trustworthiness
- Culture
- Decision quality
Human brain - planets most sophisticated
and vulnerable decision maker
the weakest point
• Emotions trumps facts (irrationality)
• Limited processing capacity
• Need to rest, easily bored
• Inconsistency across exemplars
• Creative, easily distracted
• Values (ethics and morale)
• Mental illness
How to compensate?
Things
Troll A, 472 meters, the largest man made “thing” ever moved
Software was an alien concept
things anno 1995
things anno 2015
Asgard subsea compression runs on software
Size = a football field
things anno 2025
Internet of critical things
critical things
Things or networks of things where
failure could lead to an accident
- Pressure vessels
- Oil & Gas wells
- Boilers
- Industrial Instrumentation & Control
- Emergency shutdown
- Fire and gas leak detection
- Life support devices
- Pacemakers
- Infusion pumps
form critical systems
system criticality
Non - Critical
Useful system
- Low dependability
- System does not
need to be trusted
Business - Critical Mission - Critical Safety - Critical
High Availability
- Focus on cost s of
failure caused by
system downtime,
cost of spares, repair
equipment and
personnel and
warranty claims
High Reliability
- Increase the
probability of failure
free system
operation over a
specified time in a
given environment
for a given purpose
High Safety &
Integrity Level
- High reliability
- High availability
- High security
- Focus is not on cost,
but on preserving life
and nature
Case Study
Drill string
Drilling Control System
Weight on
Bit
Rotation
Mud
Circulation
Manual Control
- Interpret data
- Perform tasks
A manually controlled process
drilling
• I have to make frequent decisions and many of
them depend upon readings from sensors that
can be correct, noisy, random, unavailable, or
in some other state.
• The decisions I have to make often have safety
consequences, they certainly have economic
consequences, and some are irreversible.
• At any point in time there may be three or four
actions I could take based on my sense of
what’s happening on the rig
• I would like better support to determine how
trustworthy my readings are, what the possible
situations are and the consequences of each
action.
What is the best action
to take?
enhance human decision making
systems of action
• Can sense or observe a phenomena, process or machine
• Process observations and search for anomalies, undesired state
changes and other deviations that must be dealt with.
• Plan and execute / (recommend execution of) actions to bring the observed
phenomena, process or machine back to its desired operational state.
• Monitor effects of actions and re-plan if action did not have intended effect
on process state
Computer systems that
making better decisions under stress and uncertainty
“Drillers Buddy”
Real-time data
Manual Control
Recommend actions in
context of process state
add active computer support
Drill string
Drilling Control System
Weight on
Bit
Rotation
Mud
Circulation
Drillers Buddy
State & Events
Drilling Simulator
• Hydraulic model
• Mechanical model
• Temperature model
Drilling Advisor
• Uncertainty model
• Causality model
• Reasoning
• Planning model
Drilling Control System
Real-Time Data
Actions
technical building blocks
Action to be executed by human, but concept opens up for more computer control in the future.
i.e. Drilling advisor can be turned into “synthetic driller”.
Historical Data
What is the best action to take for the business?
What is the best action to take for control or safety?
What is the process state and where is it heading?
What do we know for certain and what are we
estimating?
What are we measuring directly, with what accuracy?
What can we infer about performance and changes
in the physical system?
Local Action
Optimization
Situational
Awareness
Uncertainty and
Validation
Physical System
Behavior
Physical System
Sensing
Global Action
Optimization
IncreasinglyActionableInformation
expressed in capabilities
Local Action
Optimization
Situational
Awareness
Uncertainty and
Validation
Physical System
Behavior
Physical System
Sensing
Global Action
Optimization
Machine
learning
(Bayesian)
+
Physics
(Cyb)
Decision
/ game
theory
Automated
planning
and
scheduling
Rational agent
• has goals
• models uncertainty
• chooses action with optimal
expected outcome for itself
• Examples:
− human (on a good day)
− intelligent software agent
more sophisticated technology
Sensors
solution creates new challenges
What parts are safety critical?
What parts are only business critical?
How to assess and protect against cyber threats?
How does failure in non-safety part influence safety and security?
What dependencies do we have?
Industry become software dependent
How to design software that tackles mechanical failures?
2014-04-2421
how to build
trustworthy
software?
Software
before software
Tangible control logic
• Design level
• Implementation level
• Verification & test level
No cyber threats
• Intrusion
• Viruses
• Theft
• Identity
two unique properties
Inspection & Test
• Software can’t be inspected and
tested as analogous components
CPU – the single point of failure
• All signals are threaded through the
one single element.
• Execution sequence is un-known
• Same defect is systemized across
multiple instances
Impacts how we must manage software for critical systems
some specific challenges
Common mode failure
Malware, Viruses and Hacking
Human Factors
Blurred boundaries
common mode failure
“results from an event which
because of dependencies
causes a coincidence of failure
states of components in two or
more separate channels of a
redundancy system, leading to
the defined systems failing to
perform its intended function”.
Ariane 5 test launch, 1996
malware, viruses and hacking
Motivated by financial, political, criminal or idealistic interests
Software created to cause harm
• Change of system behaviour
• Steal / destroy data or machines
Exploits weaknesses in
• Human character
• Technical designs
Horror stories:
• Stuxnet and the Iranian centrifuges (Siemens control system)
• Saudi Aramco hack of 35000 computers (Windows back office)
human factors
How to minimize the effects of human error?
Mistakes occur everywhere
• Specification
• Design
• Implementation
• Deployment
• Operations
Humans make mistakes
• By commission
• By omission
• By carelessness
blurred boundaries
Conflicting interests, divergent
situational understanding across
disciplines and roles.
Architects thinks and designs in terms of hierarchy and layering
Programmers thinks and designs in terms of threads of execution
Users need systems that works and solves a real world problems
Operations needs to get the job done
Tools
systems engineering
Architecture centric
• Design
• Implementation
• Deployment
• Usage
Risk based
• Requirements
• Design
• Implementation
• Commissioning
• Usage
Forging “design thinking” with “high-integrity systems” practices
architecture
Separation and protection of critical functions
Local Action
Optimization
Situational
Awareness
Uncertainty and
Validation
Physical System
Behavior
Physical System
Sensing
Global Action
Optimization
standards
IEC 61508 Functional safety of safety instrumented systems for the process industry sector
IEC 61511 Safety instrumented systems for the process industry sector
DO-178C Software considerations in airborne systems and equipment certification
The good thing about standards is that there are so many to choose from
Andrew S. Tanenbaum
Not sufficient on their own
Represents insights
Must be tailored to be useful
evidence based safety & security
Thanks to professor Tim Kelly @ University of York
Summary
summary
Things run on software
Critical things form critical / high-integrity systems
Cognitive functions make software inherent complicated
Holistic, architecture centric Systems Engineering
Software is used to offload and support human operators
2nd and 3d order failure effects must be addressed upfront
Forging design thinking with high-integrity systems practices
Safety and security in mission critical IoT
systems
Einar Landre
Lead Analyst
E-mail einla@statoil.com
Tel: +4741470537
www.statoil.com
Thank you

More Related Content

What's hot

35958867 safety-instrumented-systems
35958867 safety-instrumented-systems35958867 safety-instrumented-systems
35958867 safety-instrumented-systemsMowaten Masry
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCommunity Protection Forum
 
The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016Ashley Deuble
 
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...Jaap van Ekris
 
2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systems2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systemsJaap van Ekris
 
Operations_Security - Richard Mosher
Operations_Security - Richard MosherOperations_Security - Richard Mosher
Operations_Security - Richard Mosheramiable_indian
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems scriptsommerville-videos
 
1. safety instrumented systems
1. safety instrumented systems1. safety instrumented systems
1. safety instrumented systemsSaiful Chowdhury
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMJim Gilsinn
 
Security in embedded systems
Security in embedded systemsSecurity in embedded systems
Security in embedded systemsRaghav S
 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security PresentationWajahat Rajab
 
Information Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementInformation Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementEnclaveSecurity
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're InfectedTripwire
 

What's hot (20)

35958867 safety-instrumented-systems
35958867 safety-instrumented-systems35958867 safety-instrumented-systems
35958867 safety-instrumented-systems
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016
 
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
 
2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systems2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systems
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Operations_Security - Richard Mosher
Operations_Security - Richard MosherOperations_Security - Richard Mosher
Operations_Security - Richard Mosher
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
 
THERP
THERPTHERP
THERP
 
Safety system
Safety systemSafety system
Safety system
 
1. safety instrumented systems
1. safety instrumented systems1. safety instrumented systems
1. safety instrumented systems
 
Critical Systems
Critical SystemsCritical Systems
Critical Systems
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
 
Security in embedded systems
Security in embedded systemsSecurity in embedded systems
Security in embedded systems
 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security Presentation
 
Secure Embedded Systems
Secure Embedded SystemsSecure Embedded Systems
Secure Embedded Systems
 
Information Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementInformation Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to Measurement
 
Sis training course_1
Sis training course_1Sis training course_1
Sis training course_1
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected
 

Similar to Safety and security in mission critical IoT systems

Safety and security in distributed systems
Safety and security in distributed systems Safety and security in distributed systems
Safety and security in distributed systems Einar Landre
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopPriyanka Aash
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchMcKonly & Asbury, LLP
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart WaySecurity Innovation
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems Jeffrey Paulette
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples CounselingAtif Ghauri
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principlesDivya Tiwari
 
Security Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriSecurity Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriAtif Ghauri
 
Industrial Control Systems and Incident Response
Industrial Control Systems and Incident Response Industrial Control Systems and Incident Response
Industrial Control Systems and Incident Response Yugal Pathak
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipRedZone Technologies
 
Brighttalk high scale low touch and other bedtime stories - final
Brighttalk   high scale low touch and other bedtime stories - finalBrighttalk   high scale low touch and other bedtime stories - final
Brighttalk high scale low touch and other bedtime stories - finalAndrew White
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshopSLVA Information Security
 
Real world IoT for enterprises
Real world IoT for enterprisesReal world IoT for enterprises
Real world IoT for enterprisesIndicThreads
 
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsNCC Group
 
20cs2024 Ethics in Information Technology
20cs2024 Ethics in Information Technology20cs2024 Ethics in Information Technology
20cs2024 Ethics in Information TechnologyKathirvel Ayyaswamy
 
Security Change Management: Agility vs. Control
Security Change Management: Agility vs. ControlSecurity Change Management: Agility vs. Control
Security Change Management: Agility vs. ControlAlgoSec
 
Reducing Accident in OG Industry.pdf
Reducing Accident in OG Industry.pdfReducing Accident in OG Industry.pdf
Reducing Accident in OG Industry.pdfDianValarbi
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on VehiclesPriyanka Aash
 

Similar to Safety and security in mission critical IoT systems (20)

Safety and security in distributed systems
Safety and security in distributed systems Safety and security in distributed systems
Safety and security in distributed systems
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shop
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart Way
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
Security Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriSecurity Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif Ghauri
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
Industrial Control Systems and Incident Response
Industrial Control Systems and Incident Response Industrial Control Systems and Incident Response
Industrial Control Systems and Incident Response
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and Leadership
 
Brighttalk high scale low touch and other bedtime stories - final
Brighttalk   high scale low touch and other bedtime stories - finalBrighttalk   high scale low touch and other bedtime stories - final
Brighttalk high scale low touch and other bedtime stories - final
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Real world IoT for enterprises
Real world IoT for enterprisesReal world IoT for enterprises
Real world IoT for enterprises
 
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security Threats
 
20cs2024 Ethics in Information Technology
20cs2024 Ethics in Information Technology20cs2024 Ethics in Information Technology
20cs2024 Ethics in Information Technology
 
Security Change Management: Agility vs. Control
Security Change Management: Agility vs. ControlSecurity Change Management: Agility vs. Control
Security Change Management: Agility vs. Control
 
Reducing Accident in OG Industry.pdf
Reducing Accident in OG Industry.pdfReducing Accident in OG Industry.pdf
Reducing Accident in OG Industry.pdf
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on Vehicles
 

Recently uploaded

Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 

Recently uploaded (20)

Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 

Safety and security in mission critical IoT systems

  • 1. Safety and security in Mission Critical IoT Systems - Supporting human decision makers in dynamic environments Einar Landre
  • 4. Failed Safety Critical Decisions - Situational awareness - Trustworthiness - Culture - Decision quality
  • 5. Human brain - planets most sophisticated and vulnerable decision maker the weakest point • Emotions trumps facts (irrationality) • Limited processing capacity • Need to rest, easily bored • Inconsistency across exemplars • Creative, easily distracted • Values (ethics and morale) • Mental illness How to compensate?
  • 7. Troll A, 472 meters, the largest man made “thing” ever moved Software was an alien concept things anno 1995
  • 8. things anno 2015 Asgard subsea compression runs on software Size = a football field
  • 9. things anno 2025 Internet of critical things
  • 10. critical things Things or networks of things where failure could lead to an accident - Pressure vessels - Oil & Gas wells - Boilers - Industrial Instrumentation & Control - Emergency shutdown - Fire and gas leak detection - Life support devices - Pacemakers - Infusion pumps form critical systems
  • 11. system criticality Non - Critical Useful system - Low dependability - System does not need to be trusted Business - Critical Mission - Critical Safety - Critical High Availability - Focus on cost s of failure caused by system downtime, cost of spares, repair equipment and personnel and warranty claims High Reliability - Increase the probability of failure free system operation over a specified time in a given environment for a given purpose High Safety & Integrity Level - High reliability - High availability - High security - Focus is not on cost, but on preserving life and nature
  • 13. Drill string Drilling Control System Weight on Bit Rotation Mud Circulation Manual Control - Interpret data - Perform tasks A manually controlled process drilling
  • 14. • I have to make frequent decisions and many of them depend upon readings from sensors that can be correct, noisy, random, unavailable, or in some other state. • The decisions I have to make often have safety consequences, they certainly have economic consequences, and some are irreversible. • At any point in time there may be three or four actions I could take based on my sense of what’s happening on the rig • I would like better support to determine how trustworthy my readings are, what the possible situations are and the consequences of each action. What is the best action to take? enhance human decision making
  • 15. systems of action • Can sense or observe a phenomena, process or machine • Process observations and search for anomalies, undesired state changes and other deviations that must be dealt with. • Plan and execute / (recommend execution of) actions to bring the observed phenomena, process or machine back to its desired operational state. • Monitor effects of actions and re-plan if action did not have intended effect on process state Computer systems that making better decisions under stress and uncertainty
  • 16. “Drillers Buddy” Real-time data Manual Control Recommend actions in context of process state add active computer support Drill string Drilling Control System Weight on Bit Rotation Mud Circulation
  • 17. Drillers Buddy State & Events Drilling Simulator • Hydraulic model • Mechanical model • Temperature model Drilling Advisor • Uncertainty model • Causality model • Reasoning • Planning model Drilling Control System Real-Time Data Actions technical building blocks Action to be executed by human, but concept opens up for more computer control in the future. i.e. Drilling advisor can be turned into “synthetic driller”. Historical Data
  • 18. What is the best action to take for the business? What is the best action to take for control or safety? What is the process state and where is it heading? What do we know for certain and what are we estimating? What are we measuring directly, with what accuracy? What can we infer about performance and changes in the physical system? Local Action Optimization Situational Awareness Uncertainty and Validation Physical System Behavior Physical System Sensing Global Action Optimization IncreasinglyActionableInformation expressed in capabilities
  • 19. Local Action Optimization Situational Awareness Uncertainty and Validation Physical System Behavior Physical System Sensing Global Action Optimization Machine learning (Bayesian) + Physics (Cyb) Decision / game theory Automated planning and scheduling Rational agent • has goals • models uncertainty • chooses action with optimal expected outcome for itself • Examples: − human (on a good day) − intelligent software agent more sophisticated technology Sensors
  • 20. solution creates new challenges What parts are safety critical? What parts are only business critical? How to assess and protect against cyber threats? How does failure in non-safety part influence safety and security? What dependencies do we have? Industry become software dependent How to design software that tackles mechanical failures?
  • 23. before software Tangible control logic • Design level • Implementation level • Verification & test level No cyber threats • Intrusion • Viruses • Theft • Identity
  • 24. two unique properties Inspection & Test • Software can’t be inspected and tested as analogous components CPU – the single point of failure • All signals are threaded through the one single element. • Execution sequence is un-known • Same defect is systemized across multiple instances Impacts how we must manage software for critical systems
  • 25. some specific challenges Common mode failure Malware, Viruses and Hacking Human Factors Blurred boundaries
  • 26. common mode failure “results from an event which because of dependencies causes a coincidence of failure states of components in two or more separate channels of a redundancy system, leading to the defined systems failing to perform its intended function”. Ariane 5 test launch, 1996
  • 27. malware, viruses and hacking Motivated by financial, political, criminal or idealistic interests Software created to cause harm • Change of system behaviour • Steal / destroy data or machines Exploits weaknesses in • Human character • Technical designs Horror stories: • Stuxnet and the Iranian centrifuges (Siemens control system) • Saudi Aramco hack of 35000 computers (Windows back office)
  • 28. human factors How to minimize the effects of human error? Mistakes occur everywhere • Specification • Design • Implementation • Deployment • Operations Humans make mistakes • By commission • By omission • By carelessness
  • 29. blurred boundaries Conflicting interests, divergent situational understanding across disciplines and roles. Architects thinks and designs in terms of hierarchy and layering Programmers thinks and designs in terms of threads of execution Users need systems that works and solves a real world problems Operations needs to get the job done
  • 30. Tools
  • 31. systems engineering Architecture centric • Design • Implementation • Deployment • Usage Risk based • Requirements • Design • Implementation • Commissioning • Usage Forging “design thinking” with “high-integrity systems” practices
  • 32. architecture Separation and protection of critical functions Local Action Optimization Situational Awareness Uncertainty and Validation Physical System Behavior Physical System Sensing Global Action Optimization
  • 33. standards IEC 61508 Functional safety of safety instrumented systems for the process industry sector IEC 61511 Safety instrumented systems for the process industry sector DO-178C Software considerations in airborne systems and equipment certification The good thing about standards is that there are so many to choose from Andrew S. Tanenbaum Not sufficient on their own Represents insights Must be tailored to be useful
  • 34. evidence based safety & security Thanks to professor Tim Kelly @ University of York
  • 36. summary Things run on software Critical things form critical / high-integrity systems Cognitive functions make software inherent complicated Holistic, architecture centric Systems Engineering Software is used to offload and support human operators 2nd and 3d order failure effects must be addressed upfront Forging design thinking with high-integrity systems practices
  • 37. Safety and security in mission critical IoT systems Einar Landre Lead Analyst E-mail einla@statoil.com Tel: +4741470537 www.statoil.com Thank you

Editor's Notes

  1. Macondo: A difficult well & reservoir The latest and greatest technology Human operators did not understand system messages and alarms Focus on making things work No trust in the IT systems 50 minutes from first anomaly to blow-out False-positives is probably one of the most important threats toward humans building trust to technical systems. For a system with a high frequency of false-positive alarms, the real alarms will not be detected. Cancelling out false-positives before they reach the human operator is one of the most vital HSE measures in complex systems.
  2. Historically information technology has been used to implement what we call “systems of record”. These are systems whose primary function is capture and storage of data, it be operational events, engineering decisions or sensor readings. Today information technology has reached a technological readiness level where it has become cost efficient to create what we have chosen to call “systems of action”. These are systems that can analyse data in context of a process and either recommend or execute the best possible action. These systems enable automation of tasks across all phases of the well construction process.
  3. Thinking of a human driving a car or any other machine the reasoning defined by the five lowest layers takes place all the time. When things get too complicated due to process or mechanical failure, situational awareness is easily lost with the effect that local action optimization collapses and the catastrophe is on its way. Leading edge information technology enables us to automate at all levels in the stack, but since few of us really like a world with machines doing things on their own, such automation needs to be done on the terms of the human operators. That implies the human is in control and understands what goes on, with respect to the controlled process and in the machine itself.
  4. Planning is searching through possible sequences of action for a path that reaches the goal while respects constraints. Decision theory is finding the optimal action. Game theory is «interactive decision theory», meaning that other agents will respond to your action. Rational agents is really a term from economics, but also used in AI and other fields.
  5. For those who have seen Apollo 13, that is an excersize in how to program an analog computer, bringing electronical circuits alive by switches.