SlideShare a Scribd company logo
1 of 9
Download to read offline
Textmasterformat bearbeiten
 Second Level
 Third Level
 Fourth Level
Fifth Level
May 29, 2018
5 Things to Know about
FPGAs in Safety-Critical Environments
2
5 Things to Know about FPGAs in Safety-Critical Environments
Safety-critical systems must always function reliably. Essential functional safety can be
realized with FPGA logic. And they have a few advantages making development safety-
critical designs considerably easier.
5 Things about FPGAs in Safety-Critical Environments:
1: Simulation of Errors and Testing of the Desired Behavior?
2: Implement Advanced Monitoring/Surveillance Functions?
3: Long-Term Availability and Reduced Risk of Obsolescence?
4: Easy Construction of Redundancies and Immunity against SEUs
5: Integration of Security Applications
Simulation of Errors and Testing of the Desired Behavior?
Before a safety-critical design can be qualified and certified, a proof of its behavior in
the event of an error must be provided.
This is comparatively easy with development tools for FPGAs: In the virtual
development environment for FPGAs, even serious or complicated errors can be
provoked to test the error behavior of the system or to check whether the system has
a defined error behavior.
This form of simulation is not common in software, but is part of the basic tool for FPGA
design.
Implement Advanced Monitoring/Surveillance Functions
Monitoring of proper conditions is extremely important in the safety-critical area, as
this is the only way to detect failures and initiate appropriate actions.
Finished components for the connection of input and output units - such as serial
interfaces or GPIOs - rarely contain such monitoring functions as are required for
functional safety.
Such functions can be mapped very efficiently in FPGAs if there are no suitable
microcontrollers.
The integration of such monitoring functions into FPGAs also offers the advantage over
microcontrollers that they are freely configurable and can be adapted to the
application.
Long-Term Availability and Reduced Risk of Obsolescence
The FPGA function is not in a dedicated component, but in the programming itself. As a
result, component discontinuations are comparatively easy to handle, since the code
can be ported to new FPGAs with identical functionality.
Project runtimes of more than 30 years are no problem, even if the FPGA
manufacturer has to be changed. This also provides independence from a certain
supplier.
With FPGAs, it is also always possible to integrate
additional functions at a later date - for example, to
upgrade the system.
Easy Construction of Redundancies and Immunity against SEUs
Single Event Upsets (SEU) or Multi-Bit Upsets (MBU), where one or more bits in
memory elements jump from 0 to 1 or vice versa are e.g. caused by cosmic radiation.
If critical components such as a CPU in multiple redundancy with voting are present,
this increases functional safety and availability. Such redundancies including voting
functionality can be built up with FPGAs, which offers the advantage that this logic can
be easily copied in every instance by ‘copy & paste’ the IP logic.
In the FPGA, this redundancy is repeated again in order to be able to complete its
calculation, if an FPGA flip/flop fails.
As a result, an almost SEU-immune implementation can be realized, when using a Flash-
based FPGA.
Integration of Security Applications
To protect the application against manipulation, unauthorized access or duplication of
data, FPGAs offer many possibilities. For example, a unique key can be programmed in
the FPGA. There it is stored in encrypted form in a non-volatile memory.
This key can then ensure that data can only be read by applications and people who
know this key. The key can also be used to identify the device's communication with
other devices.
Because it is hardware-based, it can no longer
be manipulated on the software side, which
always uniquely identifies the device.
A code, which is implemented in hardware
cannot be copied as easily as software.
Product Examples and Detailed White Paper
Get detailed information and even more
advantages for FPGAs in safety-critical applications
in the White Paper!
COTS products from MEN:
ARM i.MX6 based Rugged COM Express type 6 module with a
Cortex-A9 architecture and an onboard FPGA for flexible,
customizable I/O. > Data Sheet CC10C
High-performance multicore VMEbus CPU
board. VMEbus interface is implemented as an open-source,
FPGA-based solution. > Data Sheet A25
www.men-deutschland.de

More Related Content

More from MEN Mikro Elektronik GmbH

9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches
9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches
9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet SwitchesMEN Mikro Elektronik GmbH
 
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...MEN Mikro Elektronik GmbH
 
5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in Aerospace5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in AerospaceMEN Mikro Elektronik GmbH
 
10 Frequently asked Questions about Safe Train Control System menTCS
10 Frequently asked Questions about Safe Train Control System menTCS10 Frequently asked Questions about Safe Train Control System menTCS
10 Frequently asked Questions about Safe Train Control System menTCSMEN Mikro Elektronik GmbH
 
5 Application Examples Using Wireless Communication in Harsh IoT Environments
5 Application Examples Using Wireless Communication in Harsh IoT Environments5 Application Examples Using Wireless Communication in Harsh IoT Environments
5 Application Examples Using Wireless Communication in Harsh IoT EnvironmentsMEN Mikro Elektronik GmbH
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded SystemsMEN Mikro Elektronik GmbH
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded SystemsMEN Mikro Elektronik GmbH
 
5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI Serial5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI SerialMEN Mikro Elektronik GmbH
 
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch FamilyMEN Mikro Elektronik GmbH
 
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile CommunicationBL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile CommunicationMEN Mikro Elektronik GmbH
 
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26LMEN Mikro Elektronik GmbH
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCSMEN Mikro Elektronik GmbH
 
5 Things to Know about the Railway Data Center menRDC
5 Things to Know about the Railway Data Center menRDC5 Things to Know about the Railway Data Center menRDC
5 Things to Know about the Railway Data Center menRDCMEN Mikro Elektronik GmbH
 
F26L – CompactPCI PlusIO SBC with Intel Atom Apollo Lake-I
F26L – CompactPCI PlusIO SBC with Intel Atom Apollo Lake-IF26L – CompactPCI PlusIO SBC with Intel Atom Apollo Lake-I
F26L – CompactPCI PlusIO SBC with Intel Atom Apollo Lake-IMEN Mikro Elektronik GmbH
 

More from MEN Mikro Elektronik GmbH (20)

9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches
9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches
9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches
 
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
 
5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in Aerospace5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in Aerospace
 
10 Frequently asked Questions about Safe Train Control System menTCS
10 Frequently asked Questions about Safe Train Control System menTCS10 Frequently asked Questions about Safe Train Control System menTCS
10 Frequently asked Questions about Safe Train Control System menTCS
 
5 Application Examples Using Wireless Communication in Harsh IoT Environments
5 Application Examples Using Wireless Communication in Harsh IoT Environments5 Application Examples Using Wireless Communication in Harsh IoT Environments
5 Application Examples Using Wireless Communication in Harsh IoT Environments
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI Serial5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI Serial
 
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
 
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile CommunicationBL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
 
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
 
CB30C Rugged COM Express Safe Computer
CB30C Rugged COM Express Safe ComputerCB30C Rugged COM Express Safe Computer
CB30C Rugged COM Express Safe Computer
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS
 
5 Things to Know about the Railway Data Center menRDC
5 Things to Know about the Railway Data Center menRDC5 Things to Know about the Railway Data Center menRDC
5 Things to Know about the Railway Data Center menRDC
 
menRDC - MEN Railway Data Center
menRDC - MEN Railway Data CentermenRDC - MEN Railway Data Center
menRDC - MEN Railway Data Center
 
MEN - Rail and Public Transport Computers
MEN - Rail and Public Transport ComputersMEN - Rail and Public Transport Computers
MEN - Rail and Public Transport Computers
 
menRDC - MEN Railway Data Center
menRDC - MEN Railway Data CentermenRDC - MEN Railway Data Center
menRDC - MEN Railway Data Center
 
Ready to Roll
Ready to RollReady to Roll
Ready to Roll
 
menTCS - MEN Train Control System
menTCS - MEN Train Control SystemmenTCS - MEN Train Control System
menTCS - MEN Train Control System
 
F26L – CompactPCI PlusIO SBC with Intel Atom Apollo Lake-I
F26L – CompactPCI PlusIO SBC with Intel Atom Apollo Lake-IF26L – CompactPCI PlusIO SBC with Intel Atom Apollo Lake-I
F26L – CompactPCI PlusIO SBC with Intel Atom Apollo Lake-I
 

Recently uploaded

Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 

Recently uploaded (20)

Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 

5 Things to Know about FPGAs in Safety-Critical Environments

  • 1. Textmasterformat bearbeiten  Second Level  Third Level  Fourth Level Fifth Level May 29, 2018 5 Things to Know about FPGAs in Safety-Critical Environments
  • 2. 2 5 Things to Know about FPGAs in Safety-Critical Environments Safety-critical systems must always function reliably. Essential functional safety can be realized with FPGA logic. And they have a few advantages making development safety- critical designs considerably easier. 5 Things about FPGAs in Safety-Critical Environments: 1: Simulation of Errors and Testing of the Desired Behavior? 2: Implement Advanced Monitoring/Surveillance Functions? 3: Long-Term Availability and Reduced Risk of Obsolescence? 4: Easy Construction of Redundancies and Immunity against SEUs 5: Integration of Security Applications
  • 3. Simulation of Errors and Testing of the Desired Behavior? Before a safety-critical design can be qualified and certified, a proof of its behavior in the event of an error must be provided. This is comparatively easy with development tools for FPGAs: In the virtual development environment for FPGAs, even serious or complicated errors can be provoked to test the error behavior of the system or to check whether the system has a defined error behavior. This form of simulation is not common in software, but is part of the basic tool for FPGA design.
  • 4. Implement Advanced Monitoring/Surveillance Functions Monitoring of proper conditions is extremely important in the safety-critical area, as this is the only way to detect failures and initiate appropriate actions. Finished components for the connection of input and output units - such as serial interfaces or GPIOs - rarely contain such monitoring functions as are required for functional safety. Such functions can be mapped very efficiently in FPGAs if there are no suitable microcontrollers. The integration of such monitoring functions into FPGAs also offers the advantage over microcontrollers that they are freely configurable and can be adapted to the application.
  • 5. Long-Term Availability and Reduced Risk of Obsolescence The FPGA function is not in a dedicated component, but in the programming itself. As a result, component discontinuations are comparatively easy to handle, since the code can be ported to new FPGAs with identical functionality. Project runtimes of more than 30 years are no problem, even if the FPGA manufacturer has to be changed. This also provides independence from a certain supplier. With FPGAs, it is also always possible to integrate additional functions at a later date - for example, to upgrade the system.
  • 6. Easy Construction of Redundancies and Immunity against SEUs Single Event Upsets (SEU) or Multi-Bit Upsets (MBU), where one or more bits in memory elements jump from 0 to 1 or vice versa are e.g. caused by cosmic radiation. If critical components such as a CPU in multiple redundancy with voting are present, this increases functional safety and availability. Such redundancies including voting functionality can be built up with FPGAs, which offers the advantage that this logic can be easily copied in every instance by ‘copy & paste’ the IP logic. In the FPGA, this redundancy is repeated again in order to be able to complete its calculation, if an FPGA flip/flop fails. As a result, an almost SEU-immune implementation can be realized, when using a Flash- based FPGA.
  • 7. Integration of Security Applications To protect the application against manipulation, unauthorized access or duplication of data, FPGAs offer many possibilities. For example, a unique key can be programmed in the FPGA. There it is stored in encrypted form in a non-volatile memory. This key can then ensure that data can only be read by applications and people who know this key. The key can also be used to identify the device's communication with other devices. Because it is hardware-based, it can no longer be manipulated on the software side, which always uniquely identifies the device. A code, which is implemented in hardware cannot be copied as easily as software.
  • 8. Product Examples and Detailed White Paper Get detailed information and even more advantages for FPGAs in safety-critical applications in the White Paper! COTS products from MEN: ARM i.MX6 based Rugged COM Express type 6 module with a Cortex-A9 architecture and an onboard FPGA for flexible, customizable I/O. > Data Sheet CC10C High-performance multicore VMEbus CPU board. VMEbus interface is implemented as an open-source, FPGA-based solution. > Data Sheet A25