Interlocking Safety Cases for Unmanned Autonomous Systems in Shared Airspaces

Article

Abstract

The growing adoption of unmanned aerial vehicles (UAV) for tasks such as eCommerce, aerial surveillance, and environmental monitoring introduces the need for new safety mechanisms in an increasingly cluttered airspace. In our work we thus emphasize safety issues that emerge at the intersection of infrastructures responsible for controlling the airspace, and the diverse UAVs operating in their space. We build on safety assurance cases (SAC)- a state-of-the-art solution for reasoning about safety - and propose a novel approach based on interlocking SACs. The infrastructure safety case (ISAC) specifies assumptions upon UAV behavior, while each UAV demonstrates compliance to the ISAC by presenting its own (pluggable) safety case (pSAC) which connects to the ISAC through a set of interlock points. To collect information on each UAV we enforce a “trust but monitor” policy, supported by runtime monitoring and an underlying reputation model. We evaluate our approach in three ways: first by developing ISACs for two UAV infrastructures, second by running simulations to evaluate end-to-end effectiveness, and finally via an outdoor field-study with physical UAVs. The results show that interlocking SACs can be effective for identifying, specifying, and monitoring safety-related constraints upon UAVs flying in a controlled airspace.

Attributes

Attribute NameValues
Creator
  • Michael Vierhauser

  • Sean Beyley

  • Jane Wyngaard

  • Wandi Xiong

  • Joshua Huseman

  • Robyn Lutz

  • Jane Cleland-Huang

Journal or Work Title
  • IEEE Transactions on Software Engineering

Publisher
  • IEEE

Date Created
  • 2019-05-06

Language
  • English

Departments and Units
Record Visibility and Access Public
Content License
  • All rights reserved

Digital Object Identifier

doi:10.1109/TSE.2019.2907595

This DOI is the best way to cite this article.

Files

Please Note: You may encounter a delay before a download begins. Large or infrequently accessed files can take several minutes to retrieve from our archival storage system.