DOI QR코드

DOI QR Code

Study on Net Assessment of Trustworthy Evidence in Teleoperation System for Interplanetary Transportation

  • Wen, Jinjie (School of Traffic and Transportation, Shijiazhuang Tiedao University) ;
  • Zhao, Zhengxu (Institute of Complex Networks and Visualizations, Shijiazhuang Tiedao University) ;
  • Zhong, Qian (Institute of Complex Networks and Visualizations, Shijiazhuang Tiedao University)
  • Received : 2018.09.07
  • Accepted : 2019.04.22
  • Published : 2019.12.31

Abstract

Critical elements in the China's Lunar Exploration reside in that the lunar rover travels over the surrounding undetermined environment and it conducts scientific exploration under the ground control via teleoperation system. Such an interplanetary transportation mission teleoperation system belongs to the ground application system in deep space mission, which performs terrain reconstruction, visual positioning, path planning, and rover motion control by receiving telemetry data. It plays a vital role in the whole lunar exploration operation and its so-called trustworthy evidence must be assessed before and during its implementation. Taking ISO standards and China's national military standards as trustworthy evidence source, the net assessment model and net assessment method of teleoperation system are established in this paper. The multi-dimensional net assessment model covering the life cycle of software is defined by extracting the trustworthy evidences from trustworthy evidence source. The qualitative decisions are converted to quantitative weights through the net assessment method (NAM) combined with fuzzy analytic hierarchy process (FAHP) and entropy weight method (EWM) to determine the weight of the evidence elements in the net assessment model. The paper employs the teleoperation system for interplanetary transportation as a case study. The experimental result drawn shows the validity and rationality of net assessment model and method. In the final part of this paper, the untrustworthy elements of the teleoperation system are discovered and an improvement scheme is established upon the "net result". The work completed in this paper has been applied in the development of the teleoperation system of China's Chang'e-3 (CE-3) "Jade Rabbit-1" and Chang'e-4 (CE-4) "Jade Rabbit-2" rover successfully. Besides, it will be implemented in China's Chang'e-5 (CE-5) mission in 2019. What's more, it will be promoted in the Mars exploration mission in 2020. Therefore it is valuable to the development process improvement of aerospace information system.

Keywords

Acknowledgement

The work reported in this paper is carried out in the Institute of Complex Networks and Visualization at Shijiazhuang Tiedao University in China. The research is partially funded by the third batch of innovation teams and leading talents plan, funding number "JIZIBAN [2018]33" (Hebei, China).

References

  1. Z. Liu and L. Sun, "The development and prospects of interplanetary transportation system," Science China Technological Sciences, vol. 42, no. 5, pp. 493-504, 2012.
  2. N. G. Leveson, "Role of software in spacecraft accidents," Journal of Spacecraft and Rockets, vol. 41, no. 4, pp. 564-575, 2004. https://doi.org/10.2514/1.11950
  3. P. Athalye, D. Maksimovic, and R. Erickson, "High-performance front-end converter for avionics applications [aircraft power systems]," IEEE Transactions on Aerospace and Electronic Systems, vol. 39, no. 2, pp. 462-470, 2003. https://doi.org/10.1109/TAES.2003.1207258
  4. G. H. Shen, Z. Q. Huang, B. Xie, Y. Zhu, L. Liao, F. Wang, and Y. Liu, "Survey on software trustworthiness evaluation: standards, models and tools," Journal of Software (Ruanjian Xuebao), vol. 27, no. 4, pp. 955-968, 2016.
  5. H. S. Kim and E. Lee, "Verifying code toward trustworthy software," Journal of Information Processing Systems, vol. 14, no. 2, pp. 309-321, 2018. https://doi.org/10.3745/JIPS.01.0027
  6. S. Lipner, "The trustworthy computing security development lifecycle," in Proceedings of the 20th Annual Computer Security Applications Conference, Tucson, AZ, 2004, pp. 2-13.
  7. Trusted Computing Group, "TCG specification architecture overview," [Online]. Available: https://trustedcomputinggroup.org/resource-directory/specifications/
  8. Systems and software engineering - Systems and software Quality Requirements and Evaluation (SQuaRE) - System and software quality models, ISO/IEC 25010:2011, 2011.
  9. L. Shi and S. Yang, "The evaluation of software trustworthiness with FAHP and FTOPSIS methods," in Proceedings of 2009 International Conference on Computational Intelligence and Software Engineering, Wuhan, China, 2009, pp. 1-5.
  10. Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model, ISO/IEC 15408-1:2009, 2009.
  11. Software engineering - Product quality - Part 4: Quality in use metrics, ISO/IEC TR 9126-4:2004, 2004.
  12. H. Wang, "TRUSTIE: design of a trustworthy software production environment," in Proceedings of the 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, 2011, pp. 3-4.
  13. K. Liu, Z. Shan, J. Wang, J. He, Z. Zhang, and Y. Qin, "Overview on major research plan of trustworthy software," Bulletin of National Natural Science Foundation of China, vol. 22, no. 3, pp. 145-151, 2008. https://doi.org/10.3969/j.issn.1000-8217.2008.03.005
  14. Systems and software engineering - Software life cycle processes, ISO/IEC 12207:2008, 2018.
  15. Information technology - Process assessment - Part 5: An exemplar software life cycle process assessment model, ISO/IEC 15504-5:2012, 2012.
  16. M. B. Chrissis, M. Konrad, and S. Shrum, CMMI for Development: Guidelines for Process Integration and Product Improvement. Upper Saddle River, NJ: Addison-Wesley, 2011.
  17. M. Tang, D. Y. Sun, B. Li, C. M. Ou, Z. H. Lin, and Z. Li, "Research on the evaluation method of national military development based on net assessment," in Proceedings of 2015 European Intelligence and Security Informatics Conference, Manchester, UK, 2015, pp. 129-132.
  18. M. Drapeau and L. Wells, "Social software and national security: an initial net assessment," 2009; https://apps.dtic.mil/docs/citations/ADA497525.
  19. R. Proctor, "The evolving terrorist threat to Southeast Asia: a net assessment," Asian Affairs, vol. 43, no. 1, pp. 150-152, 2012. https://doi.org/10.1080/03068374.2012.642596
  20. D. Lin, "Discover the secret of 'The Strait of Terror'," National Defense, vol. 2002, no. 7, pp. 4-6, 2002.
  21. G. Yan, "The US Department of Defense definition of net assessment theory, methods and practice," International Data Information, vol. 2011, no. 5, pp. 30-36, 2011.
  22. B. Yi and W. Li, "The US Army's net assessment methods of strategic," Military Operations Research and Systems Engineering, vol. 26, no. 3, pp. 14-18, 2012.
  23. L. Yuan, H. M. Wang, G. Yin, D. Shi, and Y. Zhu, "An automatic evaluation evidence framework for open source software," Journal of Chinese Computer Systems, vol. 32, no. 11, pp. 2145-2151, 2011.
  24. Y. M. Zhou and W. H. Li, "Enhanced FAHP and its application to task scheme evaluation," Computer Engineering and Applications, vol. 44, no. 5, pp. 212-214, 2008. https://doi.org/10.3778/j.issn.1002-8331.2008.05.067
  25. Q. Cheng, "Structure entropy weight method to confirm the weight of evaluating index," Systems Engineering Theory & Practice, vol. 30, no. 7, pp. 1225-1228, 2010.
  26. Z. X. Zhao, The Use and Promotion of NeoKylin Operating System. Beijing, China: Science Press, 2015.
  27. Z. X. Zhao, J. J. Wen, and W. H. Zhao, Z Notation and Its Usage. Beijing, Chian: Science Press, 2015.