Providing Security of Vital Data for Conventional Microcontroller Applications

Article Preview

Abstract:

Microcontrollers are widely used in industrial world, and almost all kind of devices were based on microcontroller to achieve high flexibility and abilities. All microcontrollers have nonvolatile and volatile memories to execute the software. During the running, microcontroller calculates many variables and records them to any non-volatile memory to use later. After re-energizing, microcontroller takes the data calculated before the power off and executes the program. In case of any electrical writing error or any power loss during the writing procedure, un-written memory blocks or any un-written data leads to malfunctions. Proposed method uses a gray code based signed two memory blocks to secure the memory reserved for data. Microcontroller uses these memory blocks in alternately. Even if microcontroller has no any real-time ability, gray code provides a guarantee which block is written in last. For every re-starting microcontroller dos not lose the data. In case of any reading problem during the starting, microcontroller has two chances to decide the action. One is to start with default values and the other is to start with the previous data. This study is tested at elevator applications not to lose position and vital values.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1059-1066

Citation:

Online since:

September 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] B. Borowik, Interfacing PIC Microcontrollers to Peripheral Devices, Springer Verlag, Science and Engineering, (2011).

Google Scholar

[2] T. Wilmshurst, Designing Embedded Systems with PIC Microcontroller: Principles and Applications, Elseiver Pub, Sec. Edition, ISBN: 978-1-85617-750-4, (2010).

Google Scholar

[3] H. Thane, Henrik. Safe and Reliable Computer Control Systems Concepts and Methods, Mech. Lab, Univ. Stock, (1996).

Google Scholar

[4] M. Jürgen, O. Armbrust, M. Kowalczyk, M. Soto, Software Process Definition and Management, The Fraunhofer IESE Series on Software and Systems Engineering 2012, Publisher: Springer, (2012).

DOI: 10.1007/978-3-642-24291-5

Google Scholar

[5] R. Mariani, F. Colucci, P. Fuhrmann, Safety integrity of memory sub-systems in automotive microcontrollers, SAE 2007 World Conference in Safety-Critical System Session. No. 2007-01-1494. SAE Technical Paper, (2007).

DOI: 10.4271/2007-01-1494

Google Scholar

[6] D. J. Smith, K. G. L. Simpson, Functional Safety - A straightforward guide to applying IEC 61508 and related standards, Elsevier Butterworth-Heinemann, Oxford, 2nd edition, (2004).

Google Scholar

[7] NASA-STD-8719. 9 w/Change 2 May 9, 2002, standart for Lifting devices and Equipment, http: /www. hq. nasa. gov/office/codeq/doctree/87199. pdf, last access: 22 october (2014).

Google Scholar

[8] Secure Microcontroller User's Guide, http: /pdfserv. maximintegrated. com/en/an/AN4828. pdf last access: 22 october (2014).

Google Scholar

[9] G. Gridling, B. Weiss, Introduction to Microcontrollers, Austria, Vienna University of Technology, (2007).

Google Scholar

[10] M. Camp, H. Gerth, H. Garbe, H. Haase, Predicting the Breakdown Behavior of Microcontrollers under EMP/UWB Impact Using a Statistical Analysis, Electromagnetic Compatibility, IEEE Transactions on, 46(3), 368-379, (2004).

DOI: 10.1109/temc.2004.831816

Google Scholar

[11] White paper: A Validated Methodology for Designing Safe Industrial systems on a chip,. www. altera. com/literature/wp/wp-01168-safe-industrial-soc. pdf last access: 22 Aug. (2014).

Google Scholar

[12] 78K0R Microcontrollers: User's Manual: Instructions for 16-Bit Single-Chip Microcontrollers, http: /documentation. renesas. com/doc/DocumentServer/r01us0029ej0600_78k0r. pdf last access: 22 Aug. (2014).

Google Scholar

[13] http: /ww1. microchip. com/downloads/en/DeviceDoc/39663a. pdf last access: 22 Aug. (2014).

Google Scholar

[14] http: /www. keil. com/dd/docs/datashts/atmel/at89s52_ds. pdf last access: 22 Aug. (2014).

Google Scholar

[15] R. W. Doran, The Gray Code, Journal of Universal Computer Science, Vol. 13, no. 11, pp: 1573-1597, (2007).

Google Scholar

[16] Ali, M, Islam, M, N, and Foysal, A, B, M, Algorithms for Generating Binary Reflected Gray Code Sequence: Time Efficient Approaches, International Conference on Future Computer and Communication, ICFCC 2009, 3-5 April 2009, Kuala Lumpar, Malaysia, pp: 79-83, (2009).

DOI: 10.1109/icfcc.2009.41

Google Scholar

[17] D, J. Guan, Generalized Gray codes with applications, Proc Natl Sci Counc Repub China Part A Phys Sci Eng. pp: 841-848, Vol. 22(6), (1998).

Google Scholar

[18] M. K. Jethani, A Gray Code Based Clock, International Journal of Advanced Research in Computer Science & Technology (IJARCST 2014), Vol. 2, Issue 2, Ver. 1, pp: 22-24, (2014).

Google Scholar

[19] J. Arndt, Matters Computational: Ideas, Algorithms, Source Code, Publisher: Springer Heidelberg Dordrecht, London, NewYork, (2011).

Google Scholar

[20] Meenakshi, S. Gupta, Advanced Level Cyclic Gray Codes with Application, International Journal of Electronics Communication and Computer Technology (IJECCT), Vol: 4, Issue 3, pp: 619-622, (2014).

Google Scholar

[21] K. V. Shibu, Introduction to Embedded Systems, Tata McGraw–Hill Education, New Delhi, (2009).

Google Scholar

[22] A. P. Hiltgen, K. G. Paterson, M. Brandestini, Single-Track Gray Codes, IEEE Transactions on Information Theory, Vol. 42 (5), pp: 1555–1561, doi: 10. 1109/18. 532900, (1996).

DOI: 10.1109/18.532900

Google Scholar

[23] D. G. Alciatore, M. B. Histand, Mechatronics, McGraw-Hill Education, ISBN 978-0-07- 131444-2, Europe, (1999).

Google Scholar