Resilient Embedded and Automotive Systems: Integrating Lockstep Architectures, Software-Based Fault Detection, And Cyber-Physical Safety Models for Next-Generation Reliability
Abstract
The rapid evolution of embedded and automotive systems has introduced unprecedented complexity, driven by the integration of multi-core processors, real-time operating systems, and software-defined functionalities. This complexity has significantly increased the vulnerability of such systems to transient and permanent faults, particularly radiation-induced soft errors and memory safety violations. This research develops a comprehensive, theoretically grounded framework for fault tolerance that integrates hardware-based lockstep architectures, software-level fault detection and recovery mechanisms, and cyber-physical safety models. Drawing on foundational and contemporary literature, the study critically examines the limitations of software-only approaches in error detection coverage, the effectiveness of dual-core lockstep systems in mitigating soft errors, and the role of architectural diversity and safety frameworks such as the Simplex architecture and time-triggered systems. The methodology employs a conceptual modeling approach to analyze fault propagation, detection latency, and system recovery across heterogeneous computing environments, including automotive zonal controllers and high-performance embedded platforms. The findings demonstrate that hybrid architectures combining hardware redundancy with selective software-based mechanisms significantly enhance fault coverage and system resilience while maintaining manageable performance overhead. Furthermore, the incorporation of safety-oriented architectural paradigms effectively limits fault propagation and ensures predictable system behavior. The study highlights the importance of integrating memory safety mechanisms and control flow integrity techniques to address emerging software vulnerabilities. The discussion explores the implications of these findings for next-generation automotive and cyber-physical systems, emphasizing scalability, energy efficiency, and real-time constraints. Future research directions include adaptive fault-tolerance strategies and the integration of intelligent monitoring systems. This work contributes a unified perspective on resilient system design, bridging the gap between hardware reliability, software correctness, and system-level safety.
Keywords
References
Similar Articles
- Dr. Elena Marovic, Hyperautomation-Driven Financial Workflow Transformation: Integrating Generative Artificial Intelligence, Process Mining, and Enterprise Digital Architectures , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 01 (2026): Volume 03 Issue 01
- Dr. Nurul H. Zulkifli, Dr. Farah M. Rahimi, ACCOUNTABLE DATA AUTHORIZATION IN CLOUD ENVIRONMENTS: AN IDENTITY-BASED ENCRYPTION FRAMEWORK WITH EQUALITY TESTING , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 01 (2025): Volume 02 Issue 01
- Prof. Elise Vandermark, INTEGRATING LAKEHOUSE ARCHITECTURES AND CLOUD DATA WAREHOUSING FOR NEXT-GENERATION ENTERPRISE ANALYTICS , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 12 (2025): Volume 02 Issue 12
- Dr. Rania E. El-Gamal, EMPIRICAL CHARACTERIZATION OF IOT FIRMWARE VERSION DIVERSITY AND PATCHING STATUS , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 03 (2025): Volume 02 Issue 03
- Dr. Rakesh T. Sharma, Dr. Neha R. Kulkarni, GUIDING SEARCH-BASED SOFTWARE TESTING WITH DEFECT PREDICTION: AN EMPIRICAL INVESTIGATION , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 03 (2025): Volume 02 Issue 03
- Dr. Erik G. Johansson, Dr. Linnea K. Blomqvist, LEVERAGING PERSISTENCE AND GRAPH NEURAL NETWORKS FOR ENHANCED INFORMATION POPULARITY FORECASTING , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 04 (2025): Volume 02 Issue 04
- Dr. Sofia Duarte, Jiwon Park, SECURING LARGE-SCALE IOT NETWORKS: A FEDERATED TRANSFER LEARNING APPROACH FOR REAL-TIME INTRUSION DETECTION , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 06 (2025): Volume 02 Issue 06
- Prof. Lucas F. Oliveira, SM9-ENHANCED KEY-POLICY ATTRIBUTE-BASED ENCRYPTION: DESIGN, ANALYSIS, AND APPLICATIONS , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 06 (2025): Volume 02 Issue 06
- Dr. Elena M. Petrovic, Dr. Rajan V. Subramaniam, A COMPREHENSIVE REVIEW AND EMPIRICAL ASSESSMENT OF DATA AUGMENTATION TECHNIQUES IN TIME-SERIES CLASSIFICATION , International Journal of Modern Computer Science and IT Innovations: Vol. 2 No. 07 (2025): Volume 02 Issue 07
- Rina Kobayashi, Algorithmic Decision Engines and The Regulatory Frontier: A Multi-Dimensional Analysis of Machine Learning Architectures and Governance in Global Financial Ecosystems , International Journal of Modern Computer Science and IT Innovations: Vol. 3 No. 02 (2026): Volume 03 Issue 02
You may also start an advanced similarity search for this article.