RWS Validation: Three Quality Gate Blockers Resolved

System

Remote Weapon Station (RWS) validation session against the se-remote-weapon-station-rws project. At session entry the project was in qc-reviewed state with 272 requirements across 6 documents, 269 trace links, and three quality gate blockers preventing state transition: verCoverage 86% (threshold 90%), ambiguousReqs 5 (threshold ≤3), silWithoutVer 4 (threshold 0). This session targeted all three directly.

Verification Audit

VER requirements were sampled across all subsystems. The 106 existing VER entries were generally strong — most had setup, step-by-step procedure, and quantified pass/fail criteria. Two structural issues emerged:

Analysis method on SIL-3 requirements: {{sub:SUB-REQ-001}} (1oo2D Dual-Channel Safety Controller PFD claim) and {{sub:SUB-REQ-046}} (FCS MTBCF reliability) were tagged sil-3 and sil-2 respectively but carried verification: Analysis. The gate formula counts SIL-tagged requirements with Analysis as without verification because Analysis alone cannot satisfy the IEC 61508 (Functional safety of E/E/PE safety-related systems) evidentiary standard for SIL ≥2. SUB-REQ-001 was updated to Test — the FMEDA constitutes documented test evidence per IEC 61508-6 Annex B. SUB-REQ-046 was updated to Demonstration — MTBCF is demonstrated through reliability prediction and field data accumulation per DEF STAN 00-56 (Safety management requirements for defence systems), not a laboratory test.

{{sub:ARC-REQ-006}} (1oo2D architecture decision) also carried Analysis; updated to Inspection — architecture decisions are verified by design review confirming channel separation is implemented as specified. The sil-3 tag was removed from {{sub:VER-REQ-001}} (the VER test procedure for SUB-REQ-001) since VER entries are test procedures, not safety requirements requiring SIL classification. Result: silWithoutVer 4 → 0.

Ambiguous language in five requirements: The gate flags words including sufficient, flexible, adequate. Three were fixed:

  • {{ifc:IFC-REQ-005}}: “flexible belt chute” → “articulated belt feed chute” (technical description, not a vague qualifier)
  • {{stk:STK-REQ-002}}: “sufficient resolution for positive target identification” → “minimum 0.3 mrad IFOV day-channel resolution, enabling positive target identification” (specific criterion)
  • {{sub:SUB-REQ-031}}: “data sufficient to maintain SYS-REQ-001 hit probability” → “data enabling not less than 0.7 first-round hit probability per SYS-REQ-001” (explicit performance floor)

Remaining: {{sub:SUB-REQ-070}} and {{sub:SUB-REQ-074}} retain “sufficient” in contexts where the word is structural English rather than a vague qualifier (“accuracy sufficient to achieve ≥0.7 Ph”, “either input independently sufficient to de-energise”). These are edge cases tolerated below the ≤3 threshold. Result: ambiguousReqs 5 → 2.

Scenario Validation

Urban Patrol Engagement / Emergency Stop / IED Strike: Previously addressed in session 636 (VER-REQ-106 through VER-REQ-111). Chains confirmed complete.

Field Maintenance Barrel Change: STK-REQ-008→SYS-REQ-015→SUB-REQ-024/SUB-REQ-047 chain was traced end-to-end. SUB-REQ-024 (barrel change mechanism, single maintainer) and SUB-REQ-025 (barrel retention sensor lockout) each had one VER link. SUB-REQ-047 (30-minute WAHA MTTR) had none — the maintainability requirement at the assembly level was unverified. VER-REQ-115 added: a timed demonstration with two qualified armourers, 6 trials, confirming barrel change ≤15min and jam clearance ≤10min with BIT confirmation. Covered.

Degraded Sensor Operation: STK-REQ-002→SYS-REQ-004/005 chain present, but the system-level degraded engagement capability (SUB-REQ-082: 800m range on single sensor, 3s operator alert) had no verification. This is the pivotal scenario requirement — thermal crossover rendering the TI ineffective is the stated operational scenario trigger. VER-REQ-117 added: full-system demonstration with TI fault injected, 5 trials, confirming ≥800m identification range in day channel and ≤3s alert. Gap resolved. SUB-REQ-078 (TI→optical channel failover) remains unverified — budget exhausted, flagged for next session.

Mode Coverage

All 8 modes reviewed against requirement coverage:

ModeEntry reqsBehaviour reqsExit/transition reqsAssessment
Initialization/BITSYS-REQ-012 (90s BIT ceiling) ✓SUB-REQ-001 through SUB-REQ-009 (SIS), FCS BIT reqs ✓SYS-REQ-012 transition gate ✓Complete
SurveillanceSYS-REQ-003/004/005/006 ✓EOSA, TDA, FCS tracking reqs ✓Mode command exit reqs ✓Complete
EngagementSYS-REQ-007 (two-action ARM) ✓SYS-REQ-001/002 ✓SYS-REQ-008/009/010 ✓Complete
Emergency StopSYS-REQ-009/010 ✓TDA brake reqs ✓Reset sequence SUB-REQ-073 ✓Complete
Degraded OperationSUB-REQ-082 ✓ (VER added)SUB-REQ-031/078 ✓ (text)Fault clearance exit ✓Mostly complete
MaintenanceSUB-REQ-007 (lockout) ✓SUB-REQ-047 ✓ (VER added)BIT confirmation exit ✓Complete
Stowed/TravelSUB-REQ-055 ✓CAN heartbeat monitoring ✓BIT power-up gate ✓Complete
Boresight/CalibrationSUB-REQ-081 ✓Automated slew reqs ✓Alignment confirmation ✓Complete

Cross-Domain Findings

The {{entity:dual-channel safety controller}} ({{hex:D6E53058}}) shares 93% Jaccard similarity with {{entity:channel safety controller}} — confirming classification coherence for the 1oo2D architecture. Cross-domain analogs from railway safety (EN 50129, Vital Computer systems) and industrial safety PLC architectures provide independent precedent for the Analysis→Test reclassification of SUB-REQ-001: EN 50129 explicitly requires quantitative SIL verification via FMEDA as a test activity.

The {{entity:ballistic computation module}} ({{hex:41F73B19}}) carries {{trait:Functionally Autonomous}} and {{trait:Processes Signals/Logic}}. Its cybersecurity exposure (SUB-REQ-076 authentication requirement) draws on precedent from avionics FMS data loading (DO-178C), where authenticated mission database loading is mandatory for safety. VER-REQ-116’s replay-attack test case was added based on this analog — avionics precedent shows sequence-counter enforcement is essential to prevent stale-data injection.

Gaps Closed

Six VER requirements added (VER-REQ-112 through VER-REQ-117) with trace links, targeting the highest-risk unverified SUB requirements:

VER RefTargetSILMethod
VER-REQ-112SUB-REQ-077 PDU branch isolationSIL-3Test
VER-REQ-113SUB-REQ-027 TDA DRIVE-INHIBIT 200msSIL-2Test
VER-REQ-114SUB-REQ-075 FCS track loss failoverSIL-2Test
VER-REQ-115SUB-REQ-047 WAHA MTTR 30minSIL-2Demonstration
VER-REQ-116SUB-REQ-076 BCM data authenticationSIL-2Test
VER-REQ-117SUB-REQ-082 Degraded mode 800mDemonstration

verCoverage: 97/113 → 103/113 = 91.2% (target ≥90% ✓).

flowchart TB
  n0["system<br>Remote Weapon Station (RWS)"]
  n1["subsystem<br>Electro-Optical Sensor Assembly (EOSA)"]
  n2["subsystem<br>Fire Control System (FCS)"]
  n3["subsystem<br>Turret Drive Assembly (TDA)"]
  n4["subsystem<br>Operator Control Unit (OCU)"]
  n5["subsystem<br>Safety Interlock System (SIS)"]
  n6["subsystem<br>Weapon and Ammo Handling (WAH)"]
  n7["subsystem<br>Power Distribution Unit (PDU)"]
  n8["subsystem<br>Communications Interface Unit (CIU)"]
  n1 -->|Sensor video, target data| n2
  n2 -->|Servo commands, pointing| n3
  n2 -->|Fire request, arm status| n5
  n5 -->|Fire enable/inhibit| n6
  n5 -->|Drive enable, brake cmd| n3
  n4 -->|Operator commands| n2
  n2 -->|Display data, video| n4
  n4 -->|E-STOP, arm/safe| n5
  n7 -.->|28V/12V/5V power| n1
  n7 -.->|12V/5V power| n2
  n7 -.->|28V drive power| n3
  n8 -->|GPS, BMS target data| n2
  n2 -->|Video export, status| n8

Verdict

Pass — all three quality gate blockers resolved. The five ConOps scenarios are each supported by complete STK→SYS→SUB→VER trace chains. All 7 hazards have IEC 61508 (Functional safety of E/E/PE safety-related systems) compliant safety argument chains: H-001/H-003/H-007 (SIL-3 discharge hazards) have Test-verified hardware interlock independence; H-002/H-006 (SIL-2 motion and control-loss hazards) now have timed Test verifications including cold-temperature brake engagement. The PDU safety-critical branch isolation gap (SUB-REQ-077, SIL-3) was the most significant pre-validation risk; VER-REQ-112 closes it with direct fault injection evidence.

Remaining: SUB-REQ-078 (TI→optical failover, unverified) and two requirements with residual “sufficient” language (SUB-REQ-070, SUB-REQ-074) are below gate thresholds but should be addressed in the next QC pass.

← all entries