Files
ASF_01_sys_sw_arch/0 system_design/SRS/Traceability_SWRS.csv
2026-02-01 12:52:10 +01:00

36 KiB

1SWR_IDTypeStatusTitleDescriptionSR_IDFeature_IDComponentTest_ID
2SWR-SYS-002Software RequirementSpecifiedFSM Transition EnforcementThe software SHALL enforce valid state transitions as defined in the System State Machine Specification.SR-SYS-001F-SYS-01STMT-SYS-002
3SWR-SYS-003Software RequirementSpecifiedState-Based Operation RestrictionThe software SHALL restrict feature operations based on the current system state according to per-state execution rules.SR-SYS-002F-SYS-01STMT-SYS-003
4SWR-SYS-004Software RequirementSpecifiedState Transition NotificationThe software SHALL notify all registered components when a state transition occurs via the Event System.SR-SYS-003F-SYS-01STM, Event SystemT-SYS-004
5SWR-SYS-006Software RequirementSpecifiedCritical Data Persistence Before TeardownThe software SHALL persist all critical runtime data before completing a teardown sequence.SR-SYS-005F-SYS-02STM, PersistenceT-SYS-006
6SWR-SYS-007Software RequirementSpecifiedData Integrity Protection During ShutdownThe software SHALL prevent data corruption during teardown and reset operations.SR-SYS-006F-SYS-02STM, PersistenceT-SYS-007
7SWR-SYS-008Software RequirementSpecifiedOLED Display InterfaceThe software SHALL provide a local OLED display interface using I2C communication protocol.SR-SYS-007F-SYS-03HMIT-SYS-008
8SWR-SYS-012Software RequirementSpecifiedDiagnostic Session SupportThe software SHALL support diagnostic sessions for retrieving system status and diagnostic data.SR-SYS-011F-SYS-04Debug Session ManagerT-SYS-012
9SWR-SYS-013Software RequirementSpecifiedDebug Session SupportThe software SHALL support debug sessions allowing controlled engineering commands.SR-SYS-012F-SYS-04Debug Session ManagerT-SYS-013
10SWR-SYS-014Software RequirementSpecifiedAuthorized Debug Access ControlThe software SHALL restrict debug session actions to authorized engineering access only.SR-SYS-013F-SYS-04Debug Session Manager, SecurityT-SYS-014
11SWR-SYS-015Software RequirementSpecifiedNon-Intrusive Debug SessionsThe software SHALL ensure debug sessions do not interfere with normal sensor acquisition or communication operations.SR-SYS-013F-SYS-04Debug Session ManagerT-SYS-015
12SWR-DAQ-002Software RequirementSpecifiedDedicated Sensor Slot MappingThe software SHALL assign each supported sensor type to a predefined and unique hardware slot.SR-DAQ-002F-DAQ-01Sensor ManagerT-DAQ-002
13SWR-DAQ-003Software RequirementSpecifiedSensor Presence DetectionThe software SHALL detect the physical presence of each sensor via a dedicated hardware detection signal prior to sensor initialization.SR-DAQ-003F-DAQ-01Sensor Manager, Sensor DriversT-DAQ-003
14SWR-DAQ-004Software RequirementSpecifiedConditional Sensor InitializationThe software SHALL initialize and activate only sensors that are detected as present and enabled.SR-DAQ-004F-DAQ-01Sensor ManagerT-DAQ-004
15SWR-DAQ-005Software RequirementSpecifiedHigh-Frequency Sensor SamplingThe software SHALL sample each enabled sensor multiple times within a single acquisition cycle (default: 10 samples per sensor per cycle).SR-DAQ-005F-DAQ-02Sensor ManagerT-DAQ-005
16SWR-DAQ-006Software RequirementSpecifiedLocal Sensor Data FilteringThe software SHALL apply a local filtering mechanism to raw sensor samples to produce a single filtered sensor value per acquisition cycle.SR-DAQ-006F-DAQ-02Sensor ManagerT-DAQ-006
17SWR-DAQ-007Software RequirementSpecifiedDeterministic Sampling WindowThe software SHALL complete each sensor's sampling and filtering process within a bounded and deterministic time window (maximum 100ms per sensor).SR-DAQ-007F-DAQ-02Sensor ManagerT-DAQ-007
18SWR-DAQ-008Software RequirementSpecifiedTimestamp Generation for Sensor DataThe software SHALL generate a timestamp for each filtered sensor value upon completion of the acquisition and filtering process.SR-DAQ-008F-DAQ-03Sensor Manager, Time UtilsT-DAQ-008
19SWR-DAQ-010Software RequirementSpecifiedAvailability of Latest Sensor DataThe software SHALL maintain the most recent timestamped sensor data record in memory and make it available for persistence and on-demand communication requests.SR-DAQ-010F-DAQ-03Sensor Manager, Data PoolT-DAQ-010
20SWR-DAQ-012Software RequirementSpecifiedNon-Blocking Sensor AcquisitionThe software SHALL perform sensor acquisition in a non-blocking manner.CFC-TIME-01F-DAQ-02Sensor ManagerT-DAQ-012
21SWR-DAQ-013Software RequirementSpecifiedDeterministic Memory AllocationThe software SHALL use deterministic memory allocation for sensor acquisition buffers (no dynamic allocation in acquisition path).CFC-TIME-02F-DAQ-02Sensor ManagerT-DAQ-013
22SWR-DAQ-014Software RequirementSpecifiedSensor Data Event PublishingThe software SHALL publish sensor data updates via the Event System upon completion of each acquisition cycle.Architecture RequirementF-DAQ-03Sensor Manager, Event SystemT-DAQ-014
23SWR-DAQ-015Software RequirementSpecifiedFailed Sensor ExclusionThe software SHALL exclude failed sensors from acquisition cycles as defined by the failure handling model.SR-DQC-009F-DAQ-01Sensor ManagerT-DAQ-015
24SWR-DQC-001Software RequirementSpecifiedDetect Sensor PresenceThe software SHALL detect the physical presence of each sensor using a dedicated hardware-based detection mechanism.SR-DQC-001F-DQC-01Sensor Manager, Sensor DriversT-DQC-001
25SWR-DQC-002Software RequirementSpecifiedPerform Sensor Detection During InitializationThe software SHALL perform sensor presence detection during system startup and after any reinitialization or reconfiguration event.SR-DQC-002F-DQC-01Sensor ManagerT-DQC-002
26SWR-DQC-003Software RequirementSpecifiedConditional Sensor InitializationThe software SHALL initialize and activate only sensors that are detected as present.SR-DQC-003F-DQC-01Sensor ManagerT-DQC-003
27SWR-DQC-004Software RequirementSpecifiedAssign Fixed Sensor Slot TypesThe software SHALL assign each physical sensor slot to a predefined sensor type.SR-DQC-004F-DQC-02Sensor ManagerT-DQC-004
28SWR-DQC-005Software RequirementSpecifiedVerify Sensor Type CompatibilityThe software SHALL verify that a detected sensor matches the expected sensor type for its assigned slot.SR-DQC-005F-DQC-02Sensor ManagerT-DQC-005
29SWR-DQC-006Software RequirementSpecifiedReject Invalid Sensor ConfigurationsThe software SHALL reject and report any sensor-slot mismatch as a diagnostic event.SR-DQC-006F-DQC-02Sensor Manager, DiagnosticsT-DQC-006
30SWR-DQC-007Software RequirementSpecifiedMonitor Sensor HealthThe software SHALL continuously monitor sensor responsiveness and signal validity during normal operation.SR-DQC-007F-DQC-03Sensor ManagerT-DQC-007
31SWR-DQC-009Software RequirementSpecifiedIsolate Failed SensorsThe software SHALL mark detected faulty sensors as defective and exclude them from data acquisition and reporting.SR-DQC-009F-DQC-03Sensor ManagerT-DQC-009
32SWR-DQC-010Software RequirementSpecifiedReport Sensor FailuresThe software SHALL report detected sensor failures to the Main Hub with timestamps and failure classification.SR-DQC-010F-DQC-03Sensor Manager, CommunicationT-DQC-010
33SWR-DQC-012Software RequirementSpecifiedPersist Machine ConstantsThe software SHALL store the Machine Constants dataset in non-volatile storage.SR-DQC-012F-DQC-04Machine Constant Manager, PersistenceT-DQC-012
34SWR-DQC-013Software RequirementSpecifiedLoad Machine Constants at StartupThe software SHALL load and apply the Machine Constants dataset during system initialization.SR-DQC-013F-DQC-04Machine Constant ManagerT-DQC-013
35SWR-DQC-014Software RequirementSpecifiedSupport Remote Machine Constants UpdateThe software SHALL support remote updates of the Machine Constants dataset initiated by the Main Hub.SR-DQC-014F-DQC-04Machine Constant Manager, CommunicationT-DQC-014
36SWR-DQC-015Software RequirementSpecifiedControlled Reinitialization After UpdateThe software SHALL apply updated Machine Constants only after executing a controlled teardown and reinitialization procedure.SR-DQC-015F-DQC-04Machine Constant Manager, STMT-DQC-015
37SWR-DQC-016Software RequirementSpecifiedMachine Constants Integrity ValidationThe software SHALL validate Machine Constants integrity before applying updates.SR-SEC-008F-DQC-04Machine Constant Manager, SecurityT-DQC-016
38SWR-DQC-018Software RequirementSpecifiedMachine Constants Access via DPThe software SHALL access Machine Constants only through the DP component.CFC-ARCH-01F-DQC-04Machine Constant Manager, PersistenceT-DQC-018
39SWR-COM-001Software RequirementSpecifiedBidirectional Main Hub CommunicationThe software SHALL support bidirectional communication between the Sensor Hub and the Main Hub.SR-COM-001F-COM-01Main Hub APIs, Network StackT-COM-001
40SWR-COM-004Software RequirementSpecifiedMonitor Communication Link StatusThe software SHALL monitor the status of the communication link with the Main Hub and report link availability and failure conditions.SR-COM-004F-COM-01Network StackT-COM-004
41SWR-COM-005Software RequirementSpecifiedSupport On-Demand Data RequestsThe software SHALL support on-demand requests from the Main Hub for sensor data.SR-COM-005F-COM-02Main Hub APIsT-COM-005
42SWR-COM-006Software RequirementSpecifiedRespond with Latest Sensor DataThe software SHALL respond to on-demand data requests with the most recent timestamped sensor data.SR-COM-006F-COM-02Main Hub APIs, Data PoolT-COM-006
43SWR-COM-007Software RequirementSpecifiedInclude Data Validity in ResponsesThe software SHALL include sensor status and data validity information in on-demand data responses.SR-COM-007F-COM-02Main Hub APIsT-COM-007
44SWR-COM-008Software RequirementSpecifiedSupport Peer Sensor Hub CommunicationThe software SHALL support limited peer-to-peer communication between Sensor Hubs for connectivity checks and time synchronization.SR-COM-008F-COM-03Network StackT-COM-008
45SWR-COM-009Software RequirementSpecifiedIsolate Peer CommunicationThe software SHALL ensure that peer Sensor Hub communication does not interfere with Main Hub communication or control operations.SR-COM-010F-COM-03Network StackT-COM-009
46SWR-COM-010Software RequirementSpecifiedEncrypted Main Hub CommunicationThe software SHALL encrypt all communication with the Main Hub using authenticated encryption.SR-SEC-009F-COM-01Network Stack, SecurityT-COM-010
47SWR-COM-011Software RequirementSpecifiedMessage Integrity and AuthenticityThe software SHALL ensure integrity and authenticity of all transmitted and received messages.SR-SEC-010F-COM-01Network Stack, SecurityT-COM-011
48SWR-COM-012Software RequirementSpecifiedState-Restricted CommunicationThe software SHALL limit communication operations during TEARDOWN state to session closure only.CFC-ARCH-02F-COM-01Network StackT-COM-012
49SWR-COM-013Software RequirementSpecifiedNon-Blocking CommunicationThe software SHALL perform communication operations in a non-blocking manner.CFC-TIME-01F-COM-01Network StackT-COM-013
50SWR-COM-014Software RequirementSpecifiedCommunication Link Failure ReportingThe software SHALL report communication link failures as diagnostic events according to the failure handling model.SR-COM-004F-COM-01Network Stack, DiagnosticsT-COM-014
51SWR-COM-015Software RequirementSpecifiedSecurity Violation ReportingThe software SHALL detect and report communication security violations to the Main Hub.SR-SEC-012F-COM-01Network Stack, SecurityT-COM-015
52SWR-DIAG-002Software RequirementSpecifiedAssign Unique Diagnostic CodesThe software SHALL assign a unique diagnostic code to each detected fault or abnormal condition.SR-DIAG-002F-DIAG-01Diagnostics TaskT-DIAG-002
53SWR-DIAG-004Software RequirementSpecifiedTimestamp and Source DiagnosticsThe software SHALL associate each diagnostic event with a timestamp and the originating system component.SR-DIAG-004F-DIAG-01Diagnostics TaskT-DIAG-004
54SWR-DIAG-005Software RequirementSpecifiedPersist Diagnostic EventsThe software SHALL persist diagnostic events in non-volatile storage.SR-DIAG-005F-DIAG-02Diagnostics Task, PersistenceT-DIAG-005
55SWR-DIAG-006Software RequirementSpecifiedRetain Diagnostics Across ResetsThe software SHALL retain diagnostic data across system resets and power cycles.SR-DIAG-006F-DIAG-02Diagnostics Task, PersistenceT-DIAG-006
56SWR-DIAG-007Software RequirementSpecifiedBounded Diagnostic StorageThe software SHALL implement a bounded diagnostic storage mechanism with a defined overwrite or rollover policy.SR-DIAG-007F-DIAG-02Diagnostics Task, PersistenceT-DIAG-007
57SWR-DIAG-008Software RequirementSpecifiedProvide Diagnostic Session InterfaceThe software SHALL provide a diagnostic session interface for accessing diagnostic and system health data.SR-DIAG-008F-DIAG-03Diagnostics TaskT-DIAG-008
58SWR-DIAG-009Software RequirementSpecifiedRetrieve Diagnostic RecordsThe software SHALL allow authorized diagnostic sessions to retrieve stored diagnostic events.SR-DIAG-009F-DIAG-03Diagnostics TaskT-DIAG-009
59SWR-DIAG-010Software RequirementSpecifiedClear Diagnostic RecordsThe software SHALL allow authorized diagnostic sessions to clear stored diagnostic records.SR-DIAG-010F-DIAG-03Diagnostics TaskT-DIAG-010
60SWR-DIAG-011Software RequirementSpecifiedNon-Intrusive Diagnostic SessionsThe software SHALL ensure that diagnostic sessions do not interfere with normal sensor acquisition or communication operations.SR-DIAG-011F-DIAG-03Diagnostics TaskT-DIAG-011
61SWR-DIAG-012Software RequirementSpecifiedFault-to-State TransitionThe software SHALL trigger state transitions based on diagnostic severity according to the failure handling model.Failure Handling ModelF-DIAG-01Diagnostics Task, Error HandlerT-DIAG-012
62SWR-DIAG-013Software RequirementSpecifiedFault Latching BehaviorThe software SHALL implement fault latching behavior as defined in the failure handling model.Failure Handling ModelF-DIAG-01Error HandlerT-DIAG-013
63SWR-DIAG-014Software RequirementSpecifiedFault Escalation RulesThe software SHALL implement fault escalation rules as defined in the failure handling model.Failure Handling ModelF-DIAG-01Error HandlerT-DIAG-014
64SWR-DIAG-016Software RequirementSpecifiedDiagnostic Information via HMIThe software SHALL provide diagnostic information through the local OLED menu interface.SR-SYS-010F-DIAG-03Diagnostics Task, HMIT-DIAG-016
65SWR-DIAG-017Software RequirementSpecifiedDiagnostic Storage Access via DPThe software SHALL access diagnostic storage only through the DP component.CFC-ARCH-01F-DIAG-02Diagnostics Task, PersistenceT-DIAG-017
66SWR-DIAG-018Software RequirementSpecifiedState-Restricted Diagnostic GenerationThe software SHALL NOT generate new diagnostic events during TEARDOWN state (except teardown-specific diagnostics).CFC-ARCH-02F-DIAG-01Diagnostics TaskT-DIAG-018
67SWR-DATA-001Software RequirementSpecifiedPersistent Timestamped Sensor DataThe software SHALL persist timestamped sensor data in non-volatile storage.SR-DATA-001F-DATA-01PersistenceT-DATA-001
68SWR-DATA-003Software RequirementSpecifiedConfigurable Data Retention PolicyThe software SHALL support configurable data retention and overwrite policies for persisted sensor data.SR-DATA-003F-DATA-01PersistenceT-DATA-003
69SWR-DATA-004Software RequirementSpecifiedData Persistence Component InterfaceThe software SHALL provide a Data Persistence (DP) component as the sole interface for persistent data access.SR-DATA-004F-DATA-02PersistenceT-DATA-004
70SWR-DATA-005Software RequirementSpecifiedStorage Access IsolationThe software SHALL prevent application and feature modules from directly accessing storage hardware.SR-DATA-005F-DATA-02PersistenceT-DATA-005
71SWR-DATA-006Software RequirementSpecifiedStructured Data SerializationThe DP component SHALL support serialization and deserialization of structured system data.SR-DATA-006F-DATA-02PersistenceT-DATA-006
72SWR-DATA-007Software RequirementSpecifiedData Flush Before TeardownThe software SHALL flush all critical runtime data to non-volatile storage before entering a controlled teardown or reset state.SR-DATA-007F-DATA-03Persistence, STMT-DATA-007
73SWR-DATA-008Software RequirementSpecifiedData Integrity During UpdatesThe software SHALL protect data integrity during firmware updates and machine constant updates.SR-DATA-008F-DATA-03Persistence, OTA ManagerT-DATA-008
74SWR-DATA-009Software RequirementSpecifiedPersistence VerificationThe software SHALL verify successful data persistence before completing a system state transition.SR-DATA-009F-DATA-03Persistence, STMT-DATA-009
75SWR-DATA-010Software RequirementSpecifiedState-Restricted Data WritesThe software SHALL NOT perform data write operations during TEARDOWN state unless explicitly authorized by the System Manager.CFC-DATA-02F-DATA-03PersistenceT-DATA-010
76SWR-DATA-011Software RequirementSpecifiedPersistence Completion ConfirmationThe software SHALL ensure persistence completion is confirmed before state transitions.CFC-DATA-02F-DATA-03Persistence, STMT-DATA-011
77SWR-DATA-012Software RequirementSpecifiedSD Card Failure HandlingThe software SHALL handle SD card failures gracefully by entering SD_DEGRADED state and disabling persistence writes.System State Machine SpecificationF-DATA-01Persistence, STMT-DATA-012
78SWR-DATA-013Software RequirementSpecifiedWear-Aware Storage ManagementThe software SHALL implement wear-aware storage management to prevent premature SD card failure.Quality RequirementF-DATA-01PersistenceT-DATA-013
79SWR-DATA-014Software RequirementSpecifiedSingle Source of TruthThe software SHALL maintain a single source of truth for runtime and persistent data through the DP component.CFC-DATA-01F-DATA-02Data Pool, PersistenceT-DATA-014
80SWR-DATA-015Software RequirementSpecifiedNo Private Persistent CopiesThe software SHALL NOT allow features to maintain private persistent copies of shared system data.CFC-DATA-01F-DATA-02All ComponentsT-DATA-015
81SWR-OTA-001Software RequirementSpecifiedOTA Negotiation SupportThe software SHALL support OTA update negotiation initiated by the Main Hub.SR-OTA-001F-OTA-01OTA ManagerT-OTA-001
82SWR-OTA-002Software RequirementSpecifiedOTA Readiness ValidationThe software SHALL verify internal readiness conditions before accepting an OTA update request.SR-OTA-002F-OTA-01OTA ManagerT-OTA-002
83SWR-OTA-003Software RequirementSpecifiedOTA AcknowledgementThe software SHALL explicitly acknowledge or reject OTA update requests.SR-OTA-003F-OTA-01OTA ManagerT-OTA-003
84SWR-OTA-004Software RequirementSpecifiedFirmware ReceptionThe software SHALL receive firmware images over the established communication interface.SR-OTA-004F-OTA-02OTA Manager, Network StackT-OTA-004
85SWR-OTA-005Software RequirementSpecifiedFirmware Temporary StorageThe software SHALL store received firmware images in non-volatile storage prior to validation.SR-OTA-005F-OTA-02OTA Manager, PersistenceT-OTA-005
86SWR-OTA-006Software RequirementSpecifiedActive Firmware ProtectionThe software SHALL prevent overwriting the active firmware during firmware reception.SR-OTA-006F-OTA-02OTA ManagerT-OTA-006
87SWR-OTA-007Software RequirementSpecifiedFirmware Integrity VerificationThe software SHALL validate the integrity of received firmware images before activation.SR-OTA-007F-OTA-03OTA Manager, SecurityT-OTA-007
88SWR-OTA-008Software RequirementSpecifiedFirmware Rejection HandlingThe software SHALL reject firmware images that fail integrity validation.SR-OTA-008F-OTA-03OTA ManagerT-OTA-008
89SWR-OTA-009Software RequirementSpecifiedOTA Status ReportingThe software SHALL report firmware validation and OTA status to the Main Hub.SR-OTA-009F-OTA-03OTA Manager, CommunicationT-OTA-009
90SWR-OTA-010Software RequirementSpecifiedOTA Teardown ExecutionThe software SHALL execute a controlled teardown procedure prior to firmware activation.SR-OTA-010F-OTA-04OTA Manager, STMT-OTA-010
91SWR-OTA-011Software RequirementSpecifiedData Persistence Before FlashingThe software SHALL persist critical runtime data and calibration data before flashing new firmware.SR-OTA-011F-OTA-04OTA Manager, PersistenceT-OTA-011
92SWR-OTA-012Software RequirementSpecifiedControlled Firmware ActivationThe software SHALL activate new firmware only after successful integrity validation.SR-OTA-012F-OTA-04OTA ManagerT-OTA-012
93SWR-OTA-013Software RequirementSpecifiedOTA Reboot ExecutionThe software SHALL reboot into the new firmware after successful activation.SR-OTA-013F-OTA-04OTA ManagerT-OTA-013
94SWR-OTA-014Software RequirementSpecifiedEncrypted OTA CommunicationThe software SHALL use encrypted and authenticated communication channels for OTA firmware updates.SR-SEC-011F-OTA-02OTA Manager, SecurityT-OTA-014
95SWR-OTA-015Software RequirementSpecifiedOTA State TransitionThe software SHALL transition to OTA_PREP state upon accepting an OTA request.System State Machine SpecificationF-OTA-01OTA Manager, STMT-OTA-015
96SWR-OTA-017Software RequirementSpecifiedOTA Duration LimitThe software SHALL complete OTA operations within a maximum duration of 10 minutes.Quality RequirementF-OTA-04OTA ManagerT-OTA-017
97SWR-OTA-018Software RequirementSpecifiedOTA Failure HandlingThe software SHALL handle OTA failures by transitioning to FAULT state and reporting the failure.System State Machine SpecificationF-OTA-04OTA Manager, STMT-OTA-018
98SWR-OTA-019Software RequirementSpecifiedActive Firmware Corruption ProtectionThe software SHALL protect active firmware from corruption during OTA operations.SR-OTA-006F-OTA-02OTA ManagerT-OTA-019
99SWR-OTA-020Software RequirementSpecifiedFirmware Authenticity VerificationThe software SHALL verify firmware authenticity using secure boot mechanisms before execution.SR-SEC-001F-OTA-04OTA Manager, SecurityT-OTA-020
100SWR-SEC-001Software RequirementSpecifiedFirmware Authenticity VerificationThe software SHALL verify the authenticity of the firmware image before execution during every boot cycle.SR-SEC-001F-SEC-01SecurityT-SEC-001
101SWR-SEC-002Software RequirementSpecifiedUnauthorized Firmware BlockingThe software SHALL prevent execution of firmware images that fail cryptographic verification.SR-SEC-002F-SEC-01SecurityT-SEC-002
102SWR-SEC-003Software RequirementSpecifiedSecure Boot Failure HandlingThe software SHALL enter BOOT_FAILURE state when secure boot verification fails.SR-SEC-003F-SEC-01Security, STMT-SEC-003
103SWR-SEC-004Software RequirementSpecifiedRoot-of-Trust ProtectionThe software SHALL protect the root-of-trust against unauthorized modification.SR-SEC-004F-SEC-01SecurityT-SEC-004
104SWR-SEC-005Software RequirementSpecifiedFlash Data Access ProtectionThe software SHALL protect sensitive data stored in internal flash memory from unauthorized access.SR-SEC-005F-SEC-02SecurityT-SEC-005
105SWR-SEC-006Software RequirementSpecifiedEncrypted External StorageThe software SHALL support encryption of sensitive data stored in external storage devices.SR-SEC-006F-SEC-02Security, PersistenceT-SEC-006
106SWR-SEC-007Software RequirementSpecifiedCryptographic Key IsolationThe software SHALL restrict access to cryptographic keys to authorized system components only.SR-SEC-007F-SEC-02SecurityT-SEC-007
107SWR-SEC-009Software RequirementSpecifiedEncrypted Main Hub CommunicationThe software SHALL encrypt all communication with the Main Hub.SR-SEC-009F-SEC-03Network Stack, SecurityT-SEC-009
108SWR-SEC-010Software RequirementSpecifiedMessage Integrity and AuthenticityThe software SHALL ensure integrity and authenticity of all transmitted and received messages.SR-SEC-010F-SEC-03Network Stack, SecurityT-SEC-010
109SWR-SEC-011Software RequirementSpecifiedSecure OTA Data TransferThe software SHALL use encrypted and authenticated communication channels for OTA firmware updates.SR-SEC-011F-SEC-03OTA Manager, SecurityT-SEC-011
110SWR-SEC-012Software RequirementSpecifiedSecurity Violation ReportingThe software SHALL detect and report communication and security violations to the Main Hub.SR-SEC-012F-SEC-03Security, CommunicationT-SEC-012
111SWR-SEC-013Software RequirementSpecifiedSecurity First InitializationThe software SHALL enable secure boot and flash protection before any application-level logic executes.CFC-SEC-01F-SEC-01SecurityT-SEC-013
112SWR-SEC-014Software RequirementSpecifiedDebug Session AuthenticationThe software SHALL authenticate debug sessions before allowing debug operations.SR-SYS-013F-SEC-03Security, Debug Session ManagerT-SEC-014
113SWR-SEC-015Software RequirementSpecifiedDebug Security Bypass PreventionThe software SHALL NOT allow debug sessions to bypass security or safety mechanisms.CFC-DBG-01F-SEC-03Security, Debug Session ManagerT-SEC-015
114SWR-SEC-016Software RequirementSpecifiedSecurity Violation Diagnostic ReportingThe software SHALL report security violations as FATAL diagnostic events.Failure Handling ModelF-SEC-01Security, DiagnosticsT-SEC-016
115SWR-SEC-017Software RequirementSpecifiedCryptographic Key ProtectionThe software SHALL protect cryptographic keys during power loss and system resets.Quality RequirementF-SEC-02SecurityT-SEC-017
116SWR-SEC-018Software RequirementSpecifiedSecure Session EstablishmentThe software SHALL implement secure session establishment for all external communication.SR-SEC-009F-SEC-03Network Stack, SecurityT-SEC-018
117SWR-SEC-019Software RequirementSpecifiedMessage Integrity ValidationThe software SHALL validate message integrity on every received message.SR-SEC-010F-SEC-03Network Stack, SecurityT-SEC-019
118SWR-SEC-020Software RequirementSpecifiedDowngrade Attack PreventionThe software SHALL prevent downgrade attacks by verifying firmware version integrity.Quality RequirementF-SEC-01Security, OTA ManagerT-SEC-020
119SWR-IF-001Software RequirementSpecifiedMain Hub Communication InterfaceThe software SHALL provide a communication interface to the Main Hub supporting bidirectional data exchange.SR-COM-001F-COM-01Main Hub APIs, Network StackT-IF-001
120SWR-IF-003Software RequirementSpecifiedOLED Display InterfaceThe software SHALL provide an I2C interface for OLED display communication.SR-SYS-007F-SYS-03HMIT-IF-003
121SWR-IF-005Software RequirementSpecifiedStorage InterfacesThe software SHALL provide storage interfaces for SD card and NVM access.Architecture RequirementF-DATA-01SD Card Driver, NVM DriverT-IF-005
122SWR-IF-006Software RequirementSpecifiedDebug InterfaceThe software SHALL provide a debug interface (UART/USB) for diagnostic and debug sessions.SR-SYS-011F-SYS-04Debug Session Manager, UART DriverT-IF-006
123SWR-IF-007Software RequirementSpecifiedEvent System InterfaceThe software SHALL provide an Event System interface for cross-component communication.Architecture RequirementAll FeaturesEvent SystemT-IF-007
124SWR-IF-008Software RequirementSpecifiedData Pool InterfaceThe software SHALL provide a Data Pool interface for runtime data access.Architecture RequirementAll FeaturesData PoolT-IF-008
125SWR-IF-009Software RequirementSpecifiedData Persistence InterfaceThe software SHALL provide a Data Persistence (DP) component interface for persistent storage access.SR-DATA-004F-DATA-02PersistenceT-IF-009
126SWR-IF-010Software RequirementSpecifiedSystem State Manager InterfaceThe software SHALL provide a System State Manager interface for state queries and transitions.SR-SYS-001F-SYS-01STMT-IF-010
127SWR-IF-011Software RequirementSpecifiedDiagnostics InterfaceThe software SHALL provide a Diagnostics interface for fault reporting and querying.SR-DIAG-001F-DIAG-01Diagnostics TaskT-IF-011
128SWR-IF-012Software RequirementSpecifiedError Handler InterfaceThe software SHALL provide an Error Handler interface for fault classification and escalation.Failure Handling ModelAll FeaturesError HandlerT-IF-012
129SWR-PERF-001Software RequirementSpecifiedSensor Acquisition Cycle TimingThe software SHALL complete sensor acquisition cycles within 100ms per sensor.SR-DAQ-007Sensor AcquisitionSensor ManagerT-PERF-001
130SWR-PERF-003Software RequirementSpecifiedData Persistence TimingThe software SHALL complete data persistence operations within 200ms.Quality RequirementData PersistencePersistenceT-PERF-003
131SWR-PERF-004Software RequirementSpecifiedOTA Operation DurationThe software SHALL complete OTA operations within 10 minutes.SWR-OTA-017Firmware UpdateOTA ManagerT-PERF-004
132SWR-PERF-005Software RequirementSpecifiedCPU Utilization LimitThe software SHALL maintain CPU utilization below 80% during normal operation.Quality RequirementSystem PerformanceAll ComponentsT-PERF-005
133SWR-PERF-006Software RequirementSpecifiedRAM Usage LimitThe software SHALL maintain RAM usage below 60% of available memory.Quality RequirementSystem PerformanceAll ComponentsT-PERF-006
134SWR-PERF-007Software RequirementSpecifiedMain Hub Response TimeThe software SHALL respond to Main Hub data requests within 100ms.SR-COM-005CommunicationMain Hub APIs, Data PoolT-PERF-007
135SWR-PERF-008Software RequirementSpecifiedCommunication Link Failure DetectionThe software SHALL detect communication link failures within 30 seconds.SR-COM-004CommunicationNetwork StackT-PERF-008
136SWR-DESIGN-001Software RequirementSpecifiedNo Dynamic Memory in Acquisition PathThe software SHALL NOT use dynamic memory allocation in sensor acquisition paths.CFC-TIME-02Sensor AcquisitionSensor ManagerT-DESIGN-001
137SWR-DESIGN-002Software RequirementSpecifiedNon-Blocking OperationsThe software SHALL implement all features as non-blocking operations.CFC-TIME-01All FeaturesAll ComponentsT-DESIGN-002
138SWR-DESIGN-003Software RequirementSpecifiedHardware Access via DriversThe software SHALL access hardware only through driver and OSAL layers.CFC-ARCH-01All FeaturesAll ComponentsT-DESIGN-003
139SWR-DESIGN-004Software RequirementSpecifiedStorage Access via DPThe software SHALL access persistent storage only through the DP component.CFC-ARCH-01All FeaturesAll ComponentsT-DESIGN-004
140SWR-DESIGN-005Software RequirementSpecifiedState-Aware OperationsThe software SHALL respect system state restrictions for all operations.CFC-ARCH-02All FeaturesAll ComponentsT-DESIGN-005
141SWR-DESIGN-006Software RequirementSpecifiedEvent System CommunicationThe software SHALL use the Event System for all cross-component communication.Architecture RequirementAll FeaturesAll ComponentsT-DESIGN-006
142SWR-QUAL-001Software RequirementSpecifiedPower Interruption RecoveryThe software SHALL recover gracefully from power interruptions (< 1 second).System AssumptionsSystem ReliabilityAll ComponentsT-QUAL-001
143SWR-QUAL-002Software RequirementSpecifiedSD Card Failure HandlingThe software SHALL handle SD card failures without system failure.System LimitationsData PersistencePersistence, STMT-QUAL-002
144SWR-QUAL-003Software RequirementSpecifiedData Integrity During UpdatesThe software SHALL maintain data integrity during firmware updates.SR-DATA-008Data IntegrityOTA Manager, PersistenceT-QUAL-003
145SWR-QUAL-004Software RequirementSpecifiedUnauthorized Firmware PreventionThe software SHALL prevent unauthorized firmware execution.SR-SEC-001SecuritySecurity, OTA ManagerT-QUAL-004
146SWR-QUAL-005Software RequirementSpecifiedDeterministic BehaviorThe software SHALL provide deterministic behavior under all operational conditions.CFC-TIME-02System ReliabilityAll ComponentsT-QUAL-005