Design optimization for security- and safety-critical distributed real-time applications

被引:40
作者
Jiang, Wei [1 ]
Pop, Paul [2 ]
Jiang, Ke [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu, Sichuan, Peoples R China
[2] Tech Univ Denmark, Dept Compute, Lyngby, Denmark
[3] AF Technol AB, Boras, Vastra Gotaland, Sweden
基金
中国国家自然科学基金;
关键词
Embedded system; Security; Safety; Energy; Design optimization;
D O I
10.1016/j.micpro.2016.08.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we are interested in the design of real-time applications with security, safety, timing, and energy requirements. The applications are scheduled with cyclic scheduling, and are mapped on distributed heterogeneous architectures. Cryptographic services are deployed to satisfy security requirements on confidentiality of messages, task replication is used to enhance system reliability, and dynamic voltage and frequency scaling is used for energy efficiency of tasks. It is challenging to address these factors simultaneously, e.g., better security protections need more computing resources and consume more energy, while lower voltages and frequencies may impair schedulability and security, and also lead to reliability degradation. We introduce a vulnerability based method to quantify the security performance of communications on distributed systems. We then focus on determining the appropriate security measures for messages, the voltage and frequency levels for tasks, and the schedule tables such that the security and reliability requirements are satisfied, the application is schedulable, and the energy consumption is minimized. We propose a Tabu Search based metaheuristic to solve this problem. Extensive experiments and a real-life application are conducted to evaluate the proposed techniques. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:401 / 415
页数:15
相关论文
共 25 条
  • [1] [Anonymous], 2010, P INT C POW AW COMP, DOI DOI 10.5555/1924920.1924921
  • [2] Minimizing CPU Energy in Real-Time Systems with Discrete Speed Management
    Bini, Enrico
    Buttazzo, Giorgio
    Lipari, Giuseppe
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2009, 8 (04)
  • [3] Battery power-aware encryption
    Stevens Institute of Technology
    不详
    不详
    不详
    [J]. ACM Trans. Inf. Syst. Secur., 2006, 2 (162-180):
  • [4] Trends and challenges in VLSI circuit reliability
    Constantinescu, C
    [J]. IEEE MICRO, 2003, 23 (04) : 14 - 19
  • [5] Contini S., 1998, The Security of the RC6 Block Cipher
  • [6] Dick RP, 1998, HARDW SOFTW CODES, P97, DOI 10.1109/HSC.1998.666245
  • [7] Scheduling with bus access optimization for distributed embedded systems
    Eles, P
    Doboli, A
    Pop, P
    Peng, Z
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2000, 8 (05) : 472 - 491
  • [8] Security threats to automotive CAN networks-Practical examples and selected short-term countermeasures
    Hoppe, Tobias
    Kiltz, Stefan
    Dittmann, Jana
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2011, 96 (01) : 11 - 25
  • [9] Design optimization of time- and cost-constrained fault-tolerant distributed embedded systems
    Izosimov, V
    Pop, P
    Eles, P
    Peng, Z
    [J]. DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, VOLS 1 AND 2, PROCEEDINGS, 2005, : 864 - 869
  • [10] Jiang K, 2012, DES AUT TEST EUROPE, P947