4.8 Article

Static Security Optimization for Real-Time Systems

Journal

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 5, Issue 1, Pages 22-37

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2009.2014055

Keywords

Embedded real-time systems; optimization; security

Funding

  1. National Sciences and Engineering Research Council, Canada (NSERC)
  2. NSFC [60525202]
  3. PCSIRT Program [IRT0652]
  4. U.S. National Science Foundation [CCF-0742187, CNS-0757778, CNS-0831502, OCI-0753305, DUE-0621307, DUE-0830831]
  5. Division Of Computer and Network Systems
  6. Direct For Computer & Info Scie & Enginr [0917137, 0757778] Funding Source: National Science Foundation
  7. Division of Computing and Communication Foundations
  8. Direct For Computer & Info Scie & Enginr [0845257] Funding Source: National Science Foundation
  9. Division Of Undergraduate Education
  10. Direct For Education and Human Resources [837341] Funding Source: National Science Foundation

Ask authors/readers for more resources

An increasing number of real-time applications like railway signaling control systems and medical electronics systems require high quality of security to assure confidentiality and integrity of information. Therefore, it is desirable and essential to fulfill security requirements in security-critical real-time systems. This paper addresses the issue of optimizing quality of security in real-time systems. To meet the needs of a wide variety of security requirements imposed by real-time systems, a group-based security service model is used in which the security services are partitioned into several groups depending on security types. While services within the same security group provide the identical type of security service, the services in the group can achieve different quality of security. Security services from a number of groups can be combined to deliver better quality of security. In this study, we seamlessly integrate the group-based security model with a traditional real-time scheduling algorithm, namely earliest deadline first (EDF). Moreover, we design and develop a security-aware EDF schedulability test. Given a set of real-time tasks with chosen security services, our scheduling scheme aims at optimizing the combined security value of the selected services while guaranteeing the schedulability of the real-time tasks. We study two approaches to solve the security-aware optimization problem. Experimental results show that the combined security values are substantially higher than those achieved by alternatives for real-time tasks without violating real-time constraints.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available