Optimization of Message Encryption for Real-Time Applications in Embedded Systems

Today, security can no longer be treated as a secondary issue in embedded and cyber-physical systems. Therefore, one of the main challenges in these domains is the design of secure embedded systems under stringent resource constraints and real-time requirements. However, there exists an inherent trade-off between the security protection provided and the amount of resources allocated for this purpose. That is, the more the amount of resources used for security, the higher the security, but the fewer the number of applications which can be run on the platform and meet their timing requirements. This trade-off is of high importance since embedded systems are often highly resource constrained. In this paper, we propose an efficient solution to maximize confidentiality, while also guaranteeing the timing requirements of real-time applications on shared platforms.

[1]  A. Cervin,et al.  Optimal On-line Sampling Period Assignment for Real-Time Control Tasks Based on Plant State Information , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.

[2]  Petru Eles,et al.  Optimization of message encryption for distributed embedded systems with real-time constraints , 2011, 14th IEEE International Symposium on Design and Diagnostics of Electronic Circuits and Systems.

[3]  Petru Eles,et al.  Intrusion-Damage Assessment and Mitigation in Cyber-Physical Systems for Control Applications , 2016, RTNS.

[4]  Sang Hyuk Son,et al.  Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems , 2006, 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06).

[5]  Xiao Qin,et al.  Improving security for periodic tasks in embedded systems through scheduling , 2007, TECS.

[6]  Hermann Kopetz A solution to an automotive control system benchmark , 1994, 1994 Proceedings Real-Time Systems Symposium.

[7]  Alberto L. Sangiovanni-Vincentelli,et al.  Moving From Federated to Integrated Architectures in Automotive: The Role of Standards, Methods and Tools , 2010, Proceedings of the IEEE.

[8]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[9]  Petru Eles,et al.  Co-design techniques for distributed real-time embedded systems with communication security constraints , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[10]  James W. Layland,et al.  Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment , 1989, JACM.

[11]  Xin-She Yang,et al.  Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.

[12]  Thomas Peyrin,et al.  Security challenges in automotive hardware/software architecture design , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[13]  Amir Aminifar,et al.  Analysis, Design, and Optimization of Embedded Control Systems , 2016 .

[14]  Giorgio C. Buttazzo,et al.  Rate-adaptive tasks: Model, analysis, and design issues , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[15]  Joos Vandewalle,et al.  Linear Cryptanalysis of RC5 and RC6 , 1999, FSE.

[16]  Guido Bertoni,et al.  Cryptographic Hardware and Embedded Systems - CHES 2013: 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings , 2013, Lecture Notes in Computer Science.

[17]  Karl-Erik Årzén,et al.  Feedback–Feedforward Scheduling of Control Tasks , 2002, Real-Time Systems.

[18]  Petru Eles,et al.  Quality-driven synthesis of embedded multi-mode control systems , 2009, 2009 46th ACM/IEEE Design Automation Conference.

[19]  Elaine B. Barker,et al.  Report on the Development of the Advanced Encryption Standard (AES) , 2001, Journal of research of the National Institute of Standards and Technology.

[20]  Giorgio C. Buttazzo,et al.  HARD REAL-TIME COMPUTING SYSTEMS Predictable Scheduling Algorithms and Applications , 2007 .

[21]  Jakob Engblom,et al.  The worst-case execution-time problem—overview of methods and survey of tools , 2008, TECS.

[22]  Yuxin Ding,et al.  Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..

[23]  Michael D. Harrison,et al.  Computer Safety, Reliability, and Security, 27th International Conference, SAFECOMP 2008, Newcastle upon Tyne, UK, September 22-25, 2008, Proceedings , 2008, SAFECOMP.

[24]  Giorgio C. Buttazzo,et al.  Measuring the Performance of Schedulability Tests , 2005, Real-Time Systems.

[25]  Christof Paar,et al.  Embedded Security in Cars: Securing Current and Future Automotive IT Applications , 2005 .

[26]  Man-Ki Yoon,et al.  Real-Time Systems Security through Scheduler Constraints , 2014, 2014 26th Euromicro Conference on Real-Time Systems.

[27]  Burton S. Kaliski,et al.  On the Security of the RC5 Encryption Algorithm , 1998 .

[28]  Meikang Qiu,et al.  Static Security Optimization for Real-Time Systems , 2009, IEEE Transactions on Industrial Informatics.

[29]  Petru Eles,et al.  Optimization of secure embedded systems with dynamic task sets , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[30]  Mokhtar S. Bazaraa,et al.  Nonlinear Programming: Theory and Algorithms , 1993 .

[31]  Srivaths Ravi,et al.  Security in embedded systems: Design challenges , 2004, TECS.

[32]  Srivaths Ravi,et al.  Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..

[33]  Reinhold Heckmann,et al.  Worst case execution time prediction by static program analysis , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[34]  Ragunathan Rajkumar,et al.  Rhythmic Tasks: A New Task Model with Continually Varying Periods for Cyber-Physical Systems , 2012, 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems.