Dynamic security management for real-time embedded applications in industrial networks

Display Omitted Introducing security-critical applications based on embedded control server systems for industrial networks.Establishing the security-aware task, security overhead and risk models for aperiodic real-time applications.Combining the soft real-time and security requirements into a unified framework.Deploying proportional controllers to achieve satisfied fine-grained control. Widely deployed real-time embedded systems can improve the performance of industrial applications, but these systems also face the critical challenge of providing high quality security in an unpredictable network environment. We measure the time and energy consumptions of commonly used cryptographic algorithms on a real embedded platform and introduce a method to quantify the security risk of real-time applications. We propose a Dynamic Security Risk Management (DSRM) mechanism to manage the aperiodic real-time tasks for networked industrial applications. Inspired by the feedback design philosophy, DSRM is designed as a two-level control mechanism. The upper-level component makes efforts to admit or reject the arrival tasks and assigns the reasonable security level for each admitted task. With three proportional feedback controllers at the lower level, the security level of each ready task can be adjusted adaptively according to the dynamic environments. Simulation results show the superiority of the proposed mechanism.

[1]  Adriano Valenzano,et al.  Review of Security Issues in Industrial Networks , 2013, IEEE Transactions on Industrial Informatics.

[2]  Frank Mueller,et al.  Feedback EDF scheduling exploiting dynamic voltage scaling , 2004, Proceedings. RTAS 2004. 10th IEEE Real-Time and Embedded Technology and Applications Symposium, 2004..

[3]  Nan Sang,et al.  An Adaptive Risk Control and Security Management for Embedded Real-Time System , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.

[4]  Henning Schulzrinne,et al.  Peer-to-peer overlays for real-time communication: security issues and solutions , 2009, IEEE Communications Surveys & Tutorials.

[5]  Chenyang Lu,et al.  Feedback performance control in software services , 2003 .

[6]  Mohammed I. Alghamdi,et al.  Improving Security of Real-Time Wireless Networks Through Packet Scheduling [Transactions Letters] , 2008, IEEE Transactions on Wireless Communications.

[7]  Rabi N. Mahapatra,et al.  Feedback-controlled reliability-aware power management for real-time embedded systems , 2008, 2008 45th ACM/IEEE Design Automation Conference.

[8]  Chenyang Lu,et al.  Feedback Thermal Control for Real-time Systems , 2010, 2010 16th IEEE Real-Time and Embedded Technology and Applications Symposium.

[9]  Peng Ning,et al.  A Resilient Real-Time System Design for a Secure and Reconfigurable Power Grid , 2011, IEEE Transactions on Smart Grid.

[10]  Chung Laung Liu,et al.  Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment , 1989, JACM.

[11]  Petru Eles,et al.  Co-design techniques for distributed real-time embedded systems with communication security constraints , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[12]  Shanshan Song,et al.  Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling , 2006, IEEE Transactions on Computers.

[13]  Anand Sivasubramaniam,et al.  Storage Performance Virtualization via Throughput and Latency Control , 2005, MASCOTS.

[14]  Ashish Gehani,et al.  RheoStat: Real-Time Risk Management , 2004, RAID.

[15]  Zdravko Karakehayov,et al.  Wireless ad hoc networks: Where security, real-time and lifetime meet , 2008, IMCSIT.

[16]  Chenyang Lu,et al.  Feedback utilization control in distributed real-time systems with end-to-end tasks , 2005, IEEE Transactions on Parallel and Distributed Systems.

[17]  Srivaths Ravi,et al.  A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.

[18]  Catherine H. Gebotys Low energy security optimization in embedded cryptographic systems , 2004, CODES+ISSS '04.

[19]  R. Zurawski Networked embedded systems in industrial automation , 2008, 2008 6th IEEE International Conference on Industrial Informatics.

[20]  Sang Hyuk Son,et al.  Feedback Control Real-Time Scheduling: Framework, Modeling, and Algorithms* , 2001, Real-Time Systems.

[21]  Meikang Qiu,et al.  Static Security Optimization for Real-Time Systems , 2009, IEEE Transactions on Industrial Informatics.

[22]  Xiao Qin,et al.  Scheduling security-critical real-time applications on clusters , 2006, IEEE Transactions on Computers.