Skip to main content

Design of Adaptive Security Mechanisms for Real-Time Embedded Systems

  • Conference paper
Engineering Secure Software and Systems (ESSoS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7159))

Included in the following conference series:

Abstract

Introducing security features in a system is not free and brings along its costs and impacts. Considering this fact is essential in the design of real-time embedded systems which have limited resources. To ensure correct design of these systems, it is important to also take into account impacts of security features on other non-functional requirements, such as performance and energy consumption. Therefore, it is necessary to perform trade-off analysis among non-functional requirements to establish balance among them. In this paper, we target the timing requirements of real-time embedded systems, and introduce an approach for choosing appropriate encryption algorithms at runtime, to achieve satisfaction of timing requirements in an adaptive way, by monitoring and keeping a log of their behaviors. The approach enables the system to adopt a less or more time consuming (but presumably stronger) encryption algorithm, based on the feedback on previous executions of encryption processes. This is particularly important for systems with high degree of complexity which are hard to analyze statistically.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kocher, P., Lee, R., McGraw, G., Raghunathan, A.: Security as a new dimension in embedded system design. In: Proceedings of the 41st Annual Design Automation Conference, DAC 2004, Moderator-Ravi, Srivaths, pp. 753–760 (2004)

    Google Scholar 

  2. Gürgens, S., Rudolph, C., Maña, A., Nadjm-Tehrani, S.: Security engineering for embedded systems: the secfutur vision. In: Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems. S&D4RCES 2010, pp. 7:1–7:6. ACM, New York (2010)

    Google Scholar 

  3. Cysneiros, L.M., do Prado Leite, J.C.S.: Non-functional requirements: From elicitation to conceptual models. IEEE Transactions on Software Engineering 30, 328–350 (2004)

    Article  Google Scholar 

  4. Saadatmand, M., Cicchetti, A., Sjödin, M.: On generating security implementations from models of embedded systems. In: The Sixth International Conference on Software Engineering Advances, ICSEA 2011 (2011)

    Google Scholar 

  5. Enea: The architectural advantages of enea ose in telecom applications, http://www.enea.com/Templates/Landing.aspx?id=27011 (last accessed September 2011)

  6. Wall, A., Andersson, J., Neander, J., Norström, C., Lembke, M.: Introducing Temporal Analyzability Late in the Lifecycle of Complex Real-Time Systems. In: Chen, J., Hong, S. (eds.) RTCSA 2003. LNCS, vol. 2968, pp. 513–528. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Chodrow, S., Jahanian, F., Donner, M.: Run-time monitoring of real-time systems. In: Proceedings of the Twelfth Real-Time Systems Symposium, pp. 74–83 (1991)

    Google Scholar 

  8. Saadatmand, M., Cicchetti, A., Sjödin, M.: Uml-based modeling of non-functional requirements in telecommunication systems. In: The Sixth International Conference on Software Engineering Advances, ICSEA 2011 (2011)

    Google Scholar 

  9. Enea, http://www.enea.com (last accessed September 2011)

  10. Nadeem, A., Javed, M.: A performance comparison of data encryption algorithms. In: First International Conference on Information and Communication Technologies, ICICT 2005, pp. 84–89 (2005)

    Google Scholar 

  11. CPU Killer, http://www.cpukiller.com/ (last accessed September 2011)

  12. Mercuri, R.T., Neumann, P.G.: Security by obscurity. Commun. ACM 46 (2003)

    Google Scholar 

  13. Hissam, S., Weinstock, C., Plakosh, D., Jayatirtha, A.: Perspectives on open source. Software Engineering Institute, Carnegie Mellong, http://www.sei.cmu.edu/library/abstracts/reports/01tr019.cfm (Published November 2001, last accessed September 2011)

  14. Ravi, S., Raghunathan, A., Kocher, P., Hattangady, S.: Security in embedded systems: Design challenges. ACM Transactions on Embedded Computing Systems (TECS) 3, 461–491 (2004)

    Article  Google Scholar 

  15. Lee, J., Kapitanova, K., Son, S.H.: The price of security in wireless sensor networks. Journal of Computer Networks 54, 2967–2978 (2010)

    Article  Google Scholar 

  16. Khalilzad, N.M., Nolte, T., Behnam, M., Åsberg, M.: Towards adaptive hierarchical scheduling of real-time systems. In: 16th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2011) (2011)

    Google Scholar 

  17. Kang, K.D., Son, S.H.: Towards security and qos optimization in real-time embedded systems. SIGBED Rev. 3, 29–34 (2006)

    Article  Google Scholar 

  18. Son, S.H., Zimmerman, R., Hansson, J.: An adaptable security manager for real-time transactions. In: Euromicro Conference on Real-Time Systems, pp. 63–70 (2000)

    Google Scholar 

  19. Xie, T., Qin, X.: Scheduling security-critical real-time applications on clusters. IEEE Transactions on Computers 55, 864–879 (2006)

    Article  Google Scholar 

  20. CHESS Project: Composition with Guarantees for High-integrity Embedded Software Components Assembly, http://chess-project.ning.com/ (last accessed August 2011)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Gilles Barthe Benjamin Livshits Riccardo Scandariato

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Saadatmand, M., Cicchetti, A., Sjödin, M. (2012). Design of Adaptive Security Mechanisms for Real-Time Embedded Systems. In: Barthe, G., Livshits, B., Scandariato, R. (eds) Engineering Secure Software and Systems. ESSoS 2012. Lecture Notes in Computer Science, vol 7159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28166-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28166-2_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28165-5

  • Online ISBN: 978-3-642-28166-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics