A Security-Critical Task Management Method for Distributed Real-Time Systems

  • Yang Yu
  • Qi DongEmail author
  • Zhipeng Luo
  • Hao Chen
  • Jun Deng
  • Wei Guan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9532)


Security has become an important constraint in distributed real-time task system. For this paper, we give a security-critical distributed real-time task management model, then present a scheme for security-critical task management in the distributed real-time system, finally we propose an algorithm to solve the management problem in the distributed real-time system. We propose a security-critical distributed real-time task management model, and formulate the security-critical distributed real-time system task management issue into a shortest path problem. We solve the shortest path problem by using the improved Dijkstra algorithm. In addition, we validate the efficiency of the algorithm by simulation experiments.


Security-critical Distributed real-time system Task management Shortest path algorithm 


  1. 1.
    Loyall, J., Schantz, R.: A distributed real-time embedded application for surveillance, detection, and tracking of time critical targets. In: Proceedings of the 11th IEEE Real-Time and Embedded Technology and Applications Symposium, pp. 88–97 (2005)Google Scholar
  2. 2.
    Xie, T., Qin, X.: Security-aware resource allocation for real-time parallel jobs on homogeneous and heterogeneous clusters. IEEE Trans. Parallel Distrib. Syst. 19, 682–697 (2008)CrossRefGoogle Scholar
  3. 3.
    Xie, T., Qin, X.: Performance evaluation of a new management algorithm for distributed systems with security heterogeneity. J. Parallel Distrib. Comput. 67(10), 1067–1081 (2007)CrossRefzbMATHGoogle Scholar
  4. 4.
    Xie, T., Qin, X., Sung, A.: SAREC: a security-aware management strategy for real-time applications on clusters. In: Proceeding of ICPP 2005 Conference, Norway, pp. 5–12 (2005)Google Scholar
  5. 5.
    Huang, J., Wang, Y., Cao, F.: On developing distributed middleware services for QoS and criticality-based resource negotiation and adaptation. Real-Time Syst. 16(2), 187–221 (2007)Google Scholar
  6. 6.
    Jinyu, Z., Guangze, X.: Optimal hardware/software co-synthesis for core-based SoC designs. J. Syst. Eng. Electron. 17(2), 402–409 (2006)CrossRefzbMATHGoogle Scholar
  7. 7.
    Apvrille, A., Pourzandi, M.: XML distributed security policy for clusters. Comput. Secur. J. 23(8), 649–658 (2007)CrossRefGoogle Scholar
  8. 8.
    Azzedin, F., Maheswaran, M.: Towards trust-aware resource management in grid computing systems. In: Proceedings of the Second IEEE/ACM International Symposium on Cluster Computing and the Grid (2002)Google Scholar
  9. 9.
    Hou, C.-J., Shin, K.G.: Allocation of periodic task modules with precedence and deadline constraints in distributed real-time systems. IEEE Trans. Comput. 46(12), 1338–1355 (2008)MathSciNetGoogle Scholar
  10. 10.
    Garey, M.R., Johnson, D.S.: Strong NP-completeness results: motivation, examples, and implications. J. Assoc. Comput. Mach. 25(3), 499–508 (2008)MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Houstis, C.E.: Module allocation of real-time applications for distributed systems. IEEE Trans. Softw. Eng. 16(7), 699–709 (2007)CrossRefGoogle Scholar
  12. 12.
    Tindell, K., Clark, J.: Holistic schedulability analysis for distributed hard real-time systems. Micro-processing Microprogramming 40(20), 117–134 (2008)Google Scholar
  13. 13.
    Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: Proceedings of the Fifth Conference on Computer and Communications Security San Francisco, CA, pp. 80–94 (2008)Google Scholar
  14. 14.
    Hong, K.S., Leung, J.Y.-T.: On-line management of real-time tasks. IEEE Trans. Comput. 41(10), 1326–1331 (2008)CrossRefGoogle Scholar
  15. 15.
    Goldberg, D.E.: Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley, Reading (1989)zbMATHGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Yang Yu
    • 1
  • Qi Dong
    • 2
    Email author
  • Zhipeng Luo
    • 1
  • Hao Chen
    • 1
  • Jun Deng
    • 1
  • Wei Guan
    • 1
  1. 1.Academy of Engineering PhysicsMianyangChina
  2. 2.School of Information and SoftwareUniversity of Electronic Science and Technology of ChinaChengduChina

Personalised recommendations