Advertisement

Design of Adaptive Security Mechanisms for Real-Time Embedded Systems

  • Mehrdad Saadatmand
  • Antonio Cicchetti
  • Mikael Sjödin
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7159)

Abstract

Introducing security features in a system is not free and brings along its costs and impacts. Considering this fact is essential in the design of real-time embedded systems which have limited resources. To ensure correct design of these systems, it is important to also take into account impacts of security features on other non-functional requirements, such as performance and energy consumption. Therefore, it is necessary to perform trade-off analysis among non-functional requirements to establish balance among them. In this paper, we target the timing requirements of real-time embedded systems, and introduce an approach for choosing appropriate encryption algorithms at runtime, to achieve satisfaction of timing requirements in an adaptive way, by monitoring and keeping a log of their behaviors. The approach enables the system to adopt a less or more time consuming (but presumably stronger) encryption algorithm, based on the feedback on previous executions of encryption processes. This is particularly important for systems with high degree of complexity which are hard to analyze statistically.

Keywords

Security real-time embedded systems runtime adaptation trade-off 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kocher, P., Lee, R., McGraw, G., Raghunathan, A.: Security as a new dimension in embedded system design. In: Proceedings of the 41st Annual Design Automation Conference, DAC 2004, Moderator-Ravi, Srivaths, pp. 753–760 (2004)Google Scholar
  2. 2.
    Gürgens, S., Rudolph, C., Maña, A., Nadjm-Tehrani, S.: Security engineering for embedded systems: the secfutur vision. In: Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems. S&D4RCES 2010, pp. 7:1–7:6. ACM, New York (2010)Google Scholar
  3. 3.
    Cysneiros, L.M., do Prado Leite, J.C.S.: Non-functional requirements: From elicitation to conceptual models. IEEE Transactions on Software Engineering 30, 328–350 (2004)CrossRefGoogle Scholar
  4. 4.
    Saadatmand, M., Cicchetti, A., Sjödin, M.: On generating security implementations from models of embedded systems. In: The Sixth International Conference on Software Engineering Advances, ICSEA 2011 (2011)Google Scholar
  5. 5.
    Enea: The architectural advantages of enea ose in telecom applications, http://www.enea.com/Templates/Landing.aspx?id=27011 (last accessed September 2011)
  6. 6.
    Wall, A., Andersson, J., Neander, J., Norström, C., Lembke, M.: Introducing Temporal Analyzability Late in the Lifecycle of Complex Real-Time Systems. In: Chen, J., Hong, S. (eds.) RTCSA 2003. LNCS, vol. 2968, pp. 513–528. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  7. 7.
    Chodrow, S., Jahanian, F., Donner, M.: Run-time monitoring of real-time systems. In: Proceedings of the Twelfth Real-Time Systems Symposium, pp. 74–83 (1991)Google Scholar
  8. 8.
    Saadatmand, M., Cicchetti, A., Sjödin, M.: Uml-based modeling of non-functional requirements in telecommunication systems. In: The Sixth International Conference on Software Engineering Advances, ICSEA 2011 (2011)Google Scholar
  9. 9.
    Enea, http://www.enea.com (last accessed September 2011)
  10. 10.
    Nadeem, A., Javed, M.: A performance comparison of data encryption algorithms. In: First International Conference on Information and Communication Technologies, ICICT 2005, pp. 84–89 (2005)Google Scholar
  11. 11.
    CPU Killer, http://www.cpukiller.com/ (last accessed September 2011)
  12. 12.
    Mercuri, R.T., Neumann, P.G.: Security by obscurity. Commun. ACM 46 (2003)Google Scholar
  13. 13.
    Hissam, S., Weinstock, C., Plakosh, D., Jayatirtha, A.: Perspectives on open source. Software Engineering Institute, Carnegie Mellong, http://www.sei.cmu.edu/library/abstracts/reports/01tr019.cfm (Published November 2001, last accessed September 2011)
  14. 14.
    Ravi, S., Raghunathan, A., Kocher, P., Hattangady, S.: Security in embedded systems: Design challenges. ACM Transactions on Embedded Computing Systems (TECS) 3, 461–491 (2004)CrossRefGoogle Scholar
  15. 15.
    Lee, J., Kapitanova, K., Son, S.H.: The price of security in wireless sensor networks. Journal of Computer Networks 54, 2967–2978 (2010)CrossRefGoogle Scholar
  16. 16.
    Khalilzad, N.M., Nolte, T., Behnam, M., Åsberg, M.: Towards adaptive hierarchical scheduling of real-time systems. In: 16th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2011) (2011)Google Scholar
  17. 17.
    Kang, K.D., Son, S.H.: Towards security and qos optimization in real-time embedded systems. SIGBED Rev. 3, 29–34 (2006)CrossRefGoogle Scholar
  18. 18.
    Son, S.H., Zimmerman, R., Hansson, J.: An adaptable security manager for real-time transactions. In: Euromicro Conference on Real-Time Systems, pp. 63–70 (2000)Google Scholar
  19. 19.
    Xie, T., Qin, X.: Scheduling security-critical real-time applications on clusters. IEEE Transactions on Computers 55, 864–879 (2006)CrossRefGoogle Scholar
  20. 20.
    CHESS Project: Composition with Guarantees for High-integrity Embedded Software Components Assembly, http://chess-project.ning.com/ (last accessed August 2011)

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Mehrdad Saadatmand
    • 1
  • Antonio Cicchetti
    • 1
  • Mikael Sjödin
    • 1
  1. 1.Mälardalen Real-Time Research Centre (MRTC)Mälardalen UniversityVästeråsSweden

Personalised recommendations