Feedback-Controlled Security-Aware and Energy-Efficient Scheduling for Real-Time Embedded Systems

Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 181)

Abstract

Security has become an important characteristic for many real-time systems. Due to the lack of enough and stable energy supply in battery-powered embedded systems, one of the foremost challenges is the mismatch between energy and performance requirements of security processing. In this paper, we propose a security-aware and energy-efficient scheduling algorithm that aims at reducing energy consumption while ensuring the real-time and security requirements. Based on the feedback control theory, we employ a feedback unit to keep track of the CPU utilization and manage the security level dynamically. Simulation results show the effectiveness and efficiency of the proposed algorithm.

Keywords

Feedback control embedded systems energy efficient security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ravi, S., Raghunathan, A., Kocher, P., Hattangady, S.: Security in embedded systems: Design challenges. ACM Transactions on Embedded Computing Systems 3, 461–491 (2004)CrossRefGoogle Scholar
  2. 2.
    Markose, S., Liu, X., McMillin, B.: A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems. In: IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, vol. 1, pp. 75–81 (2008)Google Scholar
  3. 3.
    Lin, M., Xu, L., Yang, L., Qin, X.: Static Security Optimization for Real-Time Systems. IEEE Transactions on Industrial Informatics 5, 22–37 (2009)CrossRefGoogle Scholar
  4. 4.
    Xie, T., Qin, X., Sung, A.: SAREC: A Security-Aware Scheduling Strategy for Real-Time Applications on Clusters. In: International Conference on Parallel Processing, pp. 5–12 (2005)Google Scholar
  5. 5.
    Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols. IEEE Transactions on Mobile Computing 5, 128–143 (2006)CrossRefGoogle Scholar
  6. 6.
    Gebotys, H.: Low Energy Security Optimization in Embedded Cryptographic Systems. In: International Conference on Hardware Software Codesign and System Synthesis, pp. 224–229 (2004)Google Scholar
  7. 7.
    Gan, J., Gruian, F., Pop, P.: Energy/reliability trade-offs in fault-tolerant event-triggered distributed embedded systems. In: 16th Asia and South Pacific Design Automation Conference, pp. 731–736 (2011)Google Scholar
  8. 8.
    Cho, H., Chun, Y., Park, D.: Guaranteed Dynamic Priority Assignment Schemes for Real-time Tasks with (m,k)-Firm Deadlines. ETRI Journal 32(3), 422–429 (2010)CrossRefGoogle Scholar
  9. 9.
    Lu, C.: Feedback Control Real-Time Scheduling.University of Virginia CS PhD Dissertation 2001-6 (May 2001)Google Scholar
  10. 10.
    Minerick, R.J., Freeh, V.W., Kogge, P.M.: Dynamic Power Management using Feedback. In: Proc. of Workshop on Compilers and Operating Systems for Low Power (2002)Google Scholar
  11. 11.
    Zhu, Y., Mueller, F.: Feedback EDF Scheduling Exploiting Dynamic Voltage Scaling. In: Real-Time and Embedded Technology and Applications Symposium, pp. 84–93 (2004)Google Scholar
  12. 12.
    Qi, Q., Zhu, J., Wang, C.: An Adaptive Model of Task Scheduling Based on QoS Feedback Control. In: Third International Conference on Communications and Networking, pp. 1065–1069 (2008)Google Scholar
  13. 13.
    Sridharan, R., Gupta, N., Mahapatra, R.: Feedback-Controlled Reliability-Aware Power Management for Real-Time Embedded Systems. In: ACM/IEEE on Design Automation Conference, pp. 185–190 (2008)Google Scholar
  14. 14.
    Liu, C.L., Layland, J.: Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment. J. of the Association for Computing Machinery 20, 46–61 (1973)MathSciNetMATHCrossRefGoogle Scholar
  15. 15.
    Gutmann, P.: Cryptlib Security Toolkit Version 3.4., http://www.cryptlib.com

Copyright information

© Springer Science+Business Media Dordrecht 2012

Authors and Affiliations

  1. 1.School of Computer Science and EngineeringUniversity of Electronic Science and Technology of ChinaChengduChina
  2. 2.State Key Laboratory of Computer ArchitectureInstitute of Computing Technology, Chinese Academy of SciencesBeijingChina

Personalised recommendations