Abstract
Introducing security features in a system is not free and brings along its costs and impacts. Considering this fact is essential in the design of real-time embedded systems which have limited resources. To ensure correct design of these systems, it is important to also take into account impacts of security features on other non-functional requirements, such as performance and energy consumption. Therefore, it is necessary to perform trade-off analysis among non-functional requirements to establish balance among them. In this paper, we target the timing requirements of real-time embedded systems, and introduce an approach for choosing appropriate encryption algorithms at runtime, to achieve satisfaction of timing requirements in an adaptive way, by monitoring and keeping a log of their behaviors. The approach enables the system to adopt a less or more time consuming (but presumably stronger) encryption algorithm, based on the feedback on previous executions of encryption processes. This is particularly important for systems with high degree of complexity which are hard to analyze statistically.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kocher, P., Lee, R., McGraw, G., Raghunathan, A.: Security as a new dimension in embedded system design. In: Proceedings of the 41st Annual Design Automation Conference, DAC 2004, Moderator-Ravi, Srivaths, pp. 753–760 (2004)
Gürgens, S., Rudolph, C., Maña, A., Nadjm-Tehrani, S.: Security engineering for embedded systems: the secfutur vision. In: Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems. S&D4RCES 2010, pp. 7:1–7:6. ACM, New York (2010)
Cysneiros, L.M., do Prado Leite, J.C.S.: Non-functional requirements: From elicitation to conceptual models. IEEE Transactions on Software Engineering 30, 328–350 (2004)
Saadatmand, M., Cicchetti, A., Sjödin, M.: On generating security implementations from models of embedded systems. In: The Sixth International Conference on Software Engineering Advances, ICSEA 2011 (2011)
Enea: The architectural advantages of enea ose in telecom applications, http://www.enea.com/Templates/Landing.aspx?id=27011 (last accessed September 2011)
Wall, A., Andersson, J., Neander, J., Norström, C., Lembke, M.: Introducing Temporal Analyzability Late in the Lifecycle of Complex Real-Time Systems. In: Chen, J., Hong, S. (eds.) RTCSA 2003. LNCS, vol. 2968, pp. 513–528. Springer, Heidelberg (2004)
Chodrow, S., Jahanian, F., Donner, M.: Run-time monitoring of real-time systems. In: Proceedings of the Twelfth Real-Time Systems Symposium, pp. 74–83 (1991)
Saadatmand, M., Cicchetti, A., Sjödin, M.: Uml-based modeling of non-functional requirements in telecommunication systems. In: The Sixth International Conference on Software Engineering Advances, ICSEA 2011 (2011)
Enea, http://www.enea.com (last accessed September 2011)
Nadeem, A., Javed, M.: A performance comparison of data encryption algorithms. In: First International Conference on Information and Communication Technologies, ICICT 2005, pp. 84–89 (2005)
CPU Killer, http://www.cpukiller.com/ (last accessed September 2011)
Mercuri, R.T., Neumann, P.G.: Security by obscurity. Commun. ACM 46 (2003)
Hissam, S., Weinstock, C., Plakosh, D., Jayatirtha, A.: Perspectives on open source. Software Engineering Institute, Carnegie Mellong, http://www.sei.cmu.edu/library/abstracts/reports/01tr019.cfm (Published November 2001, last accessed September 2011)
Ravi, S., Raghunathan, A., Kocher, P., Hattangady, S.: Security in embedded systems: Design challenges. ACM Transactions on Embedded Computing Systems (TECS) 3, 461–491 (2004)
Lee, J., Kapitanova, K., Son, S.H.: The price of security in wireless sensor networks. Journal of Computer Networks 54, 2967–2978 (2010)
Khalilzad, N.M., Nolte, T., Behnam, M., Åsberg, M.: Towards adaptive hierarchical scheduling of real-time systems. In: 16th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2011) (2011)
Kang, K.D., Son, S.H.: Towards security and qos optimization in real-time embedded systems. SIGBED Rev. 3, 29–34 (2006)
Son, S.H., Zimmerman, R., Hansson, J.: An adaptable security manager for real-time transactions. In: Euromicro Conference on Real-Time Systems, pp. 63–70 (2000)
Xie, T., Qin, X.: Scheduling security-critical real-time applications on clusters. IEEE Transactions on Computers 55, 864–879 (2006)
CHESS Project: Composition with Guarantees for High-integrity Embedded Software Components Assembly, http://chess-project.ning.com/ (last accessed August 2011)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Saadatmand, M., Cicchetti, A., Sjödin, M. (2012). Design of Adaptive Security Mechanisms for Real-Time Embedded Systems. In: Barthe, G., Livshits, B., Scandariato, R. (eds) Engineering Secure Software and Systems. ESSoS 2012. Lecture Notes in Computer Science, vol 7159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28166-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-28166-2_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28165-5
Online ISBN: 978-3-642-28166-2
eBook Packages: Computer ScienceComputer Science (R0)