Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Power-Aware Design Techniques of Secure Multimode Embedded Systems

Published: 28 January 2016 Publication History

Abstract

Nowadays, embedded systems have been widely used in all types of application areas, some of which belong to the safety and reliability critical domains. The functional correctness and design robustness of the embedded systems involved in such domains are crucial for the safety of personal/enterprise property or even human lives. Thereby, a holistic design procedure that considers all the important design concerns is essential.
In this article, we approach embedded systems design from an integral perspective. We consider not only the classic real-time and quality of service requirements, but also the emerging security and power efficiency demands. Modern embedded systems are not any more developed for a fixed purpose, but instead designed for undertaking various processing requests. This leads to the concept of multimode embedded systems, in which the number and nature of active tasks change during runtime. Under dynamic situations, providing high performance along with various design concerns becomes a really difficult problem. Therefore, we propose a novel power-aware secure embedded systems design framework that efficiently solves the problem of runtime quality optimization with security and power constraints. The efficiency of our proposed techniques are evaluated in extensive experiments.

References

[1]
Min Bao, A. Andrei, P. Eles, and Zebo Peng. 2009. On-line thermal aware dynamic voltage scaling for energy optimization with frequency/temperature dependency consideration. In Design Automation Conference (DAC). 490--495.
[2]
Alex Biryukov and Eyal Kushilevitz. 1998. Improved cryptanalysis of RC5. In Advances in Cryptology (EUROCRYPT). 85--99.
[3]
Cisco. 2014. H.264 codec. Retrieved Feb. 27, 2015 from https://github.com/cisco/openh264.
[4]
K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan. 2002. A fast and elitist multiobjective genetic algorithm: NSGA-II. Evolutionary Computation 6 (2002), 182--197.
[5]
Jutta Degener and Carsten Borman. 1992. GSM 06.10. Retrieved Feb. 21, 2015 from http://www.quut.com/gsm/gsm-1.0.13.tar.gz.
[6]
Catherine H. Gebotys. 2006. A table masking countermeasure for low-energy secure embedded systems. IEEE Transactions on VLSI Systems 14, (July 2006), 740--753.
[7]
Johan Hagman. 1997. Mp3 decoder. Retrieved March 1, 2015 from http://aminet.net/mus/play/mpeg3play.lha.
[8]
Steven A. Hofmeyr, Stephanie Forrest, and Anil Somayaji. 1998. Intrusion detection using sequences of system calls. Journal of Computer Security 6 (1998), 151--180.
[9]
Pengcheng Huang, Orlando Moreira, Kees Goossens, and Anca Molnos. 2013. Throughput-constrained voltage and frequency scaling for real-time heterogeneous multiprocessors. In The 28th Annual ACM Symposium on Applied Computing (SAC’13). 1517--1524.
[10]
Chia-Mei Hung, Jian-Jia Chen, and Tei-Wei Kuo. 2006. Energy-efficient real-time task scheduling for a DVS system with a non-DVS processing element. In International Real-Time Systems Symposium (RTSS’06). 303--312.
[11]
Ondrej Hyncica, Pavel Kucera, Petr Honzik, and Petr Fiedler. 2011. Performance evaluation of symmetric cryptography in embedded systems. In International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS’11). 277--282.
[12]
Independent JPEG Group IJG. 1998. jpeg-6b. Retrieved Feb. 17, 2015 from https://quirkysoft.googlecode.com/files/jpegsrc.v6b.tar.gz.
[13]
Ke Jiang, Lejla Batina, Petru Eles, and Zebo Peng. 2014. Robustness analysis of real-time scheduling against differential power analysis attacks. In IEEE Computer Society Annual Symposium on VLSI (ISVLSI’14). 450--455.
[14]
Ke Jiang, Petru Eles, and Zebo Peng. 2011. Optimization of message encryption for distributed embedded systems with real-time constraints. In 14th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS’11). 243--248.
[15]
Ke Jiang, P. Eles, and Zebo Peng. 2012a. Co-design techniques for distributed real-time embedded systems with communication security constraints. In Design, Automation Test in Europe (DATE’12). 947--952.
[16]
Ke Jiang, Petru Eles, and Zebo Peng. 2013a. Optimization of secure embedded systems with dynamic task sets. In Design, Automation Test in Europe (DATE’13).
[17]
Ke Jiang, Petru Eles, Zebo Peng, and Wei Jiang. 2013b. Power-aware design of secure multimode real-time embedded systems with FPGA co-processors. In 21st International Conference on Real-Time Networks and Systems (RTNS’13).
[18]
Wei Jiang, Ke Jiang, and Yue Ma. 2012b. Resource allocation of security-critical tasks with statistically guaranteed energy constraint. In 18th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA’12). 330--339.
[19]
Lars Knudsen and Willi Meier. 2001. Correlations in RC6 with a reduced number of rounds. In Fast Software Encryption, 94--108.
[20]
Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and others. 2010. Experimental security analysis of a modern automobile. In 2010 IEEE Symposium on Security and Privacy (SP’10). IEEE, 447--462.
[21]
Wenke Lee, S. J. Stolfo, and K. W. Mok. 1999. A data mining framework for building intrusion detection models. In 1999 IEEE Symposium on Security and Privacy. 120--132.
[22]
Man Lin, Li Xu, L. T. Yang, Xiao Qin, Nenggan Zheng, Zhaohui Wu, and Meikang Qiu. 2009. Static security optimization for real-time systems. IEEE Transactions on Industrial Informatics (II) (2009), 22--37.
[23]
Jane W. S. Liu, Wei-Kuan Shih, Kwei-Jay Lin, Riccardo Bettati, and Jen-Yao Chung. 1994. Imprecise computations. Proceedings of the IEEE 82, 1 (1994), 83--94.
[24]
Jiqiang Lu, Orr Dunkelman, Nathan Keller, and Jongsung Kim. 2008. New impossible differential attacks on AES. In Progress in Cryptology. 279--293.
[25]
Andrew Lukefahr, Shruti Padmanabha, Reetuparna Das, Ronald Dreslinski, Jr., Thomas F. Wenisch, and Scott Mahlke. 2014. Heterogeneous microarchitectures trump voltage scaling for low-power cores. In 23rd International Conference on Parallel Architectures and Compilation. 237--250.
[26]
Rabi N. Mahapatra and Wei Zhao. 2005. An energy-efficient slack distribution technique for multimode distributed real-time embedded systems. IEEE Transactions on Parallel and Distributed Systems 16, 7 (2005), 650--662.
[27]
S. M. Martin, K. Flautner, T. Mudge, and D. Blaauw. 2002. Combined dynamic voltage scaling and adaptive body biasing for lower power microprocessors under dynamic workloads. In International Conference on Computer Aided Design (ICCAD’02). 721--725.
[28]
Kosma Moczek. 2014. Minmea, a lightweight GPS NMEA 0183 parser library. Retrieved Feb. 27, 2015 from https://github.com/cloudyourcar/minmea.
[29]
Jingqing Mu and Roman Lysecky. 2009. Autonomous hardware/software partitioning and voltage/frequency scaling for low-power embedded systems. ACM Transactions on Design Automation of Electronic Systems 15, 1, Article 2 (2009), 20 pages.
[30]
Hyunok Oh and Soonhoi Ha. 2002. Hardware-software cosynthesis of multimode multi-task embedded systems with real-time constraints. In 10th International Symposium on Hardware/Software Codesign(CODES02). ACM, New York, NY, 133--138.
[31]
Christof Paar and Jan Pelzl. 2010. Understanding Cryptography: A Textbook for Students and Practitioners. Springer.
[32]
Sangyoung Park, Jaehyun Park, Donghwa Shin, Yanzhi Wang, Qing Xie, M. Pedram, and Naehyuck Chang. 2013. Accurate modeling of the delay and energy overhead of dynamic voltage and frequency scaling in modern microprocessors. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 32, 5 (May 2013), 695--708.
[33]
Krutartha Patel and Sri Parameswaran. 2008. SHIELD: A software hardware design methodology for security and reliability of MPSoCs. In Design Automation Conference (DAC’08). 858--861.
[34]
Anuj Pathania, Qing Jiao, Alok Prakash, and Tulika Mitra. 2014. Integrated CPU-GPU power management for 3D mobile games. In Design Automation Conference (DAC’14).
[35]
Srivaths Ravi, Anand Raghunathan, and Srimat Chakradhar. 2004a. Tamper resistance mechanisms for secure embedded systems. International Conference on VLSI Design (2004), 605--611.
[36]
Srivaths Ravi, Anand Raghunathan, Paul Kocher, and Sunil Hattangady. 2004b. Security in embedded systems: Design challenges. ACM Transactions on Embedded Computing Systems 3 (2004), 461--491.
[37]
Ronald L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin. 1998. The RC6 block cipher. In First Advanced Encryption Standard (AES) Conference.
[38]
S. Samii, P. Eles, Zebo Peng, and A. Cervin. 2009. Quality-driven synthesis of embedded multimode control systems. In Design Automation Conference (DAC’09). 864--869.
[39]
SAMSUNG Electronics Co. Ltd. 2004. S3C2440A 32-Bit CMOS Microcontroller User’s Manual Revision 1.
[40]
Karen Scarfone and Peter Mell. 2007. Guide to intrusion detection and prevention systems (IDPS). NIST Special Publication (2007).
[41]
Zili Shao, C. Xue, Q. Zhuge, M. Qiu, Bin Xiao, and E. H.-M. Sha. 2006. Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software. IEEE Transactions on Computers (Apr. 2006), 443--453.
[42]
K. Tiri and I. Verbauwhede. 2004. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation. In Design, Automation and Test in Europe Conference (DATE’04), 246--251.
[43]
Serge Vaudenay. 1996. On the weak keys of blowfish. In Fast Software Encryption, 27--32.
[44]
H. J. M. Veendrick. 1984. Short-circuit dissipation of static CMOS circuitry and its impact on the design of buffer circuits. IEEE Journal of Solid-State Circuits (SSC) 19, 4 (1984), 468--473.
[45]
Armin Wasicek, Patricia Derler, and Edward A. Lee. 2014. Aspect-oriented modeling of attacks in automotive cyber-physical systems. In The 51st Annual Design Automation Conference (DAC’14). 1--6.
[46]
Marko Wolf, André Weimerskirch, and Christof Paar. 2006. Secure in-vehicle communication. In Embedded Security in Cars. 95--109.
[47]
Tao Xie and Xiao Qin. 2007. Improving security for periodic tasks in embedded systems through scheduling. ACM Transactions on Embedded Computing Systems 6, 3, Article 20.
[48]
Dit-Yan Yeung and Yuxin Ding. 2003. Host-based ID using dynamic and static behavioral models. Pattern Recognition 36 (2003), 229--243.
[49]
Man-Ki Yoon, S. Mohan, Jaesik Choi, Jung-Eun Kim, and Lui Sha. 2013. SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems. In 2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS’13). 21--32.
[50]
Wentao Zhang, Wenling Wu, and Dengguo Feng. 2007. New results on impossible differential cryptanalysis of reduced AES. In Information Security and Cryptology (ICISC). 239--250.
[51]
Eckart Zitzler. 2001. Hypervolume metric calculation. Retrieved Aug. 21, 2014 from ftp://ftp.tik.ee.ethz.ch/pub/people/zitzler/hypervol.c.
[52]
Eckart Zitzler and Lothar Thiele. 1998. Multiobjective optimization using evolutionary algorithms—A comparative case study. In Conference on Parallel Problem Solving from Nature (PPSN V). 292--301.

Cited By

View all
  • (2021)Embedded System Intelligent Platform Design Based on Digital Multimedia Artistic DesignWireless Communications & Mobile Computing10.1155/2021/39591992021Online publication date: 21-Dec-2021
  • (2019)Energy-Aware Design of Stochastic Applications With Statistical Deadline and Reliability GuaranteesIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2018.284665238:8(1413-1426)Online publication date: Aug-2019
  • (2019)Analyzing the Effect of Increased Distribution on a Wearable Appliance2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)10.1109/COMPSAC.2019.10176(13-18)Online publication date: Jul-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Embedded Computing Systems
ACM Transactions on Embedded Computing Systems  Volume 15, Issue 1
February 2016
530 pages
ISSN:1539-9087
EISSN:1558-3465
DOI:10.1145/2872313
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 28 January 2016
Accepted: 01 July 2015
Revised: 01 March 2015
Received: 01 September 2014
Published in TECS Volume 15, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Embedded systems
  2. multimode systems
  3. multiobjective optimization
  4. power-aware design
  5. security
  6. system design and optimization

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • Swedish Research Council

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)1
Reflects downloads up to 19 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Embedded System Intelligent Platform Design Based on Digital Multimedia Artistic DesignWireless Communications & Mobile Computing10.1155/2021/39591992021Online publication date: 21-Dec-2021
  • (2019)Energy-Aware Design of Stochastic Applications With Statistical Deadline and Reliability GuaranteesIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2018.284665238:8(1413-1426)Online publication date: Aug-2019
  • (2019)Analyzing the Effect of Increased Distribution on a Wearable Appliance2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)10.1109/COMPSAC.2019.10176(13-18)Online publication date: Jul-2019
  • (2019)Scheduling Optimization with Partitioning for Mixed-Criticality SystemsJournal of Systems Architecture10.1016/j.sysarc.2019.07.007Online publication date: Jul-2019
  • (2018)An Improved Artificial Bee Colony Algorithm for the Task Assignment in Heterogeneous Multicore ArchitecturesAdvances in Swarm Intelligence10.1007/978-3-319-93815-8_18(179-187)Online publication date: 16-Jun-2018
  • (2017)Architecture exploration for distributed embedded systems: a gap analysis in automotive domain2017 12th IEEE International Symposium on Industrial Embedded Systems (SIES)10.1109/SIES.2017.7993377(1-10)Online publication date: Jun-2017

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media