Optimization of Message Encryption for Real-Time Applications in Embedded Systems
- 1 December 2017
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Computers
- Vol. 67 (5), 748-754
- https://doi.org/10.1109/tc.2017.2778728
Abstract
Today, security can no longer be treated as a secondary issue in embedded and cyber-physical systems. Therefore, one of the main challenges in these domains is the design of secure embedded systems under stringent resource constraints and real-time requirements. However, there exists an inherent trade-off between the security protection provided and the amount of resources allocated for this purpose. That is, the more the amount of resources used for security, the higher the security, but the fewer the number of applications which can be run on the platform and meet their timing requirements. This trade-off is of high importance since embedded systems are often highly resource constrained. In this paper, we propose an efficient solution to maximize confidentiality, while also guaranteeing the timing requirements of real-time applications on shared platforms.Funding Information
- Hasler Stiftung (15048)
- ONR-G (N62909-17-1-2006)
This publication has 24 references indexed in Scilit:
- Security Challenges in Automotive Hardware/Software Architecture DesignPublished by EDAA ,2013
- The worst-case execution-time problem—overview of methods and survey of toolsACM Transactions on Embedded Computing Systems, 2008
- Improving security for periodic tasks in embedded systems through schedulingACM Transactions on Embedded Computing Systems, 2007
- Secure In-Vehicle CommunicationPublished by Springer Science and Business Media LLC ,2006
- Measuring the Performance of Schedulability TestsReal-Time Systems, 2005
- Security in embedded systemsACM Transactions on Embedded Computing Systems, 2004
- Host-based intrusion detection using dynamic and static behavioral modelsPattern Recognition, 2003
- Report on the development of the Advanced Encryption Standard (AES)Journal of Research of the National Institute of Standards and Technology, 2001
- Linear Cryptanalysis of RC5 and RC6Lecture Notes in Computer Science, 1999
- Scheduling Algorithms for Multiprogramming in a Hard-Real-Time EnvironmentJournal of the ACM, 1973