Title
Towards security and QoS optimization in real-time embedded systems
Abstract
A number of real-time embedded systems (RTESs) are used to manage critical infrastructure such as electric grids or C4I systems. In these systems, it is essential to meet deadlines, for example, to avoid a power outage or loss of a life. The importance of security support is also increasing, because more RTESs are being networked. To securely transmit sensitive data, e.g., a battle field status, across the network, RTESs need to protect the data via cryptographic techniques. However, security support may cause deadline misses or unacceptable QoS degradation. As an initial effort to address this problem, we formulate the security support in RTESs as a QoS optimization problem. Also, we propose a novel adaptive approach for security support in which a RTES initially uses a relatively short cryptographic key to maximize the QoS, while increasing the key length when the security risk level is raised. In this way, we can make a possible cryptanalysis several orders of magnitude harder by requiring the attacker to search a larger key space, while meeting all deadlines by degrading the QoS in a controlled manner. To minimize the overhead, we derive the appropriate QoS levels for several key lengths via an offine polynomial time algorithm. When the risk level is raised online, a real-time task can use a longer key and adapt to the corresponding QoS level (derived offine) in O(1) time.
Year
DOI
Venue
2006
10.1145/1279711.1279718
SIGBED Review
Keywords
Field
DocType
larger key space,short cryptographic key,security risk level,key length,security,real-time embedded system,real-time embedded systems,corresponding qos level,security support,unacceptable qos degradation,towards security,deadlines,appropriate qos level,qos optimization problem,risk level,critical infrastructure,optimization problem,real time
Key space,Computer science,Cryptography,Quality of service,Cryptanalysis,Critical infrastructure,Real-time computing,Optimization problem,Key (cryptography),Key size,Distributed computing,Embedded system
Journal
Volume
Issue
Citations 
3
1
9
PageRank 
References 
Authors
0.59
14
2
Name
Order
Citations
PageRank
Kyoung-Don Kang156337.51
Sang H. Son22433202.20