Title
Mixed Cryptography Constrained Optimization For Heterogeneous, Multicore, And Distributed Embedded Systems
Abstract
Embedded systems continue to execute computational- and memory-intensive applications with vast data sets, dynamic workloads, and dynamic execution characteristics. Adaptive distributed and heterogeneous embedded systems are increasingly critical in supporting dynamic execution requirements. With pervasive network access within these systems, security is a critical design concern that must be considered and optimized within such dynamically adaptive systems. This paper presents a modeling and optimization framework for distributed, heterogeneous embedded systems. A dataflow-based modeling framework for adaptive streaming applications integrates models for computational latency, mixed cryptographic implementations for inter-task and intra-task communication, security levels, communication latency, and power consumption. For the security model, we present a level-based modeling of cryptographic algorithms using mixed cryptographic implementations. This level-based security model enables the development of an efficient, multi-objective genetic optimization algorithm to optimize security and energy consumption subject to current application requirements and security policy constraints. The presented methodology is evaluated using a video-based object detection and tracking application and several synthetic benchmarks representing various application types and dynamic execution characteristics. Experimental results demonstrate the benefits of a mixed cryptographic algorithm security model compared to using a single, fixed cryptographic algorithm. Results also highlight how security policy constraints can yield increased security strength and cryptographic diversity for the same energy constraint.
Year
DOI
Venue
2018
10.3390/computers7020029
COMPUTERS
Keywords
Field
DocType
security-driven optimization, heterogeneous multicore systems, mixed cryptographic security model, adaptive system, runtime security optimization, system-level codesign, distributed systems
Cryptography,Adaptive system,Computer science,Dataflow,Security policy,Multi-core processor,Energy consumption,Computer security model,Constrained optimization,Embedded system
Journal
Volume
Issue
ISSN
7
2
2073-431X
Citations 
PageRank 
References 
0
0.34
16
Authors
2
Name
Order
Citations
PageRank
Hyunsuk Nam120.70
Roman Lysecky260560.43