DocumentCode
644402
Title
A Vulnerability Optimization Method for Security-Critical Real-Time Systems
Author
Xia Zhang ; Jinyu Zhan ; Wei Jiang ; Yue Ma
Author_Institution
Sch. of Inf. & Software Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
fYear
2013
fDate
17-19 July 2013
Firstpage
215
Lastpage
221
Abstract
In this paper, we focus on task scheduling problems in security-critical real-time systems. We consider that all of the critical tasks are equipped with RC5 algorithm to reduce the vulnerability when facing security attacks. The relationships among security level, vulnerability and execution time of each task are firstly deduced. Then, a Multiple Task Vulnerability Optimization Method (MTVOM), which is based on dynamic programming algorithm, is devised to obtain minimal vulnerability under strict timing constraints. Furthermore, we take task criticality into consideration because each task is not equally important to its system. Finally, simulation experiments demonstrate the effectiveness of this method.
Keywords
distributed processing; dynamic programming; embedded systems; scheduling; security of data; MTVOM method; RC5 algorithm; dynamic programming algorithm; execution time; multiple task vulnerability optimization method; security attacks; security level; security-critical realtime systems; task scheduling problems; timing constraints; vulnerability optimization method; Computers; Encryption; Heuristic algorithms; Optimization; Real-time systems; dynamic programming; real-time system; reliability; security-critical; vulnerability;
fLanguage
English
Publisher
ieee
Conference_Titel
Networking, Architecture and Storage (NAS), 2013 IEEE Eighth International Conference on
Conference_Location
Xi´an
Type
conf
DOI
10.1109/NAS.2013.34
Filename
6665366
Link To Document