Title :
A Vulnerability Optimization Method for Security-Critical Real-Time Systems
Author :
Xia Zhang ; Jinyu Zhan ; Wei Jiang ; Yue Ma
Author_Institution :
Sch. of Inf. & Software Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
Abstract :
In this paper, we focus on task scheduling problems in security-critical real-time systems. We consider that all of the critical tasks are equipped with RC5 algorithm to reduce the vulnerability when facing security attacks. The relationships among security level, vulnerability and execution time of each task are firstly deduced. Then, a Multiple Task Vulnerability Optimization Method (MTVOM), which is based on dynamic programming algorithm, is devised to obtain minimal vulnerability under strict timing constraints. Furthermore, we take task criticality into consideration because each task is not equally important to its system. Finally, simulation experiments demonstrate the effectiveness of this method.
Keywords :
distributed processing; dynamic programming; embedded systems; scheduling; security of data; MTVOM method; RC5 algorithm; dynamic programming algorithm; execution time; multiple task vulnerability optimization method; security attacks; security level; security-critical realtime systems; task scheduling problems; timing constraints; vulnerability optimization method; Computers; Encryption; Heuristic algorithms; Optimization; Real-time systems; dynamic programming; real-time system; reliability; security-critical; vulnerability;
Conference_Titel :
Networking, Architecture and Storage (NAS), 2013 IEEE Eighth International Conference on
Conference_Location :
Xi´an
DOI :
10.1109/NAS.2013.34