skip to main content
research-article

SHIELD: Security-Aware Scheduling for Real-Time DAGs on Heterogeneous Systems

Published: 13 January 2025 Publication History

Abstract

Many control applications in real-time cyber-physical systems are represented as Directed Acyclic Graphs (DAGs) due to complex interactions among their functional components, and executed on distributed heterogeneous platforms. Data communication between dependent task nodes running on different processing elements are often realized through message transmission over a public network, and are hence susceptible to multiple security threats such as snooping, alteration, and spoofing. Several alternative security protocols having varying security strengths and associated implementation overheads are available in the market, for incorporating confidentiality, integrity, and authentication on the transmitted messages. While message size and correspondingly its associated transmission overheads may be marginally increased due to the assignment of security protocols, significant computation overheads must be incurred for securing the message at the location of its source task node and for unlocking security/message extraction at the destination. Obtained security strengths and associated computation overheads vary depending on the set of protocols chosen for a given message from an available pool of protocols. Given lower bounds on the security demands of an application’s messages, selecting the appropriate protocols for each message such that a system’s overall security is maximized while satisfying constraints related to the resource, task precedence and deadline, is a challenging and computationally hard problem. In this article, we propose an efficient heuristic strategy called SHIELD for security-aware real-time scheduling of DAG-structured applications to be executed on distributed heterogeneous systems. The efficacy of the proposed scheduler is exhibited through extensive simulation-based experiments using two DAG-structured application benchmarks. Our performance evaluation results demonstrate that SHIELD significantly outperforms two greedy baseline strategies SHIELDb in terms of solution generation times (i.e., runtimes) and SHIELDf in terms of achieved security utility. Additionally, a case study on the Traction Control application in automotive systems has been included to exhibit the applicability of SHIELD in real-world settings.

References

[2]
Hamid Arabnejad and Jorge G. Barbosa. 2014. List scheduling algorithm for heterogeneous systems by an optimistic cost table. IEEE Transactions on Parallel and Distributed Systems 25, 3 (2014), 682–694.
[3]
M. Bishop. 2003. What is computer security? IEEE Security & Privacy 1, 1 (2003), 67–69. DOI:
[4]
Matt Bishop. 2004. Introduction to Computer Security. Addison-Wesley Professional.
[5]
Giorgio C. Buttazzo. 2011. Hard Real-Time Computing Systems, Vol. 24. Springer Science & Business Media.
[6]
Edward Grady Coffman and John L. Bruno. 1976. Computer and Job-Shop Scheduling Theory. John Wiley & Sons.
[7]
Shepard Daniel, Bhatti Jahshan, and Humphreys Todd. 2012. Drone Hack: Spoofing Attack Demonstration on a Civilian Unmanned Aerial Vehicle. GPS World, The Business and Technology of GNSS, 1 August 2012. Retrieved from https://www.gpsworld.com/drone-hack/
[8]
Janaka Deepakumara, Howard M. Heys, and R. Venkatesan. 2003. Performance comparison of message authentication code (MAC) algorithms for Internet protocol security (IPSEC). In Newfoundland Electrical and Computer Engineering Conference, 1–7.
[9]
Nicolas Falliere, Liam O. Murchu, and Eric Chien. 2011. W32. Stuxnet Dossier. White Paper, Symantec Corp., Security Response 5, 6 (2011), 29.
[10]
Michael R. Garey and David S. Johnson. 1979. Computers and Intractability, Vol. 174. Freeman, San Francisco.
[11]
Radoslav Ivanov, Miroslav Pajic, and Insup Lee. 2016. Attack-resilient sensor fusion for safety-critical cyber-physical systems. ACM Transactions on Embedded Computing Systems 15, 1 (2016), 1–24.
[12]
Gideon Juve, Ann Chervenak, Ewa Deelman, Shishir Bharathi, Gaurang Mehta, and Karan Vahi. 2013. Characterizing and profiling scientific workflows. Future Generation Computer Systems 29, 3 (2013), 682–692.
[13]
Nagarajan Kandasamy, John P. Hayes, and Brian T. Murray. 2005. Dependable communication synthesis for distributed embedded systems. Reliability Engineering & System Safety 89, 1 (2005), 81–92.
[14]
Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, et al. 2010. Experimental security analysis of a modern automobile. In 2010 IEEE Symposium on Security and Privacy. IEEE, 447–462.
[15]
Zhongjin Li, Jidong Ge, Haiyang Hu, Wei Song, Hao Hu, and Bin Luo. 2015. Cost and energy aware scheduling algorithm for scientific workflows with deadline constraint in clouds. IEEE Transactions on Services Computing 11, 4 (2015), 713–726.
[16]
A. Nadeem and M. Y. Javed. 2005. A performance comparison of data encryption algorithms. In 2005 International Conference on Information and Communication Technologies, 84–89. DOI:
[17]
E. Nahum, S. O’Malley, H. Orman, and R. Schroeppel. 1995. Towards high performance cryptographic software. In 3rd IEEE Workshop on the Architecture and Implementation of High Performance Communication Subsystems, 69–72. DOI:
[18]
Vahid Panahi, Mehdi Kargahi, and Fathiyeh Faghih. 2024. Control performance analysis of automotive cyber-physical systems: A study on efficient formal verification. ACM Transactions on Cyber-Physical Systems 8, 2, Article 12 (May 2024), 19 pages. DOI:
[19]
Sanjit Kumar Roy, Rajesh Devaraj, Arnab Sarkar, and Debabrata Senapati. 2021. SLAQA: Quality-level aware scheduling of task graphs on heterogeneous distributed systems. ACM Transactions on Embedded Computing Systems 20, 5 (2021), 1–31.
[20]
Arnab Sarkar. 2012. New Approaches in Real-Time Proportional Fair Multi-Processor Scheduling. Ph.D. Dissertation. IIT Kharagpur.
[21]
Debabrata Senapati, Dharmendra Maurya, Arnab Sarkar, and Chandan Karfa. 2024. ERS: Energy-efficient real-time DAG scheduling on uniform multiprocessor embedded systems. In 2024 37th International Conference on VLSI Design and 2024 23rd International Conference on Embedded Systems (VLSID), 354–359. DOI:
[22]
Debabrata Senapati, Kousik Rajesh, Chandan Karfa, and Arnab Sarkar. 2023. TMDS: Temperature-aware makespan minimizing DAG scheduler for heterogeneous distributed systems. ACM Transactions on Design Automation of Electronic Systems 28, 6, Article 99 (Oct. 2023), 22 pages. DOI:
[23]
Debabrata Senapati, Arnab Sarkar, and Chandan Karfa. 2021. HMDS: A makespan minimizing DAG scheduler for heterogeneous distributed systems. ACM Transactions on Embedded Computing Systems 20, 5s, Article 106 (Sept. 2021), 26 pages. DOI:
[24]
Debabrata Senapati, Arnab Sarkar, and Chandan Karfa. 2022. PRESTO: A penalty-aware real-time scheduler for task graphs on heterogeneous platforms. IEEE Transactions on Computers 71, 2 (2022), 421–435. DOI:
[25]
Debabrata Senapati, Arnab Sarkar, and Chandan Karfa. 2023. Energy-aware real-time scheduling of multiple periodic DAGs on heterogeneous systems. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 42, 8 (2023), 2447–2460. DOI:
[26]
Hugo Teso. 2013. Aircraft hacking: Practical aero series. In 4th Hack in the Box Security Conference in Europe. Revtrieved from https://www.youtube.com/watch?v=hrnEQtNw94c
[27]
Haluk Topcuoglu, Salim Hariri, and Min-you Wu. 2002. Performance-effective and low-complexity task scheduling for heterogeneous computing. IEEE Transactions on Parallel and Distributed Systems 13, 3 (2002), 260–274.
[28]
Quanwang Wu, Fuyuki Ishikawa, Qingsheng Zhu, Yunni Xia, and Junhao Wen. 2017. Deadline-constrained cost optimization approaches for workflow scheduling in clouds. IEEE Transactions on Parallel and Distributed Systems 28, 12 (2017), 3401–3412.
[29]
Tang Xiaoyong, Kenli Li, Zeng Zeng, and Bharadwaj Veeravalli. 2011. A novel security-driven scheduling algorithm for precedence-constrained tasks in heterogeneous distributed systems. IEEE Transactions on Computers 60, 7 (2011), 1017–1029. DOI:
[30]
Guoqi Xie, Kehua Yang, Haibo Luo, Renfa Li, and Shiyan Hu. 2021. Reliability and confidentiality co-verification for parallel applications in distributed systems. IEEE Transactions on Parallel and Distributed Systems 32, 6 (2021), 1353–1368.
[31]
Guoqi Xie, Gang Zeng, Xiongren Xiao, Renfa Li, and Keqin Li. 2017. Energy-efficient scheduling algorithms for real-time parallel applications on heterogeneous distributed embedded systems. IEEE Transactions on Parallel and Distributed Systems 28, 12 (2017), 3426–3442.
[32]
Tao Xie and Xiao Qin. 2005. A new allocation scheme for parallel applications with deadline and security constraints on clusters. In 2005 IEEE International Conference on Cluster Computing, 1–10.
[33]
T. Xie and X. Qin. 2006. Scheduling security-critical real-time applications on clusters. IEEE Transactions on Computers 55, 7 (2006), 864–879. DOI:
[34]
Tao Xie and Xiao Qin. 2007. Improving security for periodic tasks in embedded systems through scheduling. ACM Transactions on Embedded Computing Systems 6, 3 (Jul. 2007), 20–es. DOI:
[35]
Tao Xie and Xiao Qin. 2007. Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity. Journal of Parallel and Distributed Computing 67, 10 (2007), 1067–1081.
[36]
Tao Xie and Xiao Qin. 2008. Security-aware resource allocation for real-time parallel jobs on homogeneous and heterogeneous clusters. IEEE Transactions on Parallel and Distributed Systems 19, 5 (2008), 682–697. DOI:
[37]
Tao Xie, Xiao Qin, Andrew Sung, Man Lin, and Laurence T. Yang. 2006. Real-time scheduling with quality of security constraints. International Journal of High Performance Computing and Networking 4, 3–4 (2006), 188–197.
[38]
Hongzhi Xu, Renfa Li, Chen Pan, and Keqin Li. 2019. Minimizing energy consumption with reliability goal on heterogeneous embedded systems. Journal of Parallel and Distributed Computing 127 (2019), 44–57.
[39]
Behnam Mohammad Hasani Zade, Najme Mansouri, and Mohammad Masoud Javidi. 2021. SAEA: A security-aware and energy-aware task scheduling strategy by Parallel Squirrel Search Algorithm in cloud environment. Expert Systems with Applications 176 (2021), 114915.

Index Terms

  1. SHIELD: Security-Aware Scheduling for Real-Time DAGs on Heterogeneous Systems

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Cyber-Physical Systems
    ACM Transactions on Cyber-Physical Systems  Volume 9, Issue 1
    January 2025
    311 pages
    EISSN:2378-9638
    DOI:10.1145/3703016
    • Editor:
    • Chenyang Lu,
    • Guest Editorss:
    • Kuan-Hsun Chen,
    • Jing Li,
    • Federico Reghenzani,
    • Jian-Jia Chen
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 13 January 2025
    Online AM: 30 October 2024
    Accepted: 12 October 2024
    Revised: 21 August 2024
    Received: 14 December 2023
    Published in TCPS Volume 9, Issue 1

    Check for updates

    Author Tags

    1. DAG scheduling
    2. Real-Time Cyber-Physical Systems
    3. security
    4. list scheduling
    5. heterogeneous platforms
    6. distributed systems

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 200
      Total Downloads
    • Downloads (Last 12 months)200
    • Downloads (Last 6 weeks)39
    Reflects downloads up to 23 Jan 2025

    Other Metrics

    Citations

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media