skip to main content
research-article

Security-aware optimization for ubiquitous computing systems with SEAT graph approach

Published: 01 August 2013 Publication History

Abstract

For ubiquitous computing systems, security has become a new metric that designers should consider throughout the design process, along with other metrics such as performance and energy consumption. A combination of selected cryptographic algorithms for required security services forms a security strategy for the application. In this paper, we propose methods to generate security strategies to achieve the maximal overall security strength while meeting the real-time constraint. In order to express security requirements of an application, we propose a novel graph model called Security-Aware Task (SEAT) graph model to represent real-time constraints and precedence relationships among tasks. Based on the SEAT graph approach, we propose an optimal algorithm, Integer Linear Programming Security Optimization (ILP-SOP). For the special structures such as simple path graph and tree, we propose two dynamic programming based algorithms (DPSOP-path/tree) to generate the optimal security strategy. Experiment results demonstrate the correctness and efficiency of our proposed method. The experimental results show that, by using our proposed techniques, the security strength can be improved by 44.3% on average. Highlights Propose a novel graph model SEAT that can express security requirements of each task. Use the security probability to measure security strength of a cryptographic algorithm. Optimal strategy achieved by our ILP while guaranteeing the system schedulability Two dynamic programming algorithms generate the optimal strategy in polynomial time.

References

[1]
Son, S., Mukkamala, R. and David, R., Integrating security and real-time requirements using covert channel capacity. IEEE Trans. Knowl. Data Eng. v12. 865-879.
[2]
P. Kocher, R. Lee, G. Mcgraw, A. Raghunathan, S. Ravi, Security as a new dimension in embedded system design, in: Proceedings of ACM/IEEE DAC, 2004, pp. 753-760.
[3]
Xie, T. and Qin, X., Improving security for periodic tasks in embedded systems through scheduling. ACM Trans. Embed. Comput. Syst. v6 i3. 1-19.
[4]
Lin, M., Yang, L.T., Qin, X., Zheng, N., Wu, Z. and Qiu, M., Static security optimization for real-time systems. IEEE Trans. Ind. Inform. v5 i1. 22-37.
[5]
Shao, Z., Xue, C., Zhuge, Q., Qiu, M., Xiao, B. and Sha, E.H.-M., Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software. IEEE Trans. Comput. v55 i4. 443-453.
[6]
Z. Shao, C. Xue, Q. Zhuge, E. Sha, B. Xiao, Security protection and checking in embedded system integration against buffer overflow attacks, in: IEEE ITCC, 2004, pp. 409-412.
[7]
Kocher, P., Security in embedded systems: Design challenges. ACM Trans. Embed. Comput. Syst. v3 i3. 461-491.
[8]
Balarin, F., Lavagno, L. and Murthy, P., Scheduling for embedded real-time systems. IEEE Trans. Design Test Computers. v15 i1. 71-82.
[9]
Qiu, M. and Sha, E.H.-M., Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems. ACM Transact. Des. Automat. Electron. Syst. (TODAES). v14 i2. 1-30.
[10]
Menezes, A., Oorschot, P. and Vanstone, S., Handbook of Applied Cryptography. 1996. CRC Press.
[11]
The Design of Rijndael: AES-The Advanced Encryption Standard. 2002. Springer.
[12]
Xie, T. and Qin, X., Scheduling security-critical real-time application on clusters. IEEE Trans. Comput. v55 i7. 864-879.
[13]
C. Irvine, Quality of security service, in: Proc. ACM New Security Paradigms Workshop, 2000, pp. 91-99.
[14]
T. Xie, X. Qin, A new allocation scheme for parallel applications with deadline and security constraints on cluster, in: Proc. of the 7th IEEE International Conference on Cluster Computing, 2005, pp. 1-10.
[15]
C. Liu, J. Layland, Scheduling algorithms for multiprogramming in a hard-real-time environment, 1973.
[16]
Stankovic, J., Spuri, M., Ramamritham, K. and Buttazzo, G., Deadline Scheduling for Real-Time Systems-EDF and Related Algorithms. 1998. Kluwer Academic Publishers, Boston, MA.
[17]
Ramamritham, K. and Stankovic, J., Dynamic task scheduling in distributed hard real-time system. IEEE Trans. Softw. v1 i3. 65-75.
[18]
B. Schneier, D. Whiting, Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor, in: International Workshop Proceedings on Fast Software Encryption, 1997, pp. 242-259.
[19]
S. Fluhrer, I. Mantin, A. Shamir, Weaknesses in the key scheduling algorithm of RC4, in: The 8th Annual Workshop on Selected Areas in Cryptography, 2001, pp. 1-24.
[20]
Schneier, B., Applied Cryptography: Protocols, Algorithms, and Source Code in C. 1996. Wiley.
[21]
http://homes.esat.kuleuven.be/~bosselae/fast.html
[22]
http://www.lindo.com

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Journal of Computer and System Sciences
Journal of Computer and System Sciences  Volume 79, Issue 5
August, 2013
224 pages

Publisher

Academic Press, Inc.

United States

Publication History

Published: 01 August 2013

Author Tags

  1. Cryptographic algorithm
  2. Real-time
  3. Schedule
  4. Security
  5. Ubiquitous system

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media