skip to main content
research-article

Security-aware Routing and Scheduling for Control Applications on Ethernet TSN Networks

Published: 22 November 2019 Publication History

Abstract

Today, it is common knowledge in the cyber-physical systems domain that the tight interaction between the cyber and physical elements provides the possibility of substantially improving the performance of these systems that is otherwise impossible. On the downside, however, this tight interaction with cyber elements makes it easier for an adversary to compromise the safety of the system. This becomes particularly important, since such systems typically are composed of several critical physical components, e.g., adaptive cruise control or engine control that allow deep intervention in the driving of a vehicle. As a result, it is important to ensure not only the reliability of such systems, e.g., in terms of schedulability and stability of control plants, but also resilience to adversarial attacks.
In this article, we propose a security-aware methodology for routing and scheduling for control applications in Ethernet networks. The goal is to maximize the resilience of control applications within these networked control systems to malicious interference while guaranteeing the stability of all control plants, despite the stringent resource constraints in such cyber-physical systems. Our experimental evaluations demonstrate that careful optimization of available resources can significantly improve the resilience of these networked control systems to attacks.

References

[1]
Amir Aminifar. 2016. Analysis, Design, and Optimization of Embedded Control Systems. Ph.D. Dissertation. Linköping University.
[2]
Amir Aminifar, Petru Eles, and Zebo Peng. 2015. Jfair: A scheduling algorithm to stabilize control applications. In Proceedings of the 21st IEEE Real-Time and Embedded Technology and Applications Symposium.
[3]
Amir Aminifar, Petru Eles, and Zebo Peng. 2017. Optimization of message encryption for real-time applications in embedded systems. IEEE Trans. Comput. 67, 5 (2017), 748--754.
[4]
Amir Aminifar, Petru Eles, Zebo Peng, Anton Cervin, and Karl-Erik Årzén. 2017. Control-quality driven design of embedded control systems with stability guarantees. IEEE Design 8 Test 35, 4 (2018), 38--46.
[5]
K. J. Åström and B. Wittenmark. 1997. Computer-Controlled Systems (3rd ed.). Prentice Hall.
[6]
Clark Barrett, Aaron Stump, Cesare Tinelli, et al. 2010. The SMT-LIB standard: Version 2.0. In Proceedings of the 8th International Workshop on Satisfiability Modulo Theories, Vol. 13. 14.
[7]
Lucia Lo Bello. 2011. The case for ethernet in automotive communications. ACM SIGBED Rev. (2011).
[8]
Nikolaj Bjørner, Anh-Dung Phan, and Lars Fleckenstein. 2015. Z-An optimizing SMT solver. In Proceedings of the International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Vol. 15. 194--199.
[9]
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger. 2011. Biclique cryptanalysis of the full AES. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security. Springer, 344--371.
[10]
Johan Borst, Bart Preneel, and Joos Vandewalle. 1999. Linear cryptanalysis of RC5 and RC6. In Proceedings of the ACM SIGSOFT Conference on the Foundations of Software Engineering, Vol. 99. Springer, 16--30.
[11]
A. Cervin. 2012. Stability and worst-case performance analysis of sampled-data control systems with input and output jitter. In Proceedings of the American Control Conference (ACC’12).
[12]
S. Chakraborty, M. A. Al Faruque, W. Chang, D. Goswami, M. Wolf, and Q Zhu. 2016. Automotive cyber-physical systems: A tutorial introduction. IEEE Design 8 Test (2016).
[13]
Scott Contini, Ronald L. Rivest, M. J. B. Robshaw, and Yiqun Lisa Yin. [n.d.]. The security of the RC6 TM block cipher.
[14]
Thomas H. Cormen, Clifford Stein, Ronald L. Rivest, and Charles E. Leiserson. 2001. Introduction to Algorithms (2nd ed.). McGraw-Hill.
[15]
Silviu S. Craciunas, Ramon Serna Oliver, and Wilfried Steiner. 2016. Scheduling real-time communication in IEEE 802.1Qbv time sensitive networks. In Proceedings of the 24th International Conference on Real-Time Networks and Systems (RTNS’16).
[16]
Leonardo De Moura and Nikolaj Bjørner. 2008. Z3: An efficient SMT solver. Tools and Algorithms for the Construction and Analysis of Systems. Springer.
[17]
Peng Deng, Qi Zhu, Abhijit Davare, Anastasios Mourikis, Xue Liu, and Marco Di Natale. 2016. An efficient control-driven period optimization algorithm for distributed real-time systems. IEEE Trans. Comput. (2016).
[18]
P. Farwall and R. Rohozinski. 2011. StuxNet and the future of cyber war. Survival 53, 1, 23--40.
[19]
K. Jiang, P. Eles, and Z. Peng. 2011. Optimization of message encryption for distributed embedded systems with real-time constraints. In Proceedings of the IEEE 14th International Symposium on Design and Diagnostics of Electronic Circuits Systems (DDECS’11). 243--248.
[20]
Ke Jiang, Petru Eles, and Zebo Peng. 2012. Co-design techniques for distributed real-time embedded systems with communication security constraints. In Proceedings of the 15th Conference for Design, Automation and Test in Europe (DATE’12). 947--952.
[21]
Ke Jiang, Petru Eles, and Zebo Peng. 2013. Optimization of secure embedded systems with dynamic task sets. In Proceedings of the Conference for Design, Automation and Test in Europe (DATE’13). 1765--1770.
[22]
Charanjit S. Jutla. 2001. Encryption modes with almost free message integrity. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 529--544.
[23]
Kyoung-Don Kang and Sang H. Son. 2006. Systematic security and timeliness tradeoffs in real-time embedded systems. In IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA’06). 183--189.
[24]
Lars R. Knudsen and Willi Meier. 2000. Correlations in RC6 with a reduced number of rounds. In Proceedings of the International Workshop on Fast Software Encryption. Springer, 94--108.
[25]
Paul Kocher, Ruby Lee, Gary McGraw, and Anand Raghunathan. 2004. Security as a new dimension in embedded system design. In Proceedings of the Design Automation Conference (DAC’04).
[26]
LAN/MAN Standards Committee of the IEEE Computer Society. 2015. IEEE Standard for Local and Metropolitan Area Networks—Bridges and Bridged Networks Amendment 25: Enhancements for Scheduled Traffic, IEEE Std. 802.1Qbv-2015.
[27]
Arjen K. Lenstra. 2004. Key length. Contribution to the handbook of information security. (2004).
[28]
Vuk Lesi, Ilija Jovanov, and Miroslav Pajic. 2017. Security-aware scheduling of embedded control tasks. ACM Trans. Embed. Comput. Syst. (2017).
[29]
Yi Li, Aws Albarghouthi, Zachary Kincaid, Arie Gurfinkel, and Marsha Chechik. 2014. Symbolic optimization with SMT solvers. In ACM SIGPLAN Notices, Vol. 49. ACM, 607--618.
[30]
Man Lin, Laurence T. Yang, Xiao Qin, Nenggan Zheng, Zhaohui Wu, and Meikang Qiu. 2009. Static security optimization for real-time systems. IEEE Trans. Industr. Inform. (2009).
[31]
B. Lincoln and A. Cervin. 2002. Jitterbug: A tool for analysis of real-time control performance. In Proceedings of the 41st IEEE Conference on Decision and Control.
[32]
Rouhollah Mahfouzi, Amir Aminifar, Soheil Samii, Ahmed Rezine, Petru Eles, and Zebo Peng. 2018. Stability-aware integrated routing and scheduling for control applications in Ethernet networks. In Proceedings of the Design, Automation 8 Test in Europe Conference (DATE’18). IEEE, 682--687.
[33]
Zbigniew Michalewicz. 1996. Genetic Algorithms + Data Structures = Evolution Programs (3rd ed.). Springer-Verlag, Berlin.
[34]
Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. In Proceedings of the Black Hat USA Conference. 91.
[35]
James Nechvatal, Elaine Barker, Lawrence Bassham, William Burr, Morris Dworkin, James Foti, and Edward Roback. 2001. Report on the development of the Advanced Encryption Standard (AES). J. Res. Nat. Inst. Stand. Technol. 106, 3 (2001), 511.
[36]
Paul Pop, Michael Lander Raagaard, Silviu S. Craciunas, and Wilfried Steiner. 2016. Design optimisation of cyber-physical distributed systems using IEEE time-sensitive networks. IET Cyber-Phys. Syst.: Theor. Appl. (2016).
[37]
D. Quaglia, R. Muradore, R. Bragantini, and P. Fiorini. 2012. A SystemC/Matlab co-simulation tool for networked control systems. Simul. Mod. Pract. Theor. (2012).
[38]
Srivaths Ravi, Anand Raghunathan, Paul Kocher, and Sunil Hattangady. 2004. Security in embedded systems: Design challenges. ACM Trans. Embed. Comput. Syst. 3, 3 (2004), 461--491.
[39]
Florian Sagstetter, Martin Lukasiewycz, Sebastian Steinhorst, Marko Wolf, Alexandre Bouard, William R. Harris, Somesh Jha, Thomas Peyrin, Axel Poschmann, and Samarjit Chakraborty. 2013. Security challenges in automotive hardware/software architecture design. In Proceedings of the Design, Automation Test in Europe Conference Exhibition (DATE’13). 458--463.
[40]
S. Samii, A. Cervin, P. Eles, and Z. Peng. 2009. Integrated scheduling and synthesis of control applications on distributed embedded systems. In Proceedings of the Design, Automation Test in Europe Conference.
[41]
S. Samii and H. Zinner. 2018. Level 5 by layer 2: Time-sensitive networking for autonomous vehicles. IEEE Comm. Stand. Mag. (2018).
[42]
Roberto Sebastiani and Patrick Trentin. 2015. OptiMathSAT: A tool for optimization modulo theories. In Proceedings of the International Conference on Computer Aided Verification. Springer, 447--454.
[43]
Yasser Shoukry, Paul Martin, Paulo Tabuada, and Mani Srivastava. 2013. Non-invasive spoofing attacks for anti-lock braking systems. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 55--72.
[44]
Fedor Smirnov, Michael Glaß, Felix Reimann, and Jürgen Teich. 2017. Optimizing message routing and scheduling in automotive mixed-criticality time-triggered networks. In Proceedings of the Design Automation Conference (DAC’17).
[45]
William Stallings. 2013. Cryptography and Network Security: Principles and Practice (6th ed.). Prentice Hall Press, Upper Saddle River, NJ.
[46]
Wilfried Steiner. 2010. An evaluation of SMT-based schedule synthesis for time-triggered multi-hop networks. In Real-Time Systems Symposium.
[47]
W. Steiner. 2011. Synthesis of static communication schedules for TTEthernet-based mixed-criticality systems. In 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW).
[48]
Wilfried Steiner, Günther Bauer, Brendan Hall, and Michael Paulitsch. 2011. Time-triggered ethernet: TTEthernet. Time-Triggered Comm. (2011).
[49]
Domitian Tamas-Selicean, Paul Pop, and Wilfried Steiner. 2014. Design optimization of TTEthernet-based distributed real-time systems. Real-Time Systems (2014).
[50]
Biaoshuai Tao and Hongjun Wu. 2015. Improving the biclique cryptanalysis of AES. In Australasian Conference on Information Security and Privacy. Springer, 39--56.
[51]
L. Thiele. 2017. Internet of Things -- The quest for trust. IEEE Design Test 34, 6 (Dec 2017), 102--108.
[52]
Rolf H. Weber. 2010. Internet of Things -- New security and privacy challenges. Computer Law 8 Security Review 26, 1 (2010), 23--30.
[53]
Tao Xie and Xiao Qin. 2007. Improving security for periodic tasks in embedded systems through scheduling. ACM Trans. Embed. Comput. Syst. (2007).

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Design Automation of Electronic Systems
ACM Transactions on Design Automation of Electronic Systems  Volume 25, Issue 1
January 2020
299 pages
ISSN:1084-4309
EISSN:1557-7309
DOI:10.1145/3370083
  • Editor:
  • Naehyuck Chang
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 22 November 2019
Accepted: 01 August 2019
Revised: 01 June 2019
Received: 01 February 2019
Published in TODAES Volume 25, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Resilience optimization
  2. ethernet TSN
  3. joint routing and scheduling
  4. real-time control systems

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)71
  • Downloads (Last 6 weeks)5
Reflects downloads up to 28 Dec 2024

Other Metrics

Citations

Cited By

View all

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media