Optimization of message encryption for real-time applications in embedded systems
(2018) In IEEE Transactions on Computers 67(5). p.748-754- Abstract
Today, security can no longer be treated as a secondary issue in embedded and cyber-physical systems. Therefore, one of the main challenges in these domains is the design of secure embedded systems under stringent resource constraints and real-time requirements. However, there exists an inherent trade-off between the security protection provided and the amount of resources allocated for this purpose. That is, the more the amount of resources used for security, the higher the security, but the fewer the number of applications which can be run on the platform and meet their timing requirements. This trade-off is of high importance since embedded systems are often highly resource constrained. In this paper, we propose an efficient solution... (More)
Today, security can no longer be treated as a secondary issue in embedded and cyber-physical systems. Therefore, one of the main challenges in these domains is the design of secure embedded systems under stringent resource constraints and real-time requirements. However, there exists an inherent trade-off between the security protection provided and the amount of resources allocated for this purpose. That is, the more the amount of resources used for security, the higher the security, but the fewer the number of applications which can be run on the platform and meet their timing requirements. This trade-off is of high importance since embedded systems are often highly resource constrained. In this paper, we propose an efficient solution to maximize confidentiality, while also guaranteeing the timing requirements of real-time applications on shared platforms.
(Less)
- author
- Aminifar, Amir LU ; Eles, Petru and Peng, Zebo
- publishing date
- 2018-05-01
- type
- Contribution to journal
- publication status
- published
- subject
- keywords
- confidentiality optimization, message encryption and decryption, real-time schedulability, Secure embedded systems, secure real-time systems, security and privacy
- in
- IEEE Transactions on Computers
- volume
- 67
- issue
- 5
- pages
- 7 pages
- publisher
- IEEE - Institute of Electrical and Electronics Engineers Inc.
- external identifiers
-
- scopus:85037649318
- ISSN
- 0018-9340
- DOI
- 10.1109/TC.2017.2778728
- language
- English
- LU publication?
- no
- additional info
- Publisher Copyright: © 1968-2012 IEEE.
- id
- 661874d5-2e2f-4c67-a52e-fc2e72c9d2d6
- date added to LUP
- 2022-02-05 01:25:42
- date last changed
- 2022-04-22 08:03:51
@article{661874d5-2e2f-4c67-a52e-fc2e72c9d2d6, abstract = {{<p>Today, security can no longer be treated as a secondary issue in embedded and cyber-physical systems. Therefore, one of the main challenges in these domains is the design of secure embedded systems under stringent resource constraints and real-time requirements. However, there exists an inherent trade-off between the security protection provided and the amount of resources allocated for this purpose. That is, the more the amount of resources used for security, the higher the security, but the fewer the number of applications which can be run on the platform and meet their timing requirements. This trade-off is of high importance since embedded systems are often highly resource constrained. In this paper, we propose an efficient solution to maximize confidentiality, while also guaranteeing the timing requirements of real-time applications on shared platforms.</p>}}, author = {{Aminifar, Amir and Eles, Petru and Peng, Zebo}}, issn = {{0018-9340}}, keywords = {{confidentiality optimization; message encryption and decryption; real-time schedulability; Secure embedded systems; secure real-time systems; security and privacy}}, language = {{eng}}, month = {{05}}, number = {{5}}, pages = {{748--754}}, publisher = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}}, series = {{IEEE Transactions on Computers}}, title = {{Optimization of message encryption for real-time applications in embedded systems}}, url = {{http://dx.doi.org/10.1109/TC.2017.2778728}}, doi = {{10.1109/TC.2017.2778728}}, volume = {{67}}, year = {{2018}}, }