𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Security Mechanisms and Security-Aware Mapping for Real-Time Distributed Embedded Systems

✍ Scribed by Chung-Wei Lin;Alberto Sangiovanni-Vincentelli


Publisher
Springer International Publishing
Year
2015
Tongue
English
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Cyber-security attacks can have a critical impact on embedded systems. They may access secret information, cause system malfunction, or even endanger users in extreme circumstances. These attacks become even more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. These connections provide breeding grounds for attackers to get access to or take control of the systems. Security mechanisms can be designed to protect against attacks and meet security requirements, such as integrity, authenticity, confidentiality, or availability. However, there are many challenges of applying security mechanisms to embedded systems, such as open environments, limited resources, strict timing requirements, and large number of devices. These challenges make it very difficult and sometimes impossible to add security mechanisms after initial design stages without violating other system constraints. It is therefore important to develop a systematic approach to address security at early design stages together with all other design constraints. We first propose a general security-aware design methodology which considers security together with other design constraints at design stages. The methodology is based on Platform-Based Design [44], where a functional model and an architectural platform are initially captured separately and then brought together through a mapping process. During mapping, the functional model is implemented on the architectural platform, and constraints and objectives are satisfied and optimized, respectively. Our methodology is different from the traditional mapping process because it not only maps functional models to architectural platforms but also explores security mechanism selection and architecture selection. We then focus on the security issues for automotive systems as they represent many of the common challenges in embedded systems. We study security for in-vehicle communications and present security mechanisms for the Controller Area Network (CAN) protocol, which is a very representative asynchronous protocol and currently the most used in-vehicle communication protocol. Based on the security mechanisms, we propose a Mixed Integer Linear Programming (MILP) formulation and an MILP-based algorithm to explore task allocation, signal packing, Message Authentication Code (MAC) sharing, and priority assignment and meet both security and safety constraints. Besides the CAN protocol, we also consider a TDMA-based protocol, which is a very representative synchronous protocol and an abstraction of many existing protocols. The time-delayed release of keys [2, 34, 35, 52] is applied as the security mechanism, and an algorithm that combines a simulated annealing approach with a set of efficient optimization heuristics is developed to solve a security-aware mapping problem for TDMA-based systems. Lastly, we apply our methodology to Vehicle-to-Vehicle (V2V) communications with the Dedicated Short-Range Communications (DSRC) technology. We formulate a security-aware optimization problem and propose an efficient algorithm to solve the security-aware optimization problem. Experimental results show that our approaches can effectively and efficiently explore design spaces and satisfy all design constraints at design stages. They also demonstrate that security must be considered at initial design stages; otherwise, it is too late to add security after initial design stages.

✦ Subjects


Dissertations, Academic;Academic theses;University of California, Berkeley. -- Department of Electrical Engineering and Computer Sciences


πŸ“œ SIMILAR VOLUMES


Distributed, Embedded and Real-time Java
✍ Andy J. Wellings, Peter Dibble, David Holmes (auth.), M. Teresa Higuera-Toledano πŸ“‚ Library πŸ“… 2012 πŸ› Springer-Verlag New York 🌐 English

<p><p>Research on real-time Java technology has been prolific over the past decade, leading to a large number of corresponding hardware and software solutions, and frameworks for distributed and embedded real-time Java systems. This book is aimed primarily at researchers in real-time embedded system

Distributed, embedded and real-time Java
✍ Andy J. Wellings, Peter Dibble, David Holmes (auth.), M. Teresa Higuera-Toledano πŸ“‚ Library πŸ“… 2012 πŸ› Springer-Verlag New York 🌐 English

<p><p>Research on real-time Java technology has been prolific over the past decade, leading to a large number of corresponding hardware and software solutions, and frameworks for distributed and embedded real-time Java systems. This book is aimed primarily at researchers in real-time embedded system

Real-Time Systems: Design Principles for
✍ Hermann Kopetz (auth.) πŸ“‚ Library πŸ“… 2011 πŸ› Springer US 🌐 English

<p><p><p>"This book is a comprehensive text for the design of safety critical, hard real-time embedded systems. It offers a splendid example for the balanced, integrated treatment of systems and software engineering, helping readers tackle the hardest problems of advanced real-time system design, su

Real-Time Systems: Design Principles for
✍ Hermann Kopetz (auth.) πŸ“‚ Library πŸ“… 2002 πŸ› Springer US 🌐 English

<em>Real-Time Systems: Design Principles for Distributed Embedded</em><em>Applications</em> focuses on hard real-time systems, which are computing systems that must meet their temporal specification in all anticipated load and fault scenarios. The book stresses the system aspects of distributed real

Real-Time Systems: Design Principles for
✍ Hermann Kopetz, Wilfried Steiner πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<p><span>"This book is a comprehensive text for the design of safety critical, hard real-time embedded systems. It offersΒ  a splendid example for the balanced, integrated treatment of systems and software engineering, helping readers tackle the hardest problems of advanced real-time system design, s

Embedded Systems Security: Practical Met
✍ David Kleidermacher, Mike Kleidermacher πŸ“‚ Library πŸ“… 2012 πŸ› Newnes 🌐 English

<p><span>The ultimate resource for making embedded systems reliable, safe, and secure</span></p><p><span>Embedded Systems Security provides:</span></p><ul></ul><p></p><ul><li><span><span>A broad understanding of security principles, concerns, and technologies</span></span></li></ul><p></p><ul><li><s