2007
DOI: 10.1145/1275986.1275992
|View full text |Cite
|
Sign up to set email alerts
|

Improving security for periodic tasks in embedded systems through scheduling

Abstract: While many scheduling algorithms for periodic tasks ignore security requirements posed by sensitive applications and are, consequently, unable to perform properly in embedded systems with security constraints, in this paper, we present an approach to scheduling periodic tasks in embedded systems subject to security and timing constraints. We design a necessary and sufficient feasibility check for a set of periodic tasks with security requirements. With the feasibility test in place, we propose a scheduling alg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
68
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 76 publications
(70 citation statements)
references
References 38 publications
0
68
0
Order By: Relevance
“…Xie and Lin considered periodic task scheduling requiring security service which has varying overhead in relation to the level of service [2], [4]. They enhanced the conventional scheduler to satisfy the real-time requirement and proposed new scheduler while maximizing the level of security service.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Xie and Lin considered periodic task scheduling requiring security service which has varying overhead in relation to the level of service [2], [4]. They enhanced the conventional scheduler to satisfy the real-time requirement and proposed new scheduler while maximizing the level of security service.…”
Section: Related Workmentioning
confidence: 99%
“…To cope with such issues, some previous works have proposed approaches to add a security constraint to the realtime properties [2]- [4]. In particular, some researches have focused on maximizing the level of security while meeting real-time deadlines by improving earliest deadline first (EDF) scheduling [2], [4].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [XQ07], the authors presented an on-line scheduling policy that distributes free time slacks to enhance security services while guaranteeing the real-time constraints. However, the authors solely considered the security services as the only optimization goal, and ignored the other design requirements that may also be imposed in the system, e.g., energy efficiency and quality of service.…”
Section: Cryptography and Other Security Servicesmentioning
confidence: 99%
“…Xie and Qin [13] propose an online algorithm to schedule periodic tasks under security and timing constraints, trying to maximize a weighted sum of the individual security values, a metric defined by the authors. However, their approach does not provide any guarantees with respect to optimality of the total security value.…”
Section: Introduction and Related Workmentioning
confidence: 99%