12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06) 2006
DOI: 10.1109/rtcsa.2006.59
|View full text |Cite
|
Sign up to set email alerts
|

Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2009
2009
2012
2012

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 12 publications
0
0
0
Order By: Relevance
“…A quantitative security metric generates a security strength value for each security mechanism from its parameter configurations, and hence is more accurate and can compare the security strength of any two security mechanisms. However, the difference between the values generated by existing quantitative security metrics (Lie & Satyanarayanan, 2007;Kang & Son, 2006) cannot correctly reflect the actual difference between the security strengths of corresponding security mechanisms because they only consider the key length and ignore other important factors, such as security algorithms, attacking approaches, and attackers' computing power. For example, symmetric encryption algorithms and asymmetric encryption algorithms have different requirements on the key length.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A quantitative security metric generates a security strength value for each security mechanism from its parameter configurations, and hence is more accurate and can compare the security strength of any two security mechanisms. However, the difference between the values generated by existing quantitative security metrics (Lie & Satyanarayanan, 2007;Kang & Son, 2006) cannot correctly reflect the actual difference between the security strengths of corresponding security mechanisms because they only consider the key length and ignore other important factors, such as security algorithms, attacking approaches, and attackers' computing power. For example, symmetric encryption algorithms and asymmetric encryption algorithms have different requirements on the key length.…”
Section: Related Workmentioning
confidence: 99%
“…Our approach to the tradeoff is to adjust the security parameters, such as key length and encrypting percentage, which are much easier to control. The major distinction between our approach and existing approaches (Lie & Satyanarayanan, 2007;Yurcik, Woolam, Hellings, Khan, & Thuraisingham, 2007;Lu, Lu, Abdelzaher, Stankovic, & Son, 2006;Kang & Son, 2006;Son, Zimmerman, & Hansson, 2000;Spyropoulou, Levin, & Irvine, 2000;Yau, Yan, & Huang, 2007) is that our approach can achieve the best tradeoff by minimizing a tradeoff objective function developed from service performance and security metrics, instead of intuitively trying all possible combinations of security parameters and monitoring the resulting performance and security until the desirable tradeoff is reached. Hence, our approach can achieve the best tradeoff fast and does not need to change security parameters frequently.…”
Section: Introductionmentioning
confidence: 99%