Security-Aware Mapping for TDMA-Based Real-Time Distributed Systems
Chung-Wei Lin, Qi Zhu, Alberto Sangiovanni-Vincentelli

Citation
Chung-Wei Lin, Qi Zhu, Alberto Sangiovanni-Vincentelli. "Security-Aware Mapping for TDMA-Based Real-Time Distributed Systems". International Conference on Computer-Aided Design (ICCAD), IEEE/ACM, 2, November, 2014.

Abstract
Cyber-security has become a critical issue for realtime distributed embedded systems in domains such as automotive, avionics, and industrial automation. However, in many of such systems, tight resource constraints and strict timing requirements make it difficult or even impossible to add security mechanisms after the initial design stages. To produce secure and safe systems with desired performance, security must be considered together with other objectives at the system level and from the beginning of the design. In this paper, we focus on security-aware design for Time Division Multiple Access (TDMA) based real-time distributed systems. The TDMA-based protocol we consider is an abstraction of many time-triggered protocols that are being adopted in various safety-critical systems for their more predictable timing behavior, such as FlexRay, Time- Triggered Protocol, and Time-Triggered Ethernet. To protect against attacks on TDMA-based real-time distributed systems, we apply a message authentication mechanism with time-delayed release of keys, which provides a good balance between security and computation overhead but needs sophisticated network scheduling to ensure that the increased latencies due to delayed key releases will not violate timing requirements. We propose formulations and an algorithm to optimize the task allocation, priority assignment, network scheduling, and key-release interval length during the mapping process, while meeting both security and timing requirements. Experimental results of an automotive case study and a synthetic example show the effectiveness and efficiency of our approach.

Electronic downloads


Internal. This publication has been marked by the author for TerraSwarm-only distribution, so electronic downloads are not available without logging in.
Citation formats  
  • HTML
    Chung-Wei Lin, Qi Zhu, Alberto Sangiovanni-Vincentelli.
    <a
    href="http://www.terraswarm.org/pubs/342.html"
    >Security-Aware Mapping for TDMA-Based Real-Time
    Distributed Systems</a>, International Conference on
    Computer-Aided Design (ICCAD), IEEE/ACM, 2, November, 2014.
  • Plain text
    Chung-Wei Lin, Qi Zhu, Alberto Sangiovanni-Vincentelli.
    "Security-Aware Mapping for TDMA-Based Real-Time
    Distributed Systems". International Conference on
    Computer-Aided Design (ICCAD), IEEE/ACM, 2, November, 2014.
  • BibTeX
    @inproceedings{LinZhuSangiovanniVincentelli14_SecurityAwareMappingForTDMABasedRealTimeDistributed,
        author = {Chung-Wei Lin and Qi Zhu and Alberto
                  Sangiovanni-Vincentelli},
        title = {Security-Aware Mapping for TDMA-Based Real-Time
                  Distributed Systems},
        booktitle = {International Conference on Computer-Aided Design
                  (ICCAD)},
        organization = {IEEE/ACM},
        day = {2},
        month = {November},
        year = {2014},
        abstract = {Cyber-security has become a critical issue for
                  realtime distributed embedded systems in domains
                  such as automotive, avionics, and industrial
                  automation. However, in many of such systems,
                  tight resource constraints and strict timing
                  requirements make it difficult or even impossible
                  to add security mechanisms after the initial
                  design stages. To produce secure and safe systems
                  with desired performance, security must be
                  considered together with other objectives at the
                  system level and from the beginning of the design.
                  In this paper, we focus on security-aware design
                  for Time Division Multiple Access (TDMA) based
                  real-time distributed systems. The TDMA-based
                  protocol we consider is an abstraction of many
                  time-triggered protocols that are being adopted in
                  various safety-critical systems for their more
                  predictable timing behavior, such as FlexRay,
                  Time- Triggered Protocol, and Time-Triggered
                  Ethernet. To protect against attacks on TDMA-based
                  real-time distributed systems, we apply a message
                  authentication mechanism with time-delayed release
                  of keys, which provides a good balance between
                  security and computation overhead but needs
                  sophisticated network scheduling to ensure that
                  the increased latencies due to delayed key
                  releases will not violate timing requirements. We
                  propose formulations and an algorithm to optimize
                  the task allocation, priority assignment, network
                  scheduling, and key-release interval length during
                  the mapping process, while meeting both security
                  and timing requirements. Experimental results of
                  an automotive case study and a synthetic example
                  show the effectiveness and efficiency of our
                  approach.},
        URL = {http://terraswarm.org/pubs/342.html}
    }
    

Posted by Barb Hoversten on 4 Aug 2014.
Groups: tools

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.