Communications of the ACM - Blueprint for the future of high-performance networking
Nonfunctional Requirements: From Elicitation to Conceptual Models
IEEE Transactions on Software Engineering
Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
Security in embedded systems: Design challenges
ACM Transactions on Embedded Computing Systems (TECS)
Scheduling Security-Critical Real-Time Applications on Clusters
IEEE Transactions on Computers
Towards security and QoS optimization in real-time embedded systems
ACM SIGBED Review - Special issue: The work-in-progress (WIP) session of the RTSS 2005
Security engineering for embedded systems: the SecFutur vision
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems
The price of security in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
An adaptable security manager for real-time transactions
Euromicro-RTS'00 Proceedings of the 12th Euromicro conference on Real-time systems
An automated round-trip support towards deployment assessment in component-based embedded systems
Proceedings of the 16th International ACM Sigsoft symposium on Component-based software engineering
Runtime verification of state machines and defect localization applying model-based testing
Proceedings of the WICSA 2014 Companion Volume
Hi-index | 0.00 |
Introducing security features in a system is not free and brings along its costs and impacts. Considering this fact is essential in the design of real-time embedded systems which have limited resources. To ensure correct design of these systems, it is important to also take into account impacts of security features on other non-functional requirements, such as performance and energy consumption. Therefore, it is necessary to perform trade-off analysis among non-functional requirements to establish balance among them. In this paper, we target the timing requirements of real-time embedded systems, and introduce an approach for choosing appropriate encryption algorithms at runtime, to achieve satisfaction of timing requirements in an adaptive way, by monitoring and keeping a log of their behaviors. The approach enables the system to adopt a less or more time consuming (but presumably stronger) encryption algorithm, based on the feedback on previous executions of encryption processes. This is particularly important for systems with high degree of complexity which are hard to analyze statistically.