Secure Concurrency Control in Firm Real-Time Database Systems
Distributed and Parallel Databases - Security of data and transaction processing
The security of the cipher block chaining message authentication code
Journal of Computer and System Sciences
Real-Time Systems
Integrating Security and Real-Time Requirements Using Covert Channel Capacity
IEEE Transactions on Knowledge and Data Engineering
Dynamic and risk-aware network access management
Proceedings of the eighth ACM symposium on Access control models and technologies
Maintaining Security in Firm Real-Time Database Systems
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Calculating costs for quality of security service
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
A Concrete Security Treatment of Symmetric Encryption
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
STAR: Secure Real-Time Transaction Processing with Timeliness Guarantees
RTSS '02 Proceedings of the 23rd IEEE Real-Time Systems Symposium
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Protecting Resources with Resource Control Lists
RTAS '01 Proceedings of the Seventh Real-Time Technology and Applications Symposium (RTAS '01)
An adaptable security manager for real-time transactions
Euromicro-RTS'00 Proceedings of the 12th Euromicro conference on Real-time systems
Putting together QoS and security in autonomic pervasive systems
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Design of adaptive security mechanisms for real-time embedded systems
ESSoS'12 Proceedings of the 4th international conference on Engineering Secure Software and Systems
Task scheduling in heterogeneous distributed systems with security and QoS requirements
International Journal of Communication Networks and Distributed Systems
Hi-index | 0.00 |
A number of real-time embedded systems (RTESs) are used to manage critical infrastructure such as electric grids or C4I systems. In these systems, it is essential to meet deadlines, for example, to avoid a power outage or loss of a life. The importance of security support is also increasing, because more RTESs are being networked. To securely transmit sensitive data, e.g., a battle field status, across the network, RTESs need to protect the data via cryptographic techniques. However, security support may cause deadline misses or unacceptable QoS degradation. As an initial effort to address this problem, we formulate the security support in RTESs as a QoS optimization problem. Also, we propose a novel adaptive approach for security support in which a RTES initially uses a relatively short cryptographic key to maximize the QoS, while increasing the key length when the security risk level is raised. In this way, we can make a possible cryptanalysis several orders of magnitude harder by requiring the attacker to search a larger key space, while meeting all deadlines by degrading the QoS in a controlled manner. To minimize the overhead, we derive the appropriate QoS levels for several key lengths via an offine polynomial time algorithm. When the risk level is raised online, a real-time task can use a longer key and adapt to the corresponding QoS level (derived offine) in O(1) time.