期刊文献+

一种面向嵌入式实时系统的安全策略优化生成方法

An Optimal Security Strategy Generation Method for Embedded Real-Time Systems
下载PDF
导出
摘要 由于受到系统资源和实时性的限制,对于嵌入式实时系统的安全扩展很难延用通用计算机系统的安全设计方法,因此需要对其进行专门的研究。为了在确保实时性的前提下使嵌入式实时系统的安全性达到最优,本文提出了一套完整的安全设计方法,包括安全任务图模型和安全评估模型,在此基础上,又提出了一种基于整数线性规划的安全策略优化生成方法ILPOS。该安全策略优化生成方法同时解决了安全算法选择和实时可调度性检测两方面的问题,克服了一般分阶段优化方法的不足,从而充分地利用系统可用时间来实现安全扩展。仿真实验结果表明,与传统的启发式安全设计算法相比,ILPOS方法在各种实时性约束条件下都能有效地提高系统的安全性。 Due to system resources and real-time constraints,the security design methods for general computing systems are not fit for the real-time embedded systems,so,it is necessary to study the special design method.To obtain the optimal security of embedded systems under real-time constraints,a complete set of security design methods which include the security-related task graph model and the security evaluation model are proposed in this paper.Based on these,an ILP based optimal security strategy generation method named ILPOS is also proposed.This method can select security algorithms and detect the real-time schedulability simultaneously.That is more efficient than the phased coupled optimization methods,therefore,it can make full use of the system time for security extension.The experimental results show that ILPOS can improve the system security efficiently under various time constraints compared with the traditional heuristic algorithms.
出处 《计算机工程与科学》 CSCD 北大核心 2010年第12期19-21,26,共4页 Computer Engineering & Science
关键词 嵌入式实时系统 安全算法 静态调度 整数线性规划 real-time embedded system security algorithm static scheduling integer linear programming
  • 相关文献

参考文献8

  • 1Xie T,Qin X.Improving Security for Periodic Tasks in Embedded Systems Through Scheduling[J].ACM Trans on Embedded Computing System,2007,6(3):20-34.
  • 2崔光耀.全自主知识产权SSX45密码安全芯片问世[J].信息安全与通信保密,2008,30(8):40-40. 被引量:2
  • 3Xie T,Qin X.A New Allocation Scheme for Parallel Applications with Deadline and Security Constraints on Cluster[C] ∥Proc of the 7th IEEE Int'l Conf on Cluster Computing,2005:1-10.
  • 4Lin M,Yang L T,Qin X,et al.Static Security Optimization for Real-Time Systems[J].IEEE Trans on Industrial Informatics,2009,5(1):22-37.
  • 5Ravi S,Rage A,Kocher P C,et al.Security in Embedded Systems:Design Challenges[J].ACM Trans on Embedded Computing System,2004,3(3):461-491.
  • 6Menezes A J,Scott V O,Vanstone A.Handbook of Applied Cryptography[M].CRC Press,1996.
  • 7Eames D P,Moffett J D.The Integration of Safety and Security Requirements[C] ∥Proc of SAFECOMP'99,1999:468-480.
  • 8Aloul F,Ramani A,Markov I.Generic ILP Versus Specialized 0-1 ILP:An Update[C] ∥Proc of Int'l Conf on Computer Aided Design,2002:450-457.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部