2016
DOI: 10.1587/transinf.2015edp7493
|View full text |Cite
|
Sign up to set email alerts
|

Preemptive Real-Time Scheduling Incorporating Security Constraint for Cyber Physical Systems

Abstract: SUMMARYSince many cyber-physical systems (CPSs) manipulate security-sensitive data, enhancing the quality of security in a CPS is a critical and challenging issue in CPS design. Although there has been a large body of research on securing general purpose PCs, directly applying such techniques to a CPS can compromise the real-time property of CPSs since the timely execution of tasks in a CPS typically relies on real-time scheduling. Recognizing this property, previous works have proposed approaches to add a sec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1
1

Relationship

3
4

Authors

Journals

citations
Cited by 10 publications
(16 citation statements)
references
References 18 publications
0
16
0
Order By: Relevance
“…However, such approaches are dependent on the type of the shared resources and can negatively influence the execution time of task since each task could use the limited shared resource. Instead, some studies used a general flushing mechanism [2]- [4]. Whenever there is a possibility of information leakage, a function to clear the state of the shared resource is invoked, which is called FT.…”
Section: Existing Amc Schemementioning
confidence: 99%
See 3 more Smart Citations
“…However, such approaches are dependent on the type of the shared resources and can negatively influence the execution time of task since each task could use the limited shared resource. Instead, some studies used a general flushing mechanism [2]- [4]. Whenever there is a possibility of information leakage, a function to clear the state of the shared resource is invoked, which is called FT.…”
Section: Existing Amc Schemementioning
confidence: 99%
“…Note that we assume the total order of security-levels meaning that all tasks have different securitylevels. In this paper, likewise existing studies [3], [4], we focus on the information leakage arising from τ H to τ L since the information leakage from τ L to τ H is not as critical as that from τ H to τ L and considering two directions of information leakage causes more FTs, which often results in task sets becoming unschedulable. Thus, we incorporate the following security constraint into real-time scheduling to address the information leakage problem; for any two consecutively executing tasks under any real-time scheduler, a FT to cleanse the state of shared resources should be invoked between the two tasks if the former is τ H and the latter is τ L .…”
Section: Existing Amc Schemementioning
confidence: 99%
See 2 more Smart Citations
“…E.g. energy and temporal constraints [99], fault tolerance and temporal constraints [68], security and temporal constraints [100], system and environment states and priority of tasks [101], etc. Furthermore, a recommended method of multithreading multi-agent scheduling was proposed to search the efficient and fast solution of complex problems in real-time featuring rapid dynamic changes and uncertainty [98].…”
Section: Vandv On Real-time Schedulabilitymentioning
confidence: 99%