skip to main content
research-article

Power-Aware Design Techniques of Secure Multimode Embedded Systems

Authors Info & Claims
Published:28 January 2016Publication History
Skip Abstract Section

Abstract

Nowadays, embedded systems have been widely used in all types of application areas, some of which belong to the safety and reliability critical domains. The functional correctness and design robustness of the embedded systems involved in such domains are crucial for the safety of personal/enterprise property or even human lives. Thereby, a holistic design procedure that considers all the important design concerns is essential.

In this article, we approach embedded systems design from an integral perspective. We consider not only the classic real-time and quality of service requirements, but also the emerging security and power efficiency demands. Modern embedded systems are not any more developed for a fixed purpose, but instead designed for undertaking various processing requests. This leads to the concept of multimode embedded systems, in which the number and nature of active tasks change during runtime. Under dynamic situations, providing high performance along with various design concerns becomes a really difficult problem. Therefore, we propose a novel power-aware secure embedded systems design framework that efficiently solves the problem of runtime quality optimization with security and power constraints. The efficiency of our proposed techniques are evaluated in extensive experiments.

References

  1. Min Bao, A. Andrei, P. Eles, and Zebo Peng. 2009. On-line thermal aware dynamic voltage scaling for energy optimization with frequency/temperature dependency consideration. In Design Automation Conference (DAC). 490--495. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Alex Biryukov and Eyal Kushilevitz. 1998. Improved cryptanalysis of RC5. In Advances in Cryptology (EUROCRYPT). 85--99.Google ScholarGoogle Scholar
  3. Cisco. 2014. H.264 codec. Retrieved Feb. 27, 2015 from https://github.com/cisco/openh264.Google ScholarGoogle Scholar
  4. K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan. 2002. A fast and elitist multiobjective genetic algorithm: NSGA-II. Evolutionary Computation 6 (2002), 182--197. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Jutta Degener and Carsten Borman. 1992. GSM 06.10. Retrieved Feb. 21, 2015 from http://www.quut.com/gsm/gsm-1.0.13.tar.gz.Google ScholarGoogle Scholar
  6. Catherine H. Gebotys. 2006. A table masking countermeasure for low-energy secure embedded systems. IEEE Transactions on VLSI Systems 14, (July 2006), 740--753. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Johan Hagman. 1997. Mp3 decoder. Retrieved March 1, 2015 from http://aminet.net/mus/play/mpeg3play.lha.Google ScholarGoogle Scholar
  8. Steven A. Hofmeyr, Stephanie Forrest, and Anil Somayaji. 1998. Intrusion detection using sequences of system calls. Journal of Computer Security 6 (1998), 151--180. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Pengcheng Huang, Orlando Moreira, Kees Goossens, and Anca Molnos. 2013. Throughput-constrained voltage and frequency scaling for real-time heterogeneous multiprocessors. In The 28th Annual ACM Symposium on Applied Computing (SAC’13). 1517--1524. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Chia-Mei Hung, Jian-Jia Chen, and Tei-Wei Kuo. 2006. Energy-efficient real-time task scheduling for a DVS system with a non-DVS processing element. In International Real-Time Systems Symposium (RTSS’06). 303--312. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Ondrej Hyncica, Pavel Kucera, Petr Honzik, and Petr Fiedler. 2011. Performance evaluation of symmetric cryptography in embedded systems. In International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS’11). 277--282.Google ScholarGoogle ScholarCross RefCross Ref
  12. Independent JPEG Group IJG. 1998. jpeg-6b. Retrieved Feb. 17, 2015 from https://quirkysoft.googlecode.com/files/jpegsrc.v6b.tar.gz.Google ScholarGoogle Scholar
  13. Ke Jiang, Lejla Batina, Petru Eles, and Zebo Peng. 2014. Robustness analysis of real-time scheduling against differential power analysis attacks. In IEEE Computer Society Annual Symposium on VLSI (ISVLSI’14). 450--455. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Ke Jiang, Petru Eles, and Zebo Peng. 2011. Optimization of message encryption for distributed embedded systems with real-time constraints. In 14th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS’11). 243--248.Google ScholarGoogle ScholarCross RefCross Ref
  15. Ke Jiang, P. Eles, and Zebo Peng. 2012a. Co-design techniques for distributed real-time embedded systems with communication security constraints. In Design, Automation Test in Europe (DATE’12). 947--952. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Ke Jiang, Petru Eles, and Zebo Peng. 2013a. Optimization of secure embedded systems with dynamic task sets. In Design, Automation Test in Europe (DATE’13). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Ke Jiang, Petru Eles, Zebo Peng, and Wei Jiang. 2013b. Power-aware design of secure multimode real-time embedded systems with FPGA co-processors. In 21st International Conference on Real-Time Networks and Systems (RTNS’13).Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Wei Jiang, Ke Jiang, and Yue Ma. 2012b. Resource allocation of security-critical tasks with statistically guaranteed energy constraint. In 18th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA’12). 330--339. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Lars Knudsen and Willi Meier. 2001. Correlations in RC6 with a reduced number of rounds. In Fast Software Encryption, 94--108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and others. 2010. Experimental security analysis of a modern automobile. In 2010 IEEE Symposium on Security and Privacy (SP’10). IEEE, 447--462. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Wenke Lee, S. J. Stolfo, and K. W. Mok. 1999. A data mining framework for building intrusion detection models. In 1999 IEEE Symposium on Security and Privacy. 120--132.Google ScholarGoogle Scholar
  22. Man Lin, Li Xu, L. T. Yang, Xiao Qin, Nenggan Zheng, Zhaohui Wu, and Meikang Qiu. 2009. Static security optimization for real-time systems. IEEE Transactions on Industrial Informatics (II) (2009), 22--37.Google ScholarGoogle Scholar
  23. Jane W. S. Liu, Wei-Kuan Shih, Kwei-Jay Lin, Riccardo Bettati, and Jen-Yao Chung. 1994. Imprecise computations. Proceedings of the IEEE 82, 1 (1994), 83--94.Google ScholarGoogle ScholarCross RefCross Ref
  24. Jiqiang Lu, Orr Dunkelman, Nathan Keller, and Jongsung Kim. 2008. New impossible differential attacks on AES. In Progress in Cryptology. 279--293. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Andrew Lukefahr, Shruti Padmanabha, Reetuparna Das, Ronald Dreslinski, Jr., Thomas F. Wenisch, and Scott Mahlke. 2014. Heterogeneous microarchitectures trump voltage scaling for low-power cores. In 23rd International Conference on Parallel Architectures and Compilation. 237--250. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Rabi N. Mahapatra and Wei Zhao. 2005. An energy-efficient slack distribution technique for multimode distributed real-time embedded systems. IEEE Transactions on Parallel and Distributed Systems 16, 7 (2005), 650--662. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. S. M. Martin, K. Flautner, T. Mudge, and D. Blaauw. 2002. Combined dynamic voltage scaling and adaptive body biasing for lower power microprocessors under dynamic workloads. In International Conference on Computer Aided Design (ICCAD’02). 721--725. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Kosma Moczek. 2014. Minmea, a lightweight GPS NMEA 0183 parser library. Retrieved Feb. 27, 2015 from https://github.com/cloudyourcar/minmea.Google ScholarGoogle Scholar
  29. Jingqing Mu and Roman Lysecky. 2009. Autonomous hardware/software partitioning and voltage/frequency scaling for low-power embedded systems. ACM Transactions on Design Automation of Electronic Systems 15, 1, Article 2 (2009), 20 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Hyunok Oh and Soonhoi Ha. 2002. Hardware-software cosynthesis of multimode multi-task embedded systems with real-time constraints. In 10th International Symposium on Hardware/Software Codesign(CODES02). ACM, New York, NY, 133--138. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Christof Paar and Jan Pelzl. 2010. Understanding Cryptography: A Textbook for Students and Practitioners. Springer. Google ScholarGoogle ScholarCross RefCross Ref
  32. Sangyoung Park, Jaehyun Park, Donghwa Shin, Yanzhi Wang, Qing Xie, M. Pedram, and Naehyuck Chang. 2013. Accurate modeling of the delay and energy overhead of dynamic voltage and frequency scaling in modern microprocessors. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 32, 5 (May 2013), 695--708. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Krutartha Patel and Sri Parameswaran. 2008. SHIELD: A software hardware design methodology for security and reliability of MPSoCs. In Design Automation Conference (DAC’08). 858--861. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Anuj Pathania, Qing Jiao, Alok Prakash, and Tulika Mitra. 2014. Integrated CPU-GPU power management for 3D mobile games. In Design Automation Conference (DAC’14). Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Srivaths Ravi, Anand Raghunathan, and Srimat Chakradhar. 2004a. Tamper resistance mechanisms for secure embedded systems. International Conference on VLSI Design (2004), 605--611. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Srivaths Ravi, Anand Raghunathan, Paul Kocher, and Sunil Hattangady. 2004b. Security in embedded systems: Design challenges. ACM Transactions on Embedded Computing Systems 3 (2004), 461--491. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Ronald L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin. 1998. The RC6 block cipher. In First Advanced Encryption Standard (AES) Conference.Google ScholarGoogle Scholar
  38. S. Samii, P. Eles, Zebo Peng, and A. Cervin. 2009. Quality-driven synthesis of embedded multimode control systems. In Design Automation Conference (DAC’09). 864--869. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. SAMSUNG Electronics Co. Ltd. 2004. S3C2440A 32-Bit CMOS Microcontroller User’s Manual Revision 1.Google ScholarGoogle Scholar
  40. Karen Scarfone and Peter Mell. 2007. Guide to intrusion detection and prevention systems (IDPS). NIST Special Publication (2007).Google ScholarGoogle Scholar
  41. Zili Shao, C. Xue, Q. Zhuge, M. Qiu, Bin Xiao, and E. H.-M. Sha. 2006. Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software. IEEE Transactions on Computers (Apr. 2006), 443--453. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. K. Tiri and I. Verbauwhede. 2004. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation. In Design, Automation and Test in Europe Conference (DATE’04), 246--251. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Serge Vaudenay. 1996. On the weak keys of blowfish. In Fast Software Encryption, 27--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. H. J. M. Veendrick. 1984. Short-circuit dissipation of static CMOS circuitry and its impact on the design of buffer circuits. IEEE Journal of Solid-State Circuits (SSC) 19, 4 (1984), 468--473.Google ScholarGoogle ScholarCross RefCross Ref
  45. Armin Wasicek, Patricia Derler, and Edward A. Lee. 2014. Aspect-oriented modeling of attacks in automotive cyber-physical systems. In The 51st Annual Design Automation Conference (DAC’14). 1--6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Marko Wolf, André Weimerskirch, and Christof Paar. 2006. Secure in-vehicle communication. In Embedded Security in Cars. 95--109.Google ScholarGoogle Scholar
  47. Tao Xie and Xiao Qin. 2007. Improving security for periodic tasks in embedded systems through scheduling. ACM Transactions on Embedded Computing Systems 6, 3, Article 20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Dit-Yan Yeung and Yuxin Ding. 2003. Host-based ID using dynamic and static behavioral models. Pattern Recognition 36 (2003), 229--243.Google ScholarGoogle ScholarCross RefCross Ref
  49. Man-Ki Yoon, S. Mohan, Jaesik Choi, Jung-Eun Kim, and Lui Sha. 2013. SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems. In 2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS’13). 21--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Wentao Zhang, Wenling Wu, and Dengguo Feng. 2007. New results on impossible differential cryptanalysis of reduced AES. In Information Security and Cryptology (ICISC). 239--250. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Eckart Zitzler. 2001. Hypervolume metric calculation. Retrieved Aug. 21, 2014 from ftp://ftp.tik.ee.ethz.ch/pub/people/zitzler/hypervol.c.Google ScholarGoogle Scholar
  52. Eckart Zitzler and Lothar Thiele. 1998. Multiobjective optimization using evolutionary algorithms—A comparative case study. In Conference on Parallel Problem Solving from Nature (PPSN V). 292--301. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Power-Aware Design Techniques of Secure Multimode Embedded Systems

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in

                Full Access

                • Published in

                  cover image ACM Transactions on Embedded Computing Systems
                  ACM Transactions on Embedded Computing Systems  Volume 15, Issue 1
                  February 2016
                  530 pages
                  ISSN:1539-9087
                  EISSN:1558-3465
                  DOI:10.1145/2872313
                  Issue’s Table of Contents

                  Copyright © 2016 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 28 January 2016
                  • Accepted: 1 July 2015
                  • Revised: 1 March 2015
                  • Received: 1 September 2014
                  Published in tecs Volume 15, Issue 1

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • research-article
                  • Research
                  • Refereed

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader