Open this publication in new window or tab >>2012 (English)In: Lecture Notes in Computer Science, vol. 7159, Eindhoven, The Netherlands: Springer, 2012, p. 121-134Chapter in book (Refereed)
Abstract [en]
Introducing security features in a system is not free and brings along its costs and impacts. Considering this fact is essential in the design of real-time embedded systems which have limited resources. To ensure correct design of these systems, it is important to also take into account impacts of security features on other non-functional requirements, such as performance and energy consumption. Therefore, it is necessary to perform trade-off analysis among non-functional requirements to establish balance among them. In this paper, we target the timing requirements of real-time embedded systems, and introduce an approach for choosing appropriate encryption algorithms at runtime, to achieve satisfaction of timing requirements in an adaptive way, by monitoring and keeping a log of their behaviors. The approach enables the system to adopt a less or more time consuming (but presumably stronger) encryption algorithm, based on the feedback on previous executions of encryption processes. This is particularly important for systems with high degree of complexity which are hard to analyze statistically.
Place, publisher, year, edition, pages
Eindhoven, The Netherlands: Springer, 2012
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 7159
National Category
Computer Systems
Identifiers
urn:nbn:se:mdh:diva-14456 (URN)10.1007/978-3-642-28166-2_12 (DOI)000306351300012 ()2-s2.0-84857290766 (Scopus ID)978-364228165-5 (ISBN)
Conference
4th International Symposium on Engineering Secure Software and Systems (ESSoS)
Note
4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings
2012-04-132012-04-132015-02-04Bibliographically approved