• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2010, Vol. 32 ›› Issue (12): 19-21.doi: 10.3969/j.issn.1007130X.2010.

• 论文 • 上一篇    下一篇

一种面向嵌入式实时系统的安全策略优化生成方法

曹小峰1,杨文强2   

  1. (1.南通大学计算机科学与技术学院,江苏 南通 226019;2.许昌职业技术学院,河南 许昌 461002)
  • 收稿日期:2009-10-15 修回日期:2009-12-20 出版日期:2010-12-25 发布日期:2010-12-25
  • 通讯作者: 曹小峰
  • 作者简介:曹小峰(1972),男,江苏南通人,硕士生,讲师,CCF会员(E200015358M),研究方向为数据挖掘、网络安全;杨文强,硕士生,副教授,研究方向为计算机应用。

An Optimal Security Strategy Generation Method for Embedded RealTime Systems

CAO Xiaofeng1,YANG Wenqiang2   

  1. (1.School of Computer Science and Technology,Nantong University,Nantong 226019;
    2.College of Xuchang Vocational Technical,Xuchang 461002,China)
  • Received:2009-10-15 Revised:2009-12-20 Online:2010-12-25 Published:2010-12-25

摘要:

由于受到系统资源和实时性的限制,对于嵌入式实时系统的安全扩展很难延用通用计算机系统的安全设计方法,因此需要对其进行专门的研究。为了在确保实时性的前提下使嵌入式实时系统的安全性达到最优,本文提出了一套完整的安全设计方法,包括安全任务图模型和安全评估模型,在此基础上,又提出了一种基于整数线性规划的安全策略优化生成方法ILPOS。该安全策略优化生成方法同时解决了安全算法选择和实时可调度性检测两方面的问题,克服了一般分阶段优化方法的不足,从而充分地利用系统可用时间来实现安全扩展。仿真实验结果表明,与传统的启发式安全设计算法相比,ILPOS方法在各种实时性约束条件下都能有效地提高系统的安全性。

关键词: 嵌入式实时系统, 安全算法, 静态调度, 整数线性规划

Abstract:

Due to system resources and realtime constraints,the security design methods for general computing systems are not fit for the realtime embedded systems,so,it is necessary to study the special design method. To obtain the optimal security of embedded systems under realtime constraints,a complete set of security design methods which include the securityrelated task graph model and the security evaluation model are proposed in this paper. Based on these,an ILP based optimal security strategy generation method named ILPOS is also proposed. This method can select security algorithms and detect the realtime schedulability simultaneously. That is more efficient than the phased coupled optimization methods,therefore,it can make full use of the system time for security extension. The experimental results show that ILPOS can improve the system security efficiently under various time constraints compared with the traditional heuristic algorithms.

Key words: realtime embedded system;security algorithm;static scheduling;integer linear programming