• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2010, Vol. 32 ›› Issue (12): 19-21.doi: 10.3969/j.issn.1007130X.2010.

• 论文 • Previous Articles     Next Articles

An Optimal Security Strategy Generation Method for Embedded RealTime Systems

CAO Xiaofeng1,YANG Wenqiang2   

  1. (1.School of Computer Science and Technology,Nantong University,Nantong 226019;
    2.College of Xuchang Vocational Technical,Xuchang 461002,China)
  • Received:2009-10-15 Revised:2009-12-20 Online:2010-12-25 Published:2010-12-25

Abstract:

Due to system resources and realtime constraints,the security design methods for general computing systems are not fit for the realtime embedded systems,so,it is necessary to study the special design method. To obtain the optimal security of embedded systems under realtime constraints,a complete set of security design methods which include the securityrelated task graph model and the security evaluation model are proposed in this paper. Based on these,an ILP based optimal security strategy generation method named ILPOS is also proposed. This method can select security algorithms and detect the realtime schedulability simultaneously. That is more efficient than the phased coupled optimization methods,therefore,it can make full use of the system time for security extension. The experimental results show that ILPOS can improve the system security efficiently under various time constraints compared with the traditional heuristic algorithms.

Key words: realtime embedded system;security algorithm;static scheduling;integer linear programming