• Complain

Chung-Wei Lin - Security Mechanisms and Security-Aware Mapping for Real-Time Distributed Embedded Systems

Here you can read online Chung-Wei Lin - Security Mechanisms and Security-Aware Mapping for Real-Time Distributed Embedded Systems full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Cham;Berkeley;CA, year: 2015, publisher: Springer International Publishing, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Chung-Wei Lin Security Mechanisms and Security-Aware Mapping for Real-Time Distributed Embedded Systems
  • Book:
    Security Mechanisms and Security-Aware Mapping for Real-Time Distributed Embedded Systems
  • Author:
  • Publisher:
    Springer International Publishing
  • Genre:
  • Year:
    2015
  • City:
    Cham;Berkeley;CA
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Security Mechanisms and Security-Aware Mapping for Real-Time Distributed Embedded Systems: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Security Mechanisms and Security-Aware Mapping for Real-Time Distributed Embedded Systems" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Cyber-security attacks can have a critical impact on embedded systems. They may access secret information, cause system malfunction, or even endanger users in extreme circumstances. These attacks become even more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. These connections provide breeding grounds for attackers to get access to or take control of the systems. Security mechanisms can be designed to protect against attacks and meet security requirements, such as integrity, authenticity, confidentiality, or availability. However, there are many challenges of applying security mechanisms to embedded systems, such as open environments, limited resources, strict timing requirements, and large number of devices. These challenges make it very difficult and sometimes impossible to add security mechanisms after initial design stages without violating other system constraints. It is therefore important to develop a systematic approach to address security at early design stages together with all other design constraints. We first propose a general security-aware design methodology which considers security together with other design constraints at design stages. The methodology is based on Platform-Based Design [44], where a functional model and an architectural platform are initially captured separately and then brought together through a mapping process. During mapping, the functional model is implemented on the architectural platform, and constraints and objectives are satisfied and optimized, respectively. Our methodology is different from the traditional mapping process because it not only maps functional models to architectural platforms but also explores security mechanism selection and architecture selection. We then focus on the security issues for automotive systems as they represent many of the common challenges in embedded systems. We study security for in-vehicle communications and present security mechanisms for the Controller Area Network (CAN) protocol, which is a very representative asynchronous protocol and currently the most used in-vehicle communication protocol. Based on the security mechanisms, we propose a Mixed Integer Linear Programming (MILP) formulation and an MILP-based algorithm to explore task allocation, signal packing, Message Authentication Code (MAC) sharing, and priority assignment and meet both security and safety constraints. Besides the CAN protocol, we also consider a TDMA-based protocol, which is a very representative synchronous protocol and an abstraction of many existing protocols. The time-delayed release of keys [2, 34, 35, 52] is applied as the security mechanism, and an algorithm that combines a simulated annealing approach with a set of efficient optimization heuristics is developed to solve a security-aware mapping problem for TDMA-based systems. Lastly, we apply our methodology to Vehicle-to-Vehicle (V2V) communications with the Dedicated Short-Range Communications (DSRC) technology. We formulate a security-aware optimization problem and propose an efficient algorithm to solve the security-aware optimization problem. Experimental results show that our approaches can effectively and efficiently explore design spaces and satisfy all design constraints at design stages. They also demonstrate that security must be considered at initial design stages; otherwise, it is too late to add security after initial design stages.

Chung-Wei Lin: author's other books


Who wrote Security Mechanisms and Security-Aware Mapping for Real-Time Distributed Embedded Systems? Find out the surname, the name of the author of the book and a list of all author's works by series.

Security Mechanisms and Security-Aware Mapping for Real-Time Distributed Embedded Systems — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Security Mechanisms and Security-Aware Mapping for Real-Time Distributed Embedded Systems" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Springer International Publishing AG 2017
Chung-Wei Lin and Alberto Sangiovanni-Vincentelli Security-Aware Design for Cyber-Physical Systems 10.1007/978-3-319-51328-7_1
1. Introduction
Chung-Wei Lin 1 and Alberto Sangiovanni-Vincentelli 1
(1)
University of California, Berkeley, Berkeley, CA, USA
Chung-Wei Lin
Email:
As computational technology advances, more and more systems in daily life are controlled or supported by algorithms and computers. The most representative evolution includes the fly-by-wire and the drive-by-wire of aircraft and automotive systems which are no longer pure mechanical systems. This kind of systems combining computations and physical behaviors are called cyber-physical systems, where cyber represents the computational part, and physical represents the physical behavior. Besides aircraft and automotive systems, other common cyber-physical systems include medical devices, smart grids, and robotics. Many of them are safety-critical systems, and a fault may cause serious consequences or even endanger users in extreme circumstances.
Besides regular system faults, cyber-security attacks are even more critical as they can also trigger different kinds of systems faults, and attackers are malicious to find out security holes of systems. They may access secret information, control system behavior, or paralyze systems. Different types of cyber-attacks have been identified in automotive systems [6, 13, 2527, 39], aircraft systems [5, 46], global positioning systems [8, 58], medical devices [10, 29], and smart grids [24, 30]. These attacks become even more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems as these connections provide breeding grounds and access points for cyber-attacks.
Security mechanisms can be designed to protect against cyber-attacks and meet security requirements, such as integrity, authenticity, confidentiality, or availability. However, there are many challenges of applying security mechanisms to cyber-physical systems, such as open environments (e.g., wireless communication), limited resources (e.g., network bandwidth, computational resource, and power), strict timing requirements, and large number of devices [10, 23, 24, 27, 46].
Fig 11 The system development process 35 These challenges above make it - photo 1
Fig. 1.1
The system development process [35]
These challenges above make it very difficult and sometimes impossible to add security mechanisms after initial design stages without violating other system constraints. The system development process is usually described as the V-model shown in Fig. [35]. If security is not considered before detailed design or implementation, the challenges above are very difficult to be resolved. For example, remaining network bandwidth or computational resource is not enough for security mechanisms, or timing requirements are too tight to add security mechanisms. It is therefore important to develop a systematic approach to address security at early design stages together with all other design constraints.
In this book, a general security-aware design methodology is first introduced to address security together with other design constraints at the design stages for cyber-physical systems. The methodology is based on Platform-Based Design [47], where a functional model and an architectural platform are initially captured separately and then brought together through a mapping process. During mapping, the functional model is implemented on the architectural platform, and constraints and objectives are satisfied and optimized, respectively. The methodology is different from the traditional mapping process because it not only maps functional models to architectural platforms but also explores security mechanism selection and architecture selection.
Then, the book focuses on the security issues for automotive systems as they represent many of the common challenges in cyber-physical systems, such as resource constraints and timing requirements. The Controller Area Network (CAN) protocol, which is a very representative asynchronous protocol and currently the most used in-vehicle communication protocol, is first studied, and a security mechanism is proposed for the CAN protocol. Based on the security mechanisms, security is addressed during the mapping from functional models to architectural platforms, and security and safety constraints are considered in an integrated formulation. With a flexible key distribution scheme, the security-aware mapping problem is formulated as a Mixed Integer Linear Programming (MILP) problem.
Besides the CAN protocol, a Time Division Multiple Access (TDMA) based protocol for in-vehicle communication is also considered, which is a very representative synchronous protocol and an abstraction of many existing protocols such as the FlexRay [7], the Time-Triggered Protocol [45], and the Time-Triggered Ethernet [44]. This kind of protocols is increasingly adopted in various safety-critical systems for more predictable timing behavior. The time-delayed release of keys [2, 37, 38, 55] is applied as the security mechanism, and an algorithm that combines a simulated annealing approach with a set of efficient optimization heuristics is developed to solve the security-aware mapping problem.
The methodology is then applied to Vehicle-to-Vehicle (V2V) communications with the Dedicated Short-Range Communication (DSRC) technology. A security-aware optimization problem with consideration of both security and safety requirements is formulated, and it considers the overhead of different settings of the Elliptic Curve Digital Signature Algorithm (ECDSA). The key decision variables are the sending rates and the authentication rates of Basic Safety Messages (BSMs) which carry important information for safety applications and thus need security protections, and their sending rates and authentication rates play dominant roles in system performance and security, respectively [1, 23, 28]. The security-aware optimization problem is solved by an efficient algorithm.
Following the studies of asynchronous and synchronous protocols, other general security-aware design problems are also presented in this book. The first type is based on Finite State Machines (FSMs), and a synthesis problem is formulated to model a system with limited resources. The second type is based on graphs where message duplication and network partitioning are addressed for security.
The rest of the book is organized as follows. Chapter concludes the book and points out some future directions.
Springer International Publishing AG 2017
Chung-Wei Lin and Alberto Sangiovanni-Vincentelli Security-Aware Design for Cyber-Physical Systems 10.1007/978-3-319-51328-7_2
2. Security Threats in Cyber-Physical Systems
Chung-Wei Lin 1 and Alberto Sangiovanni-Vincentelli 1
(1)
University of California, Berkeley, Berkeley, CA, USA
Chung-Wei Lin
Email:
Traditional security terminology describes high-level attacking scenarios:
  • A fabrication is a scenario that an unauthorized party generates additional data or objects on a network or in some storage.
  • A modification is a scenario that an unauthorized party changes existing data or objects on a network or in some storage.
  • An interception is a scenario that an unauthorized party reads data or objects on a network or in some storage.
  • An interruption is a scenario that an unauthorized party makes data, objects, or services become unavailable.
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Security Mechanisms and Security-Aware Mapping for Real-Time Distributed Embedded Systems»

Look at similar books to Security Mechanisms and Security-Aware Mapping for Real-Time Distributed Embedded Systems. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Security Mechanisms and Security-Aware Mapping for Real-Time Distributed Embedded Systems»

Discussion, reviews of the book Security Mechanisms and Security-Aware Mapping for Real-Time Distributed Embedded Systems and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.