Skip to main content

New Middleware for Secured Reconfigurable Real-Time Systems

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 532))

Abstract

The paper deals with secured reconfigurable real-time embedded systems that should be adapted to their environment according to user requirements. For various reasons, a reconfiguration scenario is a run-time automatic operation that allows the addition-removal-update of Operating System tasks. These tasks are secured and should meet real-time constraints. In this case, security mechanisms are assumed to be executed to protect them. Nevertheless, when a reconfiguration is applied to add new tasks and their related mechanisms, some deadlines can be violated. We propose a new middleware that constructs a new execution model of the system after reconfiguration scenarios. It proposes to reduce the execution number of mechanisms that share the security of several tasks, or also reduces the security level of others. The middleware is based on a multi-agent model, is composed of Reconfiguration Agent that controls reconfigurations, Security Agent that controls the security of the system, Scheduling Agent that constructs the new execution model, and Execution Agent that applies the new model. The paper’s contribution is implemented and applied to a case study.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Gharbi, A., Gharsellaoui, H., Khalgui, M., Valentini, A.: Safety reconfiguration of embedded control systems. In: Embedded Computing Systems: Applications, Optimization, and Advanced Design, pp. 184–210 (2013)

    Google Scholar 

  2. Shyamasundar, R.K., Aghav, J.V.: Validating real-time constraints in embedded systems. In: Pacific Rim International Symposium, pp. 347–355. IEEE Press (2001)

    Google Scholar 

  3. Dave, B.P.: CRUSADE: hardware/software co-synthesis of dynamically reconfigurable heterogeneous real-time distributed embedded systems. In: Design, Automation and Test in Europe Conference and Exhibition, pp. 97–104. IEEE Press (1999)

    Google Scholar 

  4. Rammig, F., Ditze, M., Janacik, P., Heimfarth, T., Kerstan, T., Oberthuer, S., Stahl, K.: Basic Concepts of Real Time Operating Systems. In: Ecker, W., Mller, W., Dmer, R. (eds.) Hardware-dependent Software, Principles and Practice, pp. 15–45. Springer (Science + Business Media B.V), The Netherlands (2009)

    Chapter  Google Scholar 

  5. Khelladi, L., Challal, Y., Bouabdallah, A., Badache, N.: On security issues in embedded systems: challenges and solutions. Int. J. Inf. Comput. Secur. IJICS 2(2), 140–174 (2008)

    Google Scholar 

  6. Singh, B.: Network security and management. In: Computational Intelligence and Computing Research ICCIC, pp. 1–6. IEEE Press (2010)

    Google Scholar 

  7. Spyropoulou, E., Levin, T., Irvine, C.: Calculating costs for quality of security service. In: Computer Security Applications ACSAC, pp. 334–343. IEEE Press (2000)

    Google Scholar 

  8. Angelov, C., Sierszecki, K., Marian, N.: Design models for reusable and reconfigurable state machines. In: International Federation for Information Processing, pp. 152–163. IEEE Press (2005)

    Google Scholar 

  9. Gehin, A.L., Staroswiecki, M.: Reconfiguration analysis using generic component models. IEEE Trans. Syst. Mach. Cybern. 38(3), 575–583 (2008)

    Article  Google Scholar 

  10. Al-Safi, Y., Vyatkin, V.: An ontology-based reconfiguration agent for intelligent mechatronic systems. In: Proceedings 4th International Conference Holonic and Multi-Agent System Manufacturing, pp. 114–126, Regensburg, Germany (2007)

    Google Scholar 

  11. Wang, X., Khalgui, M., Li, Z.W.: Dynamic low power reconfigurations of real-time embedded systems. In: Proceedings 1st Pervasive and Embedded Computing and Communication Systems, Algarve, Portugal (2011)

    Google Scholar 

  12. Palis, M.A.: Online real-time job scheduling with rate of progress guarantees. In: Parallel Architectures, Algorithms, and Networks, pp. 65–70 (2002)

    Google Scholar 

  13. Xie, T., Qin, X., Sung, A.: SAREC: a security-aware scheduling strategy for real-time applications on clusters. In: Parallel Processing ICPP, pp. 5–12. IEEE Press (2005)

    Google Scholar 

  14. Singhoff, F., Legrand, J., Nana, L., Marc, L.: Cheddar: a flexible real time scheduling framework. ACM SIGAda Ada Letters 24(4), 1–8 (2004)

    Article  Google Scholar 

  15. Bhat, U.N.: An Introduction to Queueing Theory. Birkhäuser Boston, IEEE Press, Boston (2008)

    Book  Google Scholar 

  16. El-Hoiydi, A.: Soft deadline bounds for two-way transactions in bluetooth piconets under co-channel interference. In: Emerging Technologies and Factory Automation, pp. 143–150. IEEE Press (2001)

    Google Scholar 

  17. Idriss, R., Loukil, A., Khalgui, M.: New solutions for feasible secured reconfiguration of embedded control systems. In: The European Simulation and Modelling Conference (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rim Idriss .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Idriss, R., Loukil, A., Khalgui, M. (2015). New Middleware for Secured Reconfigurable Real-Time Systems. In: Fujita, H., Guizzi, G. (eds) Intelligent Software Methodologies, Tools and Techniques. SoMeT 2015. Communications in Computer and Information Science, vol 532. Springer, Cham. https://doi.org/10.1007/978-3-319-22689-7_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22689-7_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22688-0

  • Online ISBN: 978-3-319-22689-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics