Abstract
The paper deals with secured reconfigurable real-time embedded systems that should be adapted to their environment according to user requirements. For various reasons, a reconfiguration scenario is a run-time automatic operation that allows the addition-removal-update of Operating System tasks. These tasks are secured and should meet real-time constraints. In this case, security mechanisms are assumed to be executed to protect them. Nevertheless, when a reconfiguration is applied to add new tasks and their related mechanisms, some deadlines can be violated. We propose a new middleware that constructs a new execution model of the system after reconfiguration scenarios. It proposes to reduce the execution number of mechanisms that share the security of several tasks, or also reduces the security level of others. The middleware is based on a multi-agent model, is composed of Reconfiguration Agent that controls reconfigurations, Security Agent that controls the security of the system, Scheduling Agent that constructs the new execution model, and Execution Agent that applies the new model. The paper’s contribution is implemented and applied to a case study.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Gharbi, A., Gharsellaoui, H., Khalgui, M., Valentini, A.: Safety reconfiguration of embedded control systems. In: Embedded Computing Systems: Applications, Optimization, and Advanced Design, pp. 184–210 (2013)
Shyamasundar, R.K., Aghav, J.V.: Validating real-time constraints in embedded systems. In: Pacific Rim International Symposium, pp. 347–355. IEEE Press (2001)
Dave, B.P.: CRUSADE: hardware/software co-synthesis of dynamically reconfigurable heterogeneous real-time distributed embedded systems. In: Design, Automation and Test in Europe Conference and Exhibition, pp. 97–104. IEEE Press (1999)
Rammig, F., Ditze, M., Janacik, P., Heimfarth, T., Kerstan, T., Oberthuer, S., Stahl, K.: Basic Concepts of Real Time Operating Systems. In: Ecker, W., Mller, W., Dmer, R. (eds.) Hardware-dependent Software, Principles and Practice, pp. 15–45. Springer (Science + Business Media B.V), The Netherlands (2009)
Khelladi, L., Challal, Y., Bouabdallah, A., Badache, N.: On security issues in embedded systems: challenges and solutions. Int. J. Inf. Comput. Secur. IJICS 2(2), 140–174 (2008)
Singh, B.: Network security and management. In: Computational Intelligence and Computing Research ICCIC, pp. 1–6. IEEE Press (2010)
Spyropoulou, E., Levin, T., Irvine, C.: Calculating costs for quality of security service. In: Computer Security Applications ACSAC, pp. 334–343. IEEE Press (2000)
Angelov, C., Sierszecki, K., Marian, N.: Design models for reusable and reconfigurable state machines. In: International Federation for Information Processing, pp. 152–163. IEEE Press (2005)
Gehin, A.L., Staroswiecki, M.: Reconfiguration analysis using generic component models. IEEE Trans. Syst. Mach. Cybern. 38(3), 575–583 (2008)
Al-Safi, Y., Vyatkin, V.: An ontology-based reconfiguration agent for intelligent mechatronic systems. In: Proceedings 4th International Conference Holonic and Multi-Agent System Manufacturing, pp. 114–126, Regensburg, Germany (2007)
Wang, X., Khalgui, M., Li, Z.W.: Dynamic low power reconfigurations of real-time embedded systems. In: Proceedings 1st Pervasive and Embedded Computing and Communication Systems, Algarve, Portugal (2011)
Palis, M.A.: Online real-time job scheduling with rate of progress guarantees. In: Parallel Architectures, Algorithms, and Networks, pp. 65–70 (2002)
Xie, T., Qin, X., Sung, A.: SAREC: a security-aware scheduling strategy for real-time applications on clusters. In: Parallel Processing ICPP, pp. 5–12. IEEE Press (2005)
Singhoff, F., Legrand, J., Nana, L., Marc, L.: Cheddar: a flexible real time scheduling framework. ACM SIGAda Ada Letters 24(4), 1–8 (2004)
Bhat, U.N.: An Introduction to Queueing Theory. Birkhäuser Boston, IEEE Press, Boston (2008)
El-Hoiydi, A.: Soft deadline bounds for two-way transactions in bluetooth piconets under co-channel interference. In: Emerging Technologies and Factory Automation, pp. 143–150. IEEE Press (2001)
Idriss, R., Loukil, A., Khalgui, M.: New solutions for feasible secured reconfiguration of embedded control systems. In: The European Simulation and Modelling Conference (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Idriss, R., Loukil, A., Khalgui, M. (2015). New Middleware for Secured Reconfigurable Real-Time Systems. In: Fujita, H., Guizzi, G. (eds) Intelligent Software Methodologies, Tools and Techniques. SoMeT 2015. Communications in Computer and Information Science, vol 532. Springer, Cham. https://doi.org/10.1007/978-3-319-22689-7_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-22689-7_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22688-0
Online ISBN: 978-3-319-22689-7
eBook Packages: Computer ScienceComputer Science (R0)