DC Field | Value | Language |
---|---|---|
dc.contributor.author | Baek, Hyeongboo | ko |
dc.contributor.author | Lee, Jaewoo | ko |
dc.contributor.author | Lee, Yongjae | ko |
dc.contributor.author | Yoon, Hyunsoo | ko |
dc.date.accessioned | 2016-10-07T09:30:09Z | - |
dc.date.available | 2016-10-07T09:30:09Z | - |
dc.date.created | 2016-10-05 | - |
dc.date.created | 2016-10-05 | - |
dc.date.issued | 2016-08 | - |
dc.identifier.citation | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E99D, no.8, pp.2121 - 2130 | - |
dc.identifier.issn | 1745-1361 | - |
dc.identifier.uri | http://hdl.handle.net/10203/213246 | - |
dc.description.abstract | Since many cyber-physical systems (CPSs) manipulate security-sensitive data, enhancing the quality of security in a CPS is a critical and challenging issue in CPS design. Although there has been a large body of research on securing general purpose PCs, directly applying such techniques to a CPS can compromise the real-time property of CPSs since the timely execution of tasks in a CPS typically relies on real-time scheduling. Recognizing this property, previous works have proposed approaches to add a security constraint to the real-time properties to cope with the information leakage problem that can arise between real-time tasks with different security levels. However, conventional works have mainly focused on non-preemptive scheduling and have suggested a very naive approach for preemptive scheduling, which shows limited analytical capability. In this paper, we present a new preemptive fixed-priority scheduling algorithm incorporating a security constraint, called lowest security-level first (LSF) and its strong schedulability analysis to reduce the potential of information leakage. Our simulation results show that LSF schedulability analysis outperforms state-of-the-art FP analysis when the security constraint has reasonable timing penalties | - |
dc.language | English | - |
dc.publisher | IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG | - |
dc.title | Preemptive Real-Time Scheduling Incorporating Security Constraint for Cyber Physical Systems | - |
dc.type | Article | - |
dc.identifier.wosid | 000381563200019 | - |
dc.identifier.scopusid | 2-s2.0-84983070601 | - |
dc.type.rims | ART | - |
dc.citation.volume | E99D | - |
dc.citation.issue | 8 | - |
dc.citation.beginningpage | 2121 | - |
dc.citation.endingpage | 2130 | - |
dc.citation.publicationname | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | - |
dc.identifier.doi | 10.1587/transinf.2015EDP7493 | - |
dc.contributor.localauthor | Yoon, Hyunsoo | - |
dc.contributor.nonIdAuthor | Lee, Jaewoo | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | cyber-physical system | - |
dc.subject.keywordAuthor | security | - |
dc.subject.keywordAuthor | real-time scheduling | - |
dc.subject.keywordAuthor | schedulability analysis | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.