ArticlePDF Available

Towards security and QoS optimization in real-time embedded systems

Authors:

Abstract and Figures

A number of real-time embedded systems (RTESs) are used to manage critical infrastructure such as electric grids or C 4 I systems. In these systems, it is essential to meet deadlines, for example, to avoid a power outage or loss of a life. The im-portance of security support is also increasing, because more RTESs are being networked. To securely transmit sensitive data, e.g., a battle field status, across the network, RTESs need to protect the data via cryptographic techniques. How-ever, security support may cause deadline misses or unac-ceptable QoS degradation. As an initial effort to address this problem, we formulate the security support in RTESs as a QoS optimization problem. Also, we propose a novel adaptive approach for security support in which a RTES ini-tially uses a relatively short cryptographic key to maximize the QoS, while increasing the key length when the security risk level is raised. In this way, we can make a possible cryptanalysis several orders of magnitude harder by requir-ing the attacker to search a larger key space, while meeting all deadlines by degrading the QoS in a controlled manner. To minimize the overhead, we derive the appropriate QoS levels for several key lengths via an offline polynomial time algorithm. When the risk level is raised online, a real-time task can use a longer key and adapt to the corresponding QoS level (derived offline) in O(1) time.
Content may be subject to copyright.
Towards Security and QoS Optimization in Real-Time
Embedded Systems
Kyoung-Don Kang
Department of Computer Science
State University of New York at Binghamton
kang@cs.binghamton.edu
Sang H. Son
Department of Computer Science
University of Virginia
son@cs.virginia.edu
ABSTRACT
A number of real-time embedded systems (RTESs) are used
to manage critical infrastructure such as electric grids or C
4
I
systems. In these systems, it is essential to meet deadlines,
for example, to avoid a power outage or loss of a life. The im-
portance of security support is also increasing, b ecause more
RTESs are being networked. To securely transmit sensitive
data, e.g., a battle field status, across the network, RTESs
need to protect the data via cryptographic techniques. How-
ever, security support may cause deadline misses or unac-
ceptable QoS degradation. As an initial effort to address
this problem, we formulate the security support in RTESs
as a QoS optimization problem. Also, we propose a novel
adaptive approach for security support in which a RTES ini-
tially uses a relatively short cryptographic key to maximize
the QoS, while increasing the key length when the security
risk level is raised. In this way, we can make a possible
cryptanalysis several orders of magnitude harder by requir-
ing the attacker to search a larger key space, while meeting
all deadlines by degrading the QoS in a controlled manner.
To minimize the overhead, we derive the appropriate QoS
levels for several key lengths via an offline polynomial time
algorithm. When the risk level is raised online, a real-time
task can use a longer key and adapt to the corresponding
QoS level (derived offline) in O(1) time.
Keywords
Real-Time Embedded Systems, Security, Deadlines
1. INTRODUCTION
A number of real-time embedded systems (RTESs) are used
to manage critical infrastructure such as electric grids and
C
4
I (Command, Control, Communications, Computers, and
Intelligence) systems. In these systems, meeting deadlines is
essential, since a deadline miss may cause a catastrophic re-
sult, e.g., a power outage or loss of a life. The importance of
security support is also increasing, since more RTESs, e.g.,
C
4
I systems, are being networked. Although cryptographic
security and real-time systems have been well stu died sepa-
rately, very little work has been done to meet both timing
and cryptographic security requirements.
Simultaneously supporting security and timing constraints is
challenging, since these requirements can compete for com-
putational resources. A simplistic approach, e.g., always
using the longest key, may incur severe QoS degradation
in resource constrained RTESs, often based on cheap, low-
end microprocessors and/or microcontrollers. (It is known
that the time for encryption increases as the key length in-
creases [13].) In addition, sensor and control data have to
be protected for a relatively short time, since they change
frequently. Un less the current risk is high, too hard an ar-
mor could be excessive, wasting precious resources. Thus,
we aim to handle potentially time-varying risks in a cost-
effective manner.
In this paper, we first formulate the security support in RT-
ESs as a QoS optimization problem. In addition, we present
a novel adaptive and risk-aware approach to efficiently satis-
fying security and timing constraints in resource constrained
RTESs. When a n etwork intrusion detection system raises
the level of the security risk, e.g., due to t he detection of
attempts for illegal data access, a RTES begins to use a
longer cryptographic key t o better protect sensitive data.
As a result, a possible cryptanalysis trying to nd the cry p-
tographic key is forced to take several orders of magnitude
longer. At the same time, the RTES may have to degrade
the QoS of certain real-time tasks to avoid potential deadline
misses due to the increased security cost.
To minimize the adaptation overhead, we perform an of-
fline analysis to optimize the Q oS for several different key
lengths. In this way, we ensure all deadlines will be met if
the total utilization is smaller than or equal to the schedula-
ble utilization bound, e.g., 1 in EDF, while maximizing the
QoS for given key lengths. Given the current risk level, our
approach can dynamically select the appropriate key length
and QoS levels of real-time tasks from the precomputed set-
tings in O(1) time. Consequently, our approach can support
desirable security and real-time features with minimal over-
heads.
The remainder of the paper is organized as follows. The
scope of the work is described by discussing the basic as-
sumptions and formulating the problem of security and real-
time performance management in Section 2. The crypto-
graphic security support is described in Section 3. Our on-
line and offline algorithms for security and timing assurance
are presented in Section 4. Related work is discussed in Sec-
tion 5. Finally, Section 6 concludes the paper and discusses
the futu re work.
2. SCOPE OF THE WORK
WAN
ER/FW
ER/FW IDS
RTES
..........
LAN
RTES
Level
RTES
RTES
.......
Level
RTES
LAN
SC
Level
IDS
Data
Data
Figure 1: System Model: Example
2.1 Application Scenario and System Model
Figure 1 shows a high level diagram of example RTESs and
a service center (SC) that operate as follows. A RTES mon-
itors and controls, e.g., (part of) an electric grid or a battle
field. A RTES may transmit sensor or control data to a SC
to report, e.g., an overload of a power generator. RTESs in
a specific area are connected via a local area network (LAN)
such as a control area network (CAN), while communicating
with a SC across the wide area network (WAN) through an
edge router (ER) that connects the LAN to th e backbone
network.
We assume that each task in a RTES is associated with a
hard deadline; however, the transmission delay between a
RTES and SC does not require a hard guarantee. We also
assume that RTESs are independent of each other to avoid
a deadline miss due to an unpredictable delay for communi-
cation. We assume that the communication medium access,
transmission, and propagation delay in the LAN, e.g., CAN,
is predictable and t he delay is included in the schedulabil-
ity analysis to meet all deadlines, similar to [14]. We also
assume a RTES transmits data in asynchronous mode, in
which control is immediately returned to a real-time task
without waiting for the completion of the transmission.
An ER is eq uipped with a firewall (FW) t o filter suspicious
packets and connection requests, e.g., insecure file transfer
protocol (FTP) connection requests. Note that a firewall
does not completely solve the network security problem, be-
cause an adversary, who has access to the wide area net-
work, may eavesdrop or inject packets to the network. For
example, a terrorist may try to find the weakest point of an
electric grid by eavesdropping. Or, he may attempt to send
false data to the SC. Hence, it is necessary to encrypt and
authenticate data to supp ort the confidentiality, integrity,
and authenticity of the network messages.
An intrusion detection system (IDS) monitors incoming and
outgoing packets and periodically broadcasts the current
risk level to the connected RTESs or a SC in a specific area.
(We assume the intrusion detection and broadcast task is
sporadic and can subsequently be mapped as a periodic task.
A thorough investigation is reserved for future work.) A S C
is in charge of a specified set of RTESs. It takes care of,
e.g., long-term plans for energy supply and military tactics,
based on the information received from RTESs (and other
sources, if any). We assume that a SC is also protected via
a firewall and IDS, similar to RTESs.
2.2 Threat Model
We assume that an isolated RTES is trusted. Thus, a RTES
only has to encrypt data before transmitting them across the
network. We also assume that an IDS is not compromised.
We consider a symmetric key system in which a SC and
RTES share a secret key, since th e en cryption/decryption
in a public key system takes several orders of magnitude
longer than that in a symmetric key system [13]. We sup-
port the confid entiality, integrity, authenticity of a message
via encryption and cryptographic one-way hash function.
Therefore, an adversary cannot eavesdrop, corrupt, or inject
messages without being detected. In addition, we support
semantic security and replay protection.
Each RTES shares a pair of secret keys with a SC to en-
crypt and authenticate a message to support the message
confidentiality, integrity, and authenticity. We use differ-
ent keys for encryption and authentication, since the rule of
thumb is to use separate keys for different applications [13].
Note that only the SC can decry pt and check the integrity
and authenticity of the message transmitted by t he RTES
using the shared keys.
Finally, it is assumed that main attacks against a scruti-
nized cryptosystem without known vulnerability, e.g., DES
(Digital Encryption Standard) [13] or AES (Advanced En -
cryption Standard) [12], are brute-force attacks that try to
find the secret key via an exhaustive search in the key space.
Note that this is a common assumption in trusted cryptosys-
tems [13]. (A more detailed discussion of the specific security
support considered in this paper is given in Section 3.)
2.3 Problem Formulation
In this paper, we assume that a RTES consists of a set of N
periodic tasks < T
1
, T
2
, ..., T
N
>. We assume the deadline of
a task is equal to its period. The (worst case) execution time
of a task T
i
is: C
i
= C
i,c
+ C
i,e(l)
where C
i,c
is the real-time
function execution time and C
i,e(l)
is the data encryption
(and transmission) time for the key length l, respectively.
The utilization of a task T
i
is: U
i
= C
i
/P
i
where P
i
is
the period of T
i
. Further, each task is associated with k(
1) discrete QoS levels. The QoS monotonically increases
as the QoS level (and the corresponding execution time)
increases, similar to the milestone approach [8]. Ideally, we
aim to optimize the aggregate QoS of the real-time tasks
{T
1
, T
2
, ..., T
N
} defined in terms of both security and real-
time performance, while addressing the current security risk
indicated by an IDS:
Maximize QoS = S(l)
P
N
i=1
Q(i)
P
N
i=1
max Q(i)
1 (1)
where Q(i) and max Q( i) are the current and maximum
possible QoS of a t ask T
i
and
S(l) =
1 if S( l) R(t)
0 otherwise
(2)
where S(l) indicates the strength level of the currently used
cryptosystem, which is determined by t he current key length
l measured in number of bits. For example, a security of-
ficer can set S(80) = 1, S(112) = 2, and S(128) = 3 for
the DES algorithm. R(t) in Eq 2 denotes the current risk
level estimated by the IDS, e.g., 1 (low), 2 (medium), and 3
(high). Specifically, we select the key lengths to defend the
cryptosystem against a potential cryptanalysis for a certain
estimated period of time. Also, note that our QoS optimiza-
tion is subject to
N
X
i=1
U
i
UB (3)
where the U B is the utilization bound of an employed real-
time scheduling algorithm such as EDF. When the risk level
R(t) is raised by the IDS, a task T
i
has to use a longer
key. As a result, C
i
and U
i
may increase, and therefore, the
QoS manager should reallocate resources to re-optimize the
QoS. Otherwise, the QoS may become suboptimal, possibly
incurring deadlines misses if Eq 3 cannot be satisfied.
3. CRYPTOGRAPHICSECURITYSUPPORT
This section describes our cryptographic security scheme fol-
lowed by a discussion of the strength of a symmetric key
system.
3.1 Confidentiality,Integrity,andMessageAu-
thentication
E E E
P P
P
C
C C
i−1 i
i+1
i−1
i i+1
IV
Figure 2: Cipher Block Chaining
In our approach, when a RTES wants to send a message
P to a SC, it first encrypts the plaintext P to support the
confidentiality of the message. The encrypted ciphertext
message is:
C = E(P )
{K
e
, Cnt}
(4)
where E is the encryption function such as DES or AES, K
e
is the encryption key shared between a RTES and SC, and
Cnt is the current counter value that is incremented after
each message encryption and transmission. As shown in Fig-
ure 2, we use the cipher block chaining (CBC) mod e [2, 13]
in which the encrypt ed previous block is fed into the encryp-
tion of the current block; that is, the input to the encryption
function E using the key K
e
is XOR(C
i1
, P
i
) where C
i1
is
the previous ciphertext block and P
i
is the current plaintext
block to be encrypted. By u sing the counter value Cnt as
the initialization vector (IV) in CBC mode, we can support
the d esirable security features as follows.
Semantic security: The notion of semantic security [2,
5] ensures that a view of a ciphertex t does not help a
cryptanalyst to nd any information about the corre-
sponding plaintext. In our approach, if one message
is encrypted more than once, it will be encrypted dif-
ferently, because the counter, i.e., IV , is incremented
after each encryption. It is known that semantic secu-
rity can be supported when the counter is used as the
IV in CBC mode [13].
Replay protection: An adversary cannot replay an old
message, since the IV is updated after each message.
Semantic security and replay protection are supported as
long as the counter is not wrapped around yet. Generally, it
is a goo d p ractice to distribute new keys before the counter
wraps around.
1
By using several keys of different lengths,
we can safely delay the expensive key distribution process i n
two ways. First, a separate counter can be associated with
each key of a certain length in a RTES to support seman-
tic security and replay protection. After encrypting (and
transmitting) a message using a specific key, only t he cor-
respond ing counter is incremented. Since we use a constant
number of keys, the related overhead of maintaining the sep-
arate counters for different lengths of keys can be limited.
Furthermore, when the risk level is increased, we reduce the
frequencies of certain control tasks, if necessary, to use a
longer key without missing any deadline. Accordingly, the
frequency of the data transmission between a RTES and SC
is reduced. Thus, the key distribution is safely d elayed due
to the corresponding delay of the counter increment.
To check the integrity of the message and aut henticate the
claimed sender, a message authentication code (MAC) is
computed over the encrypted message C:
MAC = H(C|Cnt)
K
m
(5)
where H is a key-based one way hash function, C|Cnt is the
concatenation of the ciphertext (Eq 4) and the counter value,
and K
m
is the message authentication key shared between
a RTES and SC.
2
Using a key-based one way hash function,
one can support the following desirable security features [10,
13].
Data Integrity: A one way hash function works in one
direction; that is, computing the hash value from the
pre-image, i.e., C|Cnt in Eq 5, is easy. However, gen-
erating a pre-image that hashes to a specific value is
hard. Also, a good one way hash function avoids a
collision;that is, it ensures different messages hash to
different values. Thus, it is very hard for an adversary
to modify or fabricate a message t hat hashes to the
original M AC value. Upon the reception of the mes-
sage, the receiver computes the MAC of the C|Cnt
using the hash function (Eq 5) to check its integrity.
1
A detailed discussion of key distribution is beyond the
scope of this paper. A thorough investigation is reserved
for future work.
2
In fact, the MA C is computed over the entire message in-
cluding the source and destination address. We intentionally
omit these parts for t he clarity of presentation.
If the message body including the C|Cnt has not been
altered during the t ransition, the computed M AC will
be equal to the received one.
Message Authentication: Unfortunately, a one way hash
function itself cannot authenticate a message. For ex-
ample, an adversary can generate a false message and
hash the message. The message will be verified suc-
cessfully by the receiver. A key-based hash function
using a secret authentication key (K
m
in Eq 5) can
handle this problem. Only the sender with the authen-
tication key can generate a valid hash value that can
only be verified by the receiver sharing the key with
the sender [13]. Thus, the receiver can verify whether
or not the message is sent from the claimed sender by
checking the MAC. Once the integrity and authentic-
ity of the message is verified, the receiver decrypts th e
ciphertext. Otherwise, it drops the message.
To implement a secure one way hash function for message
authentication, we use th e block cipher in CBC mode shown
in Figure 2. The final encryption output C
n
(where n is the
number of data blocks to be authenticated) is the hash value.
We take this approach, since it is a very efficient method to
implement a secure one way hash function [13]. Further, the
CBC MAC is provably secure [3].
A message sent by a RTES A to SC B (or vice versa) includes
the encrypted message and MAC in addition to other infor-
mation such as source and destination address (not shown
here):
A B : C, Cnt, MAC (6)
where th e ciphertext C sup ports the confidentiality of the
original plaintext and MA C supports the integrity and au-
thenticity of the message. In addition, we can support se-
mantic security and replay protection by using the IV in
CBC mode, while safely delaying the key (re)distribution
procedure when the risk is raised as discussed before.
3.2 Strength of Defense
The strength of a scrutinized symmetric key system, which
has no known shortcut to break it, is often estimated by the
difficulty of finding the key via brute-force attacks [13, 19].
The speed of a brute-force attack, in which an adversary
tests all possible keys, is mainly determined by the number
of possible key values to be tested. Wiener [19] designed a
specialized parallel hardware to estimate the average time
for a brute-force attack to b reak the D ES algorithm. N ote
that this app roach is not limited to the DES, but gener-
ally applicable to other encryption algorithms such as AES
[13]. Table 1 shows the average time estimates for hardware
brute-force attacks in 2005. (These estimates extrapolate
the p revious results [13, 19] according to Moore’s law.)
Since a RTES mainly deals with time-varying sensor and
control data, using a short, e.g., 80 bit, key might be ac-
ceptable. However, a malicious third party could attack a
cryptosystem with less budget as the hardware technology
develops fast. As a result, today’s safe key length may not
be safe tomorrow. This is an important observation, since
RTESs can be used for a long time after t he deployment, for
Table 1: Estimated Average Times for Parallel
Brute-Force Attacks
Length of Keys
Hardware Cost 80 bits 112 bits 128 bits
$10K 7000 years 10
13
years 10
18
years
$100K 700 years 10
12
years 10
17
years
$1M 70 years 10
11
years 10
16
years
$10M 7 years 10
10
years 10
15
years
$100M 245 days 10
9
years 10
14
years
example, to continuously monitor and control critical infras-
tructure. Our approach is also useful in this case; a RTES
can simply switch to a longer key, while dropping a short
key that is not considered safe anymore due to the advance
of the hardware technologies decreasing the t ime and cost
for brute-force attacks.
4. SECURITY AND TIMELINESS ASSUR-
ANCE
Our online security and QoS adaptation algorithm is sum-
marized in the following.
1. Periodically receive the current risk level R(t) at time t
from the IDS.
2. If the current strength of defense S(l) < R(t), use a new
key that is l
bits long where S(l
) = R (t) and l
> l.
3. Degrade the QoS of certain real-time tasks, if necessary,
to meet all deadlines.
Our offline precomputation algorithm for a specific key length
is summarized and discussed as follows.
1. Input: Key length l and QoS function g
i
: u
i
q
i
for each task T
i
where 1 i N (#tasks in the system)
and u
i
and q
i
are the utilization and corresponding QoS,
respectively.
2. Output: Q
List[l][i]
3. for (i = 1; i N; i + +)
For a task T
i
, derive the convex hull H
i
= {< u
i1
, q
i1
>
, ..., < u
ij
, q
ij
>} where j L (#max QoS levels).
4. /* Merge sort in nondecreasing order of utilization */
H
List = Merge(H
1
−{< u
11
, q
11
>}, H
2
−{< u
21
, q
21
>
}, ..., H
N
{< u
N1
, q
N1
>})
5. Q
List[l] = ø (empty set)
6. U
a
= UB
7. /* Support at least the minimum QoS */
for (i = 1; i N; i + +)
{
a. if (U
a
< u
i1
)
b. print(“Error: Cannot Support Key Length l”)
c. exit(-1)
d. Q
List[l][i] = q
i1
e. U
a
= U
a
u
i1
}
8. /* Initial resource allocation */
for (i = 1; i N; i + + ) U[i] = u
i1
9. /* QoS optimization */
for (i = 1; i |H
List|; i + +)
{
a. id = H List[i].id
b. δU = H
List[i].u U[id]
c. if (δU > U
a
) exit(0)
d. Q List[l][id] = H List[i].q
e. U
a
= U
a
δU
f. U[id] = H List[i].u
}
In our approach, we assume a RTES stores the secret keys
in an array key[1..|R|] where |R| is the number of risk lev-
els considered by the IDS. For each key length, as shown in
Steps 1 and 2, we precompute t he near opt imal QoS levels
of the real-time tasks offline to minimize the overhead for
online security and QoS adaptation, if necessary. For a spe-
cific key length l, task T
i
can simply switch to the QoS level
stored in Q
List[l][i] when the system needs to use a key of
length l t o ensure th at the level of defense is higher than or
equal to the risk level.
In Step 3, as shown in Figure 3, we remove suboptimal dis-
crete QoS levels by deriving the convex hull for each task
T
i
(1 i N), similar to [7]. In this way, a list of near
optimal < utilization, QoS > pairs, i.e., {< u
i1
, q
i1
>, <
u
i2
, q
i2
>, ..., < u
ij
, q
ij
>}, can be derived for each task T
i
in increasing order of utilization where u
ij
is t he utilization
required to support task T
i
’s QoS level j.
In Steps 4 7, we initialize Q
List[l] to support at least
the minimum required QoS when the key is l bits long. In
Step 4, all the < utilization, QoS > pairs of all tasks except
< u
i1
, q
i1
> are merged in nondecreasing order of utiliza-
tion. If two pairs have the same utilization, the one with
the higher QoS is added to the list first. A tie, in which
two pairs have the same utilization and QoS, is broken in a
random manner. In Step 6, the available utilization U
a
is
initialized. In Steps 7.a7.c, we check whether U
a
is enough
to support the deadline and the minimum QoS of T
i
. If this
test fails, the RTES cannot support the specific key length l
and the algorithm terminates with an error. If t he required
utilization u
i1
to support t he minimum QoS of T
i
is avail-
able, we set Q
List[l][i] = q
i1
and subtract u
i1
from U
a
in
Steps 7.d and 7.e. The p rocedure is repeated for the next
task T
i+1
, if any.
In Step 8, t he required minimum utilization of each task
T
i
(1 i N) needed to support at least T
i
’s minimum
QoS is initialized. In Step 9.a, we remove th e first task
in the H
List, i.e., T
id
, which requires the smallest utiliza-
tion. δU, i.e., the extra utilization needed to improve the
QoS of T
id
, is computed in Step 9.b. If δU > U
a
, the al-
gorithm terminates normally in Step 9.c. (We can allocate
remaining resources in a greedy manner; however, we do
Convex Hull
QoS
Utilization
Suboptimal
Figure 3: Example QoS Function
not take th e greedy approach to reduce possibly excessive
QoS fluctuations when the risk level changes.) Otherwise,
the QoS of T
id
is raised to the next higher level in Step
9.d. In Steps 9.e and 9.f, the available utilization U
a
and
the utilization allocated to T
id
are updated, respectively.
The whole pro ced ure is repeated for every key length used
by a RTES. Consequently, the algorithm generates a table
Q
List[1..#keys][1..#tasks] that can be used by our online
algorithm to select an appropriate key length and QoS levels
considering the current risk level in O(1) time. Finally, the
time complexity of our offline algorithm is O(KLNlogLN),
which b ecomes O(NlogN) when the number of keys (K)
and QoS levels (L) are constant.
5. RELATED WORK
Cryptographic security support has rarely been studied in
the context of real-time systems. Lee et al. [7] propose to
consider security as a QoS d imension and select an appro-
priate encryption key length based on the importance of an
application and its resource requirements. However, they
do not discuss these security vs. performance issues in d e-
tail. They neither discuss the important security features
and implications discussed in this paper. Further, the selec-
tion of an encryption key length and QoS levels only occurs
at the start of an application, e.g, a video conference, un-
like our approach. Son et al. [16] developed an adaptive
security manager in a real-time database. When t he real-
time database is overloaded, a weaker encryption algorithm
is used to improve the deadline miss ratio. However, their
approach does not consider potential security risks to make
the decision for adaptation. Their work neither deals with
hard deadlines.
The notion of Quality of Protection has been introdu ced in
[9] to integrate the security and QoS support. Although the
concept has existed more than a decade, it is not clearly
known yet how to measure the quality of general security
service. Spyropoulou et al. [17] have proposed the notion
of QoSS (Quality of Security Service). Ideally, a system ad-
ministrator and a security officer can select an appropriate
security scheme to optimize the cost-benefit relation, when
a quantitative model showing the computational cost and
benefit of a security service is given. However, they give no
specific model that can be used for the cost-benefit analysis.
Also, they do not consider real-time constraints. In gen-
eral, the cost-b enefit analysis of security services is an open
problem. We have taken a first step to solving this problem
focused on cryptographic security support in real-time em-
bedded systems.
Miyoshi et al. [11] have developed a novel access control
scheme using the resource control lists t o protect time mul-
tiplexed resources such as the CPU and network bandwidth
against some DoS (Denial of Service) attacks. Their work
is complementary to our work. For example, we can use the
resource control lists to protect real-time systems against
some DoS attacks, while supporting timing, stability, and
cryptographic security requirements. In general, real-time
system security is a challenging open problem with many
remaining issues to study. We discuss a specific instance of
the p roblem in this paper.
The access control problem in t he multilevel security model
has been studied in the real-time database literature [1, 15,
16, 4, 6]. A majority of these work [1, 15, 16] temporarily
allow a covert channel, which can be used by an adversary t o
enable an illegal information ow between different security
levels, to improve the timeliness under overload conditions.
George et al. [4] propose a secure real-time concurrency
control protocol to avoid a covert channel. Similarly, Kang
et al. [6] use a secure concurrency protocol to eliminate
a covert channel, while supporting the desired average and
transient deadline miss ratio via feedback control. Teo et al.
[18] have developed a dynamic access control scheme based
on the quantified levels of security risk received from an in-
trusion detection system, similar t o our approach. However,
they consider neither cryptographic security nor real-time
constraints. Generally, our work is different from these work
in that we focus on supporting cryptographic security and
hard deadlines.
6. CONCLUSIONS AND FUTURE WORK
A number of real-time embedded systems are used to man-
age critical infrastructure, e.g., electric grids or C
4
I systems.
In these systems, it is essential to meet deadlines, while sup-
porting the confidentiality, integrity, and authenticity of net-
work messages. Despite the importance, security sup port in
RTESs has rarely been supported. To address this problem,
we formulate the problem as a QoS optimization problem
and propose offline and online algorithms for security and
QoS adaptation to address dynamic security risks, while op-
timizing the QoS. In this way, our approach efficiently sup-
ports essential cryptographic security features in resource
constrained RTESs. In the future, we will further investi-
gate efficient cryptographic support in RTESs considering
different task models such as sporadic or aperiodic mod -
els. Further, we will investigate other security issues closely
related to RTESs, e.g., detection of (distributed) denial of
service attacks.
7. REFERENCES
[1] Q. Ahmed and S. Vrbsky. Maintaining Security in
Firm Real-Time Database Systems. In 14th Annual
Computer Security Applications Conference, 1998.
[2] M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A
Concrete Security Treatment of S ymmetric
Encryption. In 38th IEEE Annual Symposium on
Foundations of Computer Science, 1997.
[3] M. Bellare, J. Kilian, and P. Rogaway. The Secu rity of
the Cipher Block Chaining Message Authentication
Code. Journal of Computer and System Sciences,
61(3):362–399, Dec. 2000.
[4] B. George and J. R. Haritsa. Secure Concurrency
Control in Firm Real-Time Databases. D istributed and
Parallel Databases, 5:275–320, 1997.
[5] S. Goldwasser and S. Micali. Probabilistic Encryption.
Journal of Computer and System Sciences,
28:270–299, 1984.
[6] K. D. Kang, S. H. Son, and J. A. Stankovic. STAR:
Secure Real-Time Transaction Processing with
Timeliness Guarantees. I n The 23rd IEEE
International Real-Time Systems Symposium, Dec.
2002.
[7] C. Lee, J. Lehoczky, R. Rajkumar, and D. Siewiorek.
On Quality of Service Optimization with Discrete QoS
Options. In the 4th IEEE Real-Time Technology and
Applications Symposium, 1998.
[8] K. J. Lin, S. Natarajan, and J. W. S. Liu. I mprecise
Results: Ut ilizing Partial Computations in Real-Time
Systems. In Real-Time System Symposium, December
1987.
[9] J. Linn. Generic Security S ervice Application Program
Interface. IETF Request for Comments: 1508, 1993.
[10] W. Mao. Modern Cryptography. Prentice Hall, 2004.
[11] A. Miyoshi and R. Rajkumar. Protecting Resources
with Resource Control Lists. In IEEE Real Time
Technology and Applications Symposium, 2001.
[12] National I nstitute of Standards and Technology,
Federal Information Processing Standards Publication
197: Announcing the Advanced En cryption Standard,
Nov. 2001.
[13] B. Schneier. Applied Cryptography. Wiley, 2nd edition,
1996.
[14] J. W. S.Liu. Real-Time Systems. Prentice Hall, 2000.
[15] S. H. Son, R. Mukkamala, and R. David. Integrating
Security and Real-Time Requirements using Covert
Channel Capacity. IEEE Transactions on Knowledge
and Data Engineering, 12(6), Dec 2000.
[16] S. H. Son, R. Zimmerman, and J. Hansson. An
Adaptable Security Manager for Real-Time
Transactions. In Euromicro Conference on Real-Time
Systems, pages 63–70, Stockholm, S weden, June 2000.
[17] E. Spyropoulou, T. Levin, and C. Irvine. Calculating
Costs for Quality of Security Service. In 15th
Computer Security Applications Conference, 2000.
[18] L. Teo, G.-J. Ahn, and Y. Zheng. Dynamic and
Risk-Aware Network Access Management. In ACM
Symposium on Access Control Models and
Technologies, 2003.
[19] M. J. Wiener. Efficient DES Key Search. Technical
Report TR-244, Carleton University, May 1994.
... Brute Force Attack (A 1 ): A brute force attack is used to get unauthorized access to C3I command interfaces [88]. Hackers use diferent intrusion mechanisms, such as trial-and-error methods [52] and session IDs exploitation [60], to obtain secret information (e.g., cryptographic keys and login credentials) of C3I commanders. ...
... Eavesdropping (A 11 ): Eavesdropping, also known as a man-in-the-middle attack, is a passive attack vector by which attackers secretly listen to the communication between two C3I nodes [42,75,88,117,126,180]. Open source network monitoring and packet sniing tools, such as Wireshark and Tcpdump [77], are used to eavesdrop on C3I communication links. ...
... Therefore, the existing literature presents eicient ways for managing cryptographic keys in C3I systems. For example, Kang et al. [88] (C 27 ) have used symmetric-key algorithms to generate cryptographic keys of diferent lengths according to the severity levels of security risks in C3I systems. The proposed mechanism provides both security and optimal QoS of C3I systems simultaneously in tactical domains. ...
Article
Full-text available
Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in critical civil and military domains for achieving information superiority, operational efficacy, and greater situational awareness. The critical civil and military domains include, but are not limited to battlefield, healthcare, transportation, and rescue missions. Given the sensitive nature and modernization of tactical domains, the security of C3I systems has recently become a critical concern. This is because cyber-attacks on C3I systems have catastrophic consequences including loss of human lives. Despite the increasing number of cyber-attacks on C3I systems and growing concerns about C3I systems’ security, there is a paucity of a comprehensive review to systematize the body of knowledge on the security of C3I systems. Therefore, in this paper, we have gathered, analyzed, and synthesized the body of knowledge on the security of C3I systems. We have identified and reported security vulnerabilities, attack vectors, and countermeasures/defenses for C3I systems. In particular, this paper has enabled us to (i) propose a taxonomy for security vulnerabilities, attack vectors, and countermeasures; (ii) interrelate attack vectors with security vulnerabilities and countermeasures; and (iii) propose future research directions for advancing the state-of-the-art on the security of C3I systems. We believe that our findings will serve as a guideline for practitioners and researchers to advance the state-of-the-practice and state-of-the-art on the security of C3I systems.
... The optimization of quality (e.g., accuracy and response time) is a well-trodden phenomenon explored in different domains such as embedded systems [42], cloudbased systems [43], radar systems [44], and object detection systems [45]. Whilst [45] investigates various architectural options (e.g., feature extractor and image size) where accuracy can be traded for response time, [42][43][44] present and evaluate approaches (i.e., controlling length of cryptographic keys, distributed simulations and symbiotic feedback loops, and service lever configurations based on tasks respectively) for optimizing the QoS. ...
... The optimization of quality (e.g., accuracy and response time) is a well-trodden phenomenon explored in different domains such as embedded systems [42], cloudbased systems [43], radar systems [44], and object detection systems [45]. Whilst [45] investigates various architectural options (e.g., feature extractor and image size) where accuracy can be traded for response time, [42][43][44] present and evaluate approaches (i.e., controlling length of cryptographic keys, distributed simulations and symbiotic feedback loops, and service lever configurations based on tasks respectively) for optimizing the QoS. Unlike prior work, our work is in a different domain (i.e., BDCA) and explores a different approach (i.e., architecture-driven adaptation with stopping conditions) to ensure optimal accuracy and response time. ...
Conference Paper
Full-text available
Big Data Cyber Security Analytics (BDCA) systems leverage big data technologies (e.g., Hadoop and Spark) for collecting, storing, and analyzing a large volume of security event data to detect cyber-attacks. Accuracy and response time are the two most important quality concerns for BDCA systems. However, the frequent changes in the operating environment of a BDCA system (such as quality and quantity of security event data) significantly impact these qualities. In this paper, we first study the impact of such environmental changes. We then present ADABTics, an architecture-driven adaptation approach that (re)composes the system at runtime with a set of components to ensure optimal accuracy and response time. We finally evaluate our approach both in a single node and multi-node settings using a Hadoop-based BDCA system and different adaptation scenarios. Our evaluation shows that on average ADABTics improves BDCA’s accuracy and response time by 6.06% and 23.7% respectively.
... ] an Th netw : http://dx.doi. 15 [18,19]. A ers of protecti ng networkin to hardware er to increase t e study of ad growing area o ertain securit entication, ac and non-repu self-managing to unpredictab operators an network for m y real-time ch nt protections w a complianc [3]. ...
... require addit justified conc Such a genera a which is vast ystems [11]. A iders the issu protect again ting concern o ltered in resp urn is partly load might king and so fre affic, and vic [15] also considers using IDS input in the context of real-time embedded systems to allow the system systems to allow the system to perform optimally until a real security threat occurs. Finally M.E El-Hennawy et al. [16] also tries to alleviate security processing costs through segmenting data and applying a different level of encryption to each segment by varying the algorithm key size. ...
... While security, Quality of Service (QoS), and real-time issues of NECS have been extensively investigated, their interplay has emerged only recently as an important problem [9,10,16,17]. Intuitively, the crucial issue is that security and performance compete for the same computational and communication resources that are often limited in embedded platforms. The quality of control experienced by control applications is heavily affected by the amount resources they can rely on [12,13]. ...
... In this respect, the work has evident connection with the idea of security services championed by Irvine and Levin [8]. A similar approach to the one presented in this paper has been proposed by Kang and Son [9]. They formulate the security support in real-time critical systems as a QoS optimisation problem and associate security levels to cryptographic key lengths. ...
Article
Full-text available
Networked embedded and control systems are largely used in factory au-tomation for production and logistics tasks. In this application domain, security has become a prominent issue due to the critical consequences a cyber attack may have in terms of safety and financial losses. Unfortunately security solutions compete against control applications for the often scarce resources of embedded platforms. In this paper, we show how security can be dealt with as one of different Qual-ity of Service dimensions and traded for control performance in an adaptive QoS management scheme. The system is able to respond to increased resource require-ments or to changes in the risk level by reconfiguring the application modes and the security modes. We offer an explanatory case study to show how this idea is implemented.
Preprint
Full-text available
Command, Control, Communication, and Intelligence (C3I) system is a kind of system-of-system that integrates computing machines, sensors, and communication networks. C3I systems are increasingly used in critical civil and military operations for achieving information superiority, assurance, and operational efficacy. C3I systems are no exception to the traditional systems facing widespread cyber-threats. However, the sensitive nature of the application domain (e.g., military operations) of C3I systems makes their security a critical concern. For instance, a cyber-attack on military installations can have detrimental impacts on national security. Therefore, in this paper, we review the state-of-the-art on the security of C3I systems. In particular, this paper aims to identify the security vulnerabilities, attack vectors, and countermeasures for C3I systems. We used the well-known systematic literature review method to select and review 77 studies on the security of C3I systems. Our review enabled us to identify 27 vulnerabilities, 22 attack vectors, and 62 countermeasures for C3I systems. This review has also revealed several areas for future research and identified key lessons with regards to C3I systems' security.
Article
The next generation of telesurgical robotics systems presents significant challenges related to network performance and data security. It is known that packet transmission in wide area networks is a complex stochastic process; thus, low bandwidth as well as high delay, jitter, and packet loss will greatly affect the quality of service (QoS) of teleoperation control, which is unacceptable in this kind of sensitive application. Furthermore, a relevant but more serious issue is the network attacks, particularly denial of service as well as data alteration or disclosure. The main motivation of this study is to deploy suitable security mechanisms while preserving the QoS of network-based bilateral teleoperation. We propose and apply a protocol that secures our teleoperation system while preserving its real-time constraints. More precisely, we present in this paper a bilateral generalized predictive controller coupled to a QoS-friendly IP security protocol. The experimental results demonstrate that the telerobotic system is able to satisfy both QoS and security requirements of real-time and sensitive teleoperation tasks. In fact, our teleoperation security protocol provides priority treatment while preventing attacks and avoiding potential deadline misses due to increased security cost.
Conference Paper
Transmitting video streams while ensuring security is a challenging issue in wireless networks. Due to the openness of the wireless medium, encryption techniques should be used in many critical applications to secure video stream transmission. However, this may impact the quality of service required to efficiently reconstruct video data caused by the processing overhead and delays generated by the encryption procedure. In addition, a degradation of the transmission performance in terms of signal to noise ratio (SNR) and bit error rate can occur due to the varying characteristics of the wireless environment, which affect the available bandwidth on the channel. Thus, adaptable approach that can make a trade-off between security enforcement and transmission performance is required. In this work, we investigate the design of a video stream transmission scheme over wireless networks that can ensure security and efficiency. Our proposal is cognitive-based in the sens that security policy is selected according to the risk level evaluated by the receiver. This is done using real-time assessment of the network security state, intrusion detection, access history, and resource availability in the mobile device. The main goal is to satisfy the real-time constraints of the video stream and guarantee clear reconstitution of specific part of the scene qualified as the region of interest (ROI) by adapting the compressing parameter, qualified as the delivery ratio, according to the selected security policy and the transmission characteristics of the wireless channel.
Article
Heterogeneous distributed systems are continuously being deployed, e.g., P2P and military command, control, communications, computers, and intelligence (C4I). Many of these applications trade-off quality of service (QoS) and security. In this paper, we study the problem of allocating and scheduling a set of dependent tasks with security and QoS requirements on a set of heterogeneous sites. This problem is at least as hard as the basic NP-hard problem of scheduling a directed acyclic graph (DAG) on multiple processors. In particular, we make the following contributions: 1) we formulate the problem as an optimisation problem; 2) we use a branch and bound (B&B) method guided by an upper bound on total QoS value (TQV) to find the optimal solution if one exist; 3) we propose a heuristic algorithm to provide a near optimal solution for the scheduling of the assigned tasks on a site to maximise the QoS provided by this site in a polynomial time; 4) we evaluate the heuristic algorithm and compare it with some baseline algorithms using variations of synthetic workloads.
Article
Resource constraints imposed upon embedded systems make it particularly challenging to provide high levels of security assurance without degrading their performance. We present a method for increasing security assurance of embedded systems without reducing system performance. This method employs a systemic dissolution of architected resources that reduces the attack surface of embedded systems. We show that attacks which insert foreign instructions or modify existing instructions are impossible against systems hardened using this method. We further show that systems hardened using this method are difficult if not impossible to compromise using attacks that re-use existing program logic by diverting control flow, such as return-into-libc. We discuss advantages and shortcomings of this method, and describe a prototype that applies the method to programs targeted for the Intel 8051.
Conference Paper
Full-text available
Real-time databases are needed in security-critical applications, e.g., e-commerce, agile manufacturing, and military applications. In these applications, transactions and data items can be classified into several security levels according to their clearance and sensitivity levels. It is essential for real-time databases to prevent illegal direct/indirect transfer of sensitive data, e.g., trade secret, manufacturing, or operational data, between transactions belonging to different security levels. Further transactions should be committed within their deadlines, i.e., before the market, manufacturing, or battlefield status changes. In this paper we present a novel real-time database architecture, in which illegal direct/indirect inter-level information flows are prevented while controlling the deadline miss ratio for admitted transactions to remain below a certain threshold. In our approach, mandatory access control mechanisms are applied for security purposes. QoS management, admission control, and feedback control schemes are applied to support certain guarantees on the miss ratio against potential overload and data conflicts. A detailed simulation study shows that our approach can support the specified miss ratio preventing illegal information flows even in the presence of unpredictable workloads and varying degrees of data contention, whereas baseline approaches fail.
Article
Many real-time database applications arise in electronic financial services, safety-critical installations and military systems where enforcing security is crucial to the success of the enterprise. For real-time database systems supporting applications with firm deadlines, we investigate here the performance implications, in terms of killed transactions, of guaranteeing multilevel secrecy. In particular, we focus on the concurrency control (CC) aspects of this issue. Our main contributions are the following: First, we identify which among the previously proposed real-time CC protocols are capable of providing covert-channel-free security. Second, using a detailed simulation model, we profile the real-time performance of a representative set of these secure CC protocols for a variety of security-classified workloads and system configurations. Our experiments show that a prioritized optimistic CC protocol, OPT-WAIT, provides the best overall performance. Third, we propose and evaluate a novel “dual-CC” approach that allows the real-time database system to simultaneously use different CC mechanisms for guaranteeing security and for improving real-time performance. By appropriately choosing these different mechanisms, concurrency control protocols that provide even better performance than OPT-WAIT are designed. Finally, we propose and evaluate GUARD, an adaptive admission-control policy designed to provide fairness with respect to the distribution of killed transactions across security levels. Our experiments show that GUARD efficiently provides close to ideal fairness for real-time applications that can tolerate covert channel bandwidths of upto one bit per second.
Article
A new probabilistic model of data encryption is introduced. For this model, under suitable complexity assumptions, it is proved that extracting any information about the cleartext from the cyphertext is hard on the average for an adversary with polynomially bounded computational resources. The proof holds for any message space with any probability distribution. The first implementation of this model is presented. The security of this implementation is proved under the interactability assumptin of deciding Quadratic Residuosity modulo composite numbers whose factorization is unknown.
Article
Let F be some block cipher (eg., DES) with block length l. The cipher block chaining message authentication code (CBC MAC) specifies that an m-block message x=x1…xm be authenticated among parties who share a secret key a for the block cipher by tagging x with a prefix of ym, where y0=0l and yi=Fa(mi⊕yi−1) for i=1, 2, …, m. This method is a pervasively used international and U.S. standard. We provide its first formal justification, showing the following general lemma: cipher block chaining a pseudorandom function yields a pseudorandom function. Underlying our results is a technical lemma of independent interest, bounding the success probability of a computationally unbounded adversary in distinguishing between a random ml-bit to l-bit function and the CBC MAC of a random l-bit to l-bit function.
Conference Paper
We present a QoS management framework that enables us to quantitatively measure QoS, and to analytically plan and allocate resources. In this model, end users' quality preferences are considered when system resources are ap- portioned across multiple applications such that the net util- ity that accrues to the end-users is maximized. In (23)(24), we primarily worked with continuous QoS dimensions, and assumed that the utility gained by improvements along a QoS dimension were always representable by concave func- tions. In this paper, we relax both assumptions. One, we support discrete QoS operating points. Two, we make no assumptions about the concavity of the utility functions. Us- ing these as the basis, we tackle the problem of maximizing system utility by allocating a single finite resource to satisfy the QoS requirements of multiple applications along mul- tiple QoS dimensions. We present two near-optimal algo- rithms to solve this problem. The first yields an allocation within a known bounded distance from the optimal solution, and the second yields an allocation whose distance from the optimal solution can be explicitly controlled by the QoS manager. We compare the run-times of these near-optimal algorithms and their solution quality relative to the opti- mal allocation, which in turn is computed using dynamic programming. These detailed evaluations provide practical insight into which of these algorithms can be used online in real-time systems.
Conference Paper
We study notions and schemes for symmetric (ie. private key) encryption in a concrete security framework. We give four different notions of security against chosen plaintext attack and analyze the concrete complexity of reductions among them, providing both upper and lower bounds, and obtaining tight relations. In this way we classify notions (even though polynomially reducible to each other) as stronger or weaker in terms of concrete security. Next we provide concrete security analyses of methods to encrypt using a block cipher, including the most popular encryption method, CBC. We establish tight bounds (meaning matching upper bounds and attacks) on the success of adversaries as a function of their resources
Conference Paper
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to network security can be achieved if we use quantified levels of risk as an input. In this paper, we describe a dynamic access control architecture which uses risk to determine whether to allow or deny access by a source connection into the network. A simulation of our architecture shows favorable and promising results.
Conference Paper
In real-time systems, a computation may not have time to complete its execution because of deadline requirements. In such cases, no result except the approximate results produced by the computations up to that point will be available. It is desirable to utilize these imprecise results if possible. Two approaches are proposed to enable computations to return imprecise results when executions cannot be completed normally. The milestone approach records results periodically, and if a deadline is reached, returns the last recorded result. The sieve approach demarcates sections of code which can be skipped if the time available is insufficient. By using these approaches, the system is able to produce imprecise results when deadlines are reached. The design of the Concord project is described which supports imprecise computations using these techniques. Also presented is a general model of imprecise computations using these techniques, as well as one which takes into account the influence of the environment, showing where the latter approach fits into this model.
Conference Paper
Resource management has become an important issue for computer systems as QoS-sensitive multimedia applications and hostile acts such as denial of service (DoS) attacks become widespread. Since applications access the processor, network and other subsystems, attacks on any of these subsystems can lead to undesirable behavior. To maintain system integrity even under such attacks, an unprivileged application must not be allowed to intentionally or unintentionally affect the progress of others. The authors present a first-class abstraction called Resource Control Lists (RCLs) to specify and enforce protection policies on time multiplexed resources, similar to access control on files. RCLs put access control on time multiplexed resources such as CPU time and network and disk bandwidth. RCLs are practical, flexible and provide several benefits. Protection policies specified by RCLs can be under administrator control, customized to a site, and can be dynamically adapted. We have built support for RCLs into Linux/RK, a real-time version of Linux that provides resource reservations where applications receive a promised amount of resources by making reservations. Quantitative measurements with limited forms of DoS attacks show that our new features provide flexible functionality while imposing acceptable overhead without modifying the applications. We also demonstrate that resources are protected even in the face of malicious activities. Finally, we show how RCLs can be used to deliver resource protection on multiple Web server configurations including the hosting of multiple logical sites by an ISP and preferential treatment of buyers on e-commerce sites