Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Preemptive Real-Time Scheduling Incorporating Security Constraint for Cyber Physical Systems

Full metadata record
DC Field Value Language
dc.contributor.authorBaek, Hyeongboo-
dc.contributor.authorLee, Jaewoo-
dc.contributor.authorLee, Yongjae-
dc.contributor.authorYoon, Hyunsoo-
dc.date.accessioned2023-02-15T08:41:36Z-
dc.date.available2023-02-15T08:41:36Z-
dc.date.issued2016-08-
dc.identifier.issn0916-8532-
dc.identifier.issn1745-1361-
dc.identifier.urihttps://scholarworks.bwise.kr/cau/handle/2019.sw.cau/60656-
dc.description.abstractSince many cyber-physical systems (CPSs) manipulate security-sensitive data, enhancing the quality of security in a CPS is a critical and challenging issue in CPS design. Although there has been a large body of research on securing general purpose PCs, directly applying such techniques to a CPS can compromise the real-time property of CPSs since the timely execution of tasks in a CPS typically relies on real-time scheduling. Recognizing this property, previous works have proposed approaches to add a security constraint to the real-time properties to cope with the information leakage problem that can arise between real-time tasks with different security levels. However, conventional works have mainly focused on non-preemptive scheduling and have suggested a very naive approach for preemptive scheduling, which shows limited analytical capability. In this paper, we present a new preemptive fixed-priority scheduling algorithm incorporating a security constraint, called lowest security-level first (LSF) and its strong schedulability analysis to reduce the potential of information leakage. Our simulation results show that LSF schedulability analysis outperforms state-of-the-art FP analysis when the security constraint has reasonable timing penalties.-
dc.format.extent10-
dc.language영어-
dc.language.isoENG-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.titlePreemptive Real-Time Scheduling Incorporating Security Constraint for Cyber Physical Systems-
dc.typeArticle-
dc.identifier.doi10.1587/transinf.2015EDP7493-
dc.identifier.bibliographicCitationIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E99-D, no.8, pp 2121 - 2130-
dc.description.isOpenAccessY-
dc.identifier.wosid000381563200019-
dc.identifier.scopusid2-s2.0-84983070601-
dc.citation.endPage2130-
dc.citation.number8-
dc.citation.startPage2121-
dc.citation.titleIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.citation.volumeE99-D-
dc.type.docTypeArticle-
dc.publisher.location일본-
dc.subject.keywordAuthorcyber-physical system-
dc.subject.keywordAuthorsecurity-
dc.subject.keywordAuthorreal-time scheduling-
dc.subject.keywordAuthorschedulability analysis-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Business & Economics > Department of Industrial Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Jaewoo photo

Lee, Jaewoo
경영경제대학 (산업보안학과)
Read more

Altmetrics

Total Views & Downloads

BROWSE