Mixed Cryptography Constrained Optimization for Heterogeneous, Multicore, and Distributed Embedded Systems
AffiliationUniv Arizona, Dept Elect & Comp Engn
heterogeneous multicore systems
mixed cryptographic security model
runtime security optimization
MetadataShow full item record
CitationNam H, Lysecky R. Mixed Cryptography Constrained Optimization for Heterogeneous, Multicore, and Distributed Embedded Systems. Computers. 2018; 7(2):29.
Rights© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Collection InformationThis item from the UA Faculty Publications collection is made available by the University of Arizona with support from the University of Arizona Libraries. If you have questions, please contact us at firstname.lastname@example.org.
AbstractEmbedded systems continue to execute computational- and memory-intensive applications with vast data sets, dynamic workloads, and dynamic execution characteristics. Adaptive distributed and heterogeneous embedded systems are increasingly critical in supporting dynamic execution requirements. With pervasive network access within these systems, security is a critical design concern that must be considered and optimized within such dynamically adaptive systems. This paper presents a modeling and optimization framework for distributed, heterogeneous embedded systems. A dataflow-based modeling framework for adaptive streaming applications integrates models for computational latency, mixed cryptographic implementations for inter-task and intra-task communication, security levels, communication latency, and power consumption. For the security model, we present a level-based modeling of cryptographic algorithms using mixed cryptographic implementations. This level-based security model enables the development of an efficient, multi-objective genetic optimization algorithm to optimize security and energy consumption subject to current application requirements and security policy constraints. The presented methodology is evaluated using a video-based object detection and tracking application and several synthetic benchmarks representing various application types and dynamic execution characteristics. Experimental results demonstrate the benefits of a mixed cryptographic algorithm security model compared to using a single, fixed cryptographic algorithm. Results also highlight how security policy constraints can yield increased security strength and cryptographic diversity for the same energy constraint.
NoteOpen access journal.
VersionFinal published version
Showing items related by title, author, creator and subject.
The IPTN's Airborne Data Relay System (ADReS): A System Concept and the Phase One System ConfigurationSoelaiman, Adi Dharma; Roesma, Fauzi Effendy; Indonesian Aircraft Industry Ltd. (International Foundation for Telemetering, 1988-10)By making use of NC212-200 commuter aircraft as an airborne container, the ADReS, a short for airborne data relay system, had been configured and tested in an experimental status during the year of 1987. A kind of test on EMC, EMI, RFI and telemetry data link were applied to the system. Prior to the IPTN's flight test program in the year of 1988 - 1992, the ADReS is designed not only to receive and to relay the data, but also planed to be able to process the data for quick data analysis purposes on board. This paper describes the ADReS system concept and its experimental status system - the Phase One system configuration.
Thermal Retentive Nature of the I-Xe System in the Meteorite Bjurbole: Implications for the I-Xe System as a Chronometer of Early Solar System EventsBurkland, Michael Kennedy, 1963- (The University of Arizona., 1998)
SPECTRAL EFFICIENCY/BIT ERROR RATE OF FQPSK AND OTHER NON-COHERENT SYSTEMS SUPERIOR TO COHERENT SYSTEMS FOR SMS AND BURSTED TDMA AND CDMA SYSTEMSMcCorduck, James A.; Feher, Kamilo; MatrixSat, Inc.; University of California; Digcom, Inc. (International Foundation for Telemetering, 2002-10)For faster acquisition in bursted environments for SMS (Short Messaging Service) and other lower-bit rate applications, non-coherent detection techniques are proposed. Non-Coherent detection demodulators are proposed because faster acquisition capability in bursted environments can result in a reduced amount of preamble bits in the messaging frame, i.e. less overhead, resulting in an effective increase in spectral efficiency. Reducing the preamble can also provide performance enhancement opportunities for Feher Quadrature Phase Shift Keying (FQPSK)  and for other systems. The preamble can also be varied to provide for better Bit Error Rate (BER) performance. The lower bit rate environment also gives the opportunity to employ simpler architectures in lieu of preamble modification. Several non-coherent detection alternatives are described.