Optimization of message encryption for real-time applications in embedded systems

A Aminifar, P Eles, Z Peng - IEEE Transactions on Computers, 2017 - ieeexplore.ieee.org
Today, security can no longer be treated as a secondary issue in embedded and cyber-
physical systems. Therefore, one of the main challenges in these domains is the design of …

Design of adaptive security mechanisms for real-time embedded systems

M Saadatmand, A Cicchetti, M Sjödin - Engineering Secure Software and …, 2012 - Springer
Introducing security features in a system is not free and brings along its costs and impacts.
Considering this fact is essential in the design of real-time embedded systems which have …

Optimization of message encryption for distributed embedded systems with real-time constraints

K Jiang, P Eles, Z Peng - 14th IEEE International Symposium …, 2011 - ieeexplore.ieee.org
In this paper we consider distributed embedded systems in which privacy or confidentiality of
the internal communication is critical, and present an approach to optimizing cryptographic …

Beepbeep: Embedded real-time encryption

K Driscoll - International Workshop on Fast Software Encryption, 2002 - Springer
The BeepBeep algorithm is designed to supply secrecy and integrity for embedded real-time
systems. These systems must achieve their required timing performance under all …

Unequal security protection for secure multimedia communication

YW Leung, RYT Hou - 2015 IEEE 4th Global Conference on …, 2015 - ieeexplore.ieee.org
In some multimedia communication applications for portable devices, the media should be
encrypted for confidentiality and privacy. Since portable devices have relatively limited …

Context-aware multimedia encryption in mobile platforms

M Fazeen, G Bajwa, R Dantu - Proceedings of the 9th Annual Cyber and …, 2014 - dl.acm.org
Voice over IP (VoIP) is a part of multimedia content and this communication is growing
rapidly in portable devices due to its attractive features. Secure communication is critical as …

Towards security and qos optimization in real-time embedded systems

KD Kang, SH Son - ACM SIGBED Review, 2006 - dl.acm.org
A number of real-time embedded systems (RTESs) are used to manage critical infrastructure
such as electric grids or C4I systems. In these systems, it is essential to meet deadlines, for …

Design optimization of secure message communication for energy-constrained distributed real-time systems

W Jiang, X Zhang, J Zhan, Y Ma, K Jiang - Journal of Parallel and …, 2017 - Elsevier
Abstract Modern Distributed Embedded Systems (DESs) tend to be more connected to other
peers or external networks. This opens the gate for potential security attacks, although it is …

Dynamic encryption key design and management for memory data encryption in embedded systems

M Hong, H Guo… - 2013 IEEE Computer …, 2013 - ieeexplore.ieee.org
To effectively encrypt data memory contents of an embedded processor, multiple keys which
are dynamically changed are necessary. However, the resources required to store and …

Optimization of secure embedded systems with dynamic task sets

K Jiang, P Eles, Z Peng - 2013 Design, Automation & Test in …, 2013 - ieeexplore.ieee.org
In this paper, we approach embedded systems design from a new angle that considers not
only quality of service but also security as part of the design process. Moreover, we also take …