Home // International Journal On Advances in Security, volume 5, numbers 3 and 4, 2012 // View article
Authors:
Mehrdad Saadatmand
Thomas Leveque
Antonio Cicchetti
Mikael Sjödin
Keywords: Real-Time Embedded Systems; Security; Model-Driven Development; Component-Based Development; Runtime Adaptation; Encryption.
Abstract:
Considering security as an afterthought and adding security aspects to a system late in the development process has now been realized to be an inefficient and bad approach to security. The trend is to bring security considerations as early as possible in the design of systems. This is especially critical in certain domains such as real-time embedded systems. Due to different constraints and resource limitations that these systems have, the costs and implications of security features should be carefully evaluated in order to find appropriate ones which respect the constraints of the system. Model-Driven Development (MDD) and Component-Based Development (CBD) are two software engineering disciplines which help to cope with the increasing complexity of real-time embedded systems. While CBD enables the reuse of functionality and analysis results by building systems out of already existing components, MDD helps to increase the abstraction level, perform analysis at earlier phases of development, and also promotes automatic code generation. By using these approaches and including security aspects in the design models, it becomes possible to consider security from early phases of development and also identify the implications of security features. Timing issues are one of the most important factors for successful design of real-time embedded systems. In this paper, we provide an approach using MDD and CBD methods to make it easier for system designers to include security aspects in the design of systems and identify and manage their timing implications and costs. Among different security mechanisms to satisfy security requirements, our focus in this paper is mainly on using encryption and decryption algorithms and consideration of their timing costs to design secure systems.
Pages: 68 to 80
Copyright: Copyright (c) to authors, 2012. Used with permission.
Publication date: December 31, 2012
Published in: journal
ISSN: 1942-2636