Next Article in Journal
A New Strategy for Energy Saving in Spectrum-Sliced Elastic Optical Networks
Next Article in Special Issue
Hardware-Assisted Secure Communication in Embedded and Multi-Core Computing Systems
Previous Article in Journal
Comparing the Cost of Protecting Selected Lightweight Block Ciphers against Differential Power Analysis in Low-Cost FPGAs
Previous Article in Special Issue
Designing Domain-Specific Heterogeneous Architectures from Dataflow Programs
Article Menu
Issue 2 (June) cover image

Export Article

Open AccessFeature PaperArticle
Computers 2018, 7(2), 29; https://doi.org/10.3390/computers7020029

Mixed Cryptography Constrained Optimization for Heterogeneous, Multicore, and Distributed Embedded Systems

Department of Electrical and Computer Engineering, University of Arizona, Tucson, AZ 85721, USA
*
Author to whom correspondence should be addressed.
Received: 28 February 2018 / Revised: 11 April 2018 / Accepted: 22 April 2018 / Published: 24 April 2018
(This article belongs to the Special Issue Multi-Core Systems-On-Chips Design and Optimization)
Full-Text   |   PDF [3771 KB, uploaded 3 May 2018]   |  

Abstract

Embedded systems continue to execute computational- and memory-intensive applications with vast data sets, dynamic workloads, and dynamic execution characteristics. Adaptive distributed and heterogeneous embedded systems are increasingly critical in supporting dynamic execution requirements. With pervasive network access within these systems, security is a critical design concern that must be considered and optimized within such dynamically adaptive systems. This paper presents a modeling and optimization framework for distributed, heterogeneous embedded systems. A dataflow-based modeling framework for adaptive streaming applications integrates models for computational latency, mixed cryptographic implementations for inter-task and intra-task communication, security levels, communication latency, and power consumption. For the security model, we present a level-based modeling of cryptographic algorithms using mixed cryptographic implementations. This level-based security model enables the development of an efficient, multi-objective genetic optimization algorithm to optimize security and energy consumption subject to current application requirements and security policy constraints. The presented methodology is evaluated using a video-based object detection and tracking application and several synthetic benchmarks representing various application types and dynamic execution characteristics. Experimental results demonstrate the benefits of a mixed cryptographic algorithm security model compared to using a single, fixed cryptographic algorithm. Results also highlight how security policy constraints can yield increased security strength and cryptographic diversity for the same energy constraint. View Full-Text
Keywords: security-driven optimization; heterogeneous multicore systems; mixed cryptographic security model; adaptive system; runtime security optimization; system-level codesign; distributed systems security-driven optimization; heterogeneous multicore systems; mixed cryptographic security model; adaptive system; runtime security optimization; system-level codesign; distributed systems
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Nam, H.; Lysecky, R. Mixed Cryptography Constrained Optimization for Heterogeneous, Multicore, and Distributed Embedded Systems. Computers 2018, 7, 29.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Computers EISSN 2073-431X Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top