Mixed cryptography constrained optimization for heterogeneous, multicore, and distributed embedded systems

Hyunsuk Nam, Roman L Lysecky

Research output: Contribution to journalArticle

Abstract

Embedded systems continue to execute computational-and memory-intensive applications with vast data sets, dynamic workloads, and dynamic execution characteristics. Adaptive distributed and heterogeneous embedded systems are increasingly critical in supporting dynamic execution requirements. With pervasive network access within these systems, security is a critical design concern that must be considered and optimized within such dynamically adaptive systems. This paper presents a modeling and optimization framework for distributed, heterogeneous embedded systems. A dataflow-based modeling framework for adaptive streaming applications integrates models for computational latency, mixed cryptographic implementations for inter-task and intra-task communication, security levels, communication latency, and power consumption. For the security model, we present a level-based modeling of cryptographic algorithms using mixed cryptographic implementations. This level-based security model enables the development of an efficient, multi-objective genetic optimization algorithm to optimize security and energy consumption subject to current application requirements and security policy constraints. The presented methodology is evaluated using a video-based object detection and tracking application and several synthetic benchmarks representing various application types and dynamic execution characteristics. Experimental results demonstrate the benefits of a mixed cryptographic algorithm security model compared to using a single, fixed cryptographic algorithm. Results also highlight how security policy constraints can yield increased security strength and cryptographic diversity for the same energy constraint.

Original languageEnglish (US)
Article number29
JournalComputers
Volume7
Issue number2
DOIs
StatePublished - Jan 1 2018

Fingerprint

Constrained optimization
Embedded systems
Cryptography
Adaptive systems
Security systems
Electric power utilization
Energy utilization
Data storage equipment
Communication

Keywords

  • Adaptive system
  • Distributed systems
  • Heterogeneous multicore systems
  • Mixed cryptographic security model
  • Runtime security optimization
  • Security-driven optimization
  • System-level codesign

ASJC Scopus subject areas

  • Human-Computer Interaction
  • Computer Networks and Communications

Cite this

Mixed cryptography constrained optimization for heterogeneous, multicore, and distributed embedded systems. / Nam, Hyunsuk; Lysecky, Roman L.

In: Computers, Vol. 7, No. 2, 29, 01.01.2018.

Research output: Contribution to journalArticle

@article{02c813b4f7c34a7a8d56373255ac4be6,
title = "Mixed cryptography constrained optimization for heterogeneous, multicore, and distributed embedded systems",
abstract = "Embedded systems continue to execute computational-and memory-intensive applications with vast data sets, dynamic workloads, and dynamic execution characteristics. Adaptive distributed and heterogeneous embedded systems are increasingly critical in supporting dynamic execution requirements. With pervasive network access within these systems, security is a critical design concern that must be considered and optimized within such dynamically adaptive systems. This paper presents a modeling and optimization framework for distributed, heterogeneous embedded systems. A dataflow-based modeling framework for adaptive streaming applications integrates models for computational latency, mixed cryptographic implementations for inter-task and intra-task communication, security levels, communication latency, and power consumption. For the security model, we present a level-based modeling of cryptographic algorithms using mixed cryptographic implementations. This level-based security model enables the development of an efficient, multi-objective genetic optimization algorithm to optimize security and energy consumption subject to current application requirements and security policy constraints. The presented methodology is evaluated using a video-based object detection and tracking application and several synthetic benchmarks representing various application types and dynamic execution characteristics. Experimental results demonstrate the benefits of a mixed cryptographic algorithm security model compared to using a single, fixed cryptographic algorithm. Results also highlight how security policy constraints can yield increased security strength and cryptographic diversity for the same energy constraint.",
keywords = "Adaptive system, Distributed systems, Heterogeneous multicore systems, Mixed cryptographic security model, Runtime security optimization, Security-driven optimization, System-level codesign",
author = "Hyunsuk Nam and Lysecky, {Roman L}",
year = "2018",
month = "1",
day = "1",
doi = "10.3390/computers7020029",
language = "English (US)",
volume = "7",
journal = "Computers",
issn = "2073-431X",
publisher = "MDPI AG",
number = "2",

}

TY - JOUR

T1 - Mixed cryptography constrained optimization for heterogeneous, multicore, and distributed embedded systems

AU - Nam, Hyunsuk

AU - Lysecky, Roman L

PY - 2018/1/1

Y1 - 2018/1/1

N2 - Embedded systems continue to execute computational-and memory-intensive applications with vast data sets, dynamic workloads, and dynamic execution characteristics. Adaptive distributed and heterogeneous embedded systems are increasingly critical in supporting dynamic execution requirements. With pervasive network access within these systems, security is a critical design concern that must be considered and optimized within such dynamically adaptive systems. This paper presents a modeling and optimization framework for distributed, heterogeneous embedded systems. A dataflow-based modeling framework for adaptive streaming applications integrates models for computational latency, mixed cryptographic implementations for inter-task and intra-task communication, security levels, communication latency, and power consumption. For the security model, we present a level-based modeling of cryptographic algorithms using mixed cryptographic implementations. This level-based security model enables the development of an efficient, multi-objective genetic optimization algorithm to optimize security and energy consumption subject to current application requirements and security policy constraints. The presented methodology is evaluated using a video-based object detection and tracking application and several synthetic benchmarks representing various application types and dynamic execution characteristics. Experimental results demonstrate the benefits of a mixed cryptographic algorithm security model compared to using a single, fixed cryptographic algorithm. Results also highlight how security policy constraints can yield increased security strength and cryptographic diversity for the same energy constraint.

AB - Embedded systems continue to execute computational-and memory-intensive applications with vast data sets, dynamic workloads, and dynamic execution characteristics. Adaptive distributed and heterogeneous embedded systems are increasingly critical in supporting dynamic execution requirements. With pervasive network access within these systems, security is a critical design concern that must be considered and optimized within such dynamically adaptive systems. This paper presents a modeling and optimization framework for distributed, heterogeneous embedded systems. A dataflow-based modeling framework for adaptive streaming applications integrates models for computational latency, mixed cryptographic implementations for inter-task and intra-task communication, security levels, communication latency, and power consumption. For the security model, we present a level-based modeling of cryptographic algorithms using mixed cryptographic implementations. This level-based security model enables the development of an efficient, multi-objective genetic optimization algorithm to optimize security and energy consumption subject to current application requirements and security policy constraints. The presented methodology is evaluated using a video-based object detection and tracking application and several synthetic benchmarks representing various application types and dynamic execution characteristics. Experimental results demonstrate the benefits of a mixed cryptographic algorithm security model compared to using a single, fixed cryptographic algorithm. Results also highlight how security policy constraints can yield increased security strength and cryptographic diversity for the same energy constraint.

KW - Adaptive system

KW - Distributed systems

KW - Heterogeneous multicore systems

KW - Mixed cryptographic security model

KW - Runtime security optimization

KW - Security-driven optimization

KW - System-level codesign

UR - http://www.scopus.com/inward/record.url?scp=85056760393&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85056760393&partnerID=8YFLogxK

U2 - 10.3390/computers7020029

DO - 10.3390/computers7020029

M3 - Article

VL - 7

JO - Computers

JF - Computers

SN - 2073-431X

IS - 2

M1 - 29

ER -