Skip to main content

2017 | OriginalPaper | Buchkapitel

6. Security-Aware Mapping for TDMA-Based Systems

verfasst von : Chung-Wei Lin, Alberto Sangiovanni-Vincentelli

Erschienen in: Security-Aware Design for Cyber-Physical Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter focuses on security-aware design for Time Division Multiple Access (TDMA) based real-time distributed systems. The TDMA-based protocol is a very representative synchronous protocol and an abstraction of many existing protocols, such as the FlexRay [7], the Time-Triggered Protocol [45], and the Time-Triggered Ethernet [44]. It is critically important to address these protocols, as they are being increasingly adopted in various safety-critical systems such as automotive and avionics electronic systems for their more predictable timing behavior. Compared with priority-based networks such as the Controller Area Network (CAN) protocol, TDMA-based systems have fundamental differences on system modeling (in particular for latency modeling), on security mechanism selection (a global time is available for security reasons), on design space (network scheduling is the focus of this work but not a factor for CAN-based systems), and on algorithm design. Therefore, the approaches for CAN-based systems in the previous chapter do not apply to TDMA-based systems. It is needed to rethink appropriate security mechanisms and develop a new set of formulations and algorithms to explore the design space.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
If the synchronization precision is considered, one can add a small positive constant (the precision of time) to the left-hand side.
 
2
The most common comparison is between a Keyed-Hash Message Authentication Code (HMAC) and the RSA algorithm, and HMAC (based on XOR and hash function) is usually much faster than RSA (based on exponentiation and modular arithmetic).
 
3
Note that the second approach can be regarded as a special case of the third approach. Both of them try to minimize transmission delays of packets.
 
4
The concept here is that the densest part of the packet arrival pattern is served by the least dense part of the schedule pattern.
 
5
Here, utilization is defined as the ratio of the number of used (not scheduled) time slots to the number of total time slots.
 
Metadaten
Titel
Security-Aware Mapping for TDMA-Based Systems
verfasst von
Chung-Wei Lin
Alberto Sangiovanni-Vincentelli
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-51328-7_6

Neuer Inhalt