首页 | 本学科首页   官方微博 | 高级检索  
     


Energy Optimization of Security-Critical Real-Time Applications with Guaranteed Security Protection
Affiliation:1. Universidad Carlos III de Madrid, Av. de la universidad 30, Leganés (Madrid) 28911, Spain;2. LaSIGE, Faculdade de Ciências, Universidade de Lisboa Campo Grande, Ed. C6, Piso 3, Lisboa 1749-016, Portugal;3. University of Passau, Innstraße 43, Passau 94034, Germany;1. ZebraPET LLC, Privacy Enhancing Technologies, Boca Raton 33433, FL, United States;2. Florida Atlantic University, Boca Raton 33431, FL, United States;1. Software School of Xiamen University, Xiamen 361005, China;2. Key Laboratory of Complex Systems and Intelligent Computing, School of Mathematics and Statistics, Qiannan Normal University for Nationalities, Duyun 558000, China;3. Shenzhen Research Institute of Xiamen University, Shenzhen 518057, China;4. Department of Automation, Xiamen University, Xiamen 361005, China;5. Key Laboratory of Data Engineering and Knowledge Engineering, Ministry of Education, Renmin University of China, Beijing 100872, China
Abstract:Designing energy-efficient applications has become of critical importance for embedded systems, especially for battery-powered systems. Additionally, the emerging requirements on both security and real-time make it much more difficult to produce ideal solutions. In this work, we address the emerging scheduling problem existed in the design of secure and energy-efficient real-time embedded systems. The objective is to minimize the system energy consumption subject to security and schedulability constraints. Due to the complexity of the problem, we propose a dynamic programming based approximation approach to find efficient solutions under given constraints. The proposed technique has polynomial time complexity which is half of existing approximation approaches. The efficiency of our algorithm is validated by extensive experiments and a real-life case study. Comparing with other approaches, the proposed approach achieves energy-saving up to 37.6% without violating the real-time and security constraints of the system.
Keywords:Embedded system  Security  Energy  Real-time  Design optimization
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号