Abstract
TTEthernet is a deterministic, congestion-free, and high-bandwidth communication protocol based on the Ethernet standard that provides a powerful network solution for developing safety-critical distributed real-time automotive systems. With the development of intelligence and networking of vehicles, such systems are becoming increasingly connected to external environments; thus, security has become a pressing issue in system design. However, TTEthernet-based architecture does not have direct support for secure communication. When deploying the security mechanisms on these architectures, a major challenge is to guarantee the schedulability of systems, given the tight resource constraints and strict timing constraints. In this paper, we apply an authentication mechanism based on the delayed exposure of one-way key chains to protect the authenticity of messages on TTEthernet and make a slight modification to reduce the authentication delay. On that basis, we propose a mixed integer linear programming formulation for solving the scheduling problem of the TTEthernet-based real-time automotive systems subject to both authentication mechanism constraints and other traditional design constraints. The extensive experiments are conducted to demonstrate the effectiveness and efficiency of the proposed method.
Highlights
2) we propose a mixed integer linear programming (MILP) formulation that efficiently solves the optimal scheduling problem of TTEthernetbased real-time automotive systems with authentication mechanism constraints
We provide an MILP formulation for solving the scheduling optimization problem of TTEthernet-based real-time automotive systems while meeting the requirements of both information security and functional safety
APPLICATION MODEL We model an application λr ∈ app to be processed in the system as a directed, acyclic graph Garpp, where the vertices represent the tasks, and the edges represent the signals communicated between tasks
Summary
Ethernet [1] is a highly available networking technology that implements time-triggered communication mechanisms over Ethernet standard to satisfy the requirements of fully deterministic, high-speed and low-cost communication. 1) First, we apply the TESLA [11] authentication mechanism based on delayed exposure of keys to protect against forgery and replay attacks on TTEthernet It provides an appropriate trade-off between security level and resource overhead, compared with other multicast authentication approaches. We provide an MILP formulation for solving the scheduling optimization problem of TTEthernet-based real-time automotive systems while meeting the requirements of both information security and functional safety. The repeated transmission and verification of the same key will cause the waste of bandwidth and computing resources, as well as the increase of the authentication delay which is the most critical part in real-time automotive systems in general. Interval and is transmitted through the TT traffic to ensure its time determinism
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.