{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T09:49:12Z","timestamp":1758707352621,"version":"3.41.0"},"reference-count":32,"publisher":"Association for Computing Machinery (ACM)","issue":"5s","license":[{"start":{"date-parts":[[2017,9,27]],"date-time":"2017-09-27T00:00:00Z","timestamp":1506470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-17-1-2012, N00014-17-1-2504"],"award-info":[{"award-number":["N00014-17-1-2012, N00014-17-1-2504"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1652544, CNS-1505701"],"award-info":[{"award-number":["CNS-1652544, CNS-1505701"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2017,10,31]]},"abstract":"<jats:p>In this work, we focus on securing cyber-physical systems (CPS) in the presence of network-based attacks, such as<jats:italic>Man-in-the-Middle<\/jats:italic>(MitM) attacks, where a stealthy attacker is able to compromise communication between system sensors and controllers. Standard methods for this type of attacks rely on the use of cryptographic mechanisms, such as Message Authentication Codes (MACs) to ensure data integrity. However, this approach incurs significant computation overhead, limiting its use in resource constrained systems. Consequently, we consider the problem of scheduling multiple control tasks on a shared processor while providing a suitable level of security guarantees. Specifically, by security guarantees we refer to control performance, i.e., Quality-of-Control (QoC), in the presence of attacks. We start by mapping requirements for QoC under attack into constraints for security-aware control tasks that, besides standard control operations, intermittently perform data authentication. This allows for the analysis of the impact that security-related computation overhead has on both schedulability of control tasks and QoC. Building on this analysis, we introduce a mixed-integer linear programming-based technique to obtain a schedulable task set with predefined QoC requirements. Also, to facilitate optimal resource allocation, we provide a method to analyze interplay between available computational resources and the overall QoC under attack, and show how to obtain a schedulable task set that maximizes the overall QoC guarantees. Finally, we prove usability of our approach on a case study with multiple automotive control components.<\/jats:p>","DOI":"10.1145\/3126518","type":"journal-article","created":{"date-parts":[[2017,9,27]],"date-time":"2017-09-27T12:33:53Z","timestamp":1506515633000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Security-Aware Scheduling of Embedded Control Tasks"],"prefix":"10.1145","volume":"16","author":[{"given":"Vuk","family":"Lesi","sequence":"first","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Ilija","family":"Jovanov","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Miroslav","family":"Pajic","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,9,27]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2009.39"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2010.2042980"},{"volume-title":"Proceedings of the International Conference on Design and Architectures for Signal and Image Processing (DASIP)","year":"2008","author":"Baruah Sanjoy","key":"e_1_2_1_3_1"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008030427220"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01995675"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10589-016-9847-8"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-008-9060-7"},{"edition":"3","volume-title":"Hard Real-Time Computing Systems: Predictable Scheduling Algorithms and Applications","author":"Buttazzo G. C.","key":"e_1_2_1_8_1"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.990127"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015394302429"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028073"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.115"},{"volume-title":"Wired Magazine.","year":"2015","author":"Greenberg A.","key":"e_1_2_1_13_1"},{"volume-title":"2016 IEEE Real-Time Systems Symposium (RTSS). 123--134","author":"Hasan M.","key":"e_1_2_1_14_1"},{"key":"e_1_2_1_15_1","unstructured":"I. Jovanov and M. Pajic. 2017. Relaxing Integrity Requirements for Resilient Control Systems. CoRR abs\/1707.02950 (2017). https:\/\/arxiv.org\/abs\/1707.02950 I. Jovanov and M. Pajic. 2017. Relaxing Integrity Requirements for Resilient Control Systems. CoRR abs\/1707.02950 (2017). https:\/\/arxiv.org\/abs\/1707.02950"},{"volume-title":"Sporadic Data Integrity for Secure State Estimation. In 55th IEEE Conference on Decision and Control (CDC).","author":"Jovanov I.","key":"e_1_2_1_16_1"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2514\/1.I010201"},{"volume-title":"Network Scheduling for Secure Cyber-Physical Systems. In 38th IEEE Real-Time Systems Symposium (RTSS).","author":"Lesi V.","key":"e_1_2_1_19_1"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(80)90123-4"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2803174"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2009.2014055"},{"volume-title":"Cyber-Physical Systems Security: a Systematic Mapping Study. CoRR abs\/1605.09641","year":"2016","author":"Lun Yuriy Zacchia","key":"e_1_2_1_23_1"},{"volume-title":"49th IEEE Conference on Decision and Control (CDC). 5967--5972","author":"Mo Y.","key":"e_1_2_1_24_1"},{"key":"e_1_2_1_25_1","doi-asserted-by":"crossref","unstructured":"A. K. Mok and D. Chen. 1996. A multiframe model for real-time tasks. (Dec 1996) 22--29. A. K. Mok and D. Chen. 1996. A multiframe model for real-time tasks. (Dec 1996) 22--29.","DOI":"10.1109\/REAL.1996.563696"},{"key":"e_1_2_1_26_1","unstructured":"Gurobi Optimization Inc.2014. Gurobi optimizer reference manual. (2014). http:\/\/www.gurobi.com Gurobi Optimization Inc.2014. Gurobi optimizer reference manual. (2014). http:\/\/www.gurobi.com"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2607420"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2014.6843720"},{"volume-title":"2016 IEEE 22nd International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA). 49--58","author":"Peng B.","key":"e_1_2_1_29_1"},{"key":"e_1_2_1_31_1","unstructured":"C. T. Wei. 2009. Modeling and control of an engine fuel injection system. Master\u2019s thesis. C. T. Wei. 2009. Modeling and control of an engine fuel injection system. Master\u2019s thesis."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1275986.1275992"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2016.2523937"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3126518","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3126518","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3126518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T22:34:42Z","timestamp":1750890882000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3126518"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,27]]},"references-count":32,"journal-issue":{"issue":"5s","published-print":{"date-parts":[[2017,10,31]]}},"alternative-id":["10.1145\/3126518"],"URL":"https:\/\/doi.org\/10.1145\/3126518","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2017,9,27]]},"assertion":[{"value":"2017-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-09-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}