{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:11:31Z","timestamp":1774717891790,"version":"3.50.1"},"reference-count":45,"publisher":"Wiley","license":[{"start":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T00:00:00Z","timestamp":1641945600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Foundation for Development of Cryptography","award":["MMJJ20180211"],"award-info":[{"award-number":["MMJJ20180211"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2022,1,12]]},"abstract":"<jats:p>The real-time operating system (RTOS) has a wide range of application domains and provides devices with the ability to schedule resources. Because of the restricted resources of embedded devices and the real-time constraints of RTOS, the application of cryptographic algorithms in these devices will affect the running systems. The existing approaches for RTOS ciphers\u2019 evaluation are mainly provided by experimental data performance analysis, which, however, lack a clear judgment on the affected RTOS performance indicators, such as task schedulability, bandwidth, as well as a quantitative prediction of the remaining resources of RTOS. By focusing on task schedulability in RTOS, this paper provides a timed automaton-based quantitative approach to judge the feasibility of ciphers in embedded RTOS. First, a cryptographic algorithm execution overhead estimation model is established. Then, by combining the overhead model with a sensitivity analysis method, we can analyze the feasibility of the cryptographic algorithm. Finally, a task-oriented and timed automaton-based model is built to verify the analysis results. We take AES as a case study and carry out experiments on embedded devices. The experimental results show the effectiveness of our approach, which will provide specific feasibility indicators for the application of cryptographic algorithms in RTOS.<\/jats:p>","DOI":"10.1155\/2022\/4118994","type":"journal-article","created":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T19:35:09Z","timestamp":1642016109000},"page":"1-16","source":"Crossref","is-referenced-by-count":6,"title":["Timed Automaton-Based Quantitative Feasibility Analysis of Symmetric Cipher in Embedded RTOS: A Case Study of AES"],"prefix":"10.1155","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2274-1980","authenticated-orcid":true,"given":"Yawen","family":"Ke","sequence":"first","affiliation":[{"name":"School of Bigdata and Software Engineering, Chongqing University, Chongqing 401331, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0608-2460","authenticated-orcid":true,"given":"Xiaofeng","family":"Xia","sequence":"additional","affiliation":[{"name":"School of Bigdata and Software Engineering, Chongqing University, Chongqing 401331, China"},{"name":"Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing 400044, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/2046735"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/cmc.2009.31"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2848586"},{"key":"4","first-page":"997","article-title":"Accurate modeling for predicting cryptography overheads on wireless sensor nodes","author":"W. Liu"},{"key":"5","unstructured":"GranelliF.BoatoG.A Novel Methodology for Analysis of the Computational Complexity of Block Ciphers: Rijndael, Camellia and Shacal-2 Compared2003Trento, ItalyUniversity of TrentoTechnical Report DIT-04-004"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/941350.941372"},{"key":"7","article-title":"Cortex-m3 technical reference manual","author":"ARMDeveloper","year":"2021"},{"key":"8","article-title":"Stm32 cryptographic user manual","author":"STMicroelectronics","year":"2021"},{"key":"9","article-title":"Aes Proposal: Rijndael","author":"J. Daemen","year":"1999"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69453-5_10"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2003.1258477"},{"key":"12","article-title":"Computer Aided Verification","author":"W. Damm"},{"key":"13","first-page":"232","article-title":"Uppaal\u2014a tool suite for automatic verification of real-time systems","author":"J. Bengtsson"},{"key":"14","first-page":"87","article-title":"Timed Automata: Semantics, Algorithms and Tools","author":"J. Bengtsson"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2007.01.009"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2005.11.019"},{"key":"17","first-page":"236","article-title":"Decidable and undecidable problems in schedulability analysis using timed automata","author":"P. Kr\u010d\u00e1l"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47677-3_10"},{"key":"19","first-page":"212","article-title":"Parametric schedulability analysis of fixed priority real-time distributed systems","author":"Y. Sun"},{"key":"20","article-title":"Preemptive priority based scheduling: an appropriate engineering approach","volume-title":"Principles of Real-Time Systems","author":"A. Burns","year":"1993"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1993.0034"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05416-2_14"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-010-9107-4"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.1989.63567"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/321738.321743"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2004.103"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2016.04.002"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-007-9039-9"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/rtcsa.2010.12"},{"key":"30","article-title":"Tracealyzer user manual","author":"Percepio","year":"2021"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.12.030"},{"key":"32","article-title":"Stm32 stm32f10x user manual","author":"STMicroelectronics","year":"2021"},{"key":"33","article-title":"The Freertos Reference Manual","author":"ARMDeveloper","year":"2021"},{"key":"34","volume-title":"A Tutorial on Uppaal 4.0","author":"G. Behrmann","year":"2006"},{"key":"35","volume-title":"Modelling and Verification of Real-Time Systems Using Timed Automata: Theory and Practice","author":"P. Pettersson","year":"1999"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1201\/9781420067859-c4"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.3182\/20080706-5-kr-1001.01572"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/ares.2016.94"},{"issue":"1","key":"39","first-page":"82","article-title":"Analytical comparison of cryptographic techniques for resource-constrained wireless security","volume":"9","author":"M. R. Doomun","year":"2009","journal-title":"IJ Network Security"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1145\/1138127.1138130"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1155\/wcn\/2006\/93830"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.23919\/date.2019"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-63875-x_44"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-006-9010-1"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16561-0_21"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/4118994.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/4118994.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/4118994.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T19:35:18Z","timestamp":1642016118000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2022\/4118994\/"}},"subtitle":[],"editor":[{"given":"Shahram","family":"Babaie","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,1,12]]},"references-count":45,"alternative-id":["4118994","4118994"],"URL":"https:\/\/doi.org\/10.1155\/2022\/4118994","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2022,1,12]]}}}