RA2DL-Pool: New Useful Solution to Handle Security of Reconfigurable Embedded Systems

Farid Adaili, Olfa Mosbahi, Mohamed Khalgui, Samia Bouzefrane

2016

Abstract

The importance of security in software and hardware components becomes the major concern nowadays. This paper focuses on adaptive component-based control systems following the reconfiguration architecture analysis and design language (denoted by RA2DL). Despite of its efficiency, RA2DL component can be compromised due to its lack in terms of security. This paper proposes a new method for modeling the security of RA2DL component, argues for a more comprehensive treatment of an important security aspect with several mechanisms such as authentication and access control. In this paper, we propose a new architecture of RA2DL where pools are containers of sets of RA2DL components characterized by similar properties. The proposed approach is applied to a real case study dealing with Body-Monitoring System (BMS).

References

  1. Adaili, F., Mosbahi, O., Khalgui, M., and Bouzefrane, S. (2015). New solutions for useful execution models of communicating adaptive ra2dl. In Intelligent Software Methodologies, Tools and Techniques, volume 532, pages 87-101. Springer International Publishing.
  2. Bengtsson, J., Larsen, K., Larsson, F., Pettersson, P., and Yi, W. (1996). Uppaal: A tool suite for automatic verification of real-time systems. pages 232-243, Secaucus, NJ, USA. Springer-Verlag New York, Inc.
  3. Bernstein, D. (2014). Containers and cloud: From lxc to docker to kubernetes. Cloud Computing, IEEE, 1(3):81-84.
  4. Bielikov, M. (October 2002). A body-monitoring system with eeg and eog sensors. Journal of ERCIM News No. 49.
  5. Brereton, P. and Budgen, D. (2000). Component-based systems: a classification of issues. Computer, 33(11):54- 62.
  6. Cai, X., Lyu, M., Wong, K.-F., and Ko, R. (2000). Component-based software engineering: technologies, development frameworks, and quality assurance schemes. In Software Engineering Conference, 2000. APSEC 2000. Proceedings. Seventh AsiaPacific , pages 372-379.
  7. Clements, P. C. (1996). A survey of architecture description languages. In Proceedings of the 8th International Workshop on Software Specification and Design, IWSSD 7896, pages 16-, Washington, DC, USA. IEEE Computer Society.
  8. elena Rugina, A., Kanoun, K., and Kaniche, M. (2006). An architecture-based dependability modeling framework using aadl. In In 10th IASTED International Conference on Software Engineering and Applications SEA2006.
  9. F.Adaili, O.Mosbahi, M.Khalgui, and S.Bouzefrane (2015). Ra2dl: New flexible solution for adaptive aadl-based control components. In Proceedings of the 5th International Conference on Pervasive and Embedded Computing and Communication Systems, pages 247- 258.
  10. Hansson, J., Feiler, P. H., and Morley, J. (2008). Building secure systems using model-based engineering and architectural models. CrossTalk: The Journal of Defense Software Engineering, 21(9).
  11. Husemann, D., Steinbugler, R., and Striemer, B. (2004). Body monitoring using local area wireless interfaces. US Patent App. 10/406,865.
  12. J. Alves-Foss, W. S. Harrison, P. O. and Taylor, C. (2006). The mils architecture for high assurance embedded systems. International Journal of Embedded Systems.
  13. Jürjens, J. (2002). Umlsec: Extending uml for secure systems development. In Proceedings of the 5th International Conference on The Unified Modeling Language, UML 7802, pages 412-425, London, UK, UK. Springer-Verlag.
  14. Kocher, P., Lee, R., McGraw, G., and Raghunathan, A. (2004). Security as a new dimension in embedded system design. In Proceedings of the 41st annual Design Automation Conference, DAC 7804, pages 753- 760, New York, NY, USA. ACM. Moderator-Ravi, Srivaths.
  15. Mouratidis, H., Kolp, M., Faulkner, S., and Giorgini, P. (2005). A secure architectural description language for agent systems. In Proceedings of the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS 7805, pages 578- 585, New York, NY, USA. ACM.
  16. MS, A. (2008). Security needs in embedded systems. Cryptology ePrint Archive, Report 2008/198. http://eprint.iacr.org/.
  17. Ray, A. and Cleaveland, R. (2006). A software architectural approach to security by design. In 30th Annual International Computer Software and Applications Conference, COMPSAC 2006, Chicago, Illinois, USA, September 17-21, 2006. Volume 2, pages 83-86.
  18. Ren, J. and Taylor, R. (2005). A secure software architecture description language. In Workshop on Software Security Assurance Tools, Techniques, and Metrics, pages 82-89.
  19. Salem, M. O. B., Mosbahi, O., Khalgui, M., and Frey, G. (2015). Zizo: Modeling, simulation and verification of reconfigurable real-time control tasks sharing adaptive resources - application to the medical project bros. In Proceedings of the International Conference on Health Informatics, pages 20-31.
  20. Vergnaud, T., Pautet, L., and Kordon, F. (2005). Using the aadl to describe distributed applications from middleware to software components. In Reliable Software Technology - Ada-Europe 2005, 10th Ada-Europe International Conference on Reliable Software Technologies, York, UK, June 20-24, 2005, Proceedings, pages 67-78.
  21. Yoon, E., Lee, W., and Yoo, K. (2007). Secure papbased RADIUS protocol in wireless networks. In Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, Third International Conference on Intelligent Computing, ICIC 2007, Qingdao, China, August 21-24, 2007. Proceedings, pages 689-694.
Download


Paper Citation


in Harvard Style

Adaili F., Mosbahi O., Khalgui M. and Bouzefrane S. (2016). RA2DL-Pool: New Useful Solution to Handle Security of Reconfigurable Embedded Systems . In Proceedings of the 11th International Conference on Evaluation of Novel Software Approaches to Software Engineering - Volume 1: ENASE, ISBN 978-989-758-189-2, pages 102-111. DOI: 10.5220/0005874301020111


in Bibtex Style

@conference{enase16,
author={Farid Adaili and Olfa Mosbahi and Mohamed Khalgui and Samia Bouzefrane},
title={RA2DL-Pool: New Useful Solution to Handle Security of Reconfigurable Embedded Systems},
booktitle={Proceedings of the 11th International Conference on Evaluation of Novel Software Approaches to Software Engineering - Volume 1: ENASE,},
year={2016},
pages={102-111},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005874301020111},
isbn={978-989-758-189-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 11th International Conference on Evaluation of Novel Software Approaches to Software Engineering - Volume 1: ENASE,
TI - RA2DL-Pool: New Useful Solution to Handle Security of Reconfigurable Embedded Systems
SN - 978-989-758-189-2
AU - Adaili F.
AU - Mosbahi O.
AU - Khalgui M.
AU - Bouzefrane S.
PY - 2016
SP - 102
EP - 111
DO - 10.5220/0005874301020111