Benchmarking And Configuring Security Levels In Intermittent Computing

dc.contributor.authorSanthana Krishnan, Archanaaen
dc.contributor.authorSchaumont, Patricken
dc.date.accessioned2022-09-28T11:58:02Zen
dc.date.available2022-09-28T11:58:02Zen
dc.date.issued2022-09-05en
dc.date.updated2022-09-27T20:15:19Zen
dc.description.abstractIntermittent computing derives its name from the intermittent character of the power source used to drive the computing, typically an energy harvester of ambient energy sources. Intermittent computing is characterized by frequent transitions between the powered and the non-powered state. To enable the processor to quickly recover from unexpected power loss, regular checkpoints store the run-time state of the program including variables, control information and machine state. In sensitive applications such as logged measurements, checkpoints must be secured against tamper and replay. We investigate the overhead of creating, securing and restoring checkpoints with respect to the application. We propose a configurable checkpoint security setting which leverages application properties to reduce overhead of checkpoint security and implement the same using a secure checkpointing protocol. We discuss a prototype implementation for an FRAM based micro-controller and we characterize the cost of adding and configuring security to traditional checkpointing using a suite of embedded benchmark applications.en
dc.description.versionPublished versionen
dc.format.mimetypeapplication/pdfen
dc.identifier.citationArchanaa S. Krishnan and Patrick Schaumont. 2022. Benchmarking and Configuring Security Levels in Intermittent Computing. ACM Trans. Embedd. Comput. Syst. 21, 4, Article 36 (September 2022), 22 pages. https://doi.org/10.1145/3522748en
dc.identifier.doihttps://doi.org/10.1145/3522748en
dc.identifier.issue4en
dc.identifier.urihttp://hdl.handle.net/10919/112017en
dc.identifier.volume21en
dc.language.isoenen
dc.publisherACMen
dc.rightsCreative Commons Attribution-ShareAlike 4.0 Internationalen
dc.rights.holderThe author(s)en
dc.rights.urihttp://creativecommons.org/licenses/by-sa/4.0/en
dc.titleBenchmarking And Configuring Security Levels In Intermittent Computingen
dc.title.serialACM Transactions on Embedded Computing Systemsen
dc.typeArticle - Refereeden
dc.type.dcmitypeTexten

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
3522748.pdf
Size:
3.88 MB
Format:
Adobe Portable Document Format
Description:
Published version
License bundle
Now showing 1 - 1 of 1
Name:
license.txt
Size:
0 B
Format:
Item-specific license agreed upon to submission
Description: