Journal of South China University of Technology(Natural Science Edition) ›› 2023, Vol. 51 ›› Issue (5): 1-12.doi: 10.12141/j.issn.1000-565X.220394

Special Issue: 2023年计算机科学与技术

• Computer Science & Technology • Previous Articles     Next Articles

Security-Aware Scheduling Method for Time-Sensitive Networking

LU Yiqin1 XIE WenjingWANG HaihanCHEN Zhuoxing1 CHENG Zhe2 PAN Weiqiang3 QIN Jiancheng1   

  1. 1.School of Electronic and Information Engineering,South China University of Technology,Guangzhou 510640,Guangdong,China
    2.School of Computer Science and Engineering,South China University of Technology,Guangzhou 510006,Guangdong,China
    3.Information and Network Engineering and Research Center,South China University of Technology,Guangzhou 510640,Guangdong,China
  • Received:2022-06-22 Online:2023-05-25 Published:2022-08-12
  • Contact: 程喆(1980-),男,博士生,主要从事计算机网络、信息安全研究。 E-mail:cszcheng@mail.scut.edu.cn
  • About author:陆以勤(1968-),男,博士,教授,博士生导师,主要从事新型网络体系架构、网络安全研究。E-mail:eey-qlu@scut.edu.cn
  • Supported by:
    the National Key R&D Program of China(2020YFB1805300)

Abstract:

The authenticity of information is the key security factor of system in time-sensitive networking (TSN). However, the direct introduction of traditional security authentication mechanism will lead to a significant reduction in schedulability of the system. The existing methods still have the problems of few application scenarios and high resource consumption. To address this problem, a security-aware scheduling method for TSN was proposed. Firstly, based on the traffic characteristics of TSN, a time-efficient one-time signature security mechanism was designed to provide efficient multicast source authentication for messages. Secondly, the corresponding security model was proposed to evaluate the mechanism and describe the impact of the security mechanism on tasks and traffic. Finally, the proposed security-aware scheduling method was modeled mathematically. On the basis of traditional scheduling constraints, some constraints related to security mechanisms were added. At the same time, the optimization objective was to minimize the end-to-end delay of applications, and constraint programming was used to solve the problem. Simulation results show that the introduction of the improved one-time signature mechanism can effectively protect the authenticity of key information in TSN, and has limited impact on scheduling. In multiple test cases of different sizes generated based on real industrial scenarios, the average end-to-end delay and bandwidth consumption of the generated applications only increased by 13.3% and 5.8% respectively. Compared with other similar methods, this method consumes less bandwidth, thus more suitable for TSN networks with strict bandwidth restrictions.

Key words: time-sensitive networking, security, scheduling, constraint programming

CLC Number: