Computer Science & Technology

Security-Aware Scheduling Method for Time-Sensitive Networking

  • LU Yiqin ,
  • XIE Wenjing ,
  • WANG Haihan ,
  • CHEN Zhuoxing ,
  • CHENG Zhe ,
  • PAN Weiqiang ,
  • QIN Jiancheng
Expand
  • 1.School of Electronic and Information Engineering,South China University of Technology,Guangzhou 510640,Guangdong,China
    2.School of Computer Science and Engineering,South China University of Technology,Guangzhou 510006,Guangdong,China
    3.Information and Network Engineering and Research Center,South China University of Technology,Guangzhou 510640,Guangdong,China
陆以勤(1968-),男,博士,教授,博士生导师,主要从事新型网络体系架构、网络安全研究。E-mail:eey-qlu@scut.edu.cn

Received date: 2022-06-22

  Online published: 2022-08-12

Supported by

the National Key R&D Program of China(2020YFB1805300)

Abstract

The authenticity of information is the key security factor of system in time-sensitive networking (TSN). However, the direct introduction of traditional security authentication mechanism will lead to a significant reduction in schedulability of the system. The existing methods still have the problems of few application scenarios and high resource consumption. To address this problem, a security-aware scheduling method for TSN was proposed. Firstly, based on the traffic characteristics of TSN, a time-efficient one-time signature security mechanism was designed to provide efficient multicast source authentication for messages. Secondly, the corresponding security model was proposed to evaluate the mechanism and describe the impact of the security mechanism on tasks and traffic. Finally, the proposed security-aware scheduling method was modeled mathematically. On the basis of traditional scheduling constraints, some constraints related to security mechanisms were added. At the same time, the optimization objective was to minimize the end-to-end delay of applications, and constraint programming was used to solve the problem. Simulation results show that the introduction of the improved one-time signature mechanism can effectively protect the authenticity of key information in TSN, and has limited impact on scheduling. In multiple test cases of different sizes generated based on real industrial scenarios, the average end-to-end delay and bandwidth consumption of the generated applications only increased by 13.3% and 5.8% respectively. Compared with other similar methods, this method consumes less bandwidth, thus more suitable for TSN networks with strict bandwidth restrictions.

Cite this article

LU Yiqin , XIE Wenjing , WANG Haihan , CHEN Zhuoxing , CHENG Zhe , PAN Weiqiang , QIN Jiancheng . Security-Aware Scheduling Method for Time-Sensitive Networking[J]. Journal of South China University of Technology(Natural Science), 2023 , 51(5) : 1 -12 . DOI: 10.12141/j.issn.1000-565X.220394

References

1 BELLO L L, STEINER W .A perspective on IEEE time-sensitive networking for industrial communication and automation systems[J].Proceedings of the IEEE2019107(6):1094-1120.
2 ASHJAEI M, BELLO L L, DANESHTALAB M,et al .Time-sensitive networking in automotive embedded systems:state of the art and research opportunities[J].Journal of Systems Architecture2021117:102137/1-15.
3 CRACIUNAS S S, OLIVER R S, CHMELíK M,et al .Scheduling real-time communication in IEEE 802.1 Qbv time sensitive networks[C]∥ Proceedings of the 24th International Conference on Real-Time Networks and Systems.Brest:ACM,2016:183-192.
4 DüRR F, NAYAK N G .No-wait packet scheduling for IEEE time-sensitive networks (TSN)[C]∥ Proceedings of the 24th International Conference on Real-Time Networks and Systems.Brest:ACM,2016:203-212.
5 RAAGAARD M L,POP P .Optimization algorithms for the scheduling of IEEE 802.1 time-sensitive networking (TSN) [R/OL].(2017-01-15)[2022-05-06]..
6 张彤,冯佳琦,马延滢,等 .时间敏感网络流量调度综述[J].计算机研究与发展202259(4):747-764.
  ZHANG Tong, FENG Jiaqi, MA Yanying,et al .Survey on traffic scheduling in time-sensitive networking [J].Journal of Computer Research and Development202259(4):747-764.
7 ZHANG L, GOSWAMI D, SCHNEIDER R,et al .Task-and network-level schedule co-synthesis of Ethernet-based time-triggered systems[C]∥ Proceedings of the 19th Asia and South Pacific Design Automation Conference.Singapore:IEEE,2014:119-124.
8 CRACIUNAS S S, OLIVER R S .Combined task-and network-level scheduling for distributed time-riggered systems[J].Real-Time Systems201652(2):161-200.
9 MAHFOUZI R, AMINIFAR A, SAMII S,et al .Security-aware routing and scheduling for control applications on Ethernet TSN networks[J].ACM Transactions on Design Automation of Electronic Systems201925(1):1-26.
10 ZHAO R, QIN G,LYU Y,et al .Security-aware scheduling for TTEthernet-based real-time automotive systems[J].IEEE Access20197:85971-85984.
11 PERRIG A, CANETTI R, SONG D,et al .Efficient and secure source authentication for multicast[C]∥ Proceedings of 2001 Network and Distributed System Security Symposium.San Diego:Internet Society,2001:35-46.
12 REUSCH N,POP P, CRACIUNAS S S .Work-in-progress:safe and secure configuration synthesis for TSN using constraint programming[C]∥ Proceedings of 2020 IEEE Real-Time Systems Symposium.Houston:IEEE,2020:387-390.
13 WANG Q, KHURANA H, HUANG Y,et al .Time valid one-time signature for time-critical multicast data authentication[C]∥ Proceedings of IEEE INFOCOM 2009.Rio de Janeiro:IEEE,2009:1233-1241.
14 REYZIN L, REYZIN N .Better than BiBa:short one-time signatures with fast signing and verifying[C]∥ Proceedings of the 7th Australasian Conference on Information Security and Privacy.Melboume:Springer,2002:144-153.
15 Google .CP-SAT solver [DB/OL]. (2022-03-05)[2022-05-06]..
Outlines

/