首页 > 最新文献

International Journal of Embedded and Real-Time Communication Systems (IJERTCS)最新文献

英文 中文
Protecting Security-Critical Real-Time Systems against Fault Attacks in Many-Core Platforms 在多核平台中保护安全关键型实时系统免受故障攻击
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-05-30 DOI: 10.1109/rtest56034.2022.9850010
Amin Norollah, Z. Kazemi, Danesh Derafshi, H. Beitollahi, M. Fazeli
Single-core platforms have been widely used for Many security-critical real-time systems. However, the ever-increasing high-performance requirements demanded by various industries and the advent of serious bottlenecks again increasing the performance of single-core platforms have necessitated the employment of many-core platforms in the design of such systems. This design shift from single to many-core platforms has been accompanied by security issues and has produced emerging security challenges. Fault injection attacks are one of the primary attacks that are used to infiltrate the tasks to reduce the system performance or cause system failures. In this paper, an online security-aware real-time hardware scheduler is proposed and used to avoid fault attacks using the task replication method. In the proposed real-time system, critical tasks and their replicas are scheduled with Least Slack Time first (LST) algorithm independently in the hardware under real-time constraints. Our synthesis and simulation results using Xilinx Vivado 2018.2 indicates that the proposed scheduler guarantees that all critical tasks and their replicas meet their deadlines. The results also show that our scheduler reduces the chance of a successful Fault attack and loss of the final result in critical tasks.
单核平台已广泛应用于许多安全关键型实时系统。然而,随着各行业对高性能要求的不断提高,以及单核平台性能再次提高的严重瓶颈的出现,使得在此类系统的设计中必须采用多核平台。这种从单一核心平台到多核心平台的设计转变伴随着安全问题,并产生了新的安全挑战。故障注入攻击是一种主要的攻击方式,通过渗透任务来降低系统性能或导致系统故障。本文提出了一种在线安全感知的实时硬件调度程序,并利用任务复制的方法来避免故障攻击。在该实时系统中,在实时性约束下,关键任务及其副本在硬件上采用LST算法独立调度。我们使用Xilinx Vivado 2018.2进行的综合和仿真结果表明,所提出的调度器可以保证所有关键任务及其副本在截止日期前完成。结果还表明,我们的调度器减少了在关键任务中成功进行Fault攻击和丢失最终结果的机会。
{"title":"Protecting Security-Critical Real-Time Systems against Fault Attacks in Many-Core Platforms","authors":"Amin Norollah, Z. Kazemi, Danesh Derafshi, H. Beitollahi, M. Fazeli","doi":"10.1109/rtest56034.2022.9850010","DOIUrl":"https://doi.org/10.1109/rtest56034.2022.9850010","url":null,"abstract":"Single-core platforms have been widely used for Many security-critical real-time systems. However, the ever-increasing high-performance requirements demanded by various industries and the advent of serious bottlenecks again increasing the performance of single-core platforms have necessitated the employment of many-core platforms in the design of such systems. This design shift from single to many-core platforms has been accompanied by security issues and has produced emerging security challenges. Fault injection attacks are one of the primary attacks that are used to infiltrate the tasks to reduce the system performance or cause system failures. In this paper, an online security-aware real-time hardware scheduler is proposed and used to avoid fault attacks using the task replication method. In the proposed real-time system, critical tasks and their replicas are scheduled with Least Slack Time first (LST) algorithm independently in the hardware under real-time constraints. Our synthesis and simulation results using Xilinx Vivado 2018.2 indicates that the proposed scheduler guarantees that all critical tasks and their replicas meet their deadlines. The results also show that our scheduler reduces the chance of a successful Fault attack and loss of the final result in critical tasks.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"115 1","pages":"1-6"},"PeriodicalIF":0.7,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79604041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Frequency Regulation of Multi Area Hybrid Source Power System with Energy Storage Devices 带储能装置的多区域混合电源系统的频率调节
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-05-30 DOI: 10.1109/rtest56034.2022.9850101
Ch. Naga Sai Kalyan, M. Kumar, B. S. Goud, Hossein Shahinzadeh, Ch. Rami Reddy, M. Kiran Kumar
In this paper, a three degree-of-freedom PID (3DOFPID) fine-tuned using a seagull optimization algorithm (SOA) is presented as a secondary regulator for a multi-area hybrid source (MAHS) interconnected power system. Area-1 of MAHS is subjugated with a perturbation of 10% step load. Moreover, the superiority of the presented SOA tuned 3DOFPID controller is demonstrated with performances of other control techniques that have been reported in recent literature. To further enhance the dynamical behaviour of MAHS during perturbed conditions, energy storage devices (ESDs) such as redox flow batteries (RFBs) and superconducting magnetic energy storage (SMES) devices are placed in each area of the MAHS power system one after the other. Simulation results reveal the dominancy of SMES in handling the deviations in MAHS power system performance compared to RFBs.
本文提出了一种采用海鸥优化算法(SOA)微调的三自由度PID (3DOFPID)作为多区域混合电源(MAHS)互联电力系统的二次调节器。MAHS的Area-1受到10%阶跃载荷的扰动。此外,所提出的SOA调优3DOFPID控制器的优越性与最近文献中报道的其他控制技术的性能一起得到了证明。为了进一步增强MAHS在扰动条件下的动力学行为,在MAHS电力系统的每个区域依次放置了能量存储设备(esd),如氧化还原液流电池(rbs)和超导磁储能(SMES)设备。仿真结果表明,中小企业在处理MAHS电力系统性能偏差方面比rbf更具优势。
{"title":"Frequency Regulation of Multi Area Hybrid Source Power System with Energy Storage Devices","authors":"Ch. Naga Sai Kalyan, M. Kumar, B. S. Goud, Hossein Shahinzadeh, Ch. Rami Reddy, M. Kiran Kumar","doi":"10.1109/rtest56034.2022.9850101","DOIUrl":"https://doi.org/10.1109/rtest56034.2022.9850101","url":null,"abstract":"In this paper, a three degree-of-freedom PID (3DOFPID) fine-tuned using a seagull optimization algorithm (SOA) is presented as a secondary regulator for a multi-area hybrid source (MAHS) interconnected power system. Area-1 of MAHS is subjugated with a perturbation of 10% step load. Moreover, the superiority of the presented SOA tuned 3DOFPID controller is demonstrated with performances of other control techniques that have been reported in recent literature. To further enhance the dynamical behaviour of MAHS during perturbed conditions, energy storage devices (ESDs) such as redox flow batteries (RFBs) and superconducting magnetic energy storage (SMES) devices are placed in each area of the MAHS power system one after the other. Simulation results reveal the dominancy of SMES in handling the deviations in MAHS power system performance compared to RFBs.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"197 1","pages":"1-5"},"PeriodicalIF":0.7,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76057501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Combination of FMEA and Digital Twinning for Rapid, Accurate, and Online Diagnosis in Vehicles Using COTS Embedded Computing Devices 基于COTS嵌入式计算设备的车辆快速、准确和在线诊断的FMEA和数字孪生的结合
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-05-30 DOI: 10.1109/rtest56034.2022.9849859
Mohammad Amin Moloudi, Amin Foshati, Hossein Kalantari, A. Ejlali
Vehicles are getting more and more complicated while at the same time they are safety-critical systems which mean their failures can lead to catastrophic consequences. This implies that more sophisticated diagnostic techniques are required for vehicles that also cannot be expensive as they must be widely available to serve the general public’s safety. To this end, this paper shows how a process called Failure Mode and Effect Analysis (FMEA) and a technology called Digital Twinning (DT) can be combined in a novel way to provide an inexpensive and yet effective online diagnosis for vehicles. The approach can be implemented by Commercial-Of-The-Shelf (COTS) embedded computing devices which explains why it is not expensive. It is also online, which means it is active and operational while the vehicle is in operation and motion. In order to quantitatively evaluate vehicle diagnostic approaches, this paper provides definitions for two metrics that measure the impact of the diagnosis on the ease of repair process. As an experimental case study, the proposed approach was implemented for an Electronic Throttle Control (ETC) usually used in modern vehicles. The observations indicate that the proposed approach can improve the accuracy of diagnosis above two times compared with a classic Hardware-in-the-Loop (HiL) technique. It must be emphasized that such accuracy is achieved along with online and real-time operation and low-cost implementation.
车辆变得越来越复杂,同时它们也是安全关键系统,这意味着它们的故障可能导致灾难性的后果。这意味着车辆需要更复杂的诊断技术,而这些技术也不能太贵,因为它们必须广泛可用,以服务于公众的安全。为此,本文展示了一种名为故障模式和影响分析(FMEA)的过程和一种名为数字孪生(DT)的技术如何以一种新颖的方式结合起来,为车辆提供廉价而有效的在线诊断。该方法可以通过商用货架(COTS)嵌入式计算设备实现,这解释了为什么它不昂贵。它也是在线的,这意味着当车辆在运行和运动时,它是活跃的和可操作的。为了定量评价车辆诊断方法,本文定义了两个度量诊断对维修过程容易程度的影响的指标。以现代汽车常用的电子节气门控制系统(ETC)为例进行了实验研究。结果表明,该方法的诊断准确率比传统的硬件在环(HiL)技术提高了两倍以上。必须强调的是,这种准确性是通过在线实时操作和低成本实施来实现的。
{"title":"A Combination of FMEA and Digital Twinning for Rapid, Accurate, and Online Diagnosis in Vehicles Using COTS Embedded Computing Devices","authors":"Mohammad Amin Moloudi, Amin Foshati, Hossein Kalantari, A. Ejlali","doi":"10.1109/rtest56034.2022.9849859","DOIUrl":"https://doi.org/10.1109/rtest56034.2022.9849859","url":null,"abstract":"Vehicles are getting more and more complicated while at the same time they are safety-critical systems which mean their failures can lead to catastrophic consequences. This implies that more sophisticated diagnostic techniques are required for vehicles that also cannot be expensive as they must be widely available to serve the general public’s safety. To this end, this paper shows how a process called Failure Mode and Effect Analysis (FMEA) and a technology called Digital Twinning (DT) can be combined in a novel way to provide an inexpensive and yet effective online diagnosis for vehicles. The approach can be implemented by Commercial-Of-The-Shelf (COTS) embedded computing devices which explains why it is not expensive. It is also online, which means it is active and operational while the vehicle is in operation and motion. In order to quantitatively evaluate vehicle diagnostic approaches, this paper provides definitions for two metrics that measure the impact of the diagnosis on the ease of repair process. As an experimental case study, the proposed approach was implemented for an Electronic Throttle Control (ETC) usually used in modern vehicles. The observations indicate that the proposed approach can improve the accuracy of diagnosis above two times compared with a classic Hardware-in-the-Loop (HiL) technique. It must be emphasized that such accuracy is achieved along with online and real-time operation and low-cost implementation.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"33 1","pages":"1-8"},"PeriodicalIF":0.7,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81023940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Conflict Resolution and Fluidization in Cyber-Physical Systems 信息物理系统中的冲突解决和流化
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-05-30 DOI: 10.1109/rtest56034.2022.9849884
Hassan Motallebi
In order to fight against the state space explosion problem in highly populated discrete event systems, some relaxation techniques are commonly used. In these approximation (fluidization) techniques discrete state variables are modeled as real variables. Here in this paper, we focus on the fluidization of discrete Petri nets as hybrid Petri nets. In several situations in this systems, cconflicts may arise among transitions and in many cases choosing the appropriate conflict resolution scheme for each conflict situation is challenging. In order to address this issue, in this paper, for each conflict situation we give examples of interacting producer/consumer processes with different buffering configurations and explain the rationality behind each of these conflict resolution schemes. We try to give insight into how the appropriate conflict resolution scheme in fluidized model can be determined according to how the conflict is resolved in real system or discrete model.
为了解决高密度离散事件系统的状态空间爆炸问题,通常采用一些松弛技术。在这些近似(流化)技术中,离散状态变量被建模为实变量。本文主要研究离散Petri网作为混合Petri网的流态化。在这个系统的一些情况下,过渡之间可能会出现冲突,在许多情况下,为每个冲突情况选择适当的冲突解决方案是具有挑战性的。为了解决这个问题,在本文中,对于每种冲突情况,我们给出了具有不同缓冲配置的交互生产者/消费者进程的示例,并解释了每种冲突解决方案背后的合理性。我们试图根据实际系统或离散模型中如何解决冲突来深入了解流化模型中如何确定合适的冲突解决方案。
{"title":"Conflict Resolution and Fluidization in Cyber-Physical Systems","authors":"Hassan Motallebi","doi":"10.1109/rtest56034.2022.9849884","DOIUrl":"https://doi.org/10.1109/rtest56034.2022.9849884","url":null,"abstract":"In order to fight against the state space explosion problem in highly populated discrete event systems, some relaxation techniques are commonly used. In these approximation (fluidization) techniques discrete state variables are modeled as real variables. Here in this paper, we focus on the fluidization of discrete Petri nets as hybrid Petri nets. In several situations in this systems, cconflicts may arise among transitions and in many cases choosing the appropriate conflict resolution scheme for each conflict situation is challenging. In order to address this issue, in this paper, for each conflict situation we give examples of interacting producer/consumer processes with different buffering configurations and explain the rationality behind each of these conflict resolution schemes. We try to give insight into how the appropriate conflict resolution scheme in fluidized model can be determined according to how the conflict is resolved in real system or discrete model.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"47 1","pages":"1-5"},"PeriodicalIF":0.7,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75182830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Effect of Fog Offloading on the Energy Consumption of Computational Nodes 雾卸载对计算节点能耗的影响
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-05-30 DOI: 10.1109/rtest56034.2022.9850011
Ferdous Sharifi, S. Hessabi, Ali Rasaii
In the age of Internet of Things (IoT), an immense amount of data is generated from distributed devices. Fog computing is a promising solution for managing the large volume of time-sensitive data that is being generated by IoT devices. This new computing paradigm faces new challenges. Among these challenges, computation offloading is introduced as the most important one. In this paper, the effect of computation offloading on the energy consumption of fog nodes in a multi-layer fog architecture is investigated. Energy consumption of computational nodes for four different offloading scenarios is evaluated and shown that the effectiveness of an offloading scenario highly depends on the processing power of computational nodes and the number of requests that are generated from IoT devices.
在物联网(IoT)时代,分布式设备产生了大量数据。雾计算是一种很有前途的解决方案,用于管理物联网设备生成的大量时间敏感数据。这种新的计算范式面临着新的挑战。在这些挑战中,计算卸载是最重要的一个。本文研究了多层雾结构中计算卸载对雾节点能耗的影响。评估了四种不同卸载场景下计算节点的能耗,并表明卸载场景的有效性高度依赖于计算节点的处理能力和物联网设备生成的请求数量。
{"title":"The Effect of Fog Offloading on the Energy Consumption of Computational Nodes","authors":"Ferdous Sharifi, S. Hessabi, Ali Rasaii","doi":"10.1109/rtest56034.2022.9850011","DOIUrl":"https://doi.org/10.1109/rtest56034.2022.9850011","url":null,"abstract":"In the age of Internet of Things (IoT), an immense amount of data is generated from distributed devices. Fog computing is a promising solution for managing the large volume of time-sensitive data that is being generated by IoT devices. This new computing paradigm faces new challenges. Among these challenges, computation offloading is introduced as the most important one. In this paper, the effect of computation offloading on the energy consumption of fog nodes in a multi-layer fog architecture is investigated. Energy consumption of computational nodes for four different offloading scenarios is evaluated and shown that the effectiveness of an offloading scenario highly depends on the processing power of computational nodes and the number of requests that are generated from IoT devices.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"76 1","pages":"1-6"},"PeriodicalIF":0.7,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90432779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy- and Reliability-Aware Task Replication in Safety-Critical Embedded Systems 安全关键型嵌入式系统中的能量和可靠性感知任务复制
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-05-30 DOI: 10.1109/rtest56034.2022.9850176
Farimah Poursafaei, Sepideh Safari, Mohsen Ansari, Amir Yeganeh-Khaksar, M. Salehi, A. Ejlali
Safety-critical systems should satisfy a required level of reliability. To meet a desired reliability target, task replication can be realized with exploiting multicore platforms. However, inattentive task replication might lead to significant power, energy, and time overhead. In this paper, we demonstrate that when we use task replication technique, the required number of replicas for each task and the energy consumption of the system are significantly dependent on the accuracy of the fault detection. At design time, we propose a method that determines the level of replication along with the voltage and frequency setting for each task to satisfy a desired reliability target such that the energy consumption is minimized. At run time, the proposed method controls cancelling the task replicas in the fault-free scenarios. The proposed method can be applied on both dynamic- and static-priority applications. We evaluated the effectiveness of our method through extensive simulations. The evaluation results show that our proposed method provides up to 43.5% (on average 26.2%) energy saving without reliability degradation.
安全关键型系统应满足所需的可靠性水平。为了满足期望的可靠性目标,可以利用多核平台实现任务复制。但是,不专心的任务复制可能会导致大量的电力、精力和时间开销。在本文中,我们证明了当我们使用任务复制技术时,每个任务所需的副本数量和系统的能量消耗显着依赖于故障检测的准确性。在设计时,我们提出了一种方法来确定复制的水平以及每个任务的电压和频率设置,以满足期望的可靠性目标,从而使能耗最小化。在运行时,建议的方法控制在无故障场景中取消任务副本。该方法适用于动态优先级和静态优先级的应用。我们通过大量的模拟来评估我们方法的有效性。评估结果表明,该方法在不降低可靠性的前提下,可实现43.5%(平均26.2%)的节能。
{"title":"Energy- and Reliability-Aware Task Replication in Safety-Critical Embedded Systems","authors":"Farimah Poursafaei, Sepideh Safari, Mohsen Ansari, Amir Yeganeh-Khaksar, M. Salehi, A. Ejlali","doi":"10.1109/rtest56034.2022.9850176","DOIUrl":"https://doi.org/10.1109/rtest56034.2022.9850176","url":null,"abstract":"Safety-critical systems should satisfy a required level of reliability. To meet a desired reliability target, task replication can be realized with exploiting multicore platforms. However, inattentive task replication might lead to significant power, energy, and time overhead. In this paper, we demonstrate that when we use task replication technique, the required number of replicas for each task and the energy consumption of the system are significantly dependent on the accuracy of the fault detection. At design time, we propose a method that determines the level of replication along with the voltage and frequency setting for each task to satisfy a desired reliability target such that the energy consumption is minimized. At run time, the proposed method controls cancelling the task replicas in the fault-free scenarios. The proposed method can be applied on both dynamic- and static-priority applications. We evaluated the effectiveness of our method through extensive simulations. The evaluation results show that our proposed method provides up to 43.5% (on average 26.2%) energy saving without reliability degradation.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"28 1","pages":"1-8"},"PeriodicalIF":0.7,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85980224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Model for Power-Performance Optimization in Fog-Cloud Environment by Task Off-Loading of IoT Applications 雾云环境下物联网应用任务卸载的功耗性能优化模型
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-05-30 DOI: 10.1109/rtest56034.2022.9849916
Rojin Naseri, A. Asadi, Mohammad Abdollahi Azgomi
Task offloading is a solution to compensate for resource constraints on the Internet of Things (IoT). Deciding on the location of offloading is very important. The IoT systems provide a three-tier (IoT-fog-cloud) architecture and use the locations of cloud and fog for task offloading. Fog is a more suitable location for task offloading than cloud in terms of energy consumption and response time, and this paper aims to optimize these criteria in IoT systems. In this paper, fog is modeled by queuing theory, and the minimum number of its servers is determined based on its availability by the binary search algorithm and reinforcement learning policy iteration algorithm. Different scenarios are considered for evaluating the impact of different parameters on the cost of the fog. The proposed dispatch policy improves the results by 31% compared to the policies of Slowest Server First, Fastest Server First, and Randomly Chosen Server.
任务卸载是一种补偿物联网(IoT)资源限制的解决方案。确定卸货地点是非常重要的。物联网系统提供三层(物联网-雾-云)架构,并使用云和雾的位置进行任务卸载。在能耗和响应时间方面,雾是比云更适合任务卸载的位置,本文旨在优化物联网系统中的这些标准。本文采用排队理论对雾进行建模,利用二叉搜索算法和强化学习策略迭代算法根据雾的可用性确定雾的最小服务器数量。为了评估不同参数对雾损失的影响,考虑了不同的情景。与最慢服务器优先、最快服务器优先和随机选择服务器的策略相比,所提出的调度策略的结果提高了31%。
{"title":"A Model for Power-Performance Optimization in Fog-Cloud Environment by Task Off-Loading of IoT Applications","authors":"Rojin Naseri, A. Asadi, Mohammad Abdollahi Azgomi","doi":"10.1109/rtest56034.2022.9849916","DOIUrl":"https://doi.org/10.1109/rtest56034.2022.9849916","url":null,"abstract":"Task offloading is a solution to compensate for resource constraints on the Internet of Things (IoT). Deciding on the location of offloading is very important. The IoT systems provide a three-tier (IoT-fog-cloud) architecture and use the locations of cloud and fog for task offloading. Fog is a more suitable location for task offloading than cloud in terms of energy consumption and response time, and this paper aims to optimize these criteria in IoT systems. In this paper, fog is modeled by queuing theory, and the minimum number of its servers is determined based on its availability by the binary search algorithm and reinforcement learning policy iteration algorithm. Different scenarios are considered for evaluating the impact of different parameters on the cost of the fog. The proposed dispatch policy improves the results by 31% compared to the policies of Slowest Server First, Fastest Server First, and Randomly Chosen Server.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"28 1","pages":"1-8"},"PeriodicalIF":0.7,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84861958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software-based Control-Flow Error Detection with Hardware Performance Counters in ARM Processors ARM处理器中基于软件的控制流错误检测与硬件性能计数器
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-05-30 DOI: 10.1109/rtest56034.2022.9850096
Hussien Al-haj Ahmad, Yasser Sedaghat
The recent trend in processor manufacturing technologies has significantly increased the susceptibility of safety-critical systems against soft errors in harsh environments. Such errors result in control-flow errors (CFEs) that can disturb systems' execution and cause severe financial, human, or environmental disasters. Therefore, there is a severe need for efficient techniques to detect CFEs and keep the systems fault-tolerant. Although numerous control-flow error detection techniques have been proposed, they impose considerable overheads, making them inappropriate for today's safety-critical systems with restricted resources. Several techniques attempt to insert fewer control-flow checking instructions to reduce overheads. However, they limit fault coverage. This paper proposes a software-based technique for ARM processors to detect CFEs. The technique leverages the Hardware Performance Counters (HPCs), which exist in most modern processors, to count micro-architecture events and generate HPC-based signatures. Based on these signatures that capture the correct control flow of the program, the proposed technique can detect CFEs once the correct control flow is violated. We evaluate the detection capability of the proposed technique by performing many fault injection experiments applied on different benchmark programs. Moreover, we compare the proposed technique with common signature-based CFE detection techniques with respect to fault coverage and imposed overheads. The results demonstrate that the proposed technique on average can achieve ~99% fault coverage which is 23.57% higher than that offered by the employed signature-based techniques. Moreover, the memory overhead imposed by the proposed technique is 4.85% lower, and the performance overhead is ~19% lower than that of the studied signature-based techniques.
处理器制造技术的最新趋势大大增加了安全关键系统在恶劣环境中对软错误的敏感性。此类错误会导致控制流错误(cfe),从而干扰系统的执行,并导致严重的财务、人力或环境灾难。因此,迫切需要有效的技术来检测cfe并保持系统容错性。尽管已经提出了许多控制流错误检测技术,但它们带来了相当大的开销,使得它们不适合当今资源有限的安全关键系统。有几种技术试图插入更少的控制流检查指令以减少开销。然而,它们限制了故障覆盖。本文提出了一种基于软件的ARM处理器检测CFEs的技术。该技术利用存在于大多数现代处理器中的硬件性能计数器(hpc)来计算微体系结构事件并生成基于hpc的签名。基于这些捕获程序正确控制流的签名,所提出的技术可以在违反正确控制流时检测cfe。我们通过在不同的基准程序上进行许多故障注入实验来评估所提出技术的检测能力。此外,我们将所提出的技术与基于签名的常见CFE检测技术在故障覆盖和强加开销方面进行了比较。结果表明,该方法的平均故障覆盖率为99%,比基于签名的方法提高了23.57%。此外,该技术的内存开销比基于签名的技术低4.85%,性能开销比基于签名的技术低19%。
{"title":"Software-based Control-Flow Error Detection with Hardware Performance Counters in ARM Processors","authors":"Hussien Al-haj Ahmad, Yasser Sedaghat","doi":"10.1109/rtest56034.2022.9850096","DOIUrl":"https://doi.org/10.1109/rtest56034.2022.9850096","url":null,"abstract":"The recent trend in processor manufacturing technologies has significantly increased the susceptibility of safety-critical systems against soft errors in harsh environments. Such errors result in control-flow errors (CFEs) that can disturb systems' execution and cause severe financial, human, or environmental disasters. Therefore, there is a severe need for efficient techniques to detect CFEs and keep the systems fault-tolerant. Although numerous control-flow error detection techniques have been proposed, they impose considerable overheads, making them inappropriate for today's safety-critical systems with restricted resources. Several techniques attempt to insert fewer control-flow checking instructions to reduce overheads. However, they limit fault coverage. This paper proposes a software-based technique for ARM processors to detect CFEs. The technique leverages the Hardware Performance Counters (HPCs), which exist in most modern processors, to count micro-architecture events and generate HPC-based signatures. Based on these signatures that capture the correct control flow of the program, the proposed technique can detect CFEs once the correct control flow is violated. We evaluate the detection capability of the proposed technique by performing many fault injection experiments applied on different benchmark programs. Moreover, we compare the proposed technique with common signature-based CFE detection techniques with respect to fault coverage and imposed overheads. The results demonstrate that the proposed technique on average can achieve ~99% fault coverage which is 23.57% higher than that offered by the employed signature-based techniques. Moreover, the memory overhead imposed by the proposed technique is 4.85% lower, and the performance overhead is ~19% lower than that of the studied signature-based techniques.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"40 1","pages":"1-8"},"PeriodicalIF":0.7,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86613395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Coverage and Energy Efficiency Analysis of Wireless Sensor Networks for Internet of Things 面向物联网的无线传感器网络覆盖及能效分析
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-05-30 DOI: 10.1109/rtest56034.2022.9850158
Amirhosein Imani, M. Eslami, J. Haghighat
Wireless sensor networks (WSNs) have attracted a lot of attention in recent years because they have a vital role in Internet of Things (IoT). In WSNs, it is often very important to maintain the desired amount of coverage with the least energy consumption. In this paper, the coverage and energy efficiency of randomly deployed wireless sensor networks are investigated. We use stochastic geometry to analyze the probability of coverage considering fading and random location of the nodes. Furthermore, It is shown that the probability of coverage without fading is a special case of the probability of coverage with fading. In addition, we define and analyze energy efficiency as the ratio of coverage to average energy consumption. This is a new definition of energy efficiency that seeks to determine the coverage level acquired per unit energy consumption. The simulation results in terms of coverage and energy efficiency are presented for randomly located nodes with and without fading. For maximum energy efficiency, the optimal sensing radius of the sensors are determined with the help of simulation results.
无线传感器网络(WSNs)在物联网(IoT)中发挥着重要作用,近年来引起了人们的广泛关注。在无线传感器网络中,以最少的能耗保持所需的覆盖范围通常是非常重要的。本文研究了随机部署无线传感器网络的覆盖和能量效率。我们使用随机几何来分析覆盖的概率,考虑到节点的衰落和随机位置。进一步证明了无衰落覆盖概率是有衰落覆盖概率的一种特殊情况。此外,我们将能源效率定义为覆盖与平均能源消耗的比率。这是能源效率的新定义,旨在确定每单位能源消耗获得的覆盖水平。给出了随机定位节点在有衰落和无衰落情况下的覆盖和能效仿真结果。为了获得最大的能量效率,结合仿真结果确定了传感器的最优感知半径。
{"title":"Coverage and Energy Efficiency Analysis of Wireless Sensor Networks for Internet of Things","authors":"Amirhosein Imani, M. Eslami, J. Haghighat","doi":"10.1109/rtest56034.2022.9850158","DOIUrl":"https://doi.org/10.1109/rtest56034.2022.9850158","url":null,"abstract":"Wireless sensor networks (WSNs) have attracted a lot of attention in recent years because they have a vital role in Internet of Things (IoT). In WSNs, it is often very important to maintain the desired amount of coverage with the least energy consumption. In this paper, the coverage and energy efficiency of randomly deployed wireless sensor networks are investigated. We use stochastic geometry to analyze the probability of coverage considering fading and random location of the nodes. Furthermore, It is shown that the probability of coverage without fading is a special case of the probability of coverage with fading. In addition, we define and analyze energy efficiency as the ratio of coverage to average energy consumption. This is a new definition of energy efficiency that seeks to determine the coverage level acquired per unit energy consumption. The simulation results in terms of coverage and energy efficiency are presented for randomly located nodes with and without fading. For maximum energy efficiency, the optimal sensing radius of the sensors are determined with the help of simulation results.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"5 1","pages":"1-8"},"PeriodicalIF":0.7,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83420754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RTEST 2022 Cover Page RTEST 2022封面
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-05-30 DOI: 10.1109/rtest56034.2022.9849993
{"title":"RTEST 2022 Cover Page","authors":"","doi":"10.1109/rtest56034.2022.9849993","DOIUrl":"https://doi.org/10.1109/rtest56034.2022.9849993","url":null,"abstract":"","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"38 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88292110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Embedded and Real-Time Communication Systems (IJERTCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1