Security-Critical Energy-Aware Task Scheduling for Heterogeneous Real-Time MPSoCs in IoT
Internet of Things (IoT) devices, such as intelligent road side units and video-based detectors, are being deployed in emerging applications like sustainable and intelligent transportation systems. The primary obstacles against the development of these IoT devices are various security threats and hu...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on services computing 2020-07, Vol.13 (4), p.745-758 |
---|---|
Hauptverfasser: | , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Internet of Things (IoT) devices, such as intelligent road side units and video-based detectors, are being deployed in emerging applications like sustainable and intelligent transportation systems. The primary obstacles against the development of these IoT devices are various security threats and huge energy consumption. In this article, we study the problem of scheduling tasks onto a heterogeneous multiprocessor system on a chip (MPSoC) deployed in IoT for optimizing quality of security under energy, real-time, and task precedence constraints. We first provide a mixed-integer linear programming (MILP) formulation for allocating and scheduling dependent tasks with energy and real-time constraints on a heterogeneous MPSoC system to maximize system quality of security. In order to efficiently solve the formulated MILP, we then propose an analysis-based two-stage scheme that determines the allocation, operating frequency, and security service of tasks to maximize system quality of security while satisfying the design constraints. We finally carry out extensive simulation experiments to validate our proposed two-stage scheme and MILP approach. Simulation results demonstrate that the proposed two-stage scheme outperforms a number of representative existing approaches in saving energy and improving system quality of security. The results also show that the proposed MILP approach can achieve the best performance and the proposed two-stage scheme has a close performance to the MILP approach. |
---|---|
ISSN: | 1939-1374 1939-1374 2372-0204 |
DOI: | 10.1109/TSC.2019.2963301 |