Sangam: A Confluence of Knowledge Streams

Benchmarking And Configuring Security Levels In Intermittent Computing

Show simple item record

dc.creator Santhana Krishnan, Archanaa
dc.creator Schaumont, Patrick
dc.date 2022-09-28T11:58:02Z
dc.date 2022-09-28T11:58:02Z
dc.date 2022-09-05
dc.date 2022-09-27T20:15:19Z
dc.date.accessioned 2023-03-01T18:51:35Z
dc.date.available 2023-03-01T18:51:35Z
dc.identifier Archanaa S. Krishnan and Patrick Schaumont. 2022. Benchmarking and Configuring Security Levels in Intermittent Computing. ACM Trans. Embedd. Comput. Syst. 21, 4, Article 36 (September 2022), 22 pages. https://doi.org/10.1145/3522748
dc.identifier http://hdl.handle.net/10919/112017
dc.identifier https://doi.org/10.1145/3522748
dc.identifier 21
dc.identifier 4
dc.identifier.uri http://localhost:8080/xmlui/handle/CUHPOERS/281526
dc.description Intermittent computing derives its name from the intermittent character of the power source used to drive the computing, typically an energy harvester of ambient energy sources. Intermittent computing is characterized by frequent transitions between the powered and the non-powered state. To enable the processor to quickly recover from unexpected power loss, regular checkpoints store the run-time state of the program including variables, control information and machine state. In sensitive applications such as logged measurements, checkpoints must be secured against tamper and replay. We investigate the overhead of creating, securing and restoring checkpoints with respect to the application. We propose a configurable checkpoint security setting which leverages application properties to reduce overhead of checkpoint security and implement the same using a secure checkpointing protocol. We discuss a prototype implementation for an FRAM based micro-controller and we characterize the cost of adding and configuring security to traditional checkpointing using a suite of embedded benchmark applications.
dc.description Published version
dc.format application/pdf
dc.format application/pdf
dc.language en
dc.publisher ACM
dc.rights Creative Commons Attribution-ShareAlike 4.0 International
dc.rights http://creativecommons.org/licenses/by-sa/4.0/
dc.rights The author(s)
dc.title Benchmarking And Configuring Security Levels In Intermittent Computing
dc.title ACM Transactions on Embedded Computing Systems
dc.type Article - Refereed
dc.type Text


Files in this item

Files Size Format View
3522748.pdf 4.072Mb application/pdf View/Open

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse