
arXiv: 2109.05883
Abstract Time‐Sensitive Networking (TSN) extends IEEE 802.1 Ethernet for safety‐critical and real‐time applications in several areas, for example, automotive, aerospace or industrial automation. However, many of these systems also have stringent security requirements, and security attacks may impair safety. Given a TSN‐based distributed architecture, a set of applications with tasks and messages as well as a set of security and redundancy requirements, the authors are interested to synthesise a system configuration such that the real‐time, safety and security requirements are upheld. The Timed Efficient Stream Loss‐Tolerant Authentication (TESLA) low‐resource multicast authentication protocol is used to guarantee the security requirements and redundant disjunct message routes to tolerate link failures. The authors consider that tasks are dispatched using a static cyclic schedule table and that the messages use the time‐sensitive traffic class in TSN, which relies on schedule tables (called Gate Control Lists, GCLs) in the network switches. A configuration consists of the schedule tables for tasks as well as the disjoint routes and GCLs for messages. A Constraint Programing‐based formulation, which can be used to find an optimal solution with respect to the cost function, is proposed. Additionally, a Simulated Annealing‐based metaheuristic, which can find good solution for large test cases, is proposed. The authors evaluate both approaches on several test cases.
TESLA, Networking and Internet Architecture (cs.NI), FOS: Computer and information sciences, Authentication, Computer engineering. Computer hardware, TSN, redundancy, security, QA75.5-76.95, constraint programing, Constraint programing, Simulated annealing, TK7885-7895, Computer Science - Networking and Internet Architecture, Redundancy, Electronic computers. Computer science, Security, authentication, simulated annealing
TESLA, Networking and Internet Architecture (cs.NI), FOS: Computer and information sciences, Authentication, Computer engineering. Computer hardware, TSN, redundancy, security, QA75.5-76.95, constraint programing, Constraint programing, Simulated annealing, TK7885-7895, Computer Science - Networking and Internet Architecture, Redundancy, Electronic computers. Computer science, Security, authentication, simulated annealing
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 28 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |
