Skip to main content

Invited Talk Mitigating the Effects of Internet Timing Faults Across Embedded Network Gateways

  • Conference paper
Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance (MMB&DFT 2010)

Abstract

Traditional embedded systems such as automobiles and industrial controls are increasingly being connected to enterprise computing facilities and the Internet. The usual approach to making such a connection is to install a gateway node which translates from Internet protocols to embedded field bus network protocols. Such connections raise obvious security concerns, because the gateway must guard against attacks on the embedded devices it serves. For our purposes, we’ll assume that typical enterprise and Internet vulnerabilities, such as buffer overflows, have already been taken care of. (Securing devices against traditional attacks is no small matter, but we are interested in uniquely embedded issues.)

Beyond normal gateway functions, an Internet to embedded gateway must also prevent timing faults and timing attacks from crossing over the gateway to affect the operation of attached embedded systems. An example of timing fault propagation would be severe clumping of messages on the Internet side so that many messages arrive at the gateway all at once, disrupting embedded system operation. While a queue can reduce the loss of incoming data and mitigate network overload, it cannot necessarily protect against timing-related faults on the embedded side of the gateway.

We report simulation results for several mechanisms to mitigate the effects of Internet message timing variations (whether due to faults or malicious attacks) on the performance of networked embedded systems using real-time data. Problems are caused primarily by excessive data delivery delay rather than messages being dropped from arriving clumps. This means that putting a queue in the gateway to manage arriving data clumps is typically worse than using no mitigation mechanism at all. Using a predictive filter seems intuitively better than using a queue, but finding a good generalized predictive filter is also quite difficult.

We believe that managing data streams from the Internet to embedded systems will require careful attention to the nature and time constants of data flowing through the gateway. Moreover, it seems likely that each distinct data stream will need a different set of data management mechanisms and policies at the gateway. In this case, one size does not fit all, making the design of a robust gateway a difficult problem that will require careful modeling of data value behavior for every gateway built.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Koopman, P., Ray, J. (2010). Invited Talk Mitigating the Effects of Internet Timing Faults Across Embedded Network Gateways . In: Müller-Clostermann, B., Echtle, K., Rathgeb, E.P. (eds) Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance. MMB&DFT 2010. Lecture Notes in Computer Science, vol 5987. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12104-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12104-3_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12103-6

  • Online ISBN: 978-3-642-12104-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics