Scheduling Real-Time Applications on Edge Computing Platforms with Remote Attestation for Security

Niklas Reusch, Paul Pop

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review


Edge Computing Platforms (ECP) increasingly integrate applications with mixed-criticality requirements. In this paper, we consider that critical applications and Edge applications share an ECP. Critical applications are implemented as periodic hard real-time tasks and messages and have stringent timing and security requirements. Edge applications are implemented as aperiodic tasks and messages, and are not critical. We assume that the critical tasks are scheduled using static cyclic scheduling, Time-Sensitive Networking (TSN) is used for dependable communication, and Remote Attestation (RA) is employed to check that the platform components are secure. We formulate an optimization problem for the joint scheduling of critical and Edge applications, such that (i) the deadlines of the critical applications are guaranteed at design-time, (ii) the platform has resources to perform RA, and (iii) we can successfully accommodate multiple dynamic responsive Edge applications at runtime. We evaluate our approach on a realistic use case. The results show that our approach generates dependable schedules that can meet the timing constraints of the critical applications, have enough periodic slack to perform RA for security, and can accommodate Edge applications with a shorter response time.
Original languageEnglish
Title of host publicationProceedings of 2021 IEEE/ACM Symposium on Edge Computing
Publication date2021
ISBN (Print)978-1-6654-5812-2
Publication statusPublished - 2021
Event2021 ACM/IEEE 6th Symposium on Edge Computing - San Jose, United States
Duration: 14 Dec 202117 Dec 2021


Conference2021 ACM/IEEE 6th Symposium on Edge Computing
Country/TerritoryUnited States
CitySan Jose


Dive into the research topics of 'Scheduling Real-Time Applications on Edge Computing Platforms with Remote Attestation for Security'. Together they form a unique fingerprint.

Cite this