Work-In-Progress: Safe and Secure Configuration Synthesis for TSN using Constraint Programming

Niklas Reusch, Paul Pop, Silviu S. Craciunas

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Abstract

Time-Sensitive Networking (TSN) extends IEEE 802.1 Ethernet for safety-critical and real-time applications in several areas, e.g., automotive, aerospace or industrial automation. However, many of these systems also have stringent security requirements, and security attacks may impair safety. Given a TSN-based distributed architecture, a set of applications with tasks and messages, as well as a set of security and redundancy requirements, we are interested to synthesize a system configuration such that the real-time, safety and security requirements are satisfied. We use the Timed Efficient Stream Loss-Tolerant Authentication (TESLA) low-resource multicast authentication protocol to guarantee the security requirements, and redundant disjunct message routes to tolerate link failures. We consider that the tasks are scheduled using static cyclic scheduling and that the messages use the time-sensitive traffic class in TSN, which relies on schedule tables (called Gate Control Lists, GCLs) in the network switches. A configuration consists of the schedule tables for tasks as well as the disjoint routes and GCLs for messages. We propose a Constraint Programming-based formulation for this problem and we evaluate it on several test cases.

Original languageEnglish
Title of host publicationProceedings of IEEE 41st Real-Time Systems Symposium
PublisherIEEE
Publication dateDec 2020
Pages387-390
Article number9355570
ISBN (Electronic)9781728183244
DOIs
Publication statusPublished - Dec 2020
Event41st IEEE Real-Time Systems Symposium - Virtual, Houston, United States
Duration: 1 Dec 20204 Dec 2020
Conference number: 41

Conference

Conference41st IEEE Real-Time Systems Symposium
Number41
CountryUnited States
CityVirtual, Houston
Period01/12/202004/12/2020
SeriesProceedings - Real-Time Systems Symposium
Volume2020-December
ISSN1052-8725

Bibliographical note

Publisher Copyright:
© 2020 IEEE.

Keywords

  • 802.1CB
  • 802.1Qbv
  • Constraint Programming
  • Real time
  • Redundancy
  • Safety critical
  • TESLA
  • TSN

Fingerprint Dive into the research topics of 'Work-In-Progress: Safe and Secure Configuration Synthesis for TSN using Constraint Programming'. Together they form a unique fingerprint.

Cite this