Real-time task scheduling and network device security for complex embedded systems based on deep learning networks

https://doi.org/10.1016/j.micpro.2020.103282Get rights and content

Abstract

As a hotspot of machine learning research, deep learning is applied in many fields. Embedded systems are becoming more and more complex and networked, so the real-time performance of embedded systems and the security of network embedded devices face severe challenges. Based on this, this paper studies the real-time task scheduling problem for complex embedded systems and the security of embedded network devices. For real-time, this paper proposes a comprehensive task scheduling algorithm. Based on the task classification in the embedded system, different scheduling methods are adopted for different tasks, and the scheduling mode is flexibly changed as the system load changes. A dynamic integrity measurement model is established based on the star trust chain structure, and the hardware implementation mechanism of constructing dynamic trust chain in embedded system is studied. The dynamic reconfigurable hardware design method based on FPGA is applied to the construction of dynamic trust chain, and a verification system is designed to verify the dynamic measurement mechanism. This can solve the security problem of deep network embedded devices to a certain extent.

Introduction

Deep learning has become a hot topic in the field of machine learning research in the past decade. It has made a series of major breakthroughs in practical applications in many fields, such as speech recognition, natural language processing, image and video analysis, computer vision and multimedia. With the development of information technology, especially the popularity of computer network applications, computing platforms have evolved from a loosely coupled infrastructure of point-based isolated computing nodes to massive computing, mobile computing, cloud computing and none with distributed large-scale collaborative features [1,2]. Various organizational forms such as ubiquitous computing, have increased the security requirements for information system architecture, and the requirements for information security have also increased [3,4]. On the other hand, the increased diversity of features and complexity of computing leads to increased vulnerability of information systems and reduced security and reliability [5]. Therefore, in the development trend and security requirements of information systems, it is more and more difficult to realize the overall global security of information systems from top to bottom, and the importance of individual security of computing platforms is particularly prominent [6,7]. Only bottom-up guarantees the security and credibility of individual computing platforms, and the security of large platforms and large systems is guaranteed [8].

For the research of real-time problems in embedded systems, some basic concepts have been formed, such as hard real-time and soft real-time, preemptive scheduling and non-preemptive scheduling, etc. [9]. All related research work is centered around these concepts and some shaped scheduling algorithms have been formed, such as EDF and RM [10,11]. These scheduling algorithms can satisfy some simple embedded applications, but they cannot meet the real-time constraints of the next generation of increasingly complex embedded applications [12]. Research in the field of trusted computing has been ongoing [13]. The world's scientists have gathered various aspects to conduct comprehensive research on the optimization and application of technology, and with the cooperation of industry, university and research, a large number of trusted computing alliances have emerged [14,15]. Follow-up is the industry giant in the world of computer technology, of which Microsoft is the most typical representative, and the world-class institutions of higher learning represented by the Massachusetts Institute of Technology also participated in the alliance [16]. TCG is essentially different from the general alliance organization, because the organization is not a profit structure [17]. It is mainly to strengthen the research on computer security issues, thus promoting the establishment of security standards and making computer security more effective. Control system computers currently used in aerospace and other fields are fault-tolerant computers, and computers used in data storage and transmission are also secure computers based on cryptography [18]. The combination of fault-tolerant technology and security technology can achieve the effect of a trusted computer. At present, the research on reliability technology generally focuses on fault tolerance and testing, especially in the military industry, various products and systems have strict standards for reliability [19]. Some research institutions have invested a lot of energy in reliability technology research, and have experienced many technical problems, and successfully developed different types of fault-tolerant computers, which can be used in the development of high-performance equipment such as aviation and military [20]. In particular, fault-tolerant performance testers have played a role in the practical work of application systems in different fields [21,22]. The security mechanism is an implementation method that clarifies the security of the system. Based on the security policy, the specific implementation method of security protection for the system is studied. Security mechanisms can prevent attacks, detect attacks, or recover from an attack. In order to deal with security threats, an effective security mechanism can be established to ensure the security and reliability of information systems.

This paper first introduces the network layer structure and theoretical characteristics of the convolutional neural network, focuses on the working principle of the convolutional layer and the pooling layer, and does a network structure analysis to understand deep learning and convolutional neural networks from the principle. Secondly, the core technology in the embedded system is elaborated, including the architecture of the embedded operating system. The information security technology is summarized, which is one of the technical foundations for constructing a secure embedded system. This paper proposes an integrated task scheduling algorithm. ITS divides all embedded application tasks into three categories, mission-critical, real-time, and non-real-time. ITS can ensure better real-time performance of the system and achieve higher overall system performance. ITS is aimed at the next generation of intelligent, networked, and universal embedded systems. After further research and improvement, it can be used in all embedded applications. Based on the research of dynamic measurement mechanism in trusted computing, the mechanism of establishing dynamic trust chain on FPGA-based hardware platform and the corresponding measurement model and method are proposed. The trusted root of trusted metric is solved in the design of trusted PC. Combined with the hardware mechanism guarantee provided in the system architecture, a dynamic integrity measurement model is established from the complete trusted measurement mechanism, and the dynamic reconfigurable design method is used to study the dynamic trust chain of the system runtime.

The rest of this article is organized as follows. Section 2 discusses the deep learning and security deep network embedded system, followed by the real-time integrated task scheduling method of the embedded system in Section 3. Section 4 analyzes the embedded system hardware security mechanism of the dynamic trust chain. Section 5 summarizes the full text and points out future research directions.

Section snippets

Convolutional neural networks

The scope of deep learning is very wide. Automatic encoders, sparse coding, restricted Boltzmann machines, deep confidence networks and convolutional neural networks are common models or methods for deep learning. For different network structures, the number of layers of the convolutional neural network and the composition of each part may have different descriptions, but the basic components are very close. Fig. 1 shows the general process of processing input images using convolutional neural

Real-time task scheduling

A real-time system is a system that is predictable for any input, even if many inputs are unpredictable. In a real-time system, the task scheduler must multiplex hardware resources across many tasks and ensure that the final time limit of the task is met.

1) Rate Monotonic Scheduling (RM)

In RM, the static task priority is inversely proportional to the task's period. Since the RM considers that the period of the task is constant, the priority of the task is determined at the time of task

Trust chain working mechanism

The trust chain mechanism is the core mechanism of trusted computing. The trust chain takes the root of trust as the starting point, and measures the hardware, operating system and application in the startup process step by step. The trusted computing platform integrity reporting model is shown in Fig. 5.

In the architecture scheme of the trusted PC, CRTM is used as the first piece of program code in the BIOS to implement the integrity measurement of the components that are started later, so it

Conclusion

This paper focuses on the related concepts and principles of deep learning and convolutional neural networks. With the development of embedded systems, the real-time performance of embedded systems and the security of embedded devices in deep networks are facing new challenges. This paper has solved these two problems very well. The integrated task scheduling adopts different scheduling modes for different tasks, and also performs flexible transition scheduling mode as the system load changes.

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Junyan Zhou was born in Henan, China, in 1982. From 2001 to 2005, she studied in Henan Normal University and received her Bachelor's degree in 2005. From 2008 to 2010, she studied in Wuhan University of Technology and received her Master's degree in 2010. Since 2005, she has worked in Xinlian College of Henan Normal University. She has published a total of 9 papers. Her research interests are included Computer applications and Communication Engineering.

References (22)

  • M. Ansari et al.

    Peak power management to meet thermal design power in fault-tolerant embedded systems

    IEEE Trans. Parallel Distrib. Syst.

    (2019)
  • M. Chen et al.

    Uniform regularity for a Keller-Segel-Navier-Stokes system

    Appl. Math. Lett.

    (September 2020)
  • M. Magno et al.

    An energy efficient E-skin embedded system for real-time tactile data decoding

    J. Low Power Electron.

    (2018)
  • W. Zheng et al.

    Integrating task scheduling and cache locking for multicore real-time embedded systems

    ACM Sigplan Notices

    (2017)
  • T.G. Cervero et al.

    A scalable and dynamically reconfigurable FPGA-based embedded system for real-time hyperspectral unmixing

    IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens.

    (2017)
  • A. Ahmad et al.

    Special issue on real-time image and video processing in mobile embedded systems

    J. Real-Time Image Proc.

    (2017)
  • Z. Wang et al.

    Optimizated allocation of data variables to PCM/DRAM-based hybrid main memory for real-time embedded systems

    IEEE Embed. Syst. Lett.

    (2017)
  • H. Mao et al.

    Towards real-time object detection on embedded systems

    IEEE Trans. Emerg. Top. Comput.

    (2018)
  • L. Niu et al.

    Reliability-aware energy management for embedded real-time systems with (m, k)-hard timing constraint

    J. Signal Process. Syst.

    (2018)
  • S. Lucia et al.

    Optimized FPGA implementation of model predictive control for embedded systems using high-level synthesis tool

    IEEE Trans. Ind. Inf.

    (2018)
  • E.F.F. Jr et al.

    Analysis of two-phase flow pattern identification methodologies for embedded systems

    IEEE Lat. Am. Trans.

    (2018)
  • Cited by (34)

    • A systematic review on security aware real-time task scheduling

      2023, Sustainable Computing: Informatics and Systems
    • COVID-19 diagnosis via chest X-ray image classification based on multiscale class residual attention

      2022, Computers in Biology and Medicine
      Citation Excerpt :

      Therefore, an effective and efficient CXR image understanding method of COVID-19 diagnosis becomes urgent to prevent the virus continues to spread. With the emerge of deep neural networks (DNNs) [9–14], especially convolutional neural networks (CNNs), they leverage multi-level layer neural networks for representational learning and are widely used for image classification [15,16], object detection [17,18] and semantic segmentation [19]. Naturally, DNNs are very good at detecting COVID-19 [20–25].

    • Simulation of English translation text filtering based on machine learning and embedded system

      2021, Microprocessors and Microsystems
      Citation Excerpt :

      Jargon is unsurprising, free mode, with no words. In wording mode, choosing speculating could reasonably be expected at the most significant level label exhibit [19]. Assessment of the proposed neural organization properties, for example, triggers, power, delay, exactness, review and F-measure.

    View all citing articles on Scopus

    Junyan Zhou was born in Henan, China, in 1982. From 2001 to 2005, she studied in Henan Normal University and received her Bachelor's degree in 2005. From 2008 to 2010, she studied in Wuhan University of Technology and received her Master's degree in 2010. Since 2005, she has worked in Xinlian College of Henan Normal University. She has published a total of 9 papers. Her research interests are included Computer applications and Communication Engineering.

    View full text