A Distributed WCET Computation Scheme for Smart Card Operating Systems
نویسندگان
چکیده
Smart card operating systems have to face very hard constraints in terms of available memory space and computing power. Nonetheless, the specifications of most smart card platforms impose strict deadlines for communications between the card and the terminal to which it is connected. This advocates the real time paradigm to guarantee response times and thus introduces the need for computation of WCET on these very constrained devices. Besides, smart card operating systems have very strict security requirements which must be taken into account by all parts of the operating system, including the WCET computation algorithm. Unfortunately, most of the classical algorithms for computing WCET do not address resourcelimitation or security issues. We propose in this paper a novel scheme for safely computing WCET on a very constrained device such as a smart card. We first present the Camille operating system for smart cards, and then describe the main issues when computing WCET on very constrained devices. We then detail the architecture we propose to compute WCET in the Camille operating system and illustrate it on an example of a simple embedded algorithm. We conclude by presenting the future work we plan to conduct.
منابع مشابه
Smart Card Operating Systems: Past, Present and Future
Over the last twenty years, the software in smart cards has radically changed. This has happened for several reasons, smart card software was initially rigid and monolithic and has now become more flexible with a clear separation between “operating system level” and “application level” parts. What is more, application-level resources are now much more accessible (nearly to end user level). Neve...
متن کاملA Secured and Improved Dynamic ID based Remote User Authentication Scheme using Smart Card and Hash Function for Distributed Systems
Abstract—Authentication is a major concern for accessing remote service residing over on server in an distributed systems. It is difficult to remember different identities and passwords for users. In order to solve the flaws encountered in many remote user authentication schemes in multi-server environment, only authentic user login to the remote server has been used. These remote schemes resis...
متن کاملAssessing the Future of Smart Card Operating Systems
This paper aims at presenting past issues, present work, future challenges and work in progress in smart cards operating system design. Smart cards are built to be tamper-resistant platforms whose goal is to serve their owner and to ensure that all interactions between them and the different information systems they are likely to face with, are as safe as possible. The quest for tamper-resistan...
متن کاملTowards testability in smart card operating system design
The operating system of a smart card is a safety critical system. Distributed in millions, smart cards with their small 8-bit CPU support applications where transferred values are only protected by the strength of a cryptographic protocol. This strength goes no further than the implementation of the software in the card and terminal allows. Because of its complexity, to guarantee absolute relia...
متن کاملWeakness and Improvement of the Smart Card Based Remote User Authentication Scheme with Anonymity
Today, people benefit various services through networks. However, due to the open environment of communications, networks are vulnerable to variety of security risks. Remote access capability is one of the critical functions for network systems. The remote user authentication scheme provides the server a convenient way to authenticate users before they are allowed to access database and obtain ...
متن کامل