Optimal checkpointing for secure intermittently-powered IoT devices

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Energy harvesting is a promising solution to power Internet of Things (IoT) devices. Due to the intermittent nature of these energy sources, one cannot guarantee forward progress of program execution. Prior work has advocated for checkpointing the intermediate state to off-chip non-volatile memory (NVM). Encrypting checkpoints addresses the security concern, but significantly increases the checkpointing overheads. In this paper, we propose a new online checkpointing policy that judiciously determines when to checkpoint so as to minimize application time to completion while guaranteeing security. Compared to state-of-the-art checkpointing schemes that do not account for the overheads of encrypted checkpoints we improve execution time up to 1.4 x.

Original languageEnglish (US)
Title of host publication2017 IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages376-383
Number of pages8
Volume2017-November
ISBN (Electronic)9781538630938
DOIs
StatePublished - Dec 13 2017
Event36th IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2017 - Irvine, United States
Duration: Nov 13 2017Nov 16 2017

Other

Other36th IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2017
CountryUnited States
CityIrvine
Period11/13/1711/16/17

Fingerprint

Energy harvesting
Data storage equipment
Internet of things

ASJC Scopus subject areas

  • Software
  • Computer Science Applications
  • Computer Graphics and Computer-Aided Design

Cite this

Ghodsi, Z., Garg, S., & Karri, R. (2017). Optimal checkpointing for secure intermittently-powered IoT devices. In 2017 IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2017 (Vol. 2017-November, pp. 376-383). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICCAD.2017.8203802

Optimal checkpointing for secure intermittently-powered IoT devices. / Ghodsi, Zahra; Garg, Siddharth; Karri, Ramesh.

2017 IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2017. Vol. 2017-November Institute of Electrical and Electronics Engineers Inc., 2017. p. 376-383.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ghodsi, Z, Garg, S & Karri, R 2017, Optimal checkpointing for secure intermittently-powered IoT devices. in 2017 IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2017. vol. 2017-November, Institute of Electrical and Electronics Engineers Inc., pp. 376-383, 36th IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2017, Irvine, United States, 11/13/17. https://doi.org/10.1109/ICCAD.2017.8203802
Ghodsi Z, Garg S, Karri R. Optimal checkpointing for secure intermittently-powered IoT devices. In 2017 IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2017. Vol. 2017-November. Institute of Electrical and Electronics Engineers Inc. 2017. p. 376-383 https://doi.org/10.1109/ICCAD.2017.8203802
Ghodsi, Zahra ; Garg, Siddharth ; Karri, Ramesh. / Optimal checkpointing for secure intermittently-powered IoT devices. 2017 IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2017. Vol. 2017-November Institute of Electrical and Electronics Engineers Inc., 2017. pp. 376-383
@inproceedings{4d5d3b98a99a49ffba7a423bec4395c2,
title = "Optimal checkpointing for secure intermittently-powered IoT devices",
abstract = "Energy harvesting is a promising solution to power Internet of Things (IoT) devices. Due to the intermittent nature of these energy sources, one cannot guarantee forward progress of program execution. Prior work has advocated for checkpointing the intermediate state to off-chip non-volatile memory (NVM). Encrypting checkpoints addresses the security concern, but significantly increases the checkpointing overheads. In this paper, we propose a new online checkpointing policy that judiciously determines when to checkpoint so as to minimize application time to completion while guaranteeing security. Compared to state-of-the-art checkpointing schemes that do not account for the overheads of encrypted checkpoints we improve execution time up to 1.4 x.",
author = "Zahra Ghodsi and Siddharth Garg and Ramesh Karri",
year = "2017",
month = "12",
day = "13",
doi = "10.1109/ICCAD.2017.8203802",
language = "English (US)",
volume = "2017-November",
pages = "376--383",
booktitle = "2017 IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2017",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Optimal checkpointing for secure intermittently-powered IoT devices

AU - Ghodsi, Zahra

AU - Garg, Siddharth

AU - Karri, Ramesh

PY - 2017/12/13

Y1 - 2017/12/13

N2 - Energy harvesting is a promising solution to power Internet of Things (IoT) devices. Due to the intermittent nature of these energy sources, one cannot guarantee forward progress of program execution. Prior work has advocated for checkpointing the intermediate state to off-chip non-volatile memory (NVM). Encrypting checkpoints addresses the security concern, but significantly increases the checkpointing overheads. In this paper, we propose a new online checkpointing policy that judiciously determines when to checkpoint so as to minimize application time to completion while guaranteeing security. Compared to state-of-the-art checkpointing schemes that do not account for the overheads of encrypted checkpoints we improve execution time up to 1.4 x.

AB - Energy harvesting is a promising solution to power Internet of Things (IoT) devices. Due to the intermittent nature of these energy sources, one cannot guarantee forward progress of program execution. Prior work has advocated for checkpointing the intermediate state to off-chip non-volatile memory (NVM). Encrypting checkpoints addresses the security concern, but significantly increases the checkpointing overheads. In this paper, we propose a new online checkpointing policy that judiciously determines when to checkpoint so as to minimize application time to completion while guaranteeing security. Compared to state-of-the-art checkpointing schemes that do not account for the overheads of encrypted checkpoints we improve execution time up to 1.4 x.

UR - http://www.scopus.com/inward/record.url?scp=85043522516&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85043522516&partnerID=8YFLogxK

U2 - 10.1109/ICCAD.2017.8203802

DO - 10.1109/ICCAD.2017.8203802

M3 - Conference contribution

AN - SCOPUS:85043522516

VL - 2017-November

SP - 376

EP - 383

BT - 2017 IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2017

PB - Institute of Electrical and Electronics Engineers Inc.

ER -