计算机科学 ››2025,Vol. 52 ››Issue (4): 33-39.doi:10.11896/jsjkx.241100020
何瑞琦1, 张凯龙1, 吴金飞1, 于强2, 张家铭1
HE Ruiqi1, ZHANG Kailong1, WU Jinfei1, YU Qiang2, ZHANG Jiaming1
摘要:针对当前嵌入式系统的混合部署需求和功能安全需求,提出了一种动态异构冗余的操作系统架构DHR-OS。面向混合部署需求,该架构设计了异构操作系统的混合部署模式,即在多核CPU上以Linux为主操作系统,动态部署RTOS从操作系统镜像。同时,为了操作系统间的协同工作,利用OpenAMP(Open Asymmetric Multi-Processing)实现了主从操作系统间的通信,并基于OpenAMP进一步实现了设备驱动的时分复用、远程过程调用(Remote Procedure Call,RPC)、中断转发路由机制。面向功能安全需求,该架构设计了一套调度、分发、裁决为一体的关键任务安全执行机制。具体地,Linux操作系统事先对RTOS核心做池化处理,当执行关键任务时,从RTOS内核池中调度若干RTOS核心作为任务执行环境,在Linux侧的裁决器基于加权投票的分布式共识算法,处理RTOS核心任务返回的结果。通过上述设计增强了系统的灵活性和抗攻击能力。该工作为嵌入式系统的混合部署和功能安全需求提供了一种新的系统架构解决方案,具有一定创新性和实用价值。
中图分类号:
何瑞琦, 张凯龙, 吴金飞, 于强, 张家铭.基于多核异构操作系统的动态冗余可靠机制研究[J]. 计算机科学, 2025, 52(4): 33-39. https://doi.org/10.11896/jsjkx.241100020
HE Ruiqi, ZHANG Kailong, WU Jinfei, YU Qiang, ZHANG Jiaming.Research on Dynamic Redundancy Reliability Mechanisms Based on Multi-core HeterogeneousOperating Systems[J]. Computer Science, 2025, 52(4): 33-39. https://doi.org/10.11896/jsjkx.241100020
[1]PINTO R,TORRES P M B,LOHWEG V.Closing editorial:Advances and future directions in autonomous systems for cyber-physical systems and smart industry[J].Applied Sciences,2024,14(22):10673. [2]SINGH J,SINGH A,SINGH H,et al.Implementation and evaluation of a smart machine monitoring system under industry 4.0 concept[J].Journal of Industrial Information Integration,2025,43:100746. [3]CHANDRA S,SAMUEL M,EUGENE V E,et al.Review of the security of backward-compatible automotive inter-ecu communication[J].IEEE Access,2021,9:114854-114869. [4]QU W,YU F H.Survey of Research on Asymmetric Embedded System Based on Multi-core Processor[J].Computer Science,2021,48(S1):538-542. [5]WANG Z.Application of Virtualization Technology in Computer Systems[J].Integrated Circuit Applications,2024,41(10):66-67. [6]ROHLIN A,FAHLGREN H,PERICÀS M.High performancescheduling of mixed-modedags on heterogeneous multicores[J].arXiv:1901.05907,2019. [7]ZHAO W F,ZHAO Y.Research on key technologies of multi-core processor systems[J].Digital Technology and Applications,2023,41(3):123-125. [8]ZHANG M Y,ZHANG Q Y,MENG Z Q.A survey of research on real-time dual-OS architecture for embedded platform[J].Acta Electronica Sinica,2018,46(11):2787-96. [9]KONG X Z.Research and Implementation of Embedded Real-time Operating System for SMP Architecture DSP[D].Xi'an:Xidian University,2013. [10]WU J X.Introduction to Cyberspace Mimic Defense[M].Beijing:Science Press,2017. [11]LI S Y.Application and development trends of virtualizationtechnology in computer network security[N].Anhui Science and Technology News,2024-10-18. [12]PENG A N,ZHOU W,JIAY,et al.Survey of the Internet of things operating system security[J].Journal on Communications,2018,39(3):22-34. [13]BABAR S,STANGO A,PRASAD N,et al.Proposed embeddedsecurity framework for Internet of things(IoT)[C]//2011 2nd International Conference on Wireless Communication,Vehicular Technology,Information Theory and Aerospace & Electronics Systems Technology(Wireless VITAE).2011:1-5. [14]JIN Y.Embedded system security in smart consumer electronics[C]//The 4th International Workshop on Trustworthy Embedded Devices.2014. [15]LIU S.Design and development of a security kernel in an embedded system[J].International Journal of Control & Automation,2014,7(11):49-58. [16]AZAB A M,SWIDOWSKI K,BHUTKAR R,et al.SKEE:alightweight secure kernel-level execution environment for ARM[C]//NDSS.2016. [17]BATES A,TIAN D,BUTLER K R B,et al.Trustworthy whole-system provenance for the Linux kernel[C]//Usenix Conference on Security Symposium.2015:319-334. [18]DYER J G,LINDEMANN M,PEREZ R,et al.Building the IBM 4758 secure coprocessor[J].Computer,2001,34(10):57-66. [19]ZHAO L,LI G,SUTTER B D,et al.ARMor:fully verified software fault isolation[C]//The International Conference on Embedded Software.2011:289-298. [20]WU J X.Introduction to Cyberspace Mimic Defense[M].Beijing:Science Press,2017. [21]OUYANG L,SONG K,LAN J L.Design and Implementation ofMicrocontroller Based on Dynamic Heterogeneous Redundancy Architecture[J].Acta Electronica Sinica,2023,20(9):144-159. |
|