IMPLEMENTING SOFTWARE ISOLATION IN RESOURCE-CONSTRAINED EMBEDDED SYSTEMS

Authors

  • Anushree Nagvekar AEye Inc, USA. Author

DOI:

https://doi.org/10.34218/IJCET_16_01_257

Keywords:

Containerization, Embedded Systems, Resource Optimization, Software Isolation, Virtualization

Abstract

This article explores the challenges and solutions of implementing software isolation in resource-constrained embedded systems. While traditional containerization technologies have revolutionized application deployment in cloud environments, their implementation in embedded systems presents unique challenges due to resource limitations and real-time requirements. The article examines various approaches to achieving effective isolation, focusing on lightweight alternatives that leverage RTOS features and architectural design patterns. Through analysis of current research and implementation strategies, the article demonstrates how optimized isolation mechanisms can maintain system integrity while minimizing resource overhead. The article presents empirical evidence supporting the effectiveness of lightweight isolation approaches, particularly in safety-critical applications and IoT devices, where traditional containerization proves impractical. The article highlights the importance of careful system analysis, architecture design, and validation methodologies in achieving robust isolation without compromising performance or reliability.

References

Suraj Gujar, et al., "Embedded Systems Market Size - By Component (Hardware, Software), By Application (Automotive, Consumer Electronics, Manufacturing, Retail, Media & Entertainment, Military & Defense, Telecom), By Function & Forecast, 2024 - 2032," Global Market Insights Inc., 2024. [Online]. Available: https://www.gminsights.com/industry-analysis/embedded-system-market

Shadi Al-Sarawi, et al., "Internet of Things Market Analysis Forecasts, 2020–2030," Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), 2020. [Online]. Available: https://ieeexplore.ieee.org/document/9210375

Roberto Morabito, et al., "Hypervisors vs. Lightweight Virtualization: a Performance Comparison," IEEE International Conference on Cloud Engineering, 2015. [Online]. Available: https://faculty.washington.edu/wlloyd/courses/tcss562/research_papers/T3_Hypervisors_vs_Lightweight_Virtualization_A_Performance_Comparison.pdf

Qi Zhang, et al., "A Comparative Study of Containers and Virtual Machines in Big Data Environment," ResearchGate, 2018. [Online]. Available: https://www.researchgate.net/publication/326223152_A_Comparative_Study_of_Containers_and_Virtual_Machines_in_Big_Data_Environment

Mahmoud Ammar, et al., "Internet of Things: A survey on the security of IoT frameworks," Journal of Information Security and Applications, Volume 38, February 2018, Pages 8-27. [Online]. Available: https://www.sciencedirect.com/science/article/abs/pii/S2214212617302934

Sandro Pinto, et al., "LTZVisor: TrustZone is the Key," 29th Euromicro Conference on Real-Time Systems (ECRTS 2017). [Online]. Available: https://drops.dagstuhl.de/storage/00lipics/lipics-vol076-ecrts2017/LIPIcs.ECRTS.2017.4/LIPIcs.ECRTS.2017.4.pdf

Gernot Heiser, et al., "L4 Microkernels: The Lessons from 20 Years of Research and Deployment," ACM Transactions on Computer Systems, Vol. 34, No. 1, Article 1, Publication date: April 2016. [Online]. Available: https://trustworthy.systems/publications/nicta_full_text/8988.pdf

Sandro Pinto, et al., "Towards a TrustZone-assisted Hypervisor for Real-Time Embedded Systems," IEEE Computer Architecture Letters, 2016. [Online]. Available: https://sandro2pinto.github.io/files/ieeecal2017-tz.pdf

Fernando del Ama Gonzalo, et al., "Non-intrusive electric power monitoring system in multi-purpose educational buildings," International Journal of Power Electronics and Drive Systems (IJPEDS) 10(3):1297, 2019. [Online]. Available: https://www.researchgate.net/publication/338193824_Non-intrusive_electric_power_monitoring_system_in_multi-purpose_educational_buildings

Patrick Graydon, et al., "Safety Assurance Driven Problem Formulation for Mixed-Criticality Scheduling," Mälardalen University Press, 2015. [Online]. Available: https://www.es.mdu.se/pdf_publications/3476.pdf

Lei Xun, et al., "Optimising Resource Management for Embedded Machine Learning," ResearchGate Publication, 2021. [Online]. Available: https://www.researchgate.net/publication/351477816_Optimising_Resource_Management_for_Embedded_Machine_Learning

Piotr Dziurzanski, et al., "Value-Based Allocation of Docker Containers," University of York, 2018. [Online]. Available: https://eprints.whiterose.ac.uk/126152/1/DockerScheduling_v6short.pdf

Downloads

Published

2025-02-19

How to Cite

Anushree Nagvekar. (2025). IMPLEMENTING SOFTWARE ISOLATION IN RESOURCE-CONSTRAINED EMBEDDED SYSTEMS. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND TECHNOLOGY, 16(01), 3733-3746. https://doi.org/10.34218/IJCET_16_01_257