IMPLEMENTING SOFTWARE ISOLATION IN RESOURCE-CONSTRAINED EMBEDDED SYSTEMS
DOI:
https://doi.org/10.34218/IJCET_16_01_257Keywords:
Containerization, Embedded Systems, Resource Optimization, Software Isolation, VirtualizationAbstract
This article explores the challenges and solutions of implementing software isolation in resource-constrained embedded systems. While traditional containerization technologies have revolutionized application deployment in cloud environments, their implementation in embedded systems presents unique challenges due to resource limitations and real-time requirements. The article examines various approaches to achieving effective isolation, focusing on lightweight alternatives that leverage RTOS features and architectural design patterns. Through analysis of current research and implementation strategies, the article demonstrates how optimized isolation mechanisms can maintain system integrity while minimizing resource overhead. The article presents empirical evidence supporting the effectiveness of lightweight isolation approaches, particularly in safety-critical applications and IoT devices, where traditional containerization proves impractical. The article highlights the importance of careful system analysis, architecture design, and validation methodologies in achieving robust isolation without compromising performance or reliability.
References
Suraj Gujar, et al., "Embedded Systems Market Size - By Component (Hardware, Software), By Application (Automotive, Consumer Electronics, Manufacturing, Retail, Media & Entertainment, Military & Defense, Telecom), By Function & Forecast, 2024 - 2032," Global Market Insights Inc., 2024. [Online]. Available: https://www.gminsights.com/industry-analysis/embedded-system-market
Shadi Al-Sarawi, et al., "Internet of Things Market Analysis Forecasts, 2020–2030," Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), 2020. [Online]. Available: https://ieeexplore.ieee.org/document/9210375
Roberto Morabito, et al., "Hypervisors vs. Lightweight Virtualization: a Performance Comparison," IEEE International Conference on Cloud Engineering, 2015. [Online]. Available: https://faculty.washington.edu/wlloyd/courses/tcss562/research_papers/T3_Hypervisors_vs_Lightweight_Virtualization_A_Performance_Comparison.pdf
Qi Zhang, et al., "A Comparative Study of Containers and Virtual Machines in Big Data Environment," ResearchGate, 2018. [Online]. Available: https://www.researchgate.net/publication/326223152_A_Comparative_Study_of_Containers_and_Virtual_Machines_in_Big_Data_Environment
Mahmoud Ammar, et al., "Internet of Things: A survey on the security of IoT frameworks," Journal of Information Security and Applications, Volume 38, February 2018, Pages 8-27. [Online]. Available: https://www.sciencedirect.com/science/article/abs/pii/S2214212617302934
Sandro Pinto, et al., "LTZVisor: TrustZone is the Key," 29th Euromicro Conference on Real-Time Systems (ECRTS 2017). [Online]. Available: https://drops.dagstuhl.de/storage/00lipics/lipics-vol076-ecrts2017/LIPIcs.ECRTS.2017.4/LIPIcs.ECRTS.2017.4.pdf
Gernot Heiser, et al., "L4 Microkernels: The Lessons from 20 Years of Research and Deployment," ACM Transactions on Computer Systems, Vol. 34, No. 1, Article 1, Publication date: April 2016. [Online]. Available: https://trustworthy.systems/publications/nicta_full_text/8988.pdf
Sandro Pinto, et al., "Towards a TrustZone-assisted Hypervisor for Real-Time Embedded Systems," IEEE Computer Architecture Letters, 2016. [Online]. Available: https://sandro2pinto.github.io/files/ieeecal2017-tz.pdf
Fernando del Ama Gonzalo, et al., "Non-intrusive electric power monitoring system in multi-purpose educational buildings," International Journal of Power Electronics and Drive Systems (IJPEDS) 10(3):1297, 2019. [Online]. Available: https://www.researchgate.net/publication/338193824_Non-intrusive_electric_power_monitoring_system_in_multi-purpose_educational_buildings
Patrick Graydon, et al., "Safety Assurance Driven Problem Formulation for Mixed-Criticality Scheduling," Mälardalen University Press, 2015. [Online]. Available: https://www.es.mdu.se/pdf_publications/3476.pdf
Lei Xun, et al., "Optimising Resource Management for Embedded Machine Learning," ResearchGate Publication, 2021. [Online]. Available: https://www.researchgate.net/publication/351477816_Optimising_Resource_Management_for_Embedded_Machine_Learning
Piotr Dziurzanski, et al., "Value-Based Allocation of Docker Containers," University of York, 2018. [Online]. Available: https://eprints.whiterose.ac.uk/126152/1/DockerScheduling_v6short.pdf
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Anushree Nagvekar (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.