Computer Science ›› 2025, Vol. 52 ›› Issue (4): 33-39.doi: 10.11896/jsjkx.241100020

• Smart Embedded Systems • Previous Articles     Next Articles

Research on Dynamic Redundancy Reliability Mechanisms Based on Multi-core HeterogeneousOperating Systems

HE Ruiqi1, ZHANG Kailong1, WU Jinfei1, YU Qiang2, ZHANG Jiaming1   

  1. 1 School of Software,Northwestern Polytechnical University,Xi’an 710129,China
    2 School of Computer Science,Northwestern Polytechnical University,Xi’an 710129,China
  • Received:2024-11-04 Revised:2025-01-31 Online:2025-04-15 Published:2025-04-14
  • About author:HE Ruiqi,born in 1999,postgraduate,is a member of CCF(No.Q0031G).His main research interests include embedded system design and so on.
    ZHANG Kailong,born in 1977,professor,is a distinguished member of CCF(No.08116D).His main researchin-terests include adaptive embedded real-time computing and intelligent systems.
  • Supported by:
    National Natural Science Foundation of China (61972318),Key R&D Program of Shaanxi Province(2023-GHZD-47) and Shanghai Aerospace Technology Research Institute Industry University Research Cooperation Fund Project(SAST2024-007).

Abstract: In response to the hybrid deployment requirements and functional safety needs of current embedded systems,this paper proposes a dynamic heterogeneous redundant operating system architecture,DHR-OS.Designed for hybrid deployment,the architecture features a mixed deployment model of heterogeneous operating systems,where Linux serves as the primary operating system on a multi-core CPU,while RTOS is dynamically deployed from the operating system image.To facilitate collaboration between operating systems,communication between the master and slave operating systems is implemented using OpenAMP.Furthermore,based on OpenAMP,mechanisms for time-division multiplexing of device drivers,remote RPC calls,and interrupt forwarding routing are established.To address functional safety requirements,the architecture includes a critical task safety execution mechanism that integrates scheduling,dispatching,and adjudication.Specifically,the Linux operating system pre-processes a pool of RTOS cores.When executing critical tasks,several RTOS cores are scheduled from this pool to serve as the task execution environment.The adjudicator on the Linux side processes the results returned by the RTOS core tasks using a distributed consensus algorithm based on weighted voting.This design enhances the system’s flexibility and resilience against attacks,providing a novel architectural solution to the hybrid deployment and functional safety needs of embedded systems,with significant innovation and practical value.

Key words: Dynamic heterogeneous redundancy, Hybrid deployment, Functional safety, Distributed consensus

CLC Number: 

  • TP316
[1]PINTO R,TORRES P M B,LOHWEG V.Closing editorial:Advances and future directions in autonomous systems for cyber-physical systems and smart industry[J].Applied Sciences,2024,14(22):10673.
[2]SINGH J,SINGH A,SINGH H,et al.Implementation and evaluation of a smart machine monitoring system under industry 4.0 concept[J].Journal of Industrial Information Integration,2025,43:100746.
[3]CHANDRA S,SAMUEL M,EUGENE V E,et al.Review of the security of backward-compatible automotive inter-ecu communication[J].IEEE Access,2021,9:114854-114869.
[4]QU W,YU F H.Survey of Research on Asymmetric Embedded System Based on Multi-core Processor[J].Computer Science,2021,48(S1):538-542.
[5]WANG Z.Application of Virtualization Technology in Computer Systems[J].Integrated Circuit Applications,2024,41(10):66-67.
[6]ROHLIN A,FAHLGREN H,PERICÀS M.High performancescheduling of mixed-modedags on heterogeneous multicores[J].arXiv:1901.05907,2019.
[7]ZHAO W F,ZHAO Y.Research on key technologies of multi-core processor systems[J].Digital Technology and Applications,2023,41(3):123-125.
[8]ZHANG M Y,ZHANG Q Y,MENG Z Q.A survey of research on real-time dual-OS architecture for embedded platform[J].Acta Electronica Sinica,2018,46(11):2787-96.
[9]KONG X Z.Research and Implementation of Embedded Real-time Operating System for SMP Architecture DSP[D].Xi'an:Xidian University,2013.
[10]WU J X.Introduction to Cyberspace Mimic Defense[M].Beijing:Science Press,2017.
[11]LI S Y.Application and development trends of virtualizationtechnology in computer network security[N].Anhui Science and Technology News,2024-10-18.
[12]PENG A N,ZHOU W,JIAY,et al.Survey of the Internet of things operating system security[J].Journal on Communications,2018,39(3):22-34.
[13]BABAR S,STANGO A,PRASAD N,et al.Proposed embeddedsecurity framework for Internet of things(IoT)[C]//2011 2nd International Conference on Wireless Communication,Vehicular Technology,Information Theory and Aerospace & Electronics Systems Technology(Wireless VITAE).2011:1-5.
[14]JIN Y.Embedded system security in smart consumer electronics[C]//The 4th International Workshop on Trustworthy Embedded Devices.2014.
[15]LIU S.Design and development of a security kernel in an embedded system[J].International Journal of Control & Automation,2014,7(11):49-58.
[16]AZAB A M,SWIDOWSKI K,BHUTKAR R,et al.SKEE:alightweight secure kernel-level execution environment for ARM[C]//NDSS.2016.
[17]BATES A,TIAN D,BUTLER K R B,et al.Trustworthy whole-system provenance for the Linux kernel[C]//Usenix Conference on Security Symposium.2015:319-334.
[18]DYER J G,LINDEMANN M,PEREZ R,et al.Building the IBM 4758 secure coprocessor[J].Computer,2001,34(10):57-66.
[19]ZHAO L,LI G,SUTTER B D,et al.ARMor:fully verified software fault isolation[C]//The International Conference on Embedded Software.2011:289-298.
[20]WU J X.Introduction to Cyberspace Mimic Defense[M].Beijing:Science Press,2017.
[21]OUYANG L,SONG K,LAN J L.Design and Implementation ofMicrocontroller Based on Dynamic Heterogeneous Redundancy Architecture[J].Acta Electronica Sinica,2023,20(9):144-159.
[1] MA Zigang, MA Rongkuan, LI Beibei, XIE Yaobin, WEI Qiang, PENG Minwei. SSPN-RA:Security Integration Risk Assessment Method for ICS Based on SS-petri Net [J]. Computer Science, 2024, 51(10): 380-390.
[2] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[3] . Model Development Environment Research of Embedded Real-time Software [J]. Computer Science, 2012, 39(Z11): 226-229.
[4] . Cluster-based Distributed Consensus Algorithms Based on Connected Dominating Set in WSN [J]. Computer Science, 2012, 39(Z11): 55-57.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!