scispace - formally typeset
Open Access

Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System.

Reads0
Chats0
TLDR
The main contribution of the paper is a design technique for secure embedded devices on the basis of combinations of security components, optimization approach and developed software tools for decision making support.
Abstract
As elements of complex information systems, embedded devices define informational and physical connections between the level of software control of the system on the one hand, and its technical environment and users on the other. Operating in a potentially volatile and untrusted cyber-physical environment, using insufficiently secure communication channels and sensors as well as various external influences cause such devices are subject to specific attacking actions. As a result the design of such systems is a challenging task often requiring expert based solutions. The main contribution of the paper is a design technique for secure embedded devices on the basis of combinations of security components, optimization approach and developed software tools for decision making support. The correctness of the technique is confirmed by its use in the development of the integrated cyberphysical security system.

read more

Citations
More filters
Journal ArticleDOI

LoRaWAN-Based Energy-Efficient Surveillance by Drones for Intelligent Transportation Systems

TL;DR: Drones are used as LoRaWAN gateway and a communication strategy based on the area stress, resilient factor, and energy consumption is proposed that avail in the efficient localization, improved coverage and energy-efficient surveillance with lower overheads, lower redundancy, and almost zero-isolations.
Journal ArticleDOI

An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.

TL;DR: An enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues.
Journal ArticleDOI

A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT

TL;DR: A consensus framework is proposed for mitigation of zero-day attacks in IoT networks that uses context behavior of IoT devices as a detection mechanism followed by alert message protocol and critical data sharing protocol for reliable communication during attack mitigation.
Journal ArticleDOI

MIH-SPFP: MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks

TL;DR: A new security protocol, MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6 networks (MIH-SPFP), is proposed, incorporating the features of Secure Protocol for Fast-PMIPv6 (SPFP) into F-PMipv6-MIH and reducing the security risks during the handover.
Journal ArticleDOI

Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption

TL;DR: This paper studies the so-called Compact-LWE problem and clarifies that under certain parameter settings it can be solved in polynomial time and leads to a practical attack against an instantiated scheme based on Compact- LWE proposed by Liu et al. in 2017.
References
More filters
Journal ArticleDOI

Research Directions for the Internet of Things

TL;DR: A vision for how IoT could change the world in the distant future is presented and eight key research topics are enumerated and research problems within these topics are discussed.
Book ChapterDOI

The embedded systems design challenge

TL;DR: In this article, the authors summarize some current trends in embedded systems design and point out some of their characteristics, such as the chasm between analytical and computational models, and the gap between safety-critical and best-effort engineering practices.
Book

Designing the Internet of Things

TL;DR: Designing the Internet of Things helps software engineers, web designers, product designers, and electronics engineers start designing products using the Internet-of-Things approach and explains how to combine sensors, servos, robotics, Arduino chips, and more with various networks or the Internet to create interactive, cutting-edge devices.
Patent

Transaction security system

TL;DR: In this paper, an electronic funds transfer system (EFT) is described in which retail terminals located in stores are connected through a public switched telecommunication system to card issuing agencies data processing centers.
Journal ArticleDOI

Transaction security system

TL;DR: An electronic funds transfer system (EFT) is described in which retail terminals located in stores are connected through a public switched telecommunication system to card issuing agencies data processing centers and users are issued with intelligent secure bank cards.
Related Papers (5)