scispace - formally typeset
Journal ArticleDOI

Security in embedded systems: Design challenges

Reads0
Chats0
TLDR
An introduction to the challenges involved in secure embedded system design is provided, recent advances in addressing them are discussed, and opportunities for future research are identified.
Abstract
Many modern electronic systems---including personal computers, PDAs, cell phones, network routers, smart cards, and networked sensors to name a few---need to access, store, manipulate, or communicate sensitive information, making security a serious concern in their design. Embedded systems, which account for a wide range of products from the electronics, semiconductor, telecommunications, and networking industries, face some of the most demanding security concerns---on the one hand, they are often highly resource constrained, while on the other hand, they frequently need to operate in physically insecure environments.Security has been the subject of intensive research in the context of general-purpose computing and communications systems. However, security is often misconstrued by embedded system designers as the addition of features, such as specific cryptographic algorithms and security protocols, to the system. In reality, it is a new dimension that designers should consider throughout the design process, along with other metrics such as cost, performance, and power.The challenges unique to embedded systems require new approaches to security covering all aspects of embedded system design from architecture to implementation. Security processing, which refers to the computations that must be performed in a system for the purpose of security, can easily overwhelm the computational capabilities of processors in both low- and high-end embedded systems. This challenge, which we refer to as the "security processing gap," is compounded by increases in the amounts of data manipulated and the data rates that need to be achieved. Equally daunting is the "battery gap" in battery-powered embedded systems, which is caused by the disparity between rapidly increasing energy requirements for secure operation and slow improvements in battery technology. The final challenge is the "assurance gap," which relates to the gap between functional security measures (e.g., security services, protocols, and their constituent cryptographic algorithms) and actual secure implementations. This paper provides an introduction to the challenges involved in secure embedded system design, discusses recent advances in addressing them, and identifies opportunities for future research.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Model-based security and dependability patterns in RCES: the TERESA approach

TL;DR: This paper uses meta-modeling techniques to encode security and dependability (S&D) patterns at even greater level of abstraction and proposes an implementation of these patterns using a profiled UML.
Proceedings ArticleDOI

Smart cameras with onboard signcryption for securing IoT applications

TL;DR: This work introduces the system architecture motivated by a typical case study for camera-based IoT applications, evaluates security properties and present performance results of an ARM-based implementation.
Journal ArticleDOI

Integration of wireless sensor networks into cyberinfrastructure for monitoring Hawaiian "mountain-to-sea" environments.

TL;DR: A new cyberinfrastructure for environmental monitoring is produced which successfully merged the use of wireless sensor technologies, grid computing with three-dimensional (3D) geospatial data visualization/exploration, and a secured internet portal user interface, into a working prototype for monitoring mountain-to-sea environments in the high Hawaiian Islands.
Journal ArticleDOI

Using reputation systems and non-deterministic routing to secure wireless sensor networks.

TL;DR: This work proposes a trust-based decision framework for wireless sensor networks coupled with a non-deterministic routing protocol that provides a mechanism to effectively detect and confine common attacks, and allows bad reputation feedback to the network.
Journal ArticleDOI

Security-aware Routing and Scheduling for Control Applications on Ethernet TSN Networks

TL;DR: A security-aware methodology for routing and scheduling for control applications in Ethernet networks is proposed to maximize the resilience of control applications within these networked control systems to malicious interference while guaranteeing the stability of all control plants, despite the stringent resource constraints in such cyber-physical systems.
References
More filters
Book ChapterDOI

Differential Power Analysis

TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Book ChapterDOI

Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems

TL;DR: By carefully measuring the amount of time required to perform private key operalions, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems.
Book

Cryptography and Network Security: Principles and Practice

TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
Book

Applied Cryptography: Protocols, Algorithms, and Source Code in C

TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.
Related Papers (5)