scispace - formally typeset
Journal ArticleDOI

Security in embedded systems: Design challenges

Reads0
Chats0
TLDR
An introduction to the challenges involved in secure embedded system design is provided, recent advances in addressing them are discussed, and opportunities for future research are identified.
Abstract
Many modern electronic systems---including personal computers, PDAs, cell phones, network routers, smart cards, and networked sensors to name a few---need to access, store, manipulate, or communicate sensitive information, making security a serious concern in their design. Embedded systems, which account for a wide range of products from the electronics, semiconductor, telecommunications, and networking industries, face some of the most demanding security concerns---on the one hand, they are often highly resource constrained, while on the other hand, they frequently need to operate in physically insecure environments.Security has been the subject of intensive research in the context of general-purpose computing and communications systems. However, security is often misconstrued by embedded system designers as the addition of features, such as specific cryptographic algorithms and security protocols, to the system. In reality, it is a new dimension that designers should consider throughout the design process, along with other metrics such as cost, performance, and power.The challenges unique to embedded systems require new approaches to security covering all aspects of embedded system design from architecture to implementation. Security processing, which refers to the computations that must be performed in a system for the purpose of security, can easily overwhelm the computational capabilities of processors in both low- and high-end embedded systems. This challenge, which we refer to as the "security processing gap," is compounded by increases in the amounts of data manipulated and the data rates that need to be achieved. Equally daunting is the "battery gap" in battery-powered embedded systems, which is caused by the disparity between rapidly increasing energy requirements for secure operation and slow improvements in battery technology. The final challenge is the "assurance gap," which relates to the gap between functional security measures (e.g., security services, protocols, and their constituent cryptographic algorithms) and actual secure implementations. This paper provides an introduction to the challenges involved in secure embedded system design, discusses recent advances in addressing them, and identifies opportunities for future research.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Runtime State Verification on Resource-Constrained Platforms

TL;DR: IoTA is presented, an extensible, open source, agent-based framework for trustworthy runtime integrity verification on resource-constrained platforms and the necessary trade-offs to achieve trust within these constraints are discussed.

Software security requirements in building automation.

TL;DR: An extensive survey of the security requirements for distributed control applications and analyzes software protection methods is provided and an architecture tackling the problem on how to secure software running on different device classes and preventing attacks on smart homes and buildings is briefly introduced.
Proceedings ArticleDOI

DynaPoMP: dynamic policy-driven memory protection for SPM-based embedded systems

TL;DR: DynaPoMP is proposed, a novel dynamic policy-driven scratchpad memory allocation methodology that ensures data confidentiality while minimizing the memory access latency overhead and trades-off space given to sensitive data and non-sensitive data, with the goal of reducing the execution time of the given application.
Journal ArticleDOI

Energy Consumption Analysis of the Cryptographic Key Generation Process of RSA and ECC Algorithms in Embedded Systems

TL;DR: This paper presents the energy consumption analysis between the key generators for the RSA and ECC algorithms and concludes that the ECC algorithm presented a lower energy consumption than the RSA algorithm and a strong correlation between runtime and power consumption.
Journal ArticleDOI

Secure reconfiguration of software-defined radio

TL;DR: A new architecture targeted at protecting SDR devices from malicious reconfiguration is proposed, based on robust separation of the radio operation environment and user application environment, through the use of virtualization.
References
More filters
Book ChapterDOI

Differential Power Analysis

TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Book ChapterDOI

Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems

TL;DR: By carefully measuring the amount of time required to perform private key operalions, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems.
Book

Cryptography and Network Security: Principles and Practice

TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
Book

Applied Cryptography: Protocols, Algorithms, and Source Code in C

TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.
Related Papers (5)