scispace - formally typeset
Journal ArticleDOI

Security in embedded systems: Design challenges

Reads0
Chats0
TLDR
An introduction to the challenges involved in secure embedded system design is provided, recent advances in addressing them are discussed, and opportunities for future research are identified.
Abstract
Many modern electronic systems---including personal computers, PDAs, cell phones, network routers, smart cards, and networked sensors to name a few---need to access, store, manipulate, or communicate sensitive information, making security a serious concern in their design. Embedded systems, which account for a wide range of products from the electronics, semiconductor, telecommunications, and networking industries, face some of the most demanding security concerns---on the one hand, they are often highly resource constrained, while on the other hand, they frequently need to operate in physically insecure environments.Security has been the subject of intensive research in the context of general-purpose computing and communications systems. However, security is often misconstrued by embedded system designers as the addition of features, such as specific cryptographic algorithms and security protocols, to the system. In reality, it is a new dimension that designers should consider throughout the design process, along with other metrics such as cost, performance, and power.The challenges unique to embedded systems require new approaches to security covering all aspects of embedded system design from architecture to implementation. Security processing, which refers to the computations that must be performed in a system for the purpose of security, can easily overwhelm the computational capabilities of processors in both low- and high-end embedded systems. This challenge, which we refer to as the "security processing gap," is compounded by increases in the amounts of data manipulated and the data rates that need to be achieved. Equally daunting is the "battery gap" in battery-powered embedded systems, which is caused by the disparity between rapidly increasing energy requirements for secure operation and slow improvements in battery technology. The final challenge is the "assurance gap," which relates to the gap between functional security measures (e.g., security services, protocols, and their constituent cryptographic algorithms) and actual secure implementations. This paper provides an introduction to the challenges involved in secure embedded system design, discusses recent advances in addressing them, and identifies opportunities for future research.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

64Kb logic RRAM chip resisting physical and side-channel attacks for encryption keys storage

TL;DR: A 64 Kb logic Resistive Random Access Memory (RRAM) test chip for encryption keys storage is presented and the excellent security features of resisting physical attacks and side-channel attacks are theoretically analyzed and experimentally proved.
Proceedings ArticleDOI

Using constraint graphs to improve embedded systems design

TL;DR: This work describes a top-down design process which employs constraint graphs to address embedded system design issues, and demonstrates the effectiveness of this method through the development of a family of designs for a camera.
Posted Content

Bypassing Isolated Execution on RISC-V with Fault Injection.

TL;DR: The results show that an attacker can bypass the isolation of the TEE and read data from the protected memory region.

AMISEC: Leveraging Redundancy and Adaptability to Secure AmI Applications

TL;DR: A global strategy and a system architecture to cope with security issues in AmI applications at different levels are proposed and a set of services that can be used to handle identification, authentication, and authorization in intelligent ambients are proposed.
Journal ArticleDOI

Bump in the wire (BITW) security solution for a marine ROV remote control application

TL;DR: The proposed BITW security solution involves an efficient implementation of the AES cryptographic algorithm on a Field Programmable Gate Array (FPGA) platform and the extra delay introduced into the remote control application was well within the allowable time window of 50 ms.
References
More filters
Book ChapterDOI

Differential Power Analysis

TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Book ChapterDOI

Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems

TL;DR: By carefully measuring the amount of time required to perform private key operalions, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems.
Book

Cryptography and Network Security: Principles and Practice

TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
Book

Applied Cryptography: Protocols, Algorithms, and Source Code in C

TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.
Related Papers (5)