Journal ArticleDOI
Security in embedded systems: Design challenges
Reads0
Chats0
TLDR
An introduction to the challenges involved in secure embedded system design is provided, recent advances in addressing them are discussed, and opportunities for future research are identified.Abstract:
Many modern electronic systems---including personal computers, PDAs, cell phones, network routers, smart cards, and networked sensors to name a few---need to access, store, manipulate, or communicate sensitive information, making security a serious concern in their design. Embedded systems, which account for a wide range of products from the electronics, semiconductor, telecommunications, and networking industries, face some of the most demanding security concerns---on the one hand, they are often highly resource constrained, while on the other hand, they frequently need to operate in physically insecure environments.Security has been the subject of intensive research in the context of general-purpose computing and communications systems. However, security is often misconstrued by embedded system designers as the addition of features, such as specific cryptographic algorithms and security protocols, to the system. In reality, it is a new dimension that designers should consider throughout the design process, along with other metrics such as cost, performance, and power.The challenges unique to embedded systems require new approaches to security covering all aspects of embedded system design from architecture to implementation. Security processing, which refers to the computations that must be performed in a system for the purpose of security, can easily overwhelm the computational capabilities of processors in both low- and high-end embedded systems. This challenge, which we refer to as the "security processing gap," is compounded by increases in the amounts of data manipulated and the data rates that need to be achieved. Equally daunting is the "battery gap" in battery-powered embedded systems, which is caused by the disparity between rapidly increasing energy requirements for secure operation and slow improvements in battery technology. The final challenge is the "assurance gap," which relates to the gap between functional security measures (e.g., security services, protocols, and their constituent cryptographic algorithms) and actual secure implementations. This paper provides an introduction to the challenges involved in secure embedded system design, discusses recent advances in addressing them, and identifies opportunities for future research.read more
Citations
More filters
Journal ArticleDOI
64Kb logic RRAM chip resisting physical and side-channel attacks for encryption keys storage
TL;DR: A 64 Kb logic Resistive Random Access Memory (RRAM) test chip for encryption keys storage is presented and the excellent security features of resisting physical attacks and side-channel attacks are theoretically analyzed and experimentally proved.
Proceedings ArticleDOI
Using constraint graphs to improve embedded systems design
Indira Jayaram,Carla Purdy +1 more
TL;DR: This work describes a top-down design process which employs constraint graphs to address embedded system design issues, and demonstrates the effectiveness of this method through the development of a family of designs for a camera.
Posted Content
Bypassing Isolated Execution on RISC-V with Fault Injection.
TL;DR: The results show that an attacker can bypass the isolation of the TEE and read data from the protected memory region.
AMISEC: Leveraging Redundancy and Adaptability to Secure AmI Applications
José Manuel Moya Fernández,Juan Carlos Vallejo López,Pedro José Malagón Marzo,Álvaro Araujo Pinto,Juan Mariano de Goyeneche,Octavio Nieto-Taladriz García +5 more
TL;DR: A global strategy and a system architecture to cope with security issues in AmI applications at different levels are proposed and a set of services that can be used to handle identification, authentication, and authorization in intelligent ambients are proposed.
Journal ArticleDOI
Bump in the wire (BITW) security solution for a marine ROV remote control application
Muzaffar Rao,Muzaffar Rao,Thomas Newe,Edin Omerdic,Admir Kaknjo,Walid Elgenaidi,Avijit Mathur,Gerard Dooly,Elfed Lewis,Daniel Toal +9 more
TL;DR: The proposed BITW security solution involves an efficient implementation of the AES cryptographic algorithm on a Field Programmable Gate Array (FPGA) platform and the extra delay introduced into the remote control application was well within the allowable time window of 50 ms.
References
More filters
Book ChapterDOI
Differential Power Analysis
TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Book ChapterDOI
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
TL;DR: By carefully measuring the amount of time required to perform private key operalions, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems.
Book
Cryptography and Network Security: Principles and Practice
TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
Book
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Bruce Schneier,Phil Sutherland +1 more
TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.