scispace - formally typeset
Journal ArticleDOI

Security in embedded systems: Design challenges

Reads0
Chats0
TLDR
An introduction to the challenges involved in secure embedded system design is provided, recent advances in addressing them are discussed, and opportunities for future research are identified.
Abstract
Many modern electronic systems---including personal computers, PDAs, cell phones, network routers, smart cards, and networked sensors to name a few---need to access, store, manipulate, or communicate sensitive information, making security a serious concern in their design. Embedded systems, which account for a wide range of products from the electronics, semiconductor, telecommunications, and networking industries, face some of the most demanding security concerns---on the one hand, they are often highly resource constrained, while on the other hand, they frequently need to operate in physically insecure environments.Security has been the subject of intensive research in the context of general-purpose computing and communications systems. However, security is often misconstrued by embedded system designers as the addition of features, such as specific cryptographic algorithms and security protocols, to the system. In reality, it is a new dimension that designers should consider throughout the design process, along with other metrics such as cost, performance, and power.The challenges unique to embedded systems require new approaches to security covering all aspects of embedded system design from architecture to implementation. Security processing, which refers to the computations that must be performed in a system for the purpose of security, can easily overwhelm the computational capabilities of processors in both low- and high-end embedded systems. This challenge, which we refer to as the "security processing gap," is compounded by increases in the amounts of data manipulated and the data rates that need to be achieved. Equally daunting is the "battery gap" in battery-powered embedded systems, which is caused by the disparity between rapidly increasing energy requirements for secure operation and slow improvements in battery technology. The final challenge is the "assurance gap," which relates to the gap between functional security measures (e.g., security services, protocols, and their constituent cryptographic algorithms) and actual secure implementations. This paper provides an introduction to the challenges involved in secure embedded system design, discusses recent advances in addressing them, and identifies opportunities for future research.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

The Fuzzy Integrated Evaluation of Embedded System Security

TL;DR: A fuzzy integrated security evaluation method based on man-computer combined data collection and fuzzy expert evaluation in Delphi method that could reduce the subjectivity of expert evaluation and alleviate the difficulty of data collection is proposed and makes possible a better combination of qualitative and quantitative evaluations.
Proceedings ArticleDOI

A model-based repository of security and dependability patterns for trusted RCES

TL;DR: This work presents a framework for trusted Resource Constrained Embedded Systems (RCES) development by design, by defining both a model to represent S&D pattern language and an architecture for development tools.
Proceedings ArticleDOI

The Impact of the Implementation Style on Power Consumption and Security in Embedded Cryptosystems

TL;DR: Current consumption analysis related to DPA attacks targeting a low-power 32-bit ARM processor core and results show that the DPA attack success is directly related to the number of traces collected.
Proceedings ArticleDOI

LabVIEW-FPGA based implementation of an Authenticated Encryption core

TL;DR: This work presents a LabVIEW-FPGA based implementation of authenticated encryption, which can be used in an IoT environment using BITW technique.

Satisfying non-functional requirements in model- driven development of real-time embedded systems

TL;DR: Design of real-time embedded systems is a complex and challenging task and part of this complexity originates from their limited resources which incurs handling a big range of Non-Functional Requireme Requirement.
References
More filters
Book ChapterDOI

Differential Power Analysis

TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Book ChapterDOI

Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems

TL;DR: By carefully measuring the amount of time required to perform private key operalions, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems.
Book

Cryptography and Network Security: Principles and Practice

TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
Book

Applied Cryptography: Protocols, Algorithms, and Source Code in C

TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.
Related Papers (5)