Downloads: 144 | Views: 328 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Electronics & Communication Engineering | India | Volume 6 Issue 3, March 2017 | Popularity: 7.2 / 10
Relative Study in Architecture and Design Methodologies for Secured Real Time Embedded Systems
Anupama S
Abstract: The embedded systems field is growing rapidly, with devices such as cellular phones, PDAs, smart cards, and digital music players permeating society. On the horizon are futuristic technologies such as embedded network sensors and wearable computers, which promise even greater interaction between humans and machines. As embedded devices are increasingly integrated into personal and commercial infrastructures, security becomes a paramount issue. For example, if a patient is wearing a heart-monitoring device that sends data wirelessly to a doctor, the embedded system must keep this information confidential and deliver it uncorrupted to the doctor. An embedded network sensor monitoring water quality to prevent bioterrorism must have multiple methods to detect tampering in both hardware and software, lest an attacker bypass security measures and corrupt the water supply. The design of security for embedded systems differs from traditional security design because these systems are resource-constrained in their capacities (and consequently in their defenses) and easily accessible to adversaries at the physical layer. Embedded security cant be solved at a single security ion layer, but rather is a system problem spanning multiple ion levels. We attempt to provide a unified and holistic view of embedded system security by first analyzing the typical functional security requirements for embedded systems from an end-user perspective. We then identify the implied challenges for embedded system architects, as well as hardware and software designers (e. g. , tamper-resistant embedded system design, processing requirements for security, impact of security on battery life for battery-powered systems, etc. ). We also survey solution techniques to address these challenges, drawing from both current practice and emerging research, and identify open research problems that will require innovations in embedded system architecture and design methodologies.
Keywords: Embedded Systems, PDAs, Sensors, Security, Cryptography, Security Protocols, Security Processing, Design, Design Methodologies, Architectures, Tamper Resistance, Software Attacks, Viruses, Trusted Computing, Digital Rights Management, Performance, Battery Life
Edition: Volume 6 Issue 3, March 2017
Pages: 676 - 680
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 116
M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2264 - 2270Implementation of Efficient Architecture for Vulnarability Packet Detection Using Verilog
M. Sivaramprasad, D. Sridhar
Downloads: 133
Research Paper, Electronics & Communication Engineering, India, Volume 2 Issue 12, December 2013
Pages: 123 - 128Design and Implementation of Wi-Fi Medium Access Control Layer for Transmitter with VHDL
CH. Neelima, Ravinder Tirupati, A. Deepthi
Downloads: 149 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Electronics & Communication Engineering, India, Volume 2 Issue 5, May 2013
Pages: 1 - 5Mems Pressure Sensor in Automotive Industry
K. Hema