International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 144 | Views: 328 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Electronics & Communication Engineering | India | Volume 6 Issue 3, March 2017 | Popularity: 7.2 / 10


     

Relative Study in Architecture and Design Methodologies for Secured Real Time Embedded Systems

Anupama S


Abstract: The embedded systems field is growing rapidly, with devices such as cellular phones, PDAs, smart cards, and digital music players permeating society. On the horizon are futuristic technologies such as embedded network sensors and wearable computers, which promise even greater interaction between humans and machines. As embedded devices are increasingly integrated into personal and commercial infrastructures, security becomes a paramount issue. For example, if a patient is wearing a heart-monitoring device that sends data wirelessly to a doctor, the embedded system must keep this information confidential and deliver it uncorrupted to the doctor. An embedded network sensor monitoring water quality to prevent bioterrorism must have multiple methods to detect tampering in both hardware and software, lest an attacker bypass security measures and corrupt the water supply. The design of security for embedded systems differs from traditional security design because these systems are resource-constrained in their capacities (and consequently in their defenses) and easily accessible to adversaries at the physical layer. Embedded security cant be solved at a single security ion layer, but rather is a system problem spanning multiple ion levels. We attempt to provide a unified and holistic view of embedded system security by first analyzing the typical functional security requirements for embedded systems from an end-user perspective. We then identify the implied challenges for embedded system architects, as well as hardware and software designers (e. g. , tamper-resistant embedded system design, processing requirements for security, impact of security on battery life for battery-powered systems, etc. ). We also survey solution techniques to address these challenges, drawing from both current practice and emerging research, and identify open research problems that will require innovations in embedded system architecture and design methodologies.


Keywords: Embedded Systems, PDAs, Sensors, Security, Cryptography, Security Protocols, Security Processing, Design, Design Methodologies, Architectures, Tamper Resistance, Software Attacks, Viruses, Trusted Computing, Digital Rights Management, Performance, Battery Life


Edition: Volume 6 Issue 3, March 2017


Pages: 676 - 680



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Anupama S, "Relative Study in Architecture and Design Methodologies for Secured Real Time Embedded Systems", International Journal of Science and Research (IJSR), Volume 6 Issue 3, March 2017, pp. 676-680, https://www.ijsr.net/getabstract.php?paperid=ART20164454, DOI: https://www.doi.org/10.21275/ART20164454



Similar Articles

Downloads: 116

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2264 - 2270

Implementation of Efficient Architecture for Vulnarability Packet Detection Using Verilog

M. Sivaramprasad, D. Sridhar

Share this Article

Downloads: 133

Research Paper, Electronics & Communication Engineering, India, Volume 2 Issue 12, December 2013

Pages: 123 - 128

Design and Implementation of Wi-Fi Medium Access Control Layer for Transmitter with VHDL

CH. Neelima, Ravinder Tirupati, A. Deepthi

Share this Article

Downloads: 149 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Electronics & Communication Engineering, India, Volume 2 Issue 5, May 2013

Pages: 1 - 5

Mems Pressure Sensor in Automotive Industry

K. Hema

Share this Article
Top