Affiliation:
1. NEC Laboratories America, Princeton, NJ
2. Cryptography Research, San Francisco, CA
3. Texas Instruments Inc., Dallas, TX
Abstract
Many modern electronic systems---including personal computers, PDAs, cell phones, network routers, smart cards, and networked sensors to name a few---need to access, store, manipulate, or communicate sensitive information, making security a serious concern in their design. Embedded systems, which account for a wide range of products from the electronics, semiconductor, telecommunications, and networking industries, face some of the most demanding security concerns---on the one hand, they are often highly resource constrained, while on the other hand, they frequently need to operate in physically insecure environments.Security has been the subject of intensive research in the context of general-purpose computing and communications systems. However, security is often misconstrued by embedded system designers as the addition of features, such as specific cryptographic algorithms and security protocols, to the system. In reality, it is
a new dimension
that designers should consider throughout the design process, along with other metrics such as cost, performance, and power.The challenges unique to embedded systems require new approaches to security covering all aspects of embedded system design from architecture to implementation. Security processing, which refers to the computations that must be performed in a system for the purpose of security, can easily overwhelm the computational capabilities of processors in both low- and high-end embedded systems. This challenge, which we refer to as the "security processing gap," is compounded by increases in the amounts of data manipulated and the data rates that need to be achieved. Equally daunting is the "battery gap" in battery-powered embedded systems, which is caused by the disparity between rapidly increasing energy requirements for secure operation and slow improvements in battery technology. The final challenge is the "assurance gap," which relates to the gap between functional security measures (e.g., security services, protocols, and their constituent cryptographic algorithms) and actual secure implementations. This paper provides an introduction to the challenges involved in secure embedded system design, discusses recent advances in addressing them, and identifies opportunities for future research.
Publisher
Association for Computing Machinery (ACM)
Subject
Hardware and Architecture,Software
Reference83 articles.
1. AES Algorithm (Rijndael) Information. Available at http://csrc.nist.gov/encryption/aes/rijndael.]] AES Algorithm (Rijndael) Information. Available at http://csrc.nist.gov/encryption/aes/rijndael.]]
2. Anderson R. and Kuhn M. 1996. Tamper Resistance---A Cautionary Note. Available at http: //www.cl.cam.ac.uk/users/rja14/tamper.html.]] Anderson R. and Kuhn M. 1996. Tamper Resistance---A Cautionary Note. Available at http: //www.cl.cam.ac.uk/users/rja14/tamper.html.]]
3. Anderson R. and Kuhn M. 1997. Low cost attacks on tamper resistant devices. In IWSP: International Workshop on Security Protocols. Lecture Notes on Computer Science. 125--136.]] Anderson R. and Kuhn M. 1997. Low cost attacks on tamper resistant devices. In IWSP: International Workshop on Security Protocols. Lecture Notes on Computer Science. 125--136.]]
4. ARM SecurCore. Available at http://www.arm.com.]] ARM SecurCore. Available at http://www.arm.com.]]
Cited by
162 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献