Security in embedded systems

Author:

Ravi Srivaths1,Raghunathan Anand1,Kocher Paul2,Hattangady Sunil3

Affiliation:

1. NEC Laboratories America, Princeton, NJ

2. Cryptography Research, San Francisco, CA

3. Texas Instruments Inc., Dallas, TX

Abstract

Many modern electronic systems---including personal computers, PDAs, cell phones, network routers, smart cards, and networked sensors to name a few---need to access, store, manipulate, or communicate sensitive information, making security a serious concern in their design. Embedded systems, which account for a wide range of products from the electronics, semiconductor, telecommunications, and networking industries, face some of the most demanding security concerns---on the one hand, they are often highly resource constrained, while on the other hand, they frequently need to operate in physically insecure environments.Security has been the subject of intensive research in the context of general-purpose computing and communications systems. However, security is often misconstrued by embedded system designers as the addition of features, such as specific cryptographic algorithms and security protocols, to the system. In reality, it is a new dimension that designers should consider throughout the design process, along with other metrics such as cost, performance, and power.The challenges unique to embedded systems require new approaches to security covering all aspects of embedded system design from architecture to implementation. Security processing, which refers to the computations that must be performed in a system for the purpose of security, can easily overwhelm the computational capabilities of processors in both low- and high-end embedded systems. This challenge, which we refer to as the "security processing gap," is compounded by increases in the amounts of data manipulated and the data rates that need to be achieved. Equally daunting is the "battery gap" in battery-powered embedded systems, which is caused by the disparity between rapidly increasing energy requirements for secure operation and slow improvements in battery technology. The final challenge is the "assurance gap," which relates to the gap between functional security measures (e.g., security services, protocols, and their constituent cryptographic algorithms) and actual secure implementations. This paper provides an introduction to the challenges involved in secure embedded system design, discusses recent advances in addressing them, and identifies opportunities for future research.

Publisher

Association for Computing Machinery (ACM)

Subject

Hardware and Architecture,Software

Reference83 articles.

1. AES Algorithm (Rijndael) Information. Available at http://csrc.nist.gov/encryption/aes/rijndael.]] AES Algorithm (Rijndael) Information. Available at http://csrc.nist.gov/encryption/aes/rijndael.]]

2. Anderson R. and Kuhn M. 1996. Tamper Resistance---A Cautionary Note. Available at http: //www.cl.cam.ac.uk/users/rja14/tamper.html.]] Anderson R. and Kuhn M. 1996. Tamper Resistance---A Cautionary Note. Available at http: //www.cl.cam.ac.uk/users/rja14/tamper.html.]]

3. Anderson R. and Kuhn M. 1997. Low cost attacks on tamper resistant devices. In IWSP: International Workshop on Security Protocols. Lecture Notes on Computer Science. 125--136.]] Anderson R. and Kuhn M. 1997. Low cost attacks on tamper resistant devices. In IWSP: International Workshop on Security Protocols. Lecture Notes on Computer Science. 125--136.]]

4. ARM SecurCore. Available at http://www.arm.com.]] ARM SecurCore. Available at http://www.arm.com.]]

Cited by 162 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Certificate-less Aggregate Signature Authentication Scheme (CLASAS) for secure and efficient data transmission in Wireless Sensor Networks (WSNs);Peer-to-Peer Networking and Applications;2024-05-23

2. SoK: Security in Real-Time Systems;ACM Computing Surveys;2024-04-25

3. Modern computing: Vision and challenges;Telematics and Informatics Reports;2024-03

4. Embedded Supercomputing for Edge Devices: A Comprehensive Review;Transactions on Computational Science and Computational Intelligence;2024

5. A Survey on Thwarting Memory Corruption in RISC-V;ACM Computing Surveys;2023-09-14

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3