Corpus ID: 43020089

Topics in secure embedded system design

@inproceedings{Potlapally2008TopicsIS,
  title={Topics in secure embedded system design},
  author={Nachiketh R. Potlapally},
  year={2008}
}
Pervasive networks have led to widespread use of embedded systems, like cell phones, PDAs, RFIDs etc., in increasingly diverse applications. Many of these embedded system applications handle sensitive data (e.g., credit card information on a mobile phone/PDA) or perform critical functions (e.g., medical devices or automotive electronics), and the use of security protocols is imperative to maintain confidentiality, integrity and authentication of these applications. Typically embedded systems… Expand
Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge
TLDR
The paper encompasses the core elements of the proposed technique, namely security component configuring, revelation of implicit conflicts, verification of network information flows and abnormal data from sensors, and issues of software implementation and discussion are covered. Expand
An ANP-Based Practical Quality Model for a Secure Embedded System with Sensor Network
TLDR
This paper seeks to redress this issue by presenting a quality model for a secure embedded system with sensor network that is constructed according to DeLone and McLean's success information system, and has subcriteria according to their characteristics. Expand
Detection of anomalies in data for monitoring of security components in the Internet of Things
TLDR
The paper encompasses an approach to elicitation and use of expert knowledge on detection of anomalies in data as well as their usage as an input for automated means aimed at monitoring security components of IoT. Expand

References

SHOWING 1-10 OF 99 REFERENCES
Security in embedded systems: Design challenges
TLDR
An introduction to the challenges involved in secure embedded system design is provided, recent advances in addressing them are discussed, and opportunities for future research are identified. Expand
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
TLDR
This paper presents a comprehensive analysis of the energy requirements of the most popular transport-layer security protocol: Secure Sockets Layer (SSL), and investigates the impact of various parameters at the protocol level and the cryptographic algorithm level on the overall energy consumption for secure data transactions. Expand
Analyzing the energy consumption of security protocols
TLDR
This work presents a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that are used as building blocks in security protocols and studies the energy consumption requirements of the most popular transport-layer security protocol SSL (Secure Sockets Layer). Expand
Facing the Challenge of Wireless Security
TLDR
It is challenging to implement security in small-footprint devices with low processing power and small memory capacities and that use unreliable, low bandwidth wireless networks, according to Vendors and others. Expand
Securing wireless data: system architecture challenges
Security is critical to a wide range of current and future wireless data applications and services. This paper highlights the challenges posed by the need for security during system architectureExpand
Tamper resistance mechanisms for secure embedded systems
TLDR
This paper surveys various tamper or attack techniques, and explains how they can be used to undermine or weaken security functions in embedded systems. Expand
AEGIS: architecture for tamper-evident and tamper-resistant processing
TLDR
The architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks is described and preliminary simulation results indicate that the overhead of security mechanisms in aEGis is reasonable. Expand
Optimizing public-key encryption for wireless clients
TLDR
This work evaluates the proposed algorithmic optimization techniques by obtaining processing times for the SSL handshake protocol on a state-of-the-art embedded processor by using the optimal algorithm configuration and a popular conventional algorithm configuration. Expand
Masking the Energy Behavior of DES Encryption
TLDR
This work augment the instruction set architecture of a simple five-stage pipelined smart card processor with secure instructions to mask the energy differences due to key-related data-dependent computations in DES encryption, achieving the energy masking of critical operations consuming 83% less energy as compared to existing approaches employing dual rail circuits. Expand
System design methodologies for a wireless security processing platform
TLDR
A programmable security processor platform to support both public-key and private key operations using the proposed methodology is designed, and its performance is evaluated through extensive system simulations as well as hardware prototyping. Expand
...
1
2
3
4
5
...