+ All Categories
Home > Engineering > Security in embedded systems

Security in embedded systems

Date post: 09-Jan-2017
Category:
Upload: raghav-s
View: 422 times
Download: 4 times
Share this document with a friend
13
By Raghav S Technical Seminar on Security in Embedded Systems
Transcript
Page 1: Security in embedded systems

By Raghav S

Technical Seminar on Security in Embedded

Systems

Page 2: Security in embedded systems

What is an Embedded System? Introduction to Network Security Survey Problem Definition Proposed Solution Comparison Future Scope

Overview

Page 3: Security in embedded systems

• An embedded system is a combination of computer hardware and software, either fixed in capability or programmable, that is specifically designed for a particular function.

Embedded System

Page 4: Security in embedded systems

• Network security is a term that describes the policies and procedures implemented by a network administrator to avoid and keep track of unauthorized access, exploitation, modification and denial of the access.

Network Security

Page 5: Security in embedded systems

• Hacking is gaining of unauthorized access to a computer and viewing, copying, or creating data with/without the intention of destroying data or maliciously harming the computer. 

Hacking

Page 6: Security in embedded systems

Reasons for Hacking:

Cost of Insecurity:

Survey

Page 7: Security in embedded systems

• Advancement in Technology

• Security is an afterthought

Problem Definition

Page 8: Security in embedded systems

Hardware approach : It uses ASICs (Application Specific Integrated Circuits) to implement a given cryptography algorithm in hardware.

Hybrid Hardware - software approach : It uses a general purpose embedded processor and integrates hardware accelerators for the execution of critical Cryptographic algorithms.

Proposed Solution

Page 9: Security in embedded systems

Comparison

Existing Solution(Software Solution)

Proposed Solution(Hardware Solution)

• Protects the system against software attacks only.

• Protects the system against software as well as hardware attacks.

• Has to be administered by the user.

• Self – administered.

• It proves to be expensive. • It is cost effective.

• Updating on a regular basis needs to be carried out.

• Eliminates the need for updating.

• High level user interaction required.

• User interaction is close to nil.

Page 10: Security in embedded systems

Design challenges: Battery Gap Flexibility Tamper resistance

Interaction between Network Security engineer and Architecture engineer is required.

Presently it is difficult to implement in the existing devices.

Disadvantages of the Proposed solution

Page 11: Security in embedded systems

• Development in the semiconductor industry might aid the manufacturing of the chip.

• Diversity in the hardware component used(Cryptographic Chip).

• Develop methodology to provide the features of Cryptographic chips in the existing devices.

Future Scope

Page 12: Security in embedded systems

1. Paul Kocher, Ruby Lee, Gary McGraw, Anand Raghunathan and Srivaths Ravi, “Security as a New Dimension in Embedded System Design”.

2. Srivaths Ravi, Anand Raghunathan, Paul Kocher, Sunil Hattangady, “Security in Embedded Systems: Design Challenges”.

3. Jesús Lizarraga, Roberto Uribeetxeberria, Urko Zurutuza, Miguel Fernández, “Security in embedded systems”.

4. Embedded systems, http://searchenterpriselinux.techtarget.com/definition/embedded-system.

5. Network Security, http://www.techopedia.com/definition/24783/network-security.

References

Page 13: Security in embedded systems

Thank You!


Recommended