Cryptographic Embedded Systems S
Cryptographic Embedded Systems S
net/publication/278334337
CITATIONS READS
0 192
1 author:
Bharat Kumar
Jagannath Institute for Technology and Management
1 PUBLICATION 0 CITATIONS
SEE PROFILE
All content following this page was uploaded by Bharat Kumar on 16 June 2015.
Abstract— Unauthorized attackers are able to take
control of the data stream and monitor or listen to the
communication between two parties. From this it follows
that integration of methodical measure of safety are
required. The growing number of instances of breaches Figure 1 : active attack and passive attack
in information security in the last few years has created a
compelling case for efforts towards secure electronic With the evolution of the Internet, information and
systems. Embedded systems, which will be ubiquitously communications security has gained significant attention. For
used to capture, store, manipulate, and access data of a example, various security protocols and standards such as
sensitive nature, pose several unique and interesting IPSec, SSL, WEP, and WTLS, are used for secure
security challenges. Security has been the subject of communications in embedded systems. While security protocols
intensive research in the areas of cryptography, and the cryptographic algorithms they contain address security
computing, and networking. security is often mis- considerations from a functional perspective, many embedded
construed by designers as the hardware or software systems are constrained by the environments they operate in,
implementation of specific cryptographic algorithms and and by the resources they possess. For such systems, there are
security protocols. In reality, it is an entirely new metric several factors that are moving security considerations from a
that designers should consider throughout the design function-centric perspective into a system architecture
process, along with other metrics such as cost, (hardware/software) design issue.
performance, and power.
I. EMBEDDED SYSTEM SECURITY REQUIREMENT
1. INTRODUCTION
Embedded systems often provide critical functions that could be
Today, security in one form or another is a requirement for an sabotaged by malicious parties. When they send or receive
increasing number of embedded systems, ranging from sensitive or critical information using public networks or
lowend systems such as PDAs, wireless handsets, networked communications channels accessible to potential attackers, they
sensors, and smart cards to mid- and high-end network should ideally provide basic security functions such as data
equipment such as routers, gateways, firewalls, storage and confidentiality, data integrity, and user authentication. Data
web servers. Technological advances that have spurred the confidentiality protects sensitive information from undesired
development of these electronic systems have also ushered eavesdroppers. Data integrity ensures that the information has
in seemingly parallel trends in the sophistication of security not been changed illegitimately. User authentication verifies
attacks. It has been observed that the cost of insecurity in that the information is sent and received by appropriate parties
electronic systems can be very high. For a long time rather than masqueraders. These are basic security functions are
technology is integrated into our environment. often collectively termed secure communications and are
Microprocessors are the main part of electronic devices and required of many embedded systems used in medical, sensing,
equip them with crucial intelligence. Solutions to complex automotive, financial, military and many other applications.
problems in communication technology can be realized with Since the mandate of embedded system security often requires
the help of embedded systems, which are integrated in a protecting sensitive information (code or data) throughout its
technical concept and have a fixed miniaturization, mobility lifetime, secure storage and content security become crucial.
and networking are essential IT trends in recent years. For Secure storage involves securing code or data in all system
this reason security requirements have been increased storage devices, external or internal to the system in question.
correspondingly, so that common concepts are no longer Content security protects the rights of the digital content used in
sufficient. The networking of embedded systems constitutes the system, and this issue is actively pursued by several content
an unsecured interaction or unsaved data exchange using providers. In addition to secure communications, other security
various communication channels. Especially wireless requirements have also been mentioned in the context of several
communication is particularly endangered and provides a embedded systems. Fig 1 shows some of these requirements
unique opportunity for active or passive attacks. Figure 1 from the perspective of an end-user. Very often, access to the
illustrates a passive and active attack where malicious user embedded system should be restricted to a selected set of
Mike eavesdrops on or manipulate the communication authorized users (user identification), while access to a network
between Alice and Bob. These activities are also known as or a service has to be provided only if the
man-in-the-middle attack.
device is authorized (secure network access). In several
scenarios, one can expect malicious entities preventing an
embedded system from performing the functions it is
supposed to, resulting in a degradation of performance,
quality of service, etc.
9. REFERENCES