Privacy Preservation, Trust, and Security in Intelligent Embedded Systems

Author(s):  
Kusum Yadav ◽  
Yasser Alharbi

Abstract An embedded system is a software and hardware system that is based on a microcontroller or microprocessor designed to accomplish the dedicated functions within a massive electrical or mechanical system. An intelligent embedded system (IES) is a generation or promising evolution of an embedded system (ES). IES has the ability of reasoning about their external atmosphere and acclimates their nature accordingly. The capacity of IES is characterized by the ability of process, service, or product to expose the performance of the environment to enrich the lifetime, quality, and satisfaction of the individual. IES facilitates the processing of information gathered from the embedded sensors. IES rely on numerous multidisciplinary methods for the successive operation.IES is widely employed in consumer electronics, industrial machines, agriculture, medical equipment, and other automated applications. It is programmable and necessary functionalities can be achieved effectively. In this article diversified utilities of embedded intelligence, challenges, issues, privacy, and security metrics of IES are discussed.

2020 ◽  
Vol 2 (2) ◽  
pp. 18
Author(s):  
Chen Chen

Embedded system is a special computer application system embedded in the object system. It is a combination of software and hardware. After decades of development, embedded systems have gradually entered many important industries such as industrial production, military, aerospace, transportation, wireless communications, and consumer electronics products, and their applications are extensive. The diversity of embedded systems has driven the rapid development of the embedded product market. In this paper, we analyze the teaching reform of embedded system development from the perspective of artificial intelligence. The sample models are integrated to help understand the proposed methodology. The numerical analysis proves the novelty.


Ergodesign ◽  
2020 ◽  
Vol 2020 (1) ◽  
pp. 19-24
Author(s):  
Igor Pestov ◽  
Polina Shinkareva ◽  
Sofia Kosheleva ◽  
Maxim Burmistrov

This article aims to develop a hardware-software system for access control and management based on the hardware platforms Arduino Uno and Raspberry Pi. The developed software and hardware system is designed to collect data and store them in the database. The presented complex can be carried and used anywhere, which explains its high mobility.


Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 3891 ◽  
Author(s):  
Yushuang Ma ◽  
Long Zhao ◽  
Rongjin Yang ◽  
Xiuhong Li ◽  
Qiao Song ◽  
...  

At present, as growing importance continues to be attached to atmospheric environmental problems, the demand for real-time monitoring of these problems is constantly increasing. This article describes the development and application of an embedded system for monitoring of atmospheric pollutant concentrations based on LoRa (Long Range) wireless communication technology, which is widely used in the Internet of Things (IoT). The proposed system is realized using a combination of software and hardware and is designed using the concept of modularization. Separation of each function into independent modules allows the system to be developed more quickly and to be applied more stably. In addition, by combining the requirements of the remote atmospheric pollutant concentration monitoring platform with the specific requirements for the intended application environment, the system demonstrates its significance for practical applications. In addition, the actual application data also verifies the sound application prospects of the proposed system.


The need for miniaturization has been the driving force in chip manufacturing. The proliferation of IoT, robotics, consumer electronics and medical instruments pose unprecedented demands on the embedded system design. The area optimization can be achieved either by reducing the size of transistors or by optimizing (reducing) the circuit at the gate level. The first solution has attracted many researchers while the later has not been explored to its full potential. The aim is to design a System on Chip (SoC) to satisfy the dynamic requirements of disruptive technologies while occupying the lesser area. The design and testing of communication interfaces such as Serial Peripheral Interface (SPI), Inter-IC Communication (I2C), Universal Asynchronous Receiver and Transmitter (UART) are very crucial in the area optimization of microcontroller design. Since SPI being an important communication protocol, this work reports the preliminary research carried in the design and verification of it. In this work, Verilog is used for the design and verification of the SPI module. The results show that there is a drastic reduction in the number of Look-Up-Tables (LUTs) and slices required to build the circuit. We conclude that sophisticated optimization techniques of the circuit at the gate level has the potential to reduce the area by half.


2015 ◽  
Vol 4 (9(76)) ◽  
pp. 21
Author(s):  
Роман Юрійович Лопаткін ◽  
Сергій Миколайович Ігнатенко

Author(s):  
Алексей Горлов ◽  
Aleksey Gorlov ◽  
Михаил Рытов ◽  
Mikhail Rytov ◽  
Дмитрий Лысов ◽  
...  

This article discusses the process of automating the assessment of the effectiveness of software and hardware information protection by creating an automated system. The main functions of the proposed system are: conducting an audit of information security, forming a model of information security threats, forming recommendations for creating a software and hardware system for protecting information, and creating organizational-technical documentation. The developed automated system for evaluating the effectiveness of software and hardware protection of information allows in an automated way to build a model of information security threats, to form organizational and technical documentation governing the protection of confidential information, and also to make recommendations for improving the software and hardware system for protecting information. The use of this system will significantly reduce the time and material costs of auditing information security and developing additional measures to protect information.


Author(s):  
Narander Kumar ◽  
Jitendra Kumar Samriya

Background: Cloud computing is a service that is being accelerating its growth in the field of information technology in recent years. Privacy and security are challenging issues for cloud users and providers. Obective: This work aims at ensuring secured validation of user and protects data during transmission for users in a public IoT-cloud environment. Existing security measures however fails by their single level of security, adaptability for large amount of data and reliability. Therefore, to overcome these issues and to achieve a better solution for vulnerable data. Method: The suggested method utilizes a secure transmission in cloud using key policy attribute based encryption (KPABE). Initially, user authentication is verified. Then the user data is encrypted with the help of KP-ABE algorithm. Finally, data validation and privacy preservation are done by Burrows-Abadi-Needham (BAN) logic. This verified, and shows that the proposed encryption is correct, secure and efficient to prevent unauthorized access and prevention of data leakage so that less chances of data/identity, theft of a user is the analysis and performed by KP-ABE, that is access control approach. Results: Here the method attains the maximum of 88.35% of validation accuracy with a minimum 8.78ms encryption time, which is better when, compared to the existing methods. The proposed mechanism is done by MATLAB. The performance of the implemented method is calculated based on the time of encryption and decryption, execution time and validation accuracy. Conclusion: Thus the proposed approach attains the high IoT-cloud data security and increases the speed for validation and transmission with high accuracy and used for cyber data science processing.


Locked Out ◽  
2019 ◽  
pp. 23-46
Author(s):  
Evan Elkins

Chapter 1 explores regional lockout’s assemblage of technology, distribution, regulation, and culture through the DVD region code. In order to preserve traditional market segmentation practices, Hollywood convinced consumer electronics manufacturers to develop a DRM system wherein DVDs and DVD players are assigned a numerical “region code” based on their respective geographic territories. The codes in the software and hardware must match before the DVD will play. Chapter 1 details the DVD region code’s history, showing how the system was put in place and governed through complex negotiations and alignments among content creators, electronics manufacturers, and governing bodies. The chapter argues that the system is not only a hard-nosed form of technological and distributional control but also a system of symbolic global representation that clusters certain territories together and ranks those clusters within economic and cultural hierarchies.


2012 ◽  
pp. 1141-1166
Author(s):  
Milan Petkovic ◽  
Luan Ibraimi

The introduction of e-Health and extramural applications in the personal healthcare domain has raised serious concerns about security and privacy of health data. Novel digital technologies require other security approaches in addition to the traditional “purely physical” approach. Furthermore, privacy is becoming an increasing concern in domains that deal with sensitive information such as healthcare, which cannot absorb the costs of security abuses in the system. Once sensitive information about an individual’s health is uncovered and social damage is done, there is no way to revoke the information or to restitute the individual. Therefore, in addition to legal means, it is very important to provide and enforce privacy and security in healthcare by technological means. In this chapter, the authors analyze privacy and security requirements in healthcare, explain their importance and review both classical and novel security technologies that could fulfill these requirements.


Data Mining ◽  
2011 ◽  
pp. 350-365 ◽  
Author(s):  
Fay Cobb Payton

Recent attention has turned to the healthcare industry and its use of voluntary community health information network (CHIN) models for e-health and care delivery. This chapter suggests that competition, economic dimensions, political issues, and a group of enablers are the primary determinants of implementation success. Most critical to these implementations is the issue of data management and utilization. Thus, health care organizations are finding value as well as strategic applications to mining patient data, in general, and community data, in particular. While significant gains can be obtained and have been noted at the organizational level of analysis, much attention has been given to the individual, where the focal points have centered on privacy and security of patient data. While the privacy debate is a salient issue, data mining (DM) offers broader community-based gains that enable and improve healthcare forecasting, analyses, and visualization.


Sign in / Sign up

Export Citation Format

Share Document