Secure Embedded Systems

Author(s):  
Ali Ahmadinia ◽  
Ahmed Saeed

As computing devices have become an almost integral part of our lives, security of systems and protection of the sensitive data are emerging as very important issues. This is particularly evident for embedded systems which are often deployed in unprotected environments and at the same time being constrained by limited resources. Security and trust have also become important considerations in the design of virtually all modern embedded systems as they are utilized in critical and sensitive applications such as in transportation, national infrastructure, military equipment, banking systems, and medical devices. The increase in software content and network connectivity has made them vulnerable to fast spreading software-based attacks such as viruses and worms, which were hitherto primarily the concern of personal computers, servers, and the internet. This chapter discusses the basic concepts, security attacks types, and existing preventive measures in the field of embedded systems and multi-core systems.

With the evolution of the Internet and related technologies, there has been an evolution of new paradigm, which is the Internet of Things (IoT). IoT is the network of physical objects, such as devices, embedded with electronics, software, sensors, and network connectivity that enables these objects to collect and exchange data. In the IoT, a large number of objects are connected to one another for information sharing, irrespective of their locations (Corcoran, 2016). Even though the IoT was defined at 1999, the concept of IoT has been in development for decades. As the technology and implementation of the IoT ideas move forward, different views for the concept of the IoT have appeared (Ma, 2011). Based on different views, in this book, the IoT is defined as a kind of modern technology, implicating machine to machine communications and person to computer communications will be extended to everything from everyday household objects to sensors monitoring the movement. Currently, we can see a few key areas of focus for the Internet of Things (IoT) that will require special attention over the course of the next decade on the part of computer science, energy technology, networks, wireless communication, and system platform. There are already a number of implementation case studies emerging from companies across a range of industry sectors.


Author(s):  
Alok Vishwakarma ◽  
Wafa Waheeda S

With increasing number of users on the internet, risk of security and probability of vulnerable attacks are increasing day by day. For every user connected to network, security attacks like hacking and cracking are very frequent which leaves enormous amounts of sensitive data at the risk of being altered, lost or misused. This apparently leads to the need for security measures on ports and protocols also search for application security, VPN, IPS, and a firewall support. The hacking and cracking threats and attacks in a network are no longer in control with the existing methods and standard firewalls. The introduction of Next Generation Firewalls leads to improved security over network. This chapter deals with hacking and cracking attacks over network and their countermeasures, also focusing on the changing dynamics of network security with next generation firewalls.


Author(s):  
Sungwook Kim

With the evolution of the Internet and related technologies, there has been an evolution of new paradigm, which is the Internet of Things (IoT). IoT is the network of physical objects, such as devices, embedded with electronics, software, sensors, and network connectivity that enables these objects to collect and exchange data. In the IoT, a large number of objects are connected to one another for information sharing, irrespective of their locations (Corcoran, 2016). Even though the IoT was defined at 1999, the concept of IoT has been in development for decades. As the technology and implementation of the IoT ideas move forward, different views for the concept of the IoT have appeared (Ma, 2011). Based on different views, in this book, the IoT is defined as a kind of modern technology, implicating machine to machine communications and person to computer communications will be extended to everything from everyday household objects to sensors monitoring the movement. Currently, we can see a few key areas of focus for the Internet of Things (IoT) that will require special attention over the course of the next decade on the part of computer science, energy technology, networks, wireless communication, and system platform. There are already a number of implementation case studies emerging from companies across a range of industry sectors.


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


Telecom ◽  
2021 ◽  
Vol 2 (1) ◽  
pp. 108-140
Author(s):  
Paulo Álvares ◽  
Lion Silva ◽  
Naercio Magaia

It had been predicted that by 2020, nearly 26 billion devices would be connected to the Internet, with a big percentage being vehicles. The Internet of Vehicles (IoVa) is a concept that refers to the connection and cooperation of smart vehicles and devices in a network through the generation, transmission, and processing of data that aims at improving traffic congestion, travel time, and comfort, all the while reducing pollution and accidents. However, this transmission of sensitive data (e.g., location) needs to occur with defined security properties to safeguard vehicles and their drivers since attackers could use this data. Blockchain is a fairly recent technology that guarantees trust between nodes through cryptography mechanisms and consensus protocols in distributed, untrustful environments, like IoV networks. Much research has been done in implementing the former in the latter to impressive results, as Blockchain can cover and offer solutions to many IoV problems. However, these implementations have to deal with the challenge of IoV node’s resource constraints since they do not suffice for the computational and energy requirements of traditional Blockchain systems, which is one of the biggest limitations of Blockchain implementations in IoV. Finally, these two technologies can be used to build the foundations for smart cities, enabling new application models and better results for end-users.


2015 ◽  
Vol 9 (1) ◽  
pp. 256-261 ◽  
Author(s):  
Aiyu Hao ◽  
Ling Wang

At present, hospitals in our country have basically established the HIS system, which manages registration, treatment, and charge, among many others, of patients. During treatment, patients need to use medical devices repeatedly to acquire all sorts of inspection data. Currently, the output data of the medical devices are often manually input into information system, which is easy to get wrong or easy to cause mismatches between inspection reports and patients. For some small hospitals of which information construction is still relatively weak, the information generated by the devices is still presented in the form of paper reports. When doctors or patients want to have access to the data at a given time again, they can only look at the paper files. Data integration between medical devices has long been a difficult problem for the medical information system, because the data from medical devices lack mandatory unified global standards and have outstanding heterogeneity of devices. In order to protect their own interests, manufacturers use special protocols, etc., thus causing medical devices to still be the "lonely island" of hospital information system. Besides, unfocused application of the data will lead to failure to achieve a reasonable distribution of medical resources. With the deepening of IT construction in hospitals, medical information systems will be bound to develop toward mobile applications, intelligent analysis, and interconnection and interworking, on the premise that there is an effective medical device integration (MDI) technology. To this end, this paper presents a MDI model based on the Internet of Things (IoT). Through abstract classification, this model is able to extract the common characteristics of the devices, resolve the heterogeneous differences between them, and employ a unified protocol to integrate data between devices. And by the IoT technology, it realizes interconnection network of devices and conducts associate matching between the data and the inspection with the terminal device in a timely manner.


Sign in / Sign up

Export Citation Format

Share Document