On security issues in embedded systems: Challenges and solutions

被引:9
|
作者
Khelladi, Lyes [1 ]
Challal, Yacine [2 ]
Bouabdallah, Abdelmadjid [2 ]
Badache, Nadjib [3 ]
机构
[1] CERIST Center of Research, Algiers
[2] Université de Technologies de Compiègne, UMR, CNRS, Compiègne
[3] Computer Science Department, USTHB University, Algiers
关键词
Computer security; Embedded systems; Information and computer security;
D O I
10.1504/IJICS.2008.018515
中图分类号
学科分类号
摘要
Ensuring security in embedded systems translates into several design challenges, imposed by the unique features of these systems. These features make the integration of conventional security mechanisms impractical, and require a better understanding of the whole security problem. This paper provides a unified view on security in embedded systems, by introducing first the implied design and architectural challenges. It then surveys and discusses the currently proposed security solutions that address these challenges, drawing from both current practices and emerging research, and identifies some open research problems that represent the most interesting areas of contribution. © 2008, Inderscience Publishers.
引用
收藏
页码:140 / 174
页数:34
相关论文
共 50 条
  • [1] Security Challenges in Embedded Systems
    Serpanos, Dimitrios N.
    Voyiatzis, Artemios G.
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2013, 12
  • [2] Machine Learning in Embedded Systems: Limitations, Solutions and Future Challenges
    Batzolis, Eleftherios
    Vrochidou, Eleni
    Papakostas, George A.
    2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, : 345 - 350
  • [3] Embedded security solutions for automotive applications
    Bogdanov, A.
    Carluccio, D.
    Weimerskirch, A.
    Wollinger, T.
    ADVANCED MICROSYSTEMS FOR AUTOMOTIVE APPLICATIONS 2007, 2007, : 177 - +
  • [4] The Security Process Model of Embedded Systems
    Choi, Shin-Hyeong
    GRID AND DISTRIBUTED COMPUTING, 2011, 261 : 329 - 334
  • [5] Embedded fuzzing: a review of challenges, tools, and solutions
    Max Eisele
    Marcello Maugeri
    Rachna Shriwas
    Christopher Huth
    Giampaolo Bella
    Cybersecurity, 5
  • [6] Embedded fuzzing: a review of challenges, tools, and solutions
    Eisele, Max
    Maugeri, Marcello
    Shriwas, Rachna
    Huth, Christopher
    Bella, Giampaolo
    CYBERSECURITY, 2022, 5 (01)
  • [7] Known security issues of IoT systems
    Szadeczky, Tamas
    Kovacs, Gergely
    2018 IEEE INTERNATIONAL CONFERENCE AND WORKSHOP IN OBUDA ON ELECTRICAL AND POWER ENGINEERING (CANDO-EPE), 2018, : 133 - 136
  • [8] Embedded systems - challenges and the DECOS approach
    Schoitsch, E.
    Althammer, E.
    Lamedschwandner, K.
    Welinder, J.
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2006, 123 (09): : 369 - 376
  • [9] Towards the Model-Driven Engineering of Security Requirements for Embedded Systems
    Roudier, Yves
    Idrees, Muhammad Sabir
    Apvrille, Ludovic
    2013 3RD INTERNATIONAL WORKSHOP ON MODEL-DRIVEN REQUIREMENTS ENGINEERING (MODRE), 2013, : 55 - 64
  • [10] Tiered Trust for Useful Embedded Systems Security
    Ayers, Hudson
    Dutta, Prabal
    Levis, Philip
    Levy, Amit
    Pannuto, Pat
    Van Why, Johnathan
    Watson, Jean-Luc
    PROCEEDINGS OF THE 15TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 22), 2022, : 15 - 21