On security issues in embedded systems: Challenges and solutions

被引:9
|
作者
Khelladi, Lyes [1 ]
Challal, Yacine [2 ]
Bouabdallah, Abdelmadjid [2 ]
Badache, Nadjib [3 ]
机构
[1] CERIST Center of Research, Algiers
[2] Université de Technologies de Compiègne, UMR, CNRS, Compiègne
[3] Computer Science Department, USTHB University, Algiers
关键词
Computer security; Embedded systems; Information and computer security;
D O I
10.1504/IJICS.2008.018515
中图分类号
学科分类号
摘要
Ensuring security in embedded systems translates into several design challenges, imposed by the unique features of these systems. These features make the integration of conventional security mechanisms impractical, and require a better understanding of the whole security problem. This paper provides a unified view on security in embedded systems, by introducing first the implied design and architectural challenges. It then surveys and discusses the currently proposed security solutions that address these challenges, drawing from both current practices and emerging research, and identifies some open research problems that represent the most interesting areas of contribution. © 2008, Inderscience Publishers.
引用
收藏
页码:140 / 174
页数:34
相关论文
共 50 条
  • [21] Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions
    Park, Jin Ho
    Park, Jong Hyuk
    SYMMETRY-BASEL, 2017, 9 (08):
  • [22] HardSnap: Leveraging Hardware Snapshotting for Embedded Systems Security Testing
    Corteggiani, Nassim
    Francillon, Aurelien
    2020 50TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2020), 2020, : 294 - 305
  • [23] Design for safety and security of complex embedded systems: A unified approach
    Schoitsch, E
    Cyberspace Security and Defense: Research Issues, 2005, 196 : 161 - 174
  • [24] Improving security for periodic tasks in embedded systems through scheduling
    Xie, Tao
    Qin, Xiao
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2007, 6 (03) : 20
  • [25] Embedded Systems Network Security Technology Measures Analysis Overview
    Qiu, Hong
    2012 INTERNATIONAL CONFERENCE ON EDUCATION REFORM AND MANAGEMENT INNOVATION (ERMI 2012), VOL 4, 2013, : 164 - 168
  • [26] LASE: Latency Aware Simple Encryption for Embedded Systems Security
    Courtright, Kerry
    Husain, Mohammad Iftekhar
    Sridhar, Ramalingam
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (10): : 1 - 6
  • [27] SoK: Enabling Security Analyses of Embedded Systems via Rehosting
    Fasano, Andrew
    Ballo, Tiemoko
    Muench, Marius
    Leek, Tim
    Bulekov, Alexander
    Dolan-Gavitt, Brendan
    Egele, Manuel
    Francillon, Aurelien
    Lu, Long
    Gregory, Nick
    Balzarotti, Davide
    Robertson, William
    ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 687 - 701
  • [28] Embedded Sensor Systems in Medical Devices: Requisites and Challenges Ahead
    Arandia, Nerea
    Garate, Jose Ignacio
    Mabe, Jon
    SENSORS, 2022, 22 (24)
  • [29] Large Data Stream Processing - Embedded Systems Design Challenges
    Handzlik, Adam
    Jablonski, Andrzej
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2010, 56 (02) : 107 - 110
  • [30] Challenges and Opportunities when Introducing Cloud Computing into Embedded Systems
    Hallmans, Daniel
    Sandstrom, Kristian
    Nolte, Thomas
    Larsson, Stig
    PROCEEDINGS 2015 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2015, : 454 - 459