security in embedded systems
Post on 09-Jan-2017
422 Views
Preview:
TRANSCRIPT
By Raghav S
Technical Seminar on Security in Embedded
Systems
What is an Embedded System? Introduction to Network Security Survey Problem Definition Proposed Solution Comparison Future Scope
Overview
• An embedded system is a combination of computer hardware and software, either fixed in capability or programmable, that is specifically designed for a particular function.
Embedded System
• Network security is a term that describes the policies and procedures implemented by a network administrator to avoid and keep track of unauthorized access, exploitation, modification and denial of the access.
Network Security
• Hacking is gaining of unauthorized access to a computer and viewing, copying, or creating data with/without the intention of destroying data or maliciously harming the computer.
Hacking
Reasons for Hacking:
Cost of Insecurity:
Survey
• Advancement in Technology
• Security is an afterthought
Problem Definition
Hardware approach : It uses ASICs (Application Specific Integrated Circuits) to implement a given cryptography algorithm in hardware.
Hybrid Hardware - software approach : It uses a general purpose embedded processor and integrates hardware accelerators for the execution of critical Cryptographic algorithms.
Proposed Solution
Comparison
Existing Solution(Software Solution)
Proposed Solution(Hardware Solution)
• Protects the system against software attacks only.
• Protects the system against software as well as hardware attacks.
• Has to be administered by the user.
• Self – administered.
• It proves to be expensive. • It is cost effective.
• Updating on a regular basis needs to be carried out.
• Eliminates the need for updating.
• High level user interaction required.
• User interaction is close to nil.
Design challenges: Battery Gap Flexibility Tamper resistance
Interaction between Network Security engineer and Architecture engineer is required.
Presently it is difficult to implement in the existing devices.
Disadvantages of the Proposed solution
• Development in the semiconductor industry might aid the manufacturing of the chip.
• Diversity in the hardware component used(Cryptographic Chip).
• Develop methodology to provide the features of Cryptographic chips in the existing devices.
Future Scope
1. Paul Kocher, Ruby Lee, Gary McGraw, Anand Raghunathan and Srivaths Ravi, “Security as a New Dimension in Embedded System Design”.
2. Srivaths Ravi, Anand Raghunathan, Paul Kocher, Sunil Hattangady, “Security in Embedded Systems: Design Challenges”.
3. Jesús Lizarraga, Roberto Uribeetxeberria, Urko Zurutuza, Miguel Fernández, “Security in embedded systems”.
4. Embedded systems, http://searchenterpriselinux.techtarget.com/definition/embedded-system.
5. Network Security, http://www.techopedia.com/definition/24783/network-security.
References
Thank You!
top related