security in embedded systems

Post on 09-Jan-2017

422 Views

Category:

Engineering

4 Downloads

Preview:

Click to see full reader

TRANSCRIPT

By Raghav S

Technical Seminar on Security in Embedded

Systems

What is an Embedded System? Introduction to Network Security Survey Problem Definition Proposed Solution Comparison Future Scope

Overview

• An embedded system is a combination of computer hardware and software, either fixed in capability or programmable, that is specifically designed for a particular function.

Embedded System

• Network security is a term that describes the policies and procedures implemented by a network administrator to avoid and keep track of unauthorized access, exploitation, modification and denial of the access.

Network Security

• Hacking is gaining of unauthorized access to a computer and viewing, copying, or creating data with/without the intention of destroying data or maliciously harming the computer. 

Hacking

Reasons for Hacking:

Cost of Insecurity:

Survey

• Advancement in Technology

• Security is an afterthought

Problem Definition

Hardware approach : It uses ASICs (Application Specific Integrated Circuits) to implement a given cryptography algorithm in hardware.

Hybrid Hardware - software approach : It uses a general purpose embedded processor and integrates hardware accelerators for the execution of critical Cryptographic algorithms.

Proposed Solution

Comparison

Existing Solution(Software Solution)

Proposed Solution(Hardware Solution)

• Protects the system against software attacks only.

• Protects the system against software as well as hardware attacks.

• Has to be administered by the user.

• Self – administered.

• It proves to be expensive. • It is cost effective.

• Updating on a regular basis needs to be carried out.

• Eliminates the need for updating.

• High level user interaction required.

• User interaction is close to nil.

Design challenges: Battery Gap Flexibility Tamper resistance

Interaction between Network Security engineer and Architecture engineer is required.

Presently it is difficult to implement in the existing devices.

Disadvantages of the Proposed solution

• Development in the semiconductor industry might aid the manufacturing of the chip.

• Diversity in the hardware component used(Cryptographic Chip).

• Develop methodology to provide the features of Cryptographic chips in the existing devices.

Future Scope

1. Paul Kocher, Ruby Lee, Gary McGraw, Anand Raghunathan and Srivaths Ravi, “Security as a New Dimension in Embedded System Design”.

2. Srivaths Ravi, Anand Raghunathan, Paul Kocher, Sunil Hattangady, “Security in Embedded Systems: Design Challenges”.

3. Jesús Lizarraga, Roberto Uribeetxeberria, Urko Zurutuza, Miguel Fernández, “Security in embedded systems”.

4. Embedded systems, http://searchenterpriselinux.techtarget.com/definition/embedded-system.

5. Network Security, http://www.techopedia.com/definition/24783/network-security.

References

Thank You!

top related