mollye embedded

Upload: ishaan-munrakhan

Post on 05-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 Mollye Embedded

    1/7

    REPORT

    TO DESCRIBE TYPES OF SECURITY

    WHICH ARE USED

    OR CAN BE IMPLEMENTED

    IN EMBEDDEDSYSTEMS

    BY:

    AVINASH MOLLYE

    ( 091610)

  • 8/2/2019 Mollye Embedded

    2/7

    INTRODUCTION

    Security regarding embedded systems are becoming more and more important sincethey have very

    limited security options. It is very a hard task to implement high level of security in embedded

    system devices.

    Most users want to have a security aspect in most their devices when they are making use of

    them. Therefore by doing so this will protect their data from major security problem.

  • 8/2/2019 Mollye Embedded

    3/7

    The security of embedded systems depend on many different factors which must be in the norms

    required or must be working in the way required.

    For example running software and external devices like network on a system have access to multiple

    resources which has been provided by the specific operating system.

    The role of the operating system is that it must be able to control requests. Meaning must distinguish

    with processed and unprocessed requests.

    For this the process of authentication is made. This is done to assign a username to the corresponding

    requester .

    The use of magnetic cards also can be use as a type of security.

    On the network it is different. Access can be made without authentication , therefore there we make

    use of high level security system which will offer auditing options.

    This will allow to track those people who has been reading the corresponding file.

    All these security are possible if all possible dangerous request are carried out through interrupts to the

    operating system.

    If there is direct access between hardware or resources and programs , they cannot be secured.

    Data transfer as well need to be secure when passing in public network.

    The secure data must be scrambled in such a way so that it becomes useless or unintelligible for any

    unauthorized person who want to access the secure data.

    This can be done by using Cryptographic methods such as encryption and decryption.

    In this process a secret (key) is used which only the communicating device will have access to.

    The level of security here will depend on the secrecy of the key

    This allow a securer way to communicate or send data

  • 8/2/2019 Mollye Embedded

    4/7

    Another type to secure devices is to make use of Tamper Mechanisms

    This mainly deal with physical or electronic action on the device.

    One such type is called Tamper Resistance.

    This method will increase the level of tampering by making use of specialized materials. We can find

    those kinds of steps such as hardened steel enclosures, locks, encapsulation, or security screws.

    Its advantage is that it can be visually observed and also determine that the object was prone security

    threats

    Another type of protection can be the Tamper detection method.

    This enable the hardware devices to detect any case of tampering

    We may include the use of :

    i)switch such as micro switches, magnetic switches, mercury switches, and pressure contacts to detect

    if the device has been opened or misplace of any corresponding component

    ii).Sensors to detect any changes in the product or the way it must be conserve, radiation sensors for X-

    rays to see what is the content of a sealed or any encapsulate device

    iii) Circuitry to see if a systemhas been physical tampering.

  • 8/2/2019 Mollye Embedded

    5/7

    Another threat for embedded system devices is the counterfeit creation of a product.

    To avoid this seal can be use of even appropriate tags for the corresponding are add up to make it more

    visible to the user or even the supplier if it is a counterfeit product.

    Timing Analysis Attacks is another threat in the embedded system.

    In this type of attack the attacker will try to find a connection between the working period of the

    computer of a particular and the values implicated in the steps. Information like passwords and keys for

    cryptography are most at risk in this type of attacks. By doing so an attacker can predict important

    information that has been stored in the system.

    Randomization is a solution for Timing analysis attack. To be able to achieve a timing analysis

    attack the attacker must be able to find out exactly when a particular operation is being

    performed. This is made complicated with Randomization since the reconstruction of the clock

    signal is made difficult by using a randomly switching activity and clock.

  • 8/2/2019 Mollye Embedded

    6/7

    References:

    http://www.irma-international.org/viewtitle/56302/

    http://en.wikibooks.org/wiki/Embedded_Systems/Embedded_Systems_Introduction

    Philip Koopman, Carnegie Mellon University articles

    http://www.irma-international.org/viewtitle/56302/http://www.irma-international.org/viewtitle/56302/http://en.wikibooks.org/wiki/Embedded_Systems/Embedded_Systems_Introductionhttp://en.wikibooks.org/wiki/Embedded_Systems/Embedded_Systems_Introductionhttp://en.wikibooks.org/wiki/Embedded_Systems/Embedded_Systems_Introductionhttp://www.irma-international.org/viewtitle/56302/
  • 8/2/2019 Mollye Embedded

    7/7