security in embedded systems
TRANSCRIPT
![Page 1: Security in embedded systems](https://reader036.vdocuments.us/reader036/viewer/2022062412/58730c821a28ab99088b6eeb/html5/thumbnails/1.jpg)
By Raghav S
Technical Seminar on Security in Embedded
Systems
![Page 2: Security in embedded systems](https://reader036.vdocuments.us/reader036/viewer/2022062412/58730c821a28ab99088b6eeb/html5/thumbnails/2.jpg)
What is an Embedded System? Introduction to Network Security Survey Problem Definition Proposed Solution Comparison Future Scope
Overview
![Page 3: Security in embedded systems](https://reader036.vdocuments.us/reader036/viewer/2022062412/58730c821a28ab99088b6eeb/html5/thumbnails/3.jpg)
• An embedded system is a combination of computer hardware and software, either fixed in capability or programmable, that is specifically designed for a particular function.
Embedded System
![Page 4: Security in embedded systems](https://reader036.vdocuments.us/reader036/viewer/2022062412/58730c821a28ab99088b6eeb/html5/thumbnails/4.jpg)
• Network security is a term that describes the policies and procedures implemented by a network administrator to avoid and keep track of unauthorized access, exploitation, modification and denial of the access.
Network Security
![Page 5: Security in embedded systems](https://reader036.vdocuments.us/reader036/viewer/2022062412/58730c821a28ab99088b6eeb/html5/thumbnails/5.jpg)
• Hacking is gaining of unauthorized access to a computer and viewing, copying, or creating data with/without the intention of destroying data or maliciously harming the computer.
Hacking
![Page 6: Security in embedded systems](https://reader036.vdocuments.us/reader036/viewer/2022062412/58730c821a28ab99088b6eeb/html5/thumbnails/6.jpg)
Reasons for Hacking:
Cost of Insecurity:
Survey
![Page 7: Security in embedded systems](https://reader036.vdocuments.us/reader036/viewer/2022062412/58730c821a28ab99088b6eeb/html5/thumbnails/7.jpg)
• Advancement in Technology
• Security is an afterthought
Problem Definition
![Page 8: Security in embedded systems](https://reader036.vdocuments.us/reader036/viewer/2022062412/58730c821a28ab99088b6eeb/html5/thumbnails/8.jpg)
Hardware approach : It uses ASICs (Application Specific Integrated Circuits) to implement a given cryptography algorithm in hardware.
Hybrid Hardware - software approach : It uses a general purpose embedded processor and integrates hardware accelerators for the execution of critical Cryptographic algorithms.
Proposed Solution
![Page 9: Security in embedded systems](https://reader036.vdocuments.us/reader036/viewer/2022062412/58730c821a28ab99088b6eeb/html5/thumbnails/9.jpg)
Comparison
Existing Solution(Software Solution)
Proposed Solution(Hardware Solution)
• Protects the system against software attacks only.
• Protects the system against software as well as hardware attacks.
• Has to be administered by the user.
• Self – administered.
• It proves to be expensive. • It is cost effective.
• Updating on a regular basis needs to be carried out.
• Eliminates the need for updating.
• High level user interaction required.
• User interaction is close to nil.
![Page 10: Security in embedded systems](https://reader036.vdocuments.us/reader036/viewer/2022062412/58730c821a28ab99088b6eeb/html5/thumbnails/10.jpg)
Design challenges: Battery Gap Flexibility Tamper resistance
Interaction between Network Security engineer and Architecture engineer is required.
Presently it is difficult to implement in the existing devices.
Disadvantages of the Proposed solution
![Page 11: Security in embedded systems](https://reader036.vdocuments.us/reader036/viewer/2022062412/58730c821a28ab99088b6eeb/html5/thumbnails/11.jpg)
• Development in the semiconductor industry might aid the manufacturing of the chip.
• Diversity in the hardware component used(Cryptographic Chip).
• Develop methodology to provide the features of Cryptographic chips in the existing devices.
Future Scope
![Page 12: Security in embedded systems](https://reader036.vdocuments.us/reader036/viewer/2022062412/58730c821a28ab99088b6eeb/html5/thumbnails/12.jpg)
1. Paul Kocher, Ruby Lee, Gary McGraw, Anand Raghunathan and Srivaths Ravi, “Security as a New Dimension in Embedded System Design”.
2. Srivaths Ravi, Anand Raghunathan, Paul Kocher, Sunil Hattangady, “Security in Embedded Systems: Design Challenges”.
3. Jesús Lizarraga, Roberto Uribeetxeberria, Urko Zurutuza, Miguel Fernández, “Security in embedded systems”.
4. Embedded systems, http://searchenterpriselinux.techtarget.com/definition/embedded-system.
5. Network Security, http://www.techopedia.com/definition/24783/network-security.
References
![Page 13: Security in embedded systems](https://reader036.vdocuments.us/reader036/viewer/2022062412/58730c821a28ab99088b6eeb/html5/thumbnails/13.jpg)
Thank You!