Concepedia

Publication | Closed Access

Security as a new dimension in embedded system design

389

Citations

36

References

2004

Year

TLDR

The rise in security breaches has underscored the need for secure electronic systems, and embedded systems—ubiquitously handling sensitive data—pose unique challenges that have been studied in cryptography, computing, and networking, yet designers often view security merely as cryptographic implementation rather than a holistic metric. This paper aims to introduce embedded system designers and tool developers to the challenges of treating security as a new holistic metric alongside cost, performance, and power throughout the design process. The authors analyze end‑user functional security requirements, identify challenges for architects and designers—including tamper resistance, processing demands, and battery‑life impacts—and survey existing and emerging solution techniques while outlining open research problems for future architectural innovations.

Abstract

The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded systems, which will be ubiquitously used to capture, store, manipulate, and access data of a sensitive nature, pose several unique and interesting security challenges. Security has been the subject of intensive research in the areas of cryptography, computing, and networking. However, despite these efforts, security is often mis-construed by designers as the hardware or software implementation of specific cryptographic algorithms and security protocols. In reality, it is an entirely new metric that designers should consider throughout the design process, along with other metrics such as cost, performance, and power..This paper is intended to introduce embedded system designers and design tool developers to the challenges involved in designing secure embedded systems. We attempt to provide a unified and holistic view of embedded system security by first analyzing the typical functional security requirements for embedded systems from an end-user perspective. We then identify the implied challenges for embedded system architects, as well as hardware and software designers (e.g., tamper-resistant embedded system design, processing requirements for security, impact of security on battery life for battery-powered systems, etc.). We also survey solution techniques to address these challenges, drawing from both current practice and emerging research, and identify open research problems that will require innovations in embedded system architecture and design methodologies.

References

YearCitations

Page 1