Embedded System Security
نویسنده
چکیده
F rom cars to cell phones, video equipment to MP3 players, and dishwashers to home ther-mostats—embedded computers increasingly permeate our lives. But security for these systems is an open question and could prove a more difficult long-term problem than security does today for desktop and enterprise computing. Security issues are nothing new for embedded systems. In 2001, Peter Shipley and Simson L. Garfinkel reported finding an unprotected modem line to a system that controlled a high-voltage power transmission line (" An Analysis of Dial-Up Modems and Vulnerabilities, " 2001; www.dis.org/ filez/Wardial_ShipleyGarfinkel.pdf). However, as more embedded systems are connected to the Internet, the potential damages from such vulnerabilities scale up dramatically. This issue is already upon us. Today you can buy Internet-enabled home appliances and security systems, and some hospitals use wireless IP networks for patient care equipment. Cars will inevitably have indirect Internet connections—via a firewall or two— to safety-critical control systems. There have already been proposals for using wireless roadside transmitters to send real-time speed limit changes to engine control computers. There is even a proposal for passenger jets to use IP for their primary flight controls, just a few firewalls away from passengers cruising the Web Internet connections expose applications to intrusions and malicious attacks. Unfortunately, security techniques developed for enterprise and desktop computing might not satisfy embedded application requirements. Embedded systems are often highly cost sensitive—even five cents can make a big difference when building millions of units per year. For this reason, most CPUs manufactured worldwide use 4-and 8-bit processors, which have limited room for security overhead. Many 8-bit microcontrollers, for example, can't store a big cryptographic key. This can make best practices from the enterprise world too expensive to be practical in embedded applications. Cutting corners on security to reduce hardware costs can give a competitor a market advantage for price-sensitive products. And if there is no quantitative measure of security before a product is deployed, who is to say how much to spend on it? Interactive matters Many embedded systems interact with the real world. A security breach thus can result in physical side effects, including property damage, personal injury, and even death. Backing out financial transactions can repair some enterprise security breaches, but reversing a car crash isn't possible. Unlike transaction-oriented enterprise computing, embedded systems often perform periodic computations to run control loops with real-time deadlines. Speeds can easily reach 20 loops per …
منابع مشابه
Support for modelling and integration of reusable security building blocks in embedded systems
Embedded devices are enablers of Internet of Things with countless applications. These devices store and manipulate sensitive information that is the target of sophisticated attacks. Thus, embedded systems must be protected against security threats. However, designing a secure embedded system is a difficult task, e.g., due to the tightly interdependence of security and resource constraint conce...
متن کاملEmbedded Systems Security - Part 1: Security requirements
Editor's Note: Embedded Systems Security aims for a comprehensive, systems view of security: hardware, platform software (such as operating systems and hypervisors), software development process, data protection protocols (both networking and storage), and cryptography. In this excerpt, the authors offer an in-depth look at the role of the operating system in secure embedded systems. In this in...
متن کاملEmbedded Systems Security - Part 4: I/O virtualization
Editor's Note: Embedded Systems Security aims for a comprehensive, systems view of security: hardware, platform software (such as operating systems and hypervisors), software development process, data protection protocols (both networking and storage), and cryptography. In this excerpt, the authors offer an in-depth look at the role of the operating system in secure embedded systems. In part 1,...
متن کاملWeb Based Security Protocols for Embedded System
Security can mean resistance to casual or prankster attacks like most viruses and security can also mean resistance to DOS attacks. But in this paper, security will mean the embedded devices’ ability to contain sensitive information and to hold down its end of a secure communication. In this paper we also are studying about various types of protocols which are used in networks security. These a...
متن کاملRelative Study in Architecture and Design Methodologies for Secured Real Time Embedded Systems
The embedded systems field is growing rapidly,with devices such as cellular phones, PDAs, smart cards, and digital music players permeating society. On the horizon are futuristic technologies such as embedded network sensors and wearable computers, which promise even greater interaction between humans and machines. As embedded devices are increasingly integrated into personal and commercial inf...
متن کاملA Novel Operating System on Chip with Information Security Support for Embedded System
Embedded system has made great advance with the progress of semiconductor technology. System-on-chip (SOC) has provided more powerful functions for embedded systems. Scratchpad memory (SPM), which is softwarecontrolled on-chip memory, is used in embedded systems to reduce the speed gap between the processors and the memory and the power consumption of memory. The architecture of embedded softwa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEEE Computer
دوره 37 شماره
صفحات -
تاریخ انتشار 2004