Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Security as a new dimension in embedded

system design

Shahin Imran

Dept of CSE

City University,Dhaka

Email: shahincse62@gmail.com

Keywords: Embedded system security

Introduction:

In era electronic systems including pc, cell phone, networking industries, face a number of the foremost
router, smart card, and networked sensors must access, demanding security concern.on the one hand, they're
store, manipulate, or communicate sensitive information, often highly resource obedient, while on the opposite
making security a significant concern in their design. hand, they regularly must operate in physically insecure
Embedded systems, which account for a large range of environment.[1]
products from the electronic, telecommunication, and

Security issues don't seem to be new for embedded www.dis.org/filez/Wardial_ShipleyGarfinkel.pdf).


systems. In 2001, Peter Shipley and Simson L. Garfinkel However, as more embedded systems are connected to
reported finding an unprotected modem line to a system the web, the potential damages rescale vividly.[2]
that controlled a highvoltage power line (“An Analysis
of Dial-Up Modems and Vulnerabilities,” 2001;

This paper is meant to introduce embedded system software designer (e.g., processing requirements for
designers and style tool developer to the challenge security, impact of security on battery life for battery-
connected to designing secure embedded systems. i'm powered systems, etc.). i'm also survey solution
trying to produce a unified view of embedded system techniques to deal with these challenge, drawing from
security by first analysis the standard functional security both current practice and emerging research, and
requisite for embedded systems from an end-user view. identify open research problems which will require
Then identify the implicit challenge for embedded system innovations in embedded system architecture and style
architect, furthermore as hardware and methodologies.[3]

References Combating Denial-of-Service Attacks. 10.4018/978-1-


7998-5348-0.ch018, (328-357)
[1] P. Koopman, "Embedded system security," in
Computer, vol. 37, no. 7, pp. 95-97, July 2004, doi: [3] Aloseel A, He H, Shaw C and Khan M. Analytical
10.1109/MC.2004.52. Review of Cybersecurity for Embedded Systems. IEEE
Access. 10.1109/ACCESS.2020.3045972, 9, (961-982)
[2] Haas S and Steger C. 2021. Cyber-Physical System
and Internet of Things Security Research Anthology on
Check plagarism:

You might also like