Academia.eduAcademia.edu

Outline

Proposed Embedded Security Framework for Internet of Things (IoT)

2011, Proceedings of the 2nd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE 2011), February 28 – March 3, 2011, Chennai, India.

Abstract

IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives a detailed survey and analysis of embedded security, especially in the area of IoT. Together with the conventional security solutions, the paper highlights the need to provide in-built security in the device itself to provide a flexible infrastructure for dynamic prevention, detection, diagnosis, isolation, and countermeasures against successful breaches. Based on this survey and analysis, the paper defines the security needs taking into account computational time, energy consumption and memory requirements of the devices. Finally, this paper proposes an embedded security framework as a feature of software/hardware co-design methodology.

References (14)

  1. Rolf H. Weber , "Internet of Things -New security and privacy challenges", Computer Law & Security Review, Volume 26, Issue 1, January 2010, Pages 23-30
  2. Srivaths Ravi, Anand Raghunathan, Paul Kocher, Sunil Hattangady , "Security in embedded systems: Design challenges " ,August 2004 , Transactions on Embedded Computing Systems (TECS) , Volume 3 Issue 3 , ACM
  3. Hagai Bar-El ,"An Introduction to Side Channel Attacks " , White paper,Discretix Technologies limited,
  4. Christof Paar, André Weimerskirch, "Embedded security in a pervasive world" , Information Security Technical Report, 2007 -Elsevier , Volume 12, Issue 3, 2007, Pages 155-161.
  5. Matthew Eby, Jan Werner, Gabor Karsai, Akos Ledeczi, "Embedded systems security co-design" , April 2007, SIGBED Review , Volume 4 Issue 2 ,Publisher: ACM
  6. Gebotys, C.H.; Tiu, C.C.; Chen, X., "A countermeasure for EM attack of a wireless PDA," Information Technology: Coding and Computing, 2005. ITCC 2005. International Conference on , vol.1, no., pp. 544-549 Vol. 1, 4-6 April 2005
  7. Tiri, K. and Verbauwhede, "Design Method for Constant Power Consumption of Differential Logic Circuits", In Proceedings of the Conference on Design, Automation and Test in Europe -Volume 1 (March 07 -11, 2005). Design, Automation, and Test in Europe. IEEE Computer Society, Washington, DC, 628-633.
  8. T. Kerins, W.P. Marnane E.M. Popovici: An FPGA Implementation of a Flexible Secure Elliptic Curve Cryptography Processor. Distinguished Paper. International Workshop on Applied Reconfigurable Computing ARC 2005, Proceedings, pp.22-30, IADIS press.
  9. Murphy, Gerard; Keeshan, Aidan; Agarwal, Rachit; Popovici, Emanuel,"Hardware -Software Implementation of Public-Key Cryptography for Wireless Sensor Networks ", Irish Signals and Systems Conference, 2006. IET , 28-30 June 2006 Page(s):463 -468.
  10. Wilson P, Frey A, Mihm T, Kershaw D, Alves T., "Implementing Embedded Security on Dual-Virtual-CPU Systems" , Design & Test of Computers, IEEE Volume 24, Issue 6, Nov.-Dec. 2007
  11. Romain Vaslin, Guy Gogniat, Jean-Philippe Diguet, Eduardo Wanderley, Russell Tessier, Wayne Burleson, "A security approach for off-chip memory in embedded microprocessor systems", Microprocessors and Microsystems, Volume 33, Issue 1, February 2009, Pages 37-45
  12. Olga Gelbart, Eugen Leontie, Bhagirath Narahari, Rahul Simha, "A compiler-hardware approach to software protection for embedded systems", Computers and Electrical Engineering 35 (2009) 315-328, 2008 Elsevier Ltd.
  13. Fons, M.; Fons, F.; Canto, E.;"Embedded security: New trends in personal recognition systems"; Microelectronics and Electronics Conference, 2007. RME. Ph.D. Research in 2-5 July 2007.
  14. Saputra, H.; Ozturk, O.; Vijaykrishnan, N.; Kandemir, M.; Brooks, R.;"A data-driven approach for embedded security" ; VLSI, 2005. Proceedings. IEEE Computer Society Annual Symposium on 11-12 May 2005 Page(s):104 -109.