Embedded system security


Download 0.64 Mb.
Pdf ko'rish
bet1/9
Sana24.05.2022
Hajmi0.64 Mb.
#698107
  1   2   3   4   5   6   7   8   9
Bog'liq
Embedded sytem security
1-laboratoriya, 2-Loboratoriya, 1649913326, Kopjursinova Maftuna 1-A2, Elektromagnit to’lqinlarining tarqalishi tezligi elektromagnit to’lqini, KORXONANING AXBOROT RESURSLAR, 1-амалий, 3-амалий, Xitoy Xalq Respublikasi 091218234301, Mustaqil ish7, 1-kurs dars ishlanmasi, 1, Psixologiya mustaqil ish, EWB ido doc



STUDY PAPER ON 
EMBEDDED SYSTEMS SECURITY 
---------------TS Division



CONTENTS 
1. INTRODUCTION ...................................................................................................................................... 3 
2. EMBEDDED SYSTEM: ............................................................................................................................ 3 
3. APPLICATION OF EMBEDDED SYSTEM ............................................................................................ 4 
4. SECURITY THREATS OF EMBEDDED SYSTEMS ............................................................................. 4 
5. EFFECT OF THE ATTACKS ................................................................................................................... 7 
6. CHALLENGES IN SECURITY OF EMBEDDED SYSTEMS ................................................................ 8 
7. COUNTER MEASURES ........................................................................................................................... 9 
8. CONCLUSION ........................................................................................................................................ 11 
9. REFERENCES ......................................................................................................................................... 12
 



EMBEDDED SYSTEM SECURITY 
1. INTRODUCTION 
Now a day we are going towards the age of fully autonomous environment where things will be done 
within a second and without as much influence of human. This has made possible by increasing use 
of embedded systems in all domains. From cars to cell phones, video equipment to mp3 players and 
dishwasher to home thermostats, embedded computers increasingly permeate our lives [1]. These 
systems are the driving force for technological development in every sphere of our life. Embedded 
systems started as iPod, mp3 player, Bluetooth headset, PlayStation and now they are emerged at a 
very large scale as being used in washing machines, smart phones, self-driven cars, banking, military, 
space, research and defence sections. With the growing popularity of embedded systems, concerns 
about security and privacy of these systems have risen dramatically in a short period of time. 
Embedded systems are the driving force for technological development in many domains such as 
automation products, industrial monitoring, control systems, etc. As more and more computational 
and networked devices are integrated into all aspects of our lives in a pervasive and “invisible” way, 
security becomes critical for the dependability of all smart or intelligent systems built upon these 
embedded systems. In case of security of embedded devices, assuming that embedded devices are not 
vulnerable to cyberattacks, embedded devices are not attractive targets for hacking, embedded devices 
get sufficient security with encryption and authentication is a big mistake for any organisation. This 
paper explains some of the security risks and threats associated with embedded systems, challenges 
in their security along with some of proposed countermeasures. 
2. EMBEDDED SYSTEM: 
The type of software used in embedded systems are fixed and has limited flexibility to allow user to 
program run. It is an application specific computer system built into a larger mechanical or 
electrical system. [2] It does a particular task repeatedly as per the given instructions. It consists of 
combination of software and hardware and mechanical parts if required. It is often a real time 
computing system constraint. An embedded system thus refers to a system that is controlled by a 
computer that resides within the system. Embedded systems are used in different applications 
according to the requirement but their structure and principle of working is same in terms of system 
hardware and design methodology. The application like mechanical and chemistry plants may 
requires extra hardware implementation like standard input and output devices but it’s not 



compulsory for all the plants and other devices. Embedded systems are usually based on 
microcontroller in which the memory, timer, input output ports, counters all are integrated on the 
CPU they do not require extra memory and all. According to their usage these can be categorised 
into three categories as small, medium and large. Embedded systems are not standalone but these 
are used within a complex device. 
3. APPLICATION OF EMBEDDED SYSTEM 

Download 0.64 Mb.

Do'stlaringiz bilan baham:
  1   2   3   4   5   6   7   8   9




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2023
ma'muriyatiga murojaat qiling