Embedded system security
Download 0.64 Mb. Pdf ko'rish
|
Embedded sytem security
1-laboratoriya, 2-Loboratoriya, 1649913326, Kopjursinova Maftuna 1-A2, Elektromagnit to’lqinlarining tarqalishi tezligi elektromagnit to’lqini, KORXONANING AXBOROT RESURSLAR, 1-амалий, 3-амалий, Xitoy Xalq Respublikasi 091218234301, Mustaqil ish7, 1-kurs dars ishlanmasi, 1, Psixologiya mustaqil ish, EWB ido doc
- Bu sahifa navigatsiya:
- EMBEDDED SYSTEM SECURITY
1 STUDY PAPER ON EMBEDDED SYSTEMS SECURITY ---------------TS Division 2 CONTENTS 1. INTRODUCTION ...................................................................................................................................... 3 2. EMBEDDED SYSTEM: ............................................................................................................................ 3 3. APPLICATION OF EMBEDDED SYSTEM ............................................................................................ 4 4. SECURITY THREATS OF EMBEDDED SYSTEMS ............................................................................. 4 5. EFFECT OF THE ATTACKS ................................................................................................................... 7 6. CHALLENGES IN SECURITY OF EMBEDDED SYSTEMS ................................................................ 8 7. COUNTER MEASURES ........................................................................................................................... 9 8. CONCLUSION ........................................................................................................................................ 11 9. REFERENCES ......................................................................................................................................... 12 3 EMBEDDED SYSTEM SECURITY 1. INTRODUCTION Now a day we are going towards the age of fully autonomous environment where things will be done within a second and without as much influence of human. This has made possible by increasing use of embedded systems in all domains. From cars to cell phones, video equipment to mp3 players and dishwasher to home thermostats, embedded computers increasingly permeate our lives [1]. These systems are the driving force for technological development in every sphere of our life. Embedded systems started as iPod, mp3 player, Bluetooth headset, PlayStation and now they are emerged at a very large scale as being used in washing machines, smart phones, self-driven cars, banking, military, space, research and defence sections. With the growing popularity of embedded systems, concerns about security and privacy of these systems have risen dramatically in a short period of time. Embedded systems are the driving force for technological development in many domains such as automation products, industrial monitoring, control systems, etc. As more and more computational and networked devices are integrated into all aspects of our lives in a pervasive and “invisible” way, security becomes critical for the dependability of all smart or intelligent systems built upon these embedded systems. In case of security of embedded devices, assuming that embedded devices are not vulnerable to cyberattacks, embedded devices are not attractive targets for hacking, embedded devices get sufficient security with encryption and authentication is a big mistake for any organisation. This paper explains some of the security risks and threats associated with embedded systems, challenges in their security along with some of proposed countermeasures. 2. EMBEDDED SYSTEM: The type of software used in embedded systems are fixed and has limited flexibility to allow user to program run. It is an application specific computer system built into a larger mechanical or electrical system. [2] It does a particular task repeatedly as per the given instructions. It consists of combination of software and hardware and mechanical parts if required. It is often a real time computing system constraint. An embedded system thus refers to a system that is controlled by a computer that resides within the system. Embedded systems are used in different applications according to the requirement but their structure and principle of working is same in terms of system hardware and design methodology. The application like mechanical and chemistry plants may requires extra hardware implementation like standard input and output devices but it’s not 4 compulsory for all the plants and other devices. Embedded systems are usually based on microcontroller in which the memory, timer, input output ports, counters all are integrated on the CPU they do not require extra memory and all. According to their usage these can be categorised into three categories as small, medium and large. Embedded systems are not standalone but these are used within a complex device. 3. APPLICATION OF EMBEDDED SYSTEM Download 0.64 Mb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2023
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling