Security and availability on embedded systems

被引:0
|
作者
Burger, N. [1 ]
Langeron, Y. [1 ]
Cogranne, R. [1 ]
Lallement, P. [1 ]
机构
[1] Univ Technol Troyes, Troyes, France
关键词
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the fast-paced development of the Internet of Things and its applications within the emerging field of Industry 4.0 - decentralizing decisions by remotely monitoring data and automata the issues of security and reliability of the whole communication pipeline between the connected devices taking part in this smart industry become crucial. In such context of embedded systems, microcontrollers are widely preferred over microprocessors as they are cheaper, smaller and less energy consuming. Unfortunately, the implementation of security features on microcontrollers, such as signing and ciphering functions, can largely reduce the availability of embedded systems because these functions are energy consuming and computationally complex. Thus, a trade-off has to be found between the prescribed level of availability and security. It is important to note that such a trade-off greatly depends on how the embedded systems will be used, how they are supposed to communicate between each other and if a central node with high computing resources is available. For instance, a common architecture typically consist of several embedded systems communicating up and down with a unique server. Indeed, this architecture is used in several areas where a monitor must supervise and treat data, which is the reason why this setup is chosen. The present paper aims at proposing a method to reach the right trade-off between security and availability, depending on the available resources. However, this problem is difficult to address because of the complexity to measure the security or the availability of a system. Solutions featuring those characteristics and a generic approach are presented to find the most suitable trade-off, in the use case of Industry 4.0.
引用
收藏
页码:2973 / 2976
页数:4
相关论文
共 50 条
  • [1] Availability Assessment of Embedded Systems with Security Vulnerabilities
    Kornecki, Andrew J.
    Zalewski, Janusz
    Stevenson, Wendy F.
    [J]. 2011 34TH IEEE SOFTWARE ENGINEERING WORKSHOP (SEW 2011), 2011, : 42 - 47
  • [2] Embedded systems security
    Department of Electrical Engineering, COMSATS Institute of Information Technology, Lahore, Pakistan
    不详
    [J]. Cyber Secty. Std., Practices and Indust. Applic.: Syst. and Methodologies, (179-198):
  • [3] Embedded systems security
    Claudia Eckert
    [J]. Datenschutz und Datensicherheit - DuD, 2012, 36 (12) : 861 - 861
  • [4] Editorial: Security of Embedded Systems and Cyber Irons-Embedded Systems for Security
    Shukla, Sandeep K.
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2016, 15 (04)
  • [5] Security vulnerability in embedded systems
    Martin, Patricia
    Martin, Sergio
    Diaz, Gabriel
    Castro-Gil, Manuel
    [J]. DYNA, 2016, 91 (05): : 488 - 488
  • [6] Embedded systems security—an overview
    Sri Parameswaran
    Tilman Wolf
    [J]. Design Automation for Embedded Systems, 2008, 12 : 173 - 183
  • [7] Embedded systems security - an overview
    Parameswaran, Sri
    Wolf, Tilman
    [J]. DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2008, 12 (03) : 173 - 183
  • [8] Security Challenges in Embedded Systems
    Serpanos, Dimitrios N.
    Voyiatzis, Artemios G.
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2013, 12
  • [9] Security-as-a-Service for Embedded Systems
    Vai, Michael
    Simpson, Eric
    Kava, Donato
    Lee, Alice
    Nguyen, Huy
    Hughes, Jeffrey
    Torres, Gabriel
    Lim, Jeffery
    Nahill, Ben
    Khazan, Roger
    Schneider, Fred
    [J]. MILCOM 2023 - 2023 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2023,
  • [10] Curriculum Development for Embedded Systems Security
    Zalewski, Janusz
    Kornecki, Andrew J.
    Czejdo, Bogdan Denny
    Gonzalez, Fernando Garcia
    Subramanian, Nary
    Trawczynski, Dawid
    [J]. 2014 ASEE ANNUAL CONFERENCE, 2014,