[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Security in embedded systems: Design challenges

Published: 01 August 2004 Publication History

Abstract

Many modern electronic systems---including personal computers, PDAs, cell phones, network routers, smart cards, and networked sensors to name a few---need to access, store, manipulate, or communicate sensitive information, making security a serious concern in their design. Embedded systems, which account for a wide range of products from the electronics, semiconductor, telecommunications, and networking industries, face some of the most demanding security concerns---on the one hand, they are often highly resource constrained, while on the other hand, they frequently need to operate in physically insecure environments.Security has been the subject of intensive research in the context of general-purpose computing and communications systems. However, security is often misconstrued by embedded system designers as the addition of features, such as specific cryptographic algorithms and security protocols, to the system. In reality, it is a new dimension that designers should consider throughout the design process, along with other metrics such as cost, performance, and power.The challenges unique to embedded systems require new approaches to security covering all aspects of embedded system design from architecture to implementation. Security processing, which refers to the computations that must be performed in a system for the purpose of security, can easily overwhelm the computational capabilities of processors in both low- and high-end embedded systems. This challenge, which we refer to as the "security processing gap," is compounded by increases in the amounts of data manipulated and the data rates that need to be achieved. Equally daunting is the "battery gap" in battery-powered embedded systems, which is caused by the disparity between rapidly increasing energy requirements for secure operation and slow improvements in battery technology. The final challenge is the "assurance gap," which relates to the gap between functional security measures (e.g., security services, protocols, and their constituent cryptographic algorithms) and actual secure implementations. This paper provides an introduction to the challenges involved in secure embedded system design, discusses recent advances in addressing them, and identifies opportunities for future research.

References

[1]
AES Algorithm (Rijndael) Information. Available at http://csrc.nist.gov/encryption/aes/rijndael.]]
[2]
Anderson, R. and Kuhn, M. 1996. Tamper Resistance---A Cautionary Note. Available at http: //www.cl.cam.ac.uk/users/rja14/tamper.html.]]
[3]
Anderson, R. and Kuhn, M. 1997. Low cost attacks on tamper resistant devices. In IWSP: International Workshop on Security Protocols. Lecture Notes on Computer Science. 125--136.]]
[4]
Arbaugh, A., Farber, D. J., and Smith, J. M. 1997. A secure and reliable bootstrap architecture. In Proceedings of IEEE Symposium on Security and Privacy. 65--71.]]
[5]
ARM SecurCore. Available at http://www.arm.com.]]
[6]
Best, R. M. 1981. Crypto Microprocessor for Executing Enciphered Programs. U.S. patent 4,278,837.]]
[7]
Blaze, M. 1993. A cryptographic file system for UNIX. In Proceedings of the ACM Conference on Computer and Communications Security. 9--16.]]
[8]
Boneh, D., DeMillo, R., and Lipton, R. 2001. On the importance of eliminating errors in cryptographic computations. Cryptology 14, 2, 101--119.]]
[9]
Burke, J., McDonald, J., and Austin, T. 2000. Architectural support for fast symmetric-key cryptography. In Proceedings of the International Conference on ASPLOS. 178--189.]]
[10]
Carman, D. W., Krus, P. S., and Matt, B. J. 2000. Constraints and Approaches for Distributed Sensor Network Security. Tech. rep. #00-010, NAI Labs, Network Associates, Inc., Glenwood, MD.]]
[11]
Certicom Corp. Security Builder. Available at http://www.certicom.com/.]]
[12]
Certicom and Texas Instruments Inc. 2003. Wireless Security: from the inside out. Available at http://focus.ti.com/pdfs/vf/wireless/certicom_ti_wp.pdf.]]
[13]
Chess, B. 2002. Improving computer security using extended static checking. In Proceedings of the IEEE Symposium on Security and Privacy. 148--161.]]
[14]
Clarke, E. M., Jha, S., and Marrero, W. 1998. Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In Proceedings of the IFIP Working Conference on Programming Concepts and Methods.]]
[15]
Computer Security Institute. 2002 Computer Crime and Security Survey. Available at http://www.gocsi.com/press/20020407.html.]]
[16]
Counterpane Internet Security, Inc. Available at http://www.counterpane.com.]]
[17]
Detlefs, D. L., Leino, K., Nelson, G., and Saxe, J. 1998. Extended Static Checking. Tech. rep., Systems Research Center, Compaq Inc.]]
[18]
CryptocellTM. Discretix Technologies Ltd. Available at http://www.discretix.com.]]
[19]
Discretix Technologies Ltd. Available at http://www.discretix.com.]]
[20]
DPA PATENTS. U.S. Patents Nos. 6,278,783; 6,289,455; 6,298,442; 6,304,658; 6,327,661; 6,381,699; 6,510,518; 6,539,092; 6,640,305; and 6,654,884. Available at http://www.cryptography.com/technology/dpa/licensing.html.]]
[21]
ePaynews---Mobile Commerce Statistics. Available at http://www.epaynews.com/statistics/mcommstats.html.]]
[22]
FIPS PUB 140-2. Security Requirements for Cryptographic Modules. Available at http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf.]]
[23]
Gentry, C. and Szydlo, M. 2002. Cryptanalysis of the revised NTRU signature scheme. In Proceedings of EUROCRYPT. 299--320.]]
[24]
Goh, E., Shacham, H., Modadugu, N., and Boneh, D. 2003. SiRiUS: Securing remote untrusted storage. In Proceedings of the ISOC Network and Distributed Systems Security (NDSS) Symposium. 131--145.]]
[25]
Hess, E., Janssen, N., Meyer, B., and Schutze, T. 2000. Information leakage attacks against smart card implementations of cryptographic algorithms and countermeasures. In Proceedings of the EUROSMART Security Conference. 55--64.]]
[26]
HIFN Inc. Available at http://www.hifn.com.]]
[27]
Hoglund, G. and McGraw, G. 2004. Exploiting Software: How to Break Code. Pearson Higher Education.]]
[28]
Howard, M. and LeBlanc, D. 2002. Writing Secure Code. Microsoft Press.]]
[29]
IEEE Standard 802.11. LAN/MAN Standards Committee of the IEEE. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification.]]
[30]
Infineon Technologies. SLE 88 family. http://www.infineon.com.]]
[31]
Intel Corp. 2000. Enhancing Security Performance through IA-64 Architecture. Available at http://developer.intel.com/design/security/rsa2000/itanium.pdf.]]
[32]
IPSec Working Group. Available at http://www.ietf.org/html.charters/ipsec-charter.html.]]
[33]
Internet Streaming Media Alliance. Available at http://www.isma.tv/home.]]
[34]
Karri, R. and Mishra, P. 2002. Minimizing energy consumption of secure wireless session with QoS constraints. In Proceedings of the International Conference on Communications. 2053--2057.]]
[35]
Kelsey, J., Schneier, B., Wagner, D., and Hall, C. 1998. Side channel cryptanalysis of product ciphers. In Proceedings of the ESORICS'98. 97--110.]]
[36]
Kiriansky, V., Bruening, D., and Amarasinghe, S. 2002. Secure execution via program sheperding. In Proceedings of the 11th USENIX Security Symposium.]]
[37]
Kommerling, O. and Kuhn, M. G. 1999. Design principles for tamper-resistant smartcard processors. In Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard '99). 9--20.]]
[38]
Kocher, P., Jaffe, J., and Jun, B. 1999. Differential power analysis. Advances in Cryptology---CRYPTO'99. Lecture Notes in Computer Science, vol. 1666. Springer-Verlag, Berlin, 388--397.]]
[39]
Kocher, P., Lee, R., McGraw, G., Raghunathan, A., and Ravi, S. 2004. Security as a new dimension in embedded system design. In Proceedings of the Design Automation Conference. 753--760.]]
[40]
Kocher, P. C. 1996. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Advances in Cryptology---CRYPTO'96. Lecture Notes in Computer Science, vol. 1109. Springer-Verlag, Berlin, 104--113.]]
[41]
Kuhn, M. 1997. The TrustNo 1 Cryptoprocessor Concept. CS555 Report, Purdue University. Available at http://www.cl.cam.ac.uk/ mgk25/.]]
[42]
Lahiri, K., Raghunathan, A., and Dey, S. 2002. Battery-driven system design: A new frontier in low power design. In Proceedings of the Joint Asia and South Pacific Design Automation Conference/International Conference on VLSI Design. 261--267.]]
[43]
Lee, R. B., Shi, Z., and Yang, X. 2001. Efficient permutations for fast software cryptography. IEEE Micro 21, 6 (Dec.), 56--69.]]
[44]
Lee, R. B. 1996. Subword parallelism with Max-2. IEEE Micro 16, 4 (Aug.), 51--59.]]
[45]
Lie, D., Thekkath, C. A., Mitchell, M., Lincoln, P., Boneh, D., Mitchell, J. C., and Horowitz, M. 2000. Architectural support for copy and tamper resistant software. In Proceedings of the ACM Architectural Support for Programming Languages and Operating Systems (ASPLOS). 168--177.]]
[46]
Lowe, G. 1998. Towards a completeness result for model checking of security protocols. In Proceedings of the 11th Computer Security Foundations Workshop.]]
[47]
Menezes, A. J. 1993. Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Boston, MA.]]
[48]
Messerges, T. S., Dabbish, E. A., and Sloan, R. H. 2002. Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51, 5 (May), 541--552.]]
[49]
Mobile Electronic Transactions Ltd. 2001. MeT PTD Definition (version 1.1). Available at http://www.mobiletransaction.org/.]]
[50]
SmartMIPS. Available at http://www.mips.com.]]
[51]
MPEG Open Security for Embedded Systems (MOSES). Available at http://www.crl.co.uk/projects/moses/.]]
[52]
Moving Picture Experts Group (MPEG). Available at http://mpeg.telecomitalialab.com.]]
[53]
Necula, G. C. and Lee, P. 1996. Proof-Carrying Code. Tech. Rep. CMU-CS-96-165, Carnegie Mellon University.]]
[54]
NTRU Communications and Content Security. Available at http://www.ntru.com.]]
[55]
Open Mobile Alliance (OMA). Available at http://www.wapforum.org/what/technical.htm.]]
[56]
OpenIPMP. http://www.openipmp.org.]]
[57]
OpenSSL Project. Available at http://www.openssl.org.]]
[58]
Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., and Culler, D. E. 2002. SPINS: Security protocols for sensor networks. Wireless Netw. 8, 5, 521--534.]]
[59]
PolyFuel, Inc. Available at http://www.polyfuel.com.]]
[60]
Potlapally, N., Ravi, S., Raghunathan, A., and Jha, N. K. 2003. Analyzing the energy consumption of security protocols. In Proceedings of the International Symposium on Low Power Electronics & Design. 30--35.]]
[61]
Potlapally, N., Ravi, S., Raghunathan, A., and Lakshminarayana, G. 2002a. Optimizing public-key encryption for wireless clients. In Proceedings of the IEEE International Conference on Communications. 1050--1056.]]
[62]
Potlapally, N., Ravi, S., Raghunathan, A., and Lakshminarayana, G. 2002b. Algorithm exploration for efficient public-key security processing on wireless handsets. In Proceedings of Design, Automation, and Test in Europe (DATE) Designers Forum. 42--46.]]
[63]
Point-to-Point Protocol (PPP), RFC 1661. The Internet Engineering Task Force. Available at http://www.ietf.org/rfc/rfc1661.]]
[64]
Point-to-Point Tunneling Protocol (PPTP), RFC 2637. The Internet Engineering Task Force. Available at http://www.ietf.org/rfc/rfc2637.]]
[65]
Quisquater, J. J. and Samyde, D. 2002. Side channel cryptanalysis. In Proceedings of the SECI. 179--184.]]
[66]
Rankl, W. and Effing, W. Smart Card Handbook. John Wiley and Sons, New York.]]
[67]
Ravi, S., Raghunathan, A., and Chakradhar, S. 2004. Tamper resistance mechanisms for secure embedded systems. In Proceedings of the International Conference on VLSI Design. 605--611.]]
[68]
Ravi, S., Raghunathan, A., Potlapally, N., and Sankaradass, M. 2002. System design methodologies for a wireless security processing platform. In Proceedings of the ACM/IEEE Design Automation Conference, 777--782.]]
[69]
Reid, P. 2003. Biometrics and Network Security. Prentice Hall PTR, Englewood Cliffs, NJ.]]
[70]
Rosing, M. 1998. Implementing Elliptic Curve Cryptography. Manning Publications Co.]]
[71]
Safenet Inc. Safenet EmbeddedIPTM. Available at http://www.safenet-inc.com.]]
[72]
Schneier, B. 1996. Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley and Sons, New York.]]
[73]
SFC Smart Fuel Cell AG. Available at http://www.smartfuelcell.com.]]
[74]
SSL 3.0 Specification. Available at http://wp.netscape.com/eng/ssl3/.]]
[75]
Stallings, W. 1998. Cryptography and Network Security: Principles and Practice. Prentice Hall, Englewood Cliffs, NJ.]]
[76]
STMicroelectronics Inc. ST19 Smart Card Platform Family. Available at http://www.st.com.]]
[77]
Suh, G. E., Clarke, D., Gassend, B., van Dijk, M., and Devadas, S. 2003. AEGIS: Architecture for tamper-evident and tamper-resistant processing. In Proceedings of the International Conference on Supercomputing (ICS '03). 160--171.]]
[78]
Texas Instruments Inc. OMAP Platform. Available at http://focus.ti.com/omap/docs/omaphomepage.tsp.]]
[79]
TLS Working Group. Available at http://www.ietf.org/html.charters/tls-charter.html.]]
[80]
U.S. Department of Commerce. 1999. The Emerging Digital Economy II. Available at http: //www.esa.doc.gov/508/esa/TheEmergingDigitalEconomyII.htm.]]
[81]
WAP Forum. 2002. Wireless Application Protocol 2.0. Technical White Paper. Available from http://www.wapforum.org.]]
[82]
World Wide Web Consortium. 1998. The World Wide Web Security FAQ. Available at http://www.w3.org/Security/faq/www-security-faq.html.]]
[83]
York, R. 2003. A New Foundation for CPU Systems Security. ARM Limited. Available at http://www.arm.com/armtech/TrustZone?OpenDocument.]]

Cited By

View all
  • (2024)SoK: Security in Real-Time SystemsACM Computing Surveys10.1145/364949956:9(1-31)Online publication date: 25-Apr-2024
  • (2024)Exploring the Correlation Between DRAM Latencies and Rowhammer Attacks2024 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)10.1109/ISVLSI61997.2024.00086(445-450)Online publication date: 1-Jul-2024
  • (2024)Secure Communication on CAN-Bus Using Sporadic Authenticated Encryption2024 5th CPSSI International Symposium on Cyber-Physical Systems (Applications and Theory) (CPSAT)10.1109/CPSAT64082.2024.10745422(1-8)Online publication date: 16-Oct-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Embedded Computing Systems
ACM Transactions on Embedded Computing Systems  Volume 3, Issue 3
August 2004
202 pages
ISSN:1539-9087
EISSN:1558-3465
DOI:10.1145/1015047
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 01 August 2004
Published in TECS Volume 3, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Embedded systems
  2. architecture
  3. authentication
  4. battery life
  5. cryptographic algorithms
  6. decryption
  7. encryption
  8. hardware design
  9. processing requirements
  10. security
  11. security attacks
  12. security protocols
  13. tamper resistance

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)266
  • Downloads (Last 6 weeks)26
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)SoK: Security in Real-Time SystemsACM Computing Surveys10.1145/364949956:9(1-31)Online publication date: 25-Apr-2024
  • (2024)Exploring the Correlation Between DRAM Latencies and Rowhammer Attacks2024 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)10.1109/ISVLSI61997.2024.00086(445-450)Online publication date: 1-Jul-2024
  • (2024)Secure Communication on CAN-Bus Using Sporadic Authenticated Encryption2024 5th CPSSI International Symposium on Cyber-Physical Systems (Applications and Theory) (CPSAT)10.1109/CPSAT64082.2024.10745422(1-8)Online publication date: 16-Oct-2024
  • (2024)Dependability in Embedded Systems: A Survey of Fault Tolerance Methods and Software-Based Mitigation TechniquesIEEE Access10.1109/ACCESS.2024.350963312(180939-180967)Online publication date: 2024
  • (2024)Modern computing: Vision and challengesTelematics and Informatics Reports10.1016/j.teler.2024.10011613(100116)Online publication date: Mar-2024
  • (2024)Certificate-less Aggregate Signature Authentication Scheme (CLASAS) for secure and efficient data transmission in Wireless Sensor Networks (WSNs)Peer-to-Peer Networking and Applications10.1007/s12083-024-01717-817:4(2572-2594)Online publication date: 23-May-2024
  • (2024)Embedded Supercomputing for Edge Devices: A Comprehensive ReviewFrom Internet of Things to Internet of Intelligence10.1007/978-3-031-55718-7_9(157-173)Online publication date: 23-Apr-2024
  • (2023)Overview of System-Level Security Technologies based on ARM TrustZoneFrontiers in Computing and Intelligent Systems10.54097/fcis.v4i2.103044:2(99-103)Online publication date: 26-Jun-2023
  • (2023)Sniffer for Detecting Lost MobilesInternational Journal of Advanced Research in Science, Communication and Technology10.48175/IJARSCT-9774(18-22)Online publication date: 5-May-2023
  • (2023)A Survey on Thwarting Memory Corruption in RISC-VACM Computing Surveys10.1145/360490656:2(1-29)Online publication date: 17-Jun-2023
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media