首页> 外文期刊>Recent Patents on Telecommunications >Networked Embedded System Security: Technologies, Analysis and Implementation
【24h】

Networked Embedded System Security: Technologies, Analysis and Implementation

机译:网络嵌入式系统安全性:技术,分析和实现

获取原文
获取原文并翻译 | 示例
       

摘要

Background: Embedded systems are small computing devices which are designed to perform a specific task with real-time computing and resource constraints. To meet the demands of industries and real-time applications, embedded systems are networked delivering the real-time results to required entities and make itself available to server entities. Due to the connectivity nature of embedded systems, they are placed in remote environments where embedded systems use third party service tool to connect to the external world. The connectivity and resource constraints make embedded systems susceptible to various attacks like Denial of Service (DOS) attack, Joint Test Action Group (JTAG) attacks, spoofing attack and many more while updating or retrieving data from embedded systems. Objective: To address these problems, we present securing the JTAG port with external security module, and enhancing the security features of Universal Measurement and Calibration Protocol (XCP) using various cryptographic methods. Method: The novelty of this approach is not in the individual solutions but the overall collective solution where it restricts attackers gaining access to embedded system to update false firmware or retrieve the contents of embedded systems using JTAG port or spoof the data exchanging between devices. We present a software, hardware and device level security analysis in order to eliminate vulnerabilities and secure embedded system from different kinds of attacks. Conclusion: The result from this work will give a comprehensive awareness of different cryptographic algorithms and its application and compatibility in embedded systems and also enhancing embedded systems with different existing technologies.
机译:背景技术:嵌入式系统是小型计算设备,旨在执行具有实时计算和资源限制的特定任务。为了满足行业和实时应用程序的需求,嵌入式系统被联网,从而将实时结果提供给所需实体,并使自身可用于服务器实体。由于嵌入式系统的连接性,它们被放置在远程环境中,在嵌入式系统中嵌入式系统使用第三方服务工具连接到外部环境。连接性和资源限制使嵌入式系统容易受到各种攻击,例如拒绝服务(DOS)攻击,联合测试行动小组(JTAG)攻击,欺骗攻击等,同时还会从嵌入式系统更新或检索数据。目的:为了解决这些问题,我们提出了使用外部安全模块保护JTAG端口的安全,并使用各种加密方法增强了通用测量和校准协议(XCP)的安全功能。方法:这种方法的新颖性不是单个解决方案,而是整体的集体解决方案,它限制了攻击者获得对嵌入式系统的访问权,以使用JTAG端口或伪造设备之间的数据交换来更新错误的固件或检索嵌入式系统的内容。我们提出了软件,硬件和设备级别的安全性分析,以消除漏洞并保护嵌入式系统免受各种攻击。结论:这项工作的结果将使人们对不同的加密算法及其在嵌入式系统中的应用和兼容性有一个全面的认识,并利用现有的不同技术增强嵌入式系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号