Background: Embedded systems are small computing devices which are designed to perform
a specific task with real-time computing and resource constraints. To meet the demands of industries
and real-time applications, embedded systems are networked delivering the real-time results to required
entities and make itself available to server entities. Due to the connectivity nature of embedded systems,
they are placed in remote environments where embedded systems use third party service tool to connect
to the external world. The connectivity and resource constraints make embedded systems susceptible to
various attacks like Denial of Service (DOS) attack, Joint Test Action Group (JTAG) attacks, spoofing
attack and many more while updating or retrieving data from embedded systems.
Objective: To address these problems, we present securing the JTAG port with external security module,
and enhancing the security features of Universal Measurement and Calibration Protocol (XCP) using
various cryptographic methods.
Method: The novelty of this approach is not in the individual solutions but the overall collective solution
where it restricts attackers gaining access to embedded system to update false firmware or retrieve
the contents of embedded systems using JTAG port or spoof the data exchanging between devices. We
present a software, hardware and device level security analysis in order to eliminate vulnerabilities and
secure embedded system from different kinds of attacks.
Conclusion: The result from this work will give a comprehensive awareness of different cryptographic
algorithms and its application and compatibility in embedded systems and also enhancing embedded
systems with different existing technologies.