Generic placeholder image

Recent Advances in Communications and Networking Technology (Discontinued)

Editor-in-Chief

ISSN (Print): 2215-0811
ISSN (Online): 2215-082X

Research Article

Networked Embedded System Security: Technologies, Analysis and Implementation

Author(s): Veeresh Eshwarappa Dandur* and Ning Weng

Volume 5, Issue 2, 2016

Page: [90 - 107] Pages: 18

DOI: 10.2174/2215081106666161227160759

Price: $65

Abstract

Background: Embedded systems are small computing devices which are designed to perform a specific task with real-time computing and resource constraints. To meet the demands of industries and real-time applications, embedded systems are networked delivering the real-time results to required entities and make itself available to server entities. Due to the connectivity nature of embedded systems, they are placed in remote environments where embedded systems use third party service tool to connect to the external world. The connectivity and resource constraints make embedded systems susceptible to various attacks like Denial of Service (DOS) attack, Joint Test Action Group (JTAG) attacks, spoofing attack and many more while updating or retrieving data from embedded systems.

Objective: To address these problems, we present securing the JTAG port with external security module, and enhancing the security features of Universal Measurement and Calibration Protocol (XCP) using various cryptographic methods.

Method: The novelty of this approach is not in the individual solutions but the overall collective solution where it restricts attackers gaining access to embedded system to update false firmware or retrieve the contents of embedded systems using JTAG port or spoof the data exchanging between devices. We present a software, hardware and device level security analysis in order to eliminate vulnerabilities and secure embedded system from different kinds of attacks.

Conclusion: The result from this work will give a comprehensive awareness of different cryptographic algorithms and its application and compatibility in embedded systems and also enhancing embedded systems with different existing technologies.

Keywords: Cryptographic algorithms, firmware update networked embedded systems, security, XCP.

Graphical Abstract

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy