Security challenges in embedded systems

Dimitrios N. Serpanos, Artemios G. Voyiatzis

Research output: Contribution to journalArticle

25 Citations (Scopus)

Abstract

Embedded systems security is a significant requirement in emerging environments, considering the increasing deployment of embedded systems in several application domains. The large number of deployed embedded systems, their limited resources and their increasing complexity render systems vulnerable to an increasing number of threats. Additionally, the involvement of sensitive, often private, information and the expectation for safe and dependable embedded platforms lead to strong security requirements, even legal ones, which require new technologies for their provision. In this article, we provide an overview of embedded security issues, used methods and technologies, identifying important challenges in this emerging field.

Original languageEnglish
Article number66
JournalTransactions on Embedded Computing Systems
Volume12
Issue numberSUPPL1
DOIs
Publication statusPublished - 1 Mar 2013
Externally publishedYes

Fingerprint

Embedded systems

Keywords

  • Communication system security
  • Computer security
  • Embedded systems
  • Security

ASJC Scopus subject areas

  • Hardware and Architecture
  • Software

Cite this

Security challenges in embedded systems. / Serpanos, Dimitrios N.; Voyiatzis, Artemios G.

In: Transactions on Embedded Computing Systems, Vol. 12, No. SUPPL1, 66, 01.03.2013.

Research output: Contribution to journalArticle

Serpanos, Dimitrios N. ; Voyiatzis, Artemios G. / Security challenges in embedded systems. In: Transactions on Embedded Computing Systems. 2013 ; Vol. 12, No. SUPPL1.
@article{f5e6735dce0d41b8881028eff4f2597b,
title = "Security challenges in embedded systems",
abstract = "Embedded systems security is a significant requirement in emerging environments, considering the increasing deployment of embedded systems in several application domains. The large number of deployed embedded systems, their limited resources and their increasing complexity render systems vulnerable to an increasing number of threats. Additionally, the involvement of sensitive, often private, information and the expectation for safe and dependable embedded platforms lead to strong security requirements, even legal ones, which require new technologies for their provision. In this article, we provide an overview of embedded security issues, used methods and technologies, identifying important challenges in this emerging field.",
keywords = "Communication system security, Computer security, Embedded systems, Security",
author = "Serpanos, {Dimitrios N.} and Voyiatzis, {Artemios G.}",
year = "2013",
month = "3",
day = "1",
doi = "10.1145/2435227.2435262",
language = "English",
volume = "12",
journal = "ACM Transactions on Embedded Computing Systems",
issn = "1539-9087",
publisher = "Association for Computing Machinery (ACM)",
number = "SUPPL1",

}

TY - JOUR

T1 - Security challenges in embedded systems

AU - Serpanos, Dimitrios N.

AU - Voyiatzis, Artemios G.

PY - 2013/3/1

Y1 - 2013/3/1

N2 - Embedded systems security is a significant requirement in emerging environments, considering the increasing deployment of embedded systems in several application domains. The large number of deployed embedded systems, their limited resources and their increasing complexity render systems vulnerable to an increasing number of threats. Additionally, the involvement of sensitive, often private, information and the expectation for safe and dependable embedded platforms lead to strong security requirements, even legal ones, which require new technologies for their provision. In this article, we provide an overview of embedded security issues, used methods and technologies, identifying important challenges in this emerging field.

AB - Embedded systems security is a significant requirement in emerging environments, considering the increasing deployment of embedded systems in several application domains. The large number of deployed embedded systems, their limited resources and their increasing complexity render systems vulnerable to an increasing number of threats. Additionally, the involvement of sensitive, often private, information and the expectation for safe and dependable embedded platforms lead to strong security requirements, even legal ones, which require new technologies for their provision. In this article, we provide an overview of embedded security issues, used methods and technologies, identifying important challenges in this emerging field.

KW - Communication system security

KW - Computer security

KW - Embedded systems

KW - Security

UR - http://www.scopus.com/inward/record.url?scp=84878482234&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84878482234&partnerID=8YFLogxK

U2 - 10.1145/2435227.2435262

DO - 10.1145/2435227.2435262

M3 - Article

AN - SCOPUS:84878482234

VL - 12

JO - ACM Transactions on Embedded Computing Systems

JF - ACM Transactions on Embedded Computing Systems

SN - 1539-9087

IS - SUPPL1

M1 - 66

ER -