Information security algorithm on embedded hardware

Information security algorithm on embedded hardware

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Information Security: Foundations, Technologies and Applications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

This chapter will provide an overview to all these security requirements, applying them to different platforms used to implement embedded hardware. In order to provide a better understanding, Section 15.2 will cover a taxonomy of the technologies used to develop embedded systems. Then the security requirements and their mechanisms will be covered in Section 15.3 in order to provide the basis for the explanation of how to implement such security mechanisms discussed in Section 15.4, finishing with conclusion and future trends.

Chapter Contents:

  • 15.1 Introduction
  • 15.2 Classification of embedded systems
  • 15.2.1 Application specific integrated circuits
  • 15.2.2 Field programmable gate arrays
  • 15.2.3 Microprocessor-based embedded systems
  • 15.2.4 Single-board computers
  • 15.2.5 General purpose mobile platforms
  • 15.3 Security requirements and mechanisms
  • 15.3.1 Information exchange
  • Authentication of both ends
  • Confidentiality of the message
  • Checking the integrity of the message
  • Secure messaging
  • 15.3.2 Storage security
  • 15.3.3 User-and service-related security
  • 15.3.4 Hardware vulnerabilities
  • 15.4 Implementation of security mechanisms in embedded systems
  • 15.4.1 Software-based implementations
  • 15.4.2 The use of a security co-processor
  • 15.4.3 Smart cards and common criteria
  • 15.5 Conclusion
  • References

Inspec keywords: security of data; embedded systems

Other keywords: embedded hardware; security requirements; information security algorithm; embedded systems

Preview this chapter:
Zoom in

Information security algorithm on embedded hardware, Page 1 of 2

| /docserver/preview/fulltext/books/sc/pbse001e/PBSE001E_ch15-1.gif /docserver/preview/fulltext/books/sc/pbse001e/PBSE001E_ch15-2.gif

Related content

This is a required field
Please enter a valid email address