Security Enhancement in Networked Embedded System (original) (raw)
Related papers
Embedded Systems Introduction to Arm CortexTM Microcontrollers
ARM and uVision are registered trademarks of ARM Limited. Cortex and Keil are trademarks of ARM Limited. Stellaris and Tiva are registered trademarks Texas Instruments. Code Composer Studio is a trademark of Texas Instruments. All other product or service names mentioned herein are the trademarks of their respective owners.
Embedded Systems: Security Threats and Solutions
With the increasing use of embedded devices in our daily life, security threats have also been increasing in a proportional rate. However, ensuring security in the embedded systems has become a great challenge not only for the embedded device experts but also for the manufacturers. The problem especially arises because of the limited hardware and software implementation options for the designers. At the same time, companies are trying to keep the vulnerabilities of the operating system of those embedded devices in secret and they are not relieving any necessary security updates quickly. It has become very urgent to ensure proper security of the embedded systems to save it from any major technological disaster near future. In this paper, we have broadly discussed the structures, characteristics and applications of different embedded devices in our daily life. Beside this, we have also discussed about the different causes of security threats and some of our suggested solutions to protect the systems from the attackers as well that we have found in our research
Not long ago, it was thought that only software applications and general purpose digital systems i.e. computers were prone to various types of attacks against their security. The underlying hardware, hardware implementations of these software applications, embedded systems, and hardware devices were considered to be secure and out of reach of these attacks. However, during the previous few years, it has been demonstrated that novel attacks against the hardware and embedded systems can also be mounted. Not only viruses, but worms and Trojan horses have been developed for them, and they have also been demonstrated to be effective. Whereas a lot of research has already been done in the area of security of general purpose computers and software applications, hardware and embedded systems security is a relatively new and emerging area of research. This chapter provides details of various types of existing attacks against hardware devices and embedded systems, analyzes existing design methodologies for their vulnerability to new types of attacks, and along the way describes solutions and countermeasures against them for the design and development of secure systems.
ARM Based Security & Safety System for Base Transceiver Station
The main aim of this system is for Maintenance, Safety & Security of Base Transceiver Station (BTS) site and the tower . The major problems faced include the theft of Wires & Diesel , the fluctuation of Temperatures, unauthorized person entry, unnoticedfuel amount ,Current taken by load and the technician‟s time management. The instant message about the each activity happening in the site given byGSM modem. The temperature sensors will sense the temperature of the room and if it rises above the threshold value the GSM module will send the message to the mobile. Thetemperature values are displayed on LCD, the controller gives command to cooling Fan to ON & Real time Images recording on PC by using MATLAB software with GUI .The cell site Base Transceiver Station (BTS) which are operated by Diesel generator .When the fuel level goes below the set value a message is sent to the technician requesting for refilling & with Real time Images recording with on PC by using MATLAB software. Door open/close sensor is used for indication of door opening and closing. Wire Theft Status indicated by IR Sensor .The site door can be accessed only through the RFID system. The situation in the site is updated to the technician through messages. PIR sensor used to detects the presence of humans inside the room. The system includes a Current sensor to measure Load Current & Humidity Sensor to sense humidity of BTS room with Real time Images recording on PC. Camera record BTS room. The value of Temperature & Humidity of BTS room, Diesel Level of Generator& Load Current are Logged in PC with respective time & date. Our project improves the performance ability of BTS. This technique is remote controlling and monitoring can be implemented at each and every BTS tower to look after the safety and management of its network.
Securing and Hardening Embedded Linux Devicescase study based on NXP i.MX6 Platform
9th International Conference on Future Internet of Things and Cloud (FiCloud), 2022
We have already gotten used to the fact software has become an integral part of almost every device we use. We are slowly getting used to our devices being interconnected with each other, controlling and monitoring crucial elements of our daily life and exchanging our private data. We are putting more and more trust in the embedded devices that are designed to help us out. Securing embedded devices was always a challenging task, but ubiquitous connectivity made it even much more important and difficult. As devices become smarter and highly interconnected there is more room for cybercriminals to exploit the system's vulnerabilities to issue malicious control commands or create data breaches. The purpose of this paper is to describe the main security measures for protecting embedded Linux-based systems. It describes details of the implementation of a secure boot and a secure storage mechanism using embedded hardware features of NXP i.MX6 platform. In addition, the paper discusses methods for secure connection to the cloud and device provisioning with the support of TPM module. Overall, it provides practical guidelines on how to develop an embedded Linux device having security considerations in mind and summarizes the current state of knowledge on the topic.
Secure architecture in embedded systems: an overview
Proc. Workshop Reconfigurable Comm.- …, 2006
Security issues become more and more important during the development of mobile devices. In this paper we propose first a brief overview of hardware and software attacks related to embedded systems and second a comprehensive study of existing solutions to protect programs and data exchanges within these systems. Security primitives dedicated to the implementation of a secure architecture are also presented. Based on this analysis of existing solutions and requirements an original approach is proposed in order to mitigate the cost of security. Constraints related to embedded systems are strong it is thus mandatory to define new solutions, our proposition is outlined through various security primitives (ciphering and hashing) with features adapted to embedded systems.
Bootloader design application for embedded systems by using controller area network
In this study, the software programs that enable programming of microcontrollers on the controller area network (CAN) through the network have been developed. The first developed program is the bootloader that operates on a microcontroller and enables the microcontroller to program itself through the incoming data. The second program operates on the computer and is developed with the LabVIEW TM program. With this program, the Hex file written and compiled by the users is read and sends to the microcontroller through the CAN bus.
IJERT-Hardware Implementation of Mbed to Mbed Through Controller Area Network Using ARM Cortex Core
International Journal of Engineering Research and Technology (IJERT), 2013
https://www.ijert.org/hardware-implementation-of-mbed-to-mbed-through-controller-area-network-using-arm-cortex-core https://www.ijert.org/research/hardware-implementation-of-mbed-to-mbed-through-controller-area-network-using-arm-cortex-core-IJERTV2IS80748.pdf The communication between two mbed 's is achieved by placing a Controller Area Network (CAN) in between them. The CAN is another type of serial communication protocol that was developed within the automotive industry to allow a number of electronic units on a single vehicle to share essential control data. A vehicle nowadays uses many microcontrollers for autonomous control systems. CAN was developed by the German company Bosch. The CAN standard has a high level of data security. In this paper, a hardware implementation of CAN on the mbed is proposed. This uses the ARM Cortex core. In very broad terms, the mbed takes a microcontroller and surrounds it with some very useful support circuitry. It places this n a conveniently sized little printed circuit board (PCB) and supports it with an online compiler, program library and handbook. This gives a complete embedded system development environment, allowing users to develop and prototype embedded systems simply, efficiently and rapidly. Fast prototyping is one of the key features of the mbed approach.