Visible to the public Security challenges for open embedded systems

TitleSecurity challenges for open embedded systems
Publication TypeConference Paper
Year of Publication2017
AuthorsCai, L. Z., Zuhairi, M. F.
Conference Name2017 International Conference on Engineering Technology and Technopreneurship (ICE2T)
Date Published18 December 2017
PublisherIEEE
ISBN Number978-1-5386-1807-3
Keywordsauthentication, composability, Device Security, embedded system, Embedded systems, Internet of Things, Metrics, Microprogramming, pubcrawl, Resiliency
Abstract

Lots of traditional embedded systems can be called closed systems in that they do not connect and communicate with systems or devices outside of the entities they are embedded, and some part of these systems are designed based on proprietary protocols or standards. Open embedded systems connect and communicate with other systems or devices through the Internet or other networks, and are designed based on open protocols and standards. This paper discusses two types of security challenges facing open embedded systems: the security of the devices themselves that host embedded systems, and the security of information collected, processed, communicated, and consumed by embedded systems. We also discuss solution techniques to address these challenges.

URLhttp://ieeexplore.ieee.org/document/8215952/
DOI10.1109/ICE2T.2017.8215952
Citation Keycai_security_2017