Online Library TheLib.net » Security in Embedded Devices
cover of the book Security in Embedded Devices

Ebook: Security in Embedded Devices

00
27.01.2024
0
0

Security in Embedded Devices

Cathy Gebotys

Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system designers have been dealing with tremendous challenges in performance, power, price and reliability. Now they must also deal with definition of security requirements, security design and implementation. Given the limited number of security engineers in the market, large background of cryptography with which these standards are based upon, and difficulty of ensuring the implementation will also be secure from attacks, security design remains a challenge. This book provides the foundations for understanding embedded security design, outlining various aspects of security in devices ranging from typical wireless devices such as PDAs through to contactless smartcards to satellites.

  • Provides must-have content for both security engineers and embedded systems designers;
  • Describes numerous case studies, including contactless smartcards, PDA security, and satellite security, illustrating various aspects of secure, embedded design;
  • Covers security fundamentals, embedded security issues and crypto architecture;
  • Shows readers how to attack an embedded system and how to embed countermeasures to resist attack--readers are shown that understanding attacks is crucial to implementing security in embedded systems.




Security in Embedded Devices

Cathy Gebotys

Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system designers have been dealing with tremendous challenges in performance, power, price and reliability. Now they must also deal with definition of security requirements, security design and implementation. Given the limited number of security engineers in the market, large background of cryptography with which these standards are based upon, and difficulty of ensuring the implementation will also be secure from attacks, security design remains a challenge. This book provides the foundations for understanding embedded security design, outlining various aspects of security in devices ranging from typical wireless devices such as PDAs through to contactless smartcards to satellites.

  • Provides must-have content for both security engineers and embedded systems designers;
  • Describes numerous case studies, including contactless smartcards, PDA security, and satellite security, illustrating various aspects of secure, embedded design;
  • Covers security fundamentals, embedded security issues and crypto architecture;
  • Shows readers how to attack an embedded system and how to embed countermeasures to resist attack--readers are shown that understanding attacks is crucial to implementing security in embedded systems.



Security in Embedded Devices

Cathy Gebotys

Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system designers have been dealing with tremendous challenges in performance, power, price and reliability. Now they must also deal with definition of security requirements, security design and implementation. Given the limited number of security engineers in the market, large background of cryptography with which these standards are based upon, and difficulty of ensuring the implementation will also be secure from attacks, security design remains a challenge. This book provides the foundations for understanding embedded security design, outlining various aspects of security in devices ranging from typical wireless devices such as PDAs through to contactless smartcards to satellites.

  • Provides must-have content for both security engineers and embedded systems designers;
  • Describes numerous case studies, including contactless smartcards, PDA security, and satellite security, illustrating various aspects of secure, embedded design;
  • Covers security fundamentals, embedded security issues and crypto architecture;
  • Shows readers how to attack an embedded system and how to embed countermeasures to resist attack--readers are shown that understanding attacks is crucial to implementing security in embedded systems.

Content:
Front Matter....Pages i-xi
Where Security Began....Pages 1-12
Introduction to Secure Embedded Systems....Pages 13-27
The Key....Pages 29-48
Using Keys....Pages 49-73
Elliptic Curve Protocols....Pages 75-109
Symmetric Key Protocols Including Ciphers....Pages 111-142
Data Integrity and Message Authentication....Pages 143-161
Side Channel Attacks on the Embedded System....Pages 163-222
Countermeasures....Pages 223-261
Reliable Testable Secure Systems....Pages 263-289
Summary, Standards, and Ongoing Efforts....Pages 291-294
Back Matter....Pages 295-297


Security in Embedded Devices

Cathy Gebotys

Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system designers have been dealing with tremendous challenges in performance, power, price and reliability. Now they must also deal with definition of security requirements, security design and implementation. Given the limited number of security engineers in the market, large background of cryptography with which these standards are based upon, and difficulty of ensuring the implementation will also be secure from attacks, security design remains a challenge. This book provides the foundations for understanding embedded security design, outlining various aspects of security in devices ranging from typical wireless devices such as PDAs through to contactless smartcards to satellites.

  • Provides must-have content for both security engineers and embedded systems designers;
  • Describes numerous case studies, including contactless smartcards, PDA security, and satellite security, illustrating various aspects of secure, embedded design;
  • Covers security fundamentals, embedded security issues and crypto architecture;
  • Shows readers how to attack an embedded system and how to embed countermeasures to resist attack--readers are shown that understanding attacks is crucial to implementing security in embedded systems.

Content:
Front Matter....Pages i-xi
Where Security Began....Pages 1-12
Introduction to Secure Embedded Systems....Pages 13-27
The Key....Pages 29-48
Using Keys....Pages 49-73
Elliptic Curve Protocols....Pages 75-109
Symmetric Key Protocols Including Ciphers....Pages 111-142
Data Integrity and Message Authentication....Pages 143-161
Side Channel Attacks on the Embedded System....Pages 163-222
Countermeasures....Pages 223-261
Reliable Testable Secure Systems....Pages 263-289
Summary, Standards, and Ongoing Efforts....Pages 291-294
Back Matter....Pages 295-297
....
Download the book Security in Embedded Devices for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen