Encryption Visual Projection in Embedded Systems
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2012, Vol 2, Issue 1
Abstract
Embedded systems permeate our everyday lives. From automobiles to elevators, kitchen appliances to televisions, and water heaters to cell phones, we increasingly depend upon embedded systems to operate as expected. A few obviously critical embedded application domains, such as aviation, have traditionally benefited from extraordinary care during development to ensure that everything is done correctly. But increasingly, everyday embedded applications are becoming “mission critical,” with little fanfare and perhaps without the full attention to dependability properties that they truly deserve. Typically embedded systems have low computing power and finite energy supply based on a battery, and these factors are at odds with the computationally intensive nature of the cryptographic algorithms underlying many security protocols. In addition, secure embedded systems are vulnerable to attacks, like physical tampering, malware and side-channel attacks.
Authors and Affiliations
M. Shankar| Associate Professor and Head, UG and PG studies, EEE, KEC Kuppam, Andhra Pradesh Email: magaprajin@gmail.com, Dr. M. Sridar| Director of International Relations Bharath University, Chennai, Tamilnadu, India, Email: deanrd@bharathuniv.ac.in, Dr. M. Rajani| Director of R & D Bharath University, Chennai, Tamilnadu, India, Email: deanrd@bharathuniv.ac.in
Optimal Quantum Measurement Design on Speech Signal: Blind Minimax Estimator Improving MSE Over LS Estimators
We consider the problem of estimating an unknown, deterministic speech signal parameters based on quantum measurements corrupted by white Gaussian noise. We design and analyze blind minimax estimator (BME), which consist...
Extended Class of Pruned Crossbar Switches for Optical Networks
Reducing crosspoints of conventional pruned crossbar switches (PXBSs) with N2?3 crosspoints, where N is the switch size, was investigated from an architectural point of view. PXBSs have been created by removing parts of...
User Driven Feedback Control System driven using CAN Protocol
Industrial automation is a sector having vast possibilities for major improvements. The system described in this paper consists of a console master computer (CMC) which will monitor various physical nodes usually found i...
Dominion- An Introductory Concept of Access Control Between Valuable Assets and Mobile Device
At present methods for providing conditional access to restricted resources and applications for permitting personnel, such as military members, government agencies, or first-responders are not available. The conditional...
Voice Based Elderly Assistance Using Wireless Technology
The voice controlled wheel robot system needs to make use of the latest technological components available. In this paper, we present the design and implementation of a voice based wheel chair system where communication...