Security Processing for High End Embedded System with Cryptographic Algorithms

Abstract

This paper is intended to introduce embedded system designers and design tool developers to the challenges involved in designing secure embedded systems. The challenges unique to embedded systems require new approaches to security covering all aspects of embedded system design from architecture to implementation. Security processing, which refers to the computations that must be performed in a system for the purpose of security, can easily overwhelm the computational capabilities of processors in both low- and highend embedded systems. The paper also briefs on the security enforced in a device by the use of proprietary security technology and also discusses the security measures taken during the production of the device. We also survey solution techniques to address these challenges, drawing from both current practice and emerging research, and identify open research problems that will require innovations in embedded system architecture and design methodologies.

Authors and Affiliations

M. Shankar , Dr. M. Sridar , Dr. M. Rajani

Keywords

Related Articles

ANALYSIS AND PREDICTION OF TEMPERATURE USING STATISTICAL ARTIFICIAL NEURAL NETWORK

This paper is about producing a prediction system by using artificial neural methods that will forecast temperature. This paper is based on three objectives. First, study of temperature and gathers all knowledge regardin...

IMPLEMENTATION OF PEAP ON MICROSOFT WINDOW’S IMPLEMENTATION OF PEAP ON MICROSOFT WINDOW’S

In today’s world most organizations are moving from wireconnected LAN’s to wireless LAN’s. WLANs are changing the landscape of computer networking. Wireless communications are inherently more open to attack than wired da...

Temporal Data Compression in Wireless Sensor Network using LZW

Wireless networks find maximum usage in present scenario due to less overhead of establishment. But these networks have constrained environment. Wireless networks have limited processing capability, memory space and batt...

Analysis of the Protected Extensible Authentication Protocol

The Internet Engineering Task Force (IETF) has proposed new protocols for highly secured wireless networking. The purpose of this paper is to implement one such proposed security protocol - PEAP (Protected Extensible Aut...

Contract Farming: The Survey on Different Issues

In India, 70-80% population of the country depends directly or indirectly to farming. So this field is very much important for research and the concept of contract farming is more important for farmers and other person...

Download PDF file
  • EP ID EP103627
  • DOI -
  • Views 80
  • Downloads 0

How To Cite

M. Shankar, Dr. M. Sridar, Dr. M. Rajani (2012). Security Processing for High End Embedded System with Cryptographic Algorithms. International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com, 12(1), 24-30. https://europub.co.uk/articles/-A-103627