Security Processing for High End Embedded System with Cryptographic Algorithms

Abstract

This paper is intended to introduce embedded system designers and design tool developers to the challenges involved in designing secure embedded systems. The challenges unique to embedded systems require new approaches to security covering all aspects of embedded system design from architecture to implementation. Security processing, which refers to the computations that must be performed in a system for the purpose of security, can easily overwhelm the computational capabilities of processors in both low- and highend embedded systems. The paper also briefs on the security enforced in a device by the use of proprietary security technology and also discusses the security measures taken during the production of the device. We also survey solution techniques to address these challenges, drawing from both current practice and emerging research, and identify open research problems that will require innovations in embedded system architecture and design methodologies.

Authors and Affiliations

M. Shankar , Dr. M. Sridar , Dr. M. Rajani

Keywords

Related Articles

Investigation of OCDMA System Performance Against the effect of Dispersion & MAI

This paper presents the effect of dispersion and Multi Access Interference (MAI) of optical fiber on the Bit Error Rate (BER) performance of a Direct Sequence Optical Code Division Multiple Access (DS-OCDMA) network...

Temporal Data Compression in Wireless Sensor Network using LZW

Wireless networks find maximum usage in present scenario due to less overhead of establishment. But these networks have constrained environment. Wireless networks have limited processing capability, memory space and batt...

GRID COMPUTING AND FAULT TOLERANCE APPROACH

Grid computing is a means of allocating the computational power of a large number of computers to complex difficult computation or problem. Grid computing is a distributed computing paradigm that differs from traditiona...

An Approach to Optimize QOS Routing Protocol Using Genetic Algorithm in MANET

Quality of Service support for Mobile Ad hoc Networks is an exigent task due to dynamic topology and limited resource. To support QoS, the link state information such as delay, bandwidth, jitter, cost, error rate and no...

Performance Analysis of FMCW Sub Surface Penetrating Radar

This paper explains a approach towards the implementation of a frequency modulated continuous wave (FMCW) standard system in Advanced Design System (ADS) software for Sub surface penetrating radar (SSPR). For performing...

Download PDF file
  • EP ID EP103627
  • DOI -
  • Views 68
  • Downloads 0

How To Cite

M. Shankar, Dr. M. Sridar, Dr. M. Rajani (2012). Security Processing for High End Embedded System with Cryptographic Algorithms. International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com, 12(1), 24-30. https://europub.co.uk/articles/-A-103627