Security Processing for High End Embedded System with Cryptographic Algorithms

Abstract

This paper is intended to introduce embedded system designers and design tool developers to the challenges involved in designing secure embedded systems. The challenges unique to embedded systems require new approaches to security covering all aspects of embedded system design from architecture to implementation. Security processing, which refers to the computations that must be performed in a system for the purpose of security, can easily overwhelm the computational capabilities of processors in both low- and highend embedded systems. The paper also briefs on the security enforced in a device by the use of proprietary security technology and also discusses the security measures taken during the production of the device. We also survey solution techniques to address these challenges, drawing from both current practice and emerging research, and identify open research problems that will require innovations in embedded system architecture and design methodologies.

Authors and Affiliations

M. Shankar , Dr. M. Sridar , Dr. M. Rajani

Keywords

Related Articles

SECURITY THREATS IN WIRELESS SENSOR NETWORKS

Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless...

AN EMPIRICAL ANALYSIS OF CAUSAL RELATIONSHIP BETWEEN STOCK MARKET AND MACROECONOMIC VARIABLES IN INDIA

The present paper is aimed at studying the nature of the causal relationship between stock prices and macroeconomic variables in India, if any such relationship exists. For this purpose the techniques of unit– root tests...

An Improved Approach to perform Crawling and avoid Duplicate Web Pages

When a web search is performed it includes many duplicate web pages or the websites. It means we can get number of similar pages at different web servers. We are proposing a Web Crawling Approach to Detect and avoid Dupl...

Foreign Trade of India During Pre & Post Independence (Study of Development of India)

This subject is selected for study, since it is directly onnected with the growth of our economy. In our earlier period after independence, more emphasis was put for to make the country self- sufficient. However, that is...

Download PDF file
  • EP ID EP103627
  • DOI -
  • Views 81
  • Downloads 0

How To Cite

M. Shankar, Dr. M. Sridar, Dr. M. Rajani (2012). Security Processing for High End Embedded System with Cryptographic Algorithms. International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com, 12(1), 24-30. https://europub.co.uk./articles/-A-103627