Abstract
Embedded systems for specific purposes perform certain roles in various environments. Security of embedded systems is becoming a paramount concern, and once a problem occurs in embedded systems, can lead to fatal accidents. Therefore, we need security policy for embedded systems. However, due to the limited size and performance, security techniques developed for enterprise and desktop computing might not satisfy embedded application requirements. In this paper, we analyze existing security policies and divide malicious attacks into three sections, and then present the security process model of embedded systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gupta, V., Gupta, S.: Experiments in Wireless Internet Security, 860–864 (2002)
Ashley, P., Hinton, H., Vandenwauver, M.: Wired versus Wireless Security: The Internet. WAP and iMode for E-Commerce, 296—306 (2001)
KayMiller, S.: Facing the Challenge of Wireless Security, 16–18 (2001)
Gao, F., Li, F., Bao, S., Wang, X.: Analysis and Implementation of Secure Console Server Based on Embedded Linux (2008)
Qian, H.-m.: A embedded software testing process model (2009)
Ravi, S., Raghunathan, A., Potlapally, N., Shankaradass, M.: System design methodologies for wireless security processing platform. In: Proc. Design Automation Conf., pp. 777–782 (2002)
Ukil, A., Sen, J., Koilakonda, S.: Embedded security for Internet of things. Emerging Trends and Applications in Computer Science (NCETACS), 1–6 (2011)
Henkel, J., Narayanan, V., Parameswaran, S., Ragel, R.: Security and Dependability of Embedded Systems. A Computer Architects’ Perspective, 30–32 (2009)
Kang, B., Kwon, Y.-J., Lee, R.Y.: A Design and Test Technique for Embedded Software. In: SERA 2005 Proceedings of the Third ACIS Int’l Conference on Software Engineering Research, Management and Applications (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Choi, SH. (2011). The Security Process Model of Embedded Systems. In: Kim, Th., et al. Grid and Distributed Computing. GDC 2011. Communications in Computer and Information Science, vol 261. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27180-9_40
Download citation
DOI: https://doi.org/10.1007/978-3-642-27180-9_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27179-3
Online ISBN: 978-3-642-27180-9
eBook Packages: Computer ScienceComputer Science (R0)