Skip to main content

Selected Challenges on Security and Dependability of Embedded Systems

  • Chapter
  • First Online:
Innovative Technologies for Dependable OTS-Based Critical Systems

Abstract

As embedded systems are silently spreading into every corner of our technological society and being interconnected in a world-wide network, they become invaluable to our daily lives, therefore our concern in their correct and secure behavior increases. However, improving dependability and security of embedded devices must be done with special care, since they are usually developed under severe resource- and price-constraints. In the frame of Critical Step project some FPGA-based embedded systems have been developed, with special concern for dependability and security improvement. Due to resource constraints of these devices, some particular challenges were faced, that are described in this paper: when to employ security during system lifecycle; which security threats to deal with; how to cope with computational-demanding cryptography; how to deal with security in safety-critical systems; how to increase dependability; how to assure timeliness; and how to evaluate dependability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Altera: Cyclone III 3C120 Development Board—Reference Manual. Document version 1.2, March (2009)

    Google Scholar 

  2. ADAM/AWAM Systems: Multilateration Solutions by SELEX Sistemi Integrati. http://www.selex-si.com/IT/Common/files/SelexSI/brochure_datasheet/2008/Data_Sheet/Adam.pdf

  3. CRITICAL STEP project: The CRITICAL Software Technology for an Evolutionary Partnership. A Marie-Curie Industry-Academia Partnerships and Pathways (IAPP) project belonging to call FP7-PEOPLE-2008-IAPP. http://www.critical-step.eu/

  4. Cunha, J.C., Maia, R., Rela, M.Z., Silva, J.G.: A study on failure models in feedback control systems. In: International Conference on Dependable Systems and Networks, Goteborg, Sweden (2001)

    Google Scholar 

  5. eSTREAM project. The ECRYPT Stream Cipher Project. http://www.ecrypt.eu.org/stream/

  6. Grand, J.: Practical secure hardware design for embedded systems. In: Proceedings of the 2004 Embedded Systems Conference (2004)

    Google Scholar 

  7. Koopman, P.: Embedded system security. IEEE Comput. 37(7), 95–97 (2004)

    Google Scholar 

  8. Marwedel, P.: Embedded System Design (Embedded Systems Foundations of Cyber-Physical Systems). TU Dortmund, Informatik. Springer, Dordrecht (2011)

    Google Scholar 

  9. pSHIELD project co-funded by the ARTEMIS Joint Undertaking. Research of Security, Privacy and Dependability in context of Embedded Systems. http://www.pshield.eu/

  10. pSHIELD project deliverables D2.3.2, D3.3, D6.2, D6.3. http://pshield.unik.no/wiki/PublicDeliverables

  11. Rana, V., Santambrogio, M., Sciuto, D.: Dynamic Reconfigurability in Embedded System Design. In: IEEE International Symposium on Circuits and Systems ISCAS’2007, New Orleans (2007)

    Google Scholar 

  12. Schoitsch, E.: Design for safety and security of complex embedded systems: a unified approach. In: Kowalik, J.S., Gorski, J., Sachenko, A. (eds.) Cyberspace Security and Defense: Research Issues, vol. 196, NATO Science Series II—Mathematics, Physics and Chemistry (2005)

    Google Scholar 

  13. Xilinx: ML505/ML506/ML507 Evaluation Platform—User Guide. UG347 (v3.1.2), 16 May 2011

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Przemysław Osocha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Italia

About this chapter

Cite this chapter

Osocha, P., Cunha, J.C., Matarese, F. (2013). Selected Challenges on Security and Dependability of Embedded Systems. In: Cotroneo, D. (eds) Innovative Technologies for Dependable OTS-Based Critical Systems. Springer, Milano. https://doi.org/10.1007/978-88-470-2772-5_13

Download citation

  • DOI: https://doi.org/10.1007/978-88-470-2772-5_13

  • Published:

  • Publisher Name: Springer, Milano

  • Print ISBN: 978-88-470-2771-8

  • Online ISBN: 978-88-470-2772-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics