Academic Journals Database
Disseminating quality controlled scientific knowledge

Security Processing for High End Embedded System with Cryptographic Algorithms

Author(s): M.Shankar | Dr.M.Sridar | Dr.M.Rajani

Journal: International Journal of Computer Science and Management Studies
ISSN 2231-5268

Volume: 12;
Issue: 01;
Start page: 24;
Date: 2012;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Security | Performance | Design | Reliability

This paper is intended to introduce embedded system designers and design tool developers to the challenges involved in designing secure embedded systems. The challenges unique to embedded systems require new approaches to security covering all aspects of embedded system design from architecture to implementation. Security processing, which refers to the computations that must be performed in a system for the purpose of security, can easily overwhelm thecomputational capabilities of processors in both low- and highendembedded systems. The paper also briefs on the security enforced in a device by the use of proprietary security technology and also discusses the security measures taken during the production of the device. We also survey solution techniques to address these challenges, drawing from both current practice and emerging esearch, and identify open research problems that will require innovations in embedded system architecture and design methodologies.
Affiliate Program     

Tango Rapperswil
Tango Rapperswil