Skip to main content

Security Threats of Embedded Systems in IoT Environment

  • Conference paper
  • First Online:
Inventive Communication and Computational Technologies

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 89))

Abstract

The Internet of things (IoT) technology has reached great heights with the integration of efficient networking strategies, application protocols and VLSI. With the unlimited number of devices connected to the IoT, security has become a major concern. Mainly security is ensured by network and application protocols. But with rising threats, there is a need to lay emphasis on security from a hardware design point of view. Smart devices such as sensors and actuators are connected at the node of IoT and work on an embedded processing platform. Hence, embedded processors become an integral constituent of an IoT network. Selection of processors and identification of critical modules in the processor architecture play a key role in developing a secure design. Memory design will play a pivotal role in embedded system security. Memory attack accounts for loss or alteration of information which can impair the growth of IoT. This paper attempts to highlight security from a hardware perspective along with the potential threats likely to affect the critical modules.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Zhao K, Ge L (2013) A survey on the internet of things security. In: 9th international conference on computational intelligence and security (CIS). IEEE, pp 663–667

    Google Scholar 

  2. Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener Comput Syst 29(7):1645–1660

    Google Scholar 

  3. Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805

    Google Scholar 

  4. Xu T, Wendt JB, Potkonjak M (2014) Security of IoT systems: design challenges and opportunities. In: Proceedings of the 2014 IEEE/ACM international conference on computer-aided design. IEEE Press, pp 417–423

    Google Scholar 

  5. Kocher P et al (2014) Security as a new dimension in embedded system design. In: Proceedings of the 41st annual design automation conference. ACM

    Google Scholar 

  6. Kaabouch M, Le Cocquen E (2011) Bi-processor architecture for secure systems. U.S. Patent No. 7,984,301. 19 July 2011

    Google Scholar 

  7. Suh GE, O’Donnell CW, Devadas S (2005) AEGIS: a single-chip secure processor. Inf Secur Tech Rep 10(2):63–73

    Google Scholar 

  8. Ma N et al (2014) A hierarchical reconfigurable micro-coded multi-core processor for IoT applications. In: 9th international symposium on reconfigurable and communication-centric systems-on-chip (ReCoSoC). IEEE

    Google Scholar 

  9. ARM Processors, www.ti.com/lit/er/spmz637/spmz637.pdf

  10. Elbaz R et al (2009) Hardware mechanisms for memory authentication: a survey of existing techniques and engines. In: Transactions on computational science IV. Springer Berlin Heidelberg, pp 1–22

    Google Scholar 

  11. Khurana H, Hadley M, Lu N, Frincke DA (2010) Smart-grid security issues. IEEE Secur Priv 8(1):81–85

    Article  Google Scholar 

  12. Liu J, Xiao Y, Li S, Liang W, Chen CP (2012) Cyber security and privacy issues in smart grids. IEEE Commun Surv Tutor 14(4):981–997

    Google Scholar 

  13. Simmhan Y, Kumbhare AG, Cao B, Prasanna V (2011) An analysis of security and privacy issues in smart grid software architectures on clouds. In: IEEE 4th international conference on cloud computing. IEEE, pp 582–589

    Google Scholar 

  14. McDaniel P, McLaughlin S (2009) Security and privacy challenges in the smart grid. IEEE Secur Priv 1(3):75–77

    Article  Google Scholar 

  15. Babar S et al (2011) Proposed embedded security framework for internet of things (IoT). In: 2nd IEEE international conference on wireless communication, vehicular technology, information theory and aerospace & electronic systems technology (Wireless VITAE), Feb 28. IEEE, pp 1–5

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R Mary Lourde .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rajendran, S., Mary Lourde, R. (2020). Security Threats of Embedded Systems in IoT Environment. In: Ranganathan, G., Chen, J., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 89. Springer, Singapore. https://doi.org/10.1007/978-981-15-0146-3_70

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0146-3_70

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0145-6

  • Online ISBN: 978-981-15-0146-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics