Abstract
The Internet of things (IoT) technology has reached great heights with the integration of efficient networking strategies, application protocols and VLSI. With the unlimited number of devices connected to the IoT, security has become a major concern. Mainly security is ensured by network and application protocols. But with rising threats, there is a need to lay emphasis on security from a hardware design point of view. Smart devices such as sensors and actuators are connected at the node of IoT and work on an embedded processing platform. Hence, embedded processors become an integral constituent of an IoT network. Selection of processors and identification of critical modules in the processor architecture play a key role in developing a secure design. Memory design will play a pivotal role in embedded system security. Memory attack accounts for loss or alteration of information which can impair the growth of IoT. This paper attempts to highlight security from a hardware perspective along with the potential threats likely to affect the critical modules.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zhao K, Ge L (2013) A survey on the internet of things security. In: 9th international conference on computational intelligence and security (CIS). IEEE, pp 663–667
Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener Comput Syst 29(7):1645–1660
Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805
Xu T, Wendt JB, Potkonjak M (2014) Security of IoT systems: design challenges and opportunities. In: Proceedings of the 2014 IEEE/ACM international conference on computer-aided design. IEEE Press, pp 417–423
Kocher P et al (2014) Security as a new dimension in embedded system design. In: Proceedings of the 41st annual design automation conference. ACM
Kaabouch M, Le Cocquen E (2011) Bi-processor architecture for secure systems. U.S. Patent No. 7,984,301. 19 July 2011
Suh GE, O’Donnell CW, Devadas S (2005) AEGIS: a single-chip secure processor. Inf Secur Tech Rep 10(2):63–73
Ma N et al (2014) A hierarchical reconfigurable micro-coded multi-core processor for IoT applications. In: 9th international symposium on reconfigurable and communication-centric systems-on-chip (ReCoSoC). IEEE
ARM Processors, www.ti.com/lit/er/spmz637/spmz637.pdf
Elbaz R et al (2009) Hardware mechanisms for memory authentication: a survey of existing techniques and engines. In: Transactions on computational science IV. Springer Berlin Heidelberg, pp 1–22
Khurana H, Hadley M, Lu N, Frincke DA (2010) Smart-grid security issues. IEEE Secur Priv 8(1):81–85
Liu J, Xiao Y, Li S, Liang W, Chen CP (2012) Cyber security and privacy issues in smart grids. IEEE Commun Surv Tutor 14(4):981–997
Simmhan Y, Kumbhare AG, Cao B, Prasanna V (2011) An analysis of security and privacy issues in smart grid software architectures on clouds. In: IEEE 4th international conference on cloud computing. IEEE, pp 582–589
McDaniel P, McLaughlin S (2009) Security and privacy challenges in the smart grid. IEEE Secur Priv 1(3):75–77
Babar S et al (2011) Proposed embedded security framework for internet of things (IoT). In: 2nd IEEE international conference on wireless communication, vehicular technology, information theory and aerospace & electronic systems technology (Wireless VITAE), Feb 28. IEEE, pp 1–5
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Rajendran, S., Mary Lourde, R. (2020). Security Threats of Embedded Systems in IoT Environment. In: Ranganathan, G., Chen, J., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 89. Springer, Singapore. https://doi.org/10.1007/978-981-15-0146-3_70
Download citation
DOI: https://doi.org/10.1007/978-981-15-0146-3_70
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0145-6
Online ISBN: 978-981-15-0146-3
eBook Packages: EngineeringEngineering (R0)