Abstract
As embedded systems are silently spreading into every corner of our technological society and being interconnected in a world-wide network, they become invaluable to our daily lives, therefore our concern in their correct and secure behavior increases. However, improving dependability and security of embedded devices must be done with special care, since they are usually developed under severe resource- and price-constraints. In the frame of Critical Step project some FPGA-based embedded systems have been developed, with special concern for dependability and security improvement. Due to resource constraints of these devices, some particular challenges were faced, that are described in this paper: when to employ security during system lifecycle; which security threats to deal with; how to cope with computational-demanding cryptography; how to deal with security in safety-critical systems; how to increase dependability; how to assure timeliness; and how to evaluate dependability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Altera: Cyclone III 3C120 Development Board—Reference Manual. Document version 1.2, March (2009)
ADAM/AWAM Systems: Multilateration Solutions by SELEX Sistemi Integrati. http://www.selex-si.com/IT/Common/files/SelexSI/brochure_datasheet/2008/Data_Sheet/Adam.pdf
CRITICAL STEP project: The CRITICAL Software Technology for an Evolutionary Partnership. A Marie-Curie Industry-Academia Partnerships and Pathways (IAPP) project belonging to call FP7-PEOPLE-2008-IAPP. http://www.critical-step.eu/
Cunha, J.C., Maia, R., Rela, M.Z., Silva, J.G.: A study on failure models in feedback control systems. In: International Conference on Dependable Systems and Networks, Goteborg, Sweden (2001)
eSTREAM project. The ECRYPT Stream Cipher Project. http://www.ecrypt.eu.org/stream/
Grand, J.: Practical secure hardware design for embedded systems. In: Proceedings of the 2004 Embedded Systems Conference (2004)
Koopman, P.: Embedded system security. IEEE Comput. 37(7), 95–97 (2004)
Marwedel, P.: Embedded System Design (Embedded Systems Foundations of Cyber-Physical Systems). TU Dortmund, Informatik. Springer, Dordrecht (2011)
pSHIELD project co-funded by the ARTEMIS Joint Undertaking. Research of Security, Privacy and Dependability in context of Embedded Systems. http://www.pshield.eu/
pSHIELD project deliverables D2.3.2, D3.3, D6.2, D6.3. http://pshield.unik.no/wiki/PublicDeliverables
Rana, V., Santambrogio, M., Sciuto, D.: Dynamic Reconfigurability in Embedded System Design. In: IEEE International Symposium on Circuits and Systems ISCAS’2007, New Orleans (2007)
Schoitsch, E.: Design for safety and security of complex embedded systems: a unified approach. In: Kowalik, J.S., Gorski, J., Sachenko, A. (eds.) Cyberspace Security and Defense: Research Issues, vol. 196, NATO Science Series II—Mathematics, Physics and Chemistry (2005)
Xilinx: ML505/ML506/ML507 Evaluation Platform—User Guide. UG347 (v3.1.2), 16 May 2011
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Italia
About this chapter
Cite this chapter
Osocha, P., Cunha, J.C., Matarese, F. (2013). Selected Challenges on Security and Dependability of Embedded Systems. In: Cotroneo, D. (eds) Innovative Technologies for Dependable OTS-Based Critical Systems. Springer, Milano. https://doi.org/10.1007/978-88-470-2772-5_13
Download citation
DOI: https://doi.org/10.1007/978-88-470-2772-5_13
Published:
Publisher Name: Springer, Milano
Print ISBN: 978-88-470-2771-8
Online ISBN: 978-88-470-2772-5
eBook Packages: Computer ScienceComputer Science (R0)