Security and Embedded Systems

Front Cover
Ran Giladi, Dimitrios Nikolaou Serpanos
IOS Press, 2006 - Science - 203 pages
"Technological advances have led to wide deployment and use of embedded systems in an increasing range of applications, from mobile phones to car, plane and spacecraft and from digital id's to military systems in the field. Many of these applications place significant security requirements and have led to significant research activity in the area of security and embedded systems, due to the limited resources of conventional embedded systems. This emerging research area is of great importance to a large number of public and private organizations, due to their desire to deploy secure embedded systems in the field. This publication brings together one of the first international efforts to emphasize the importance of this emerging technical field and provides presentations of leading researchers in the field. Its objectives are to present the technologies and open problems of the emerging area of security and embedded systems, to present the latest research results in all aspects of security in embedded systems, and, finally, to provide a roadmap of the technology for the future. Considering the main directions of research in the field, three main areas are discussed: (i) foundations of security and embedded systems, (ii) secure embedded computing systems and (iii) telecommunications and network services."
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Chaotic Routing as a Method of an Information Conversion
1
Combinatorial Game Models for Security Systems
8
Architectural Enhancements for Secure Embedded Processing
18
Computational Improvements to Differential Side Channel Analysis
26
A Process Algebra Approach to Authentication and Secrecy
36
Intellectual Property Protection Using Embedded Systems
44
Challenges in Deeply Networked System Survivability
57
Multimedia Watermarking
65
Research Issues in Homeland Security
113
Assurance in Autonomous Decentralized Embedded System
121
Vulnerabilities and Countermeasures for Embedded Processors
129
AgentBased Modeling and Simulation of Malefactors Attacks Against Computer Networks
139
Current Problems in Security of Military Networks
147
MultiAgent Framework for Intrusion Detection and Alert Correlation
158
Securing Home and Building Automation Systems Using the zPnP Approach
170
A Routing Method for AdHoc Networks with Adjustable Security Capability
180

A Platform for Designing Secure Embedded Systems
73
Cryptographic Insecurity of the Test Repeat Paradigm
83
A Privacy Classification Model Based on Linkability Valuation
91
A RunTime Reconfigurable Architecture for Embedded Program Flow Verification
99
ModelBased Validation of Enterprise Access Policies
107
On the Security of the GSM Cellular Network
188
Telecommunications Fraud Electronic Crime in Fix and Mobile Embedded Systems
196
Author Index
203
Copyright

Other editions - View all

Common terms and phrases