Security in Embedded Devices

Security in Embedded Devices Cathy Gebotys Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system designers have been dealing with tremendo...

Full description

Bibliographic Details
Main Author: Gebotys, Catherine H. (Author)
Corporate Author: SpringerLink (Online service)
Format: Electronic
Language:English
Published: Boston, MA : Springer US, 2010.
Edition:1.
Series:Embedded Systems
Subjects:
Online Access:https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-1-4419-1530-6
Table of Contents:
  • Where Security Began
  • Introduction to Secure Embedded Systems
  • The Key
  • Using Keys
  • Elliptic Curve Protocols
  • Symmetric Key Protocols Including Ciphers
  • Data Integrity and Message Authentication
  • Side Channel Attacks on the Embedded System
  • Countermeasures
  • Reliable Security Systems
  • Summary, Standards and Ongoing Efforts.