|
This article is cited in 13 scientific papers (total in 13 papers)
Information Security
Combined Design Technique for Secure Embedded Devices Exemplified by a Perimeter Protection System
V. Desnitsky, A. A. Chechulin, I. V. Kotenko, D. S. Levshun, M. V. Kolomeec St. Petersburg Institute for Informatics and Automation of the Russian Academy of Science (SPIIRAS)
Abstract:
In terms of information security, embedded devices are elements of complex cyber-physical systems, systems of the Internet of Things, working in a potentially hostile environment. Therefore, the development of such devices is a challenging problem, often requiring expert solutions. The complexity of developing secure embedded devices is due to different types of potential threats and attacks to the device, as well as the fact that in practice security of embedded devices is usually considered in the final stages of the development process in the form of adding additional security features. In the paper, we propose a design technique aimed at the development of safe and energy-efficient cyber-physical and embedded devices. This technique organizes a search for the best combination of security components on the basis of solving an optimization problem. The efficiency of the proposed technique is demonstrated through the development of a secure system to protect a room perimeter.
Keywords:
embedded devices; cyber-physical systems; perimeter control; design of secure cyber-physical systems.
Citation:
V. Desnitsky, A. A. Chechulin, I. V. Kotenko, D. S. Levshun, M. V. Kolomeec, “Combined Design Technique for Secure Embedded Devices Exemplified by a Perimeter Protection System”, Tr. SPIIRAN, 48 (2016), 5–31
Linking options:
https://www.mathnet.ru/eng/trspy901 https://www.mathnet.ru/eng/trspy/v48/p5
|
|