Trudy SPIIRAN
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Informatics and Automation:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Trudy SPIIRAN, 2016, Issue 48, Pages 5–31
DOI: https://doi.org/10.15622/sp.48.1
(Mi trspy901)
 

This article is cited in 13 scientific papers (total in 13 papers)

Information Security

Combined Design Technique for Secure Embedded Devices Exemplified by a Perimeter Protection System

V. Desnitsky, A. A. Chechulin, I. V. Kotenko, D. S. Levshun, M. V. Kolomeec

St. Petersburg Institute for Informatics and Automation of the Russian Academy of Science (SPIIRAS)
Abstract: In terms of information security, embedded devices are elements of complex cyber-physical systems, systems of the Internet of Things, working in a potentially hostile environment. Therefore, the development of such devices is a challenging problem, often requiring expert solutions. The complexity of developing secure embedded devices is due to different types of potential threats and attacks to the device, as well as the fact that in practice security of embedded devices is usually considered in the final stages of the development process in the form of adding additional security features. In the paper, we propose a design technique aimed at the development of safe and energy-efficient cyber-physical and embedded devices. This technique organizes a search for the best combination of security components on the basis of solving an optimization problem. The efficiency of the proposed technique is demonstrated through the development of a secure system to protect a room perimeter.
Keywords: embedded devices; cyber-physical systems; perimeter control; design of secure cyber-physical systems.
Funding agency Grant number
Russian Foundation for Basic Research 14-07-00697_а
14-07-00417_а
15-07-07451_а
16-37-00338_мол_а
16-29-09482_офи_м
16-37-50035_мол_а_мос
Russian Academy of Sciences - Federal Agency for Scientific Organizations 0073-2015-0004
0073-2015-0007
Russian Science Foundation 15-11-30029
This research was partially financially supported by grants of RFBR (projects No. 14-07-00697, 14-07-00417, 15-07-07451, 16-37-00338, 16-29-09482 ofi_m, 16-37-50035), by the budget (projects No. 0073-2015-0004 and 0073-2015-0007) as well as by Grant of Russian Science Foundation No. 15-11-30029 in SPIIRAS.
Bibliographic databases:
Document Type: Article
UDC: 004.056.53
Language: Russian
Citation: V. Desnitsky, A. A. Chechulin, I. V. Kotenko, D. S. Levshun, M. V. Kolomeec, “Combined Design Technique for Secure Embedded Devices Exemplified by a Perimeter Protection System”, Tr. SPIIRAN, 48 (2016), 5–31
Citation in format AMSBIB
\Bibitem{DesCheKot16}
\by V.~Desnitsky, A.~A.~Chechulin, I.~V.~Kotenko, D.~S.~Levshun, M.~V.~Kolomeec
\paper Combined Design Technique for Secure Embedded Devices Exemplified by a Perimeter Protection System
\jour Tr. SPIIRAN
\yr 2016
\vol 48
\pages 5--31
\mathnet{http://mi.mathnet.ru/trspy901}
\crossref{https://doi.org/10.15622/sp.48.1}
\elib{https://elibrary.ru/item.asp?id=27177922}
Linking options:
  • https://www.mathnet.ru/eng/trspy901
  • https://www.mathnet.ru/eng/trspy/v48/p5
  • This publication is cited in the following 13 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Informatics and Automation
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024