Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Meisterhans, Judith | - |
dc.contributor.author | Doran, Hans Dermot | - |
dc.contributor.author | Zimmerli, Lea | - |
dc.contributor.author | Rüst, Andreas | - |
dc.date.accessioned | 2022-01-21T16:08:37Z | - |
dc.date.available | 2022-01-21T16:08:37Z | - |
dc.date.issued | 2021 | - |
dc.identifier.uri | https://digitalcollection.zhaw.ch/handle/11475/23983 | - |
dc.description.abstract | Distributed devices are rarely initially designed with security in mind. The post-hoc addition of security features in an embedded system comes at a substantial cost. This incremental cost is largely a function of the real-time or near-real-time deadlines that device needs to adhere to and the additional computational burden of cryptographic algorithms. This cost can articulate itself in additional energy requirements, a concern for IoT devices, or increased computational power a concern for cost efficient automation components and IoT devices. In this presentation we examine, based on real-world measurements, the costs that can be expected using secure elements, HW-protocol implementations and co-designed systems. We begin by outlining the major design methodologies and their effect on the implementation and the choice of components for secure devices. We shall then discuss computational cost, security of implementation, footprint and other issues like testability and maintainability to leave the listener with a series of implementation options and key points to watch. We provide measurement results to support our arguments. | de_CH |
dc.language.iso | en | de_CH |
dc.rights | Licence according to publishing contract | de_CH |
dc.subject | IT security | de_CH |
dc.subject | Real time ethernet | de_CH |
dc.subject | Automation | de_CH |
dc.subject | IoT | de_CH |
dc.subject | HW-SW co-design | de_CH |
dc.subject | FPGA | de_CH |
dc.subject.ddc | 006: Spezielle Computerverfahren | de_CH |
dc.title | Security implementations of embedded networked devices : a comparative analysis | de_CH |
dc.type | Konferenz: Sonstiges | de_CH |
dcterms.type | Text | de_CH |
zhaw.departement | School of Engineering | de_CH |
zhaw.organisationalunit | Institute of Embedded Systems (InES) | de_CH |
zhaw.conference.details | Forum Safety & Security, Stuttgart (online), 21-23 June 2021 | de_CH |
zhaw.funding.eu | No | de_CH |
zhaw.originated.zhaw | Yes | de_CH |
zhaw.publication.status | publishedVersion | de_CH |
zhaw.publication.review | Peer review (Abstract) | de_CH |
zhaw.author.additional | No | de_CH |
zhaw.display.portrait | Yes | de_CH |
Appears in collections: | Publikationen School of Engineering |
Files in This Item:
There are no files associated with this item.
Show simple item record
Meisterhans, J., Doran, H. D., Zimmerli, L., & Rüst, A. (2021). Security implementations of embedded networked devices : a comparative analysis. Forum Safety & Security, Stuttgart (Online), 21-23 June 2021.
Meisterhans, J. et al. (2021) ‘Security implementations of embedded networked devices : a comparative analysis’, in Forum Safety & Security, Stuttgart (online), 21-23 June 2021.
J. Meisterhans, H. D. Doran, L. Zimmerli, and A. Rüst, “Security implementations of embedded networked devices : a comparative analysis,” in Forum Safety & Security, Stuttgart (online), 21-23 June 2021, 2021.
MEISTERHANS, Judith, Hans Dermot DORAN, Lea ZIMMERLI und Andreas RÜST, 2021. Security implementations of embedded networked devices : a comparative analysis. In: Forum Safety & Security, Stuttgart (online), 21-23 June 2021. Conference presentation. 2021
Meisterhans, Judith, Hans Dermot Doran, Lea Zimmerli, and Andreas Rüst. 2021. “Security Implementations of Embedded Networked Devices : A Comparative Analysis.” Conference presentation. In Forum Safety & Security, Stuttgart (Online), 21-23 June 2021.
Meisterhans, Judith, et al. “Security Implementations of Embedded Networked Devices : A Comparative Analysis.” Forum Safety & Security, Stuttgart (Online), 21-23 June 2021, 2021.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.