CFP last date
20 January 2025
Reseach Article

Implementation of Advanced Security Services in Internet Controlled Embedded Systems by using HDA Algorithm

Published on February 2013 by P. Rama Bayapa Reddy, K. Soundararajan, M. H. M. Krishna Prasad
Mobile and Embedded Technology International Conference 2013
Foundation of Computer Science USA
MECON - Number 1
February 2013
Authors: P. Rama Bayapa Reddy, K. Soundararajan, M. H. M. Krishna Prasad
8b068378-2556-455e-afce-a9ffe15d5fdf

P. Rama Bayapa Reddy, K. Soundararajan, M. H. M. Krishna Prasad . Implementation of Advanced Security Services in Internet Controlled Embedded Systems by using HDA Algorithm. Mobile and Embedded Technology International Conference 2013. MECON, 1 (February 2013), 59-67.

@article{
author = { P. Rama Bayapa Reddy, K. Soundararajan, M. H. M. Krishna Prasad },
title = { Implementation of Advanced Security Services in Internet Controlled Embedded Systems by using HDA Algorithm },
journal = { Mobile and Embedded Technology International Conference 2013 },
issue_date = { February 2013 },
volume = { MECON },
number = { 1 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 59-67 },
numpages = 9,
url = { /proceedings/mecon/number1/10796-1011/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Mobile and Embedded Technology International Conference 2013
%A P. Rama Bayapa Reddy
%A K. Soundararajan
%A M. H. M. Krishna Prasad
%T Implementation of Advanced Security Services in Internet Controlled Embedded Systems by using HDA Algorithm
%J Mobile and Embedded Technology International Conference 2013
%@ 0975-8887
%V MECON
%N 1
%P 59-67
%D 2013
%I International Journal of Computer Applications
Abstract

In recent years networks have become a very popular research topic. By providing communications in the absence of a fixed infra-structure Networks are an attractive technology for many applications such as res-cue operations, tactical operations, environmental monitoring, conferences, and the like. However, this flexibility introduces new security risks. Since prevention techniques are never enough, intrusion detection systems (IDSs), which monitor system activities and detect intrusions, are generally used to complement other security mechanisms. Intrusion detection for Networks is a complex and difficult task mainly due to the dynamic nature of Networks, their highly constrained nodes, and the lack of central monitoring points. Conventional IDSs are not easily applied to them. New approaches need to be developed or else existing approaches need to be adapted for Networks. This chapter outlines issues of intrusion detection for Networks and reviews the main solutions proposed in the literature. The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded systems, which will be ubiquitously used to capture, store, manipulate, and access data of a sensitive nature, pose several unique and interesting security challenges. However, security is often mis-construed by embedded system designers as the addition of features, such as specific cryptographic algorithms and security protocols, to the system. In reality, it is an entirely new metric that designers should consider throughout the design process, along with other metrics such as cost, performance, and power. This paper is intended to introduce HDA (High level Description Algorithm) algorithm in embedded system designers and design tool developers to the challenges involved in designing secure embedded systems. We attempt to provide a unified view of embedded system security by first analyzing the typical functional security requirements for embedded systems from an end-user perspective. Intrusion is any set of actions that attempt to compromise the integrity, confidentiality, or availability of a resource and an intrusion detection system (IDS) is a system for the detection of such intrusions. There are three main components of an IDS: data collection, detection, and response.

References
  1. A. M. Fiskiran and R. B. Lee, PAX: A Datapath-Scalable Minimalist Cryptographic Processor for Mobile Environments ( in Embedded Cryptographic Hardware: Design and Security). Nova Science Publishers (to be published),2004.
  2. R. B. Lee, R. L. Rivest, M. J. B. Robshaw, Z. J. Shi, and Y. L. Yin, "Permutation operations in cipher design," in Proc. Intl. Conf. on Information Technology (ITCC)s, Apr. 2004.
  3. HIFN Inc. http://www. hifn. com.
  4. Corrent Inc. http://www. corrent. com.
  5. Broadcom Corporation, BCM5840 Gigabit SecurityProcessor. http://www. broadcom. com.
  6. Next-Generation Secure Computing Base (NGSCB). Microsoft Inc. (http://www. microsoft. com/resources/ngscb/productinfo. mspx).
  7. P. N. Glaskowsky, Microsoft Details Secure PC Plans. Microprocessor eport,Instat/MDR, June 2003.
  8. Trusted Computing Group. http://www. trustedcomputinggroup. org/home
  9. LaGrande Technology for Safer Computing. Intel Inc. (http://www. intel. com/technology/security).
  10. Counterpane Internet Security, Inc. http://www. counterpane. com.
  11. SSL 3. 0 Specification. http://wp. netscape. com/eng/ssl3/.
  12. OpenIPMP. http://www. openipmp. org.
  13. Internet Streaming Media Alliance.
  14. http:/www. isma. tv/home.
  15. MPEG Open Security for Embedded Systems (MOSES). http://www. crl. co. uk/projects/moses/.
  16. Discretix Technologies Ltd. (http://www. discretix. com).
  17. D. Lie, C. A. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. C. Mitchell, and M. Horowitz, "Architectural support for copy and tamper resistant software," in Proc ACM Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 168–177, 2000
  18. G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas, "AEGIS: Archtecture forTamper-Evident and Tamper-Resistant Processing," in Proc. Intl Conf. Supercomputing (ICS '03), pp. 160–171, June 2003.
  19. R. M. Best, Crypto Microprocessor for Executing Enciphered Programs. U. S. patent 4,278,837, July 1981.
  20. M. Kuhn, The TrustNo 1 Cryptoprocessor Concept. CS555 Report, Purdue University http://www. cl. cam. ac. uk/˜mgk25/,Apr,1997.
  21. G. Hoglund and G. McGraw, Exploiting Software: How to Break Code (http://www. exploitingsoftware. com).
Index Terms

Computer Science
Information Sciences

Keywords

Embedded Systems Ids Security Cryptography Hda Algorithm software Attacks Viruses Trusted Computing