Abstract

In a world of pervasive computing, embedded systems can be found in a wide range of products and are employed in various heterogeneous domains. The abovementioned devices often need to access, store, manipulate and/or communicate sensitive or even critical information, making the security of their resources and services an important concern in their design process. These issues are further exacerbated by the resource-constrained nature of the devices, in conjunction with the ever-present need for smaller size and lower production costs. This paper aims to provide an overview of the challenges in designing secure embedded systems, covering both node hardware and software issues, as well as relevant network protocols and cryptographic algorithms. Moreover, recent advances in the field are identified, highlighting opportunities for future research.

Keywords:
Computer science Cryptography Computer security Process (computing) Node (physics) Resource (disambiguation) Field (mathematics) Computer network Operating system Engineering

Metrics

11
Cited By
3.38
FWCI (Field Weighted Citation Impact)
0
Refs
0.93
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Parallel Computing and Optimization Techniques
Physical Sciences →  Computer Science →  Hardware and Architecture

Related Documents

JOURNAL ARTICLE

Security challenges in embedded systems

Dimitrios SerpanosArtemios G. Voyiatzis

Journal:   ACM Transactions on Embedded Computing Systems Year: 2013 Vol: 12 (1s)Pages: 1-10
JOURNAL ARTICLE

Challenges and opportunities in deeply embedded systems security

Madhukar AnandInsup Lee

Journal:   ACM SIGBED Review Year: 2008 Vol: 5 (1)Pages: 1-2
JOURNAL ARTICLE

On security issues in embedded systems: challenges and solutions

Lyes KhelladiYacine ChallalAbdelmadjid BouabdallahNadjib Badache

Journal:   International Journal of Information and Computer Security Year: 2008 Vol: 2 (2)Pages: 140-140
© 2026 ScienceGate Book Chapters — All rights reserved.