JOURNAL ARTICLE

Security challenges for open embedded systems

Abstract

Lots of traditional embedded systems can be called closed systems in that they do not connect and communicate with systems or devices outside of the entities they are embedded, and some part of these systems are designed based on proprietary protocols or standards. Open embedded systems connect and communicate with other systems or devices through the Internet or other networks, and are designed based on open protocols and standards. This paper discusses two types of security challenges facing open embedded systems: the security of the devices themselves that host embedded systems, and the security of information collected, processed, communicated, and consumed by embedded systems. We also discuss solution techniques to address these challenges.

Keywords:
Computer science Computer security Open standard Host (biology) The Internet Embedded system World Wide Web Interoperability

Metrics

2
Cited By
0.23
FWCI (Field Weighted Citation Impact)
19
Refs
0.64
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Physical Unclonable Functions (PUFs) and Hardware Security
Physical Sciences →  Computer Science →  Hardware and Architecture

Related Documents

JOURNAL ARTICLE

Security challenges in embedded systems

Dimitrios SerpanosArtemios G. Voyiatzis

Journal:   ACM Transactions on Embedded Computing Systems Year: 2013 Vol: 12 (1s)Pages: 1-10
JOURNAL ARTICLE

MOSES: MPEG OPEN SECURITY FOR EMBEDDED SYSTEMS

Panos Kudumakis

Year: 2003 Pages: 549-552
JOURNAL ARTICLE

Open challenges in real time embedded systems

Lui Sha

Journal:   ACM SIGBED Review Year: 2004 Vol: 1 (1)Pages: 13-15
JOURNAL ARTICLE

Challenges and opportunities in deeply embedded systems security

Madhukar AnandInsup Lee

Journal:   ACM SIGBED Review Year: 2008 Vol: 5 (1)Pages: 1-2
© 2026 ScienceGate Book Chapters — All rights reserved.