The growth of the Internet since 2000, which was expected to happen in the next decade, brings several new challenges in embedded computing. With most embedded devices getting connected to the Internet, the information risk due to its value, and the risk associated with information storage, transfer, and duplication is high. The critical aspect of this information in the embedded world is that the majority of this information has a direct impact on the physical world. For example, consider an Internet-enabled control system that has access to the information acquired from the sensors; this information can be used to manipulate, undo, or modify the operating conditions of the system, and would have a significant impact on the physical world. In the past, the embedded systems, due to its isolated existence, had less worries on the need for trust and information security. The access to the embedded devices was usually restricted and different from the microprocessor pathway. However, beginning in 2009, this scenario started changing mainly because embedded devices are becoming Internet enabled, resulting in evolution of different communication pathways to access the information and the devices. The trust in the modern embedded solutions faces the challenges of multicore computing capabilities, increasing overlap with general computing architectures, and data analytic-aware computing hardware. In this chapter, we provide a modern perspective on the trust issues in embedded computing and devices. In addition, it should be noted that there is a high level of trust placed in many mission critical applications that use embedded systems. This makes this topic highly relevant and of prime importance for ensuring the robustness of embedded computing solutions in the future.
ASJC Scopus subject areas
- Computer Science(all)