Trust issues in modern embedded computing

Alex James Pappachen, Sugathan Sherin

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

The growth of the Internet since 2000, which was expected to happen in the next decade, brings several new challenges in embedded computing. With most embedded devices getting connected to the Internet, the information risk due to its value, and the risk associated with information storage, transfer, and duplication is high. The critical aspect of this information in the embedded world is that the majority of this information has a direct impact on the physical world. For example, consider an Internet-enabled control system that has access to the information acquired from the sensors; this information can be used to manipulate, undo, or modify the operating conditions of the system, and would have a significant impact on the physical world. In the past, the embedded systems, due to its isolated existence, had less worries on the need for trust and information security. The access to the embedded devices was usually restricted and different from the microprocessor pathway. However, beginning in 2009, this scenario started changing mainly because embedded devices are becoming Internet enabled, resulting in evolution of different communication pathways to access the information and the devices. The trust in the modern embedded solutions faces the challenges of multicore computing capabilities, increasing overlap with general computing architectures, and data analytic-aware computing hardware. In this chapter, we provide a modern perspective on the trust issues in embedded computing and devices. In addition, it should be noted that there is a high level of trust placed in many mission critical applications that use embedded systems. This makes this topic highly relevant and of prime importance for ensuring the robustness of embedded computing solutions in the future.

Original languageEnglish
Title of host publicationManaging Trust in Cyberspace
PublisherCRC Press
Pages361-369
Number of pages9
ISBN (Electronic)9781466568457
ISBN (Print)9781466568440
DOIs
Publication statusPublished - Jan 1 2013

Fingerprint

Internet
Embedded systems
Security of data
Microprocessor chips
Hardware
Control systems
Data storage equipment
Communication
Sensors

ASJC Scopus subject areas

  • Computer Science(all)
  • Engineering(all)

Cite this

James Pappachen, A., & Sherin, S. (2013). Trust issues in modern embedded computing. In Managing Trust in Cyberspace (pp. 361-369). CRC Press. https://doi.org/10.1201/b16318

Trust issues in modern embedded computing. / James Pappachen, Alex; Sherin, Sugathan.

Managing Trust in Cyberspace. CRC Press, 2013. p. 361-369.

Research output: Chapter in Book/Report/Conference proceedingChapter

James Pappachen, A & Sherin, S 2013, Trust issues in modern embedded computing. in Managing Trust in Cyberspace. CRC Press, pp. 361-369. https://doi.org/10.1201/b16318
James Pappachen A, Sherin S. Trust issues in modern embedded computing. In Managing Trust in Cyberspace. CRC Press. 2013. p. 361-369 https://doi.org/10.1201/b16318
James Pappachen, Alex ; Sherin, Sugathan. / Trust issues in modern embedded computing. Managing Trust in Cyberspace. CRC Press, 2013. pp. 361-369
@inbook{ebd9386c3b7e49cea7a3c33f5937ae36,
title = "Trust issues in modern embedded computing",
abstract = "The growth of the Internet since 2000, which was expected to happen in the next decade, brings several new challenges in embedded computing. With most embedded devices getting connected to the Internet, the information risk due to its value, and the risk associated with information storage, transfer, and duplication is high. The critical aspect of this information in the embedded world is that the majority of this information has a direct impact on the physical world. For example, consider an Internet-enabled control system that has access to the information acquired from the sensors; this information can be used to manipulate, undo, or modify the operating conditions of the system, and would have a significant impact on the physical world. In the past, the embedded systems, due to its isolated existence, had less worries on the need for trust and information security. The access to the embedded devices was usually restricted and different from the microprocessor pathway. However, beginning in 2009, this scenario started changing mainly because embedded devices are becoming Internet enabled, resulting in evolution of different communication pathways to access the information and the devices. The trust in the modern embedded solutions faces the challenges of multicore computing capabilities, increasing overlap with general computing architectures, and data analytic-aware computing hardware. In this chapter, we provide a modern perspective on the trust issues in embedded computing and devices. In addition, it should be noted that there is a high level of trust placed in many mission critical applications that use embedded systems. This makes this topic highly relevant and of prime importance for ensuring the robustness of embedded computing solutions in the future.",
author = "{James Pappachen}, Alex and Sugathan Sherin",
year = "2013",
month = "1",
day = "1",
doi = "10.1201/b16318",
language = "English",
isbn = "9781466568440",
pages = "361--369",
booktitle = "Managing Trust in Cyberspace",
publisher = "CRC Press",

}

TY - CHAP

T1 - Trust issues in modern embedded computing

AU - James Pappachen, Alex

AU - Sherin, Sugathan

PY - 2013/1/1

Y1 - 2013/1/1

N2 - The growth of the Internet since 2000, which was expected to happen in the next decade, brings several new challenges in embedded computing. With most embedded devices getting connected to the Internet, the information risk due to its value, and the risk associated with information storage, transfer, and duplication is high. The critical aspect of this information in the embedded world is that the majority of this information has a direct impact on the physical world. For example, consider an Internet-enabled control system that has access to the information acquired from the sensors; this information can be used to manipulate, undo, or modify the operating conditions of the system, and would have a significant impact on the physical world. In the past, the embedded systems, due to its isolated existence, had less worries on the need for trust and information security. The access to the embedded devices was usually restricted and different from the microprocessor pathway. However, beginning in 2009, this scenario started changing mainly because embedded devices are becoming Internet enabled, resulting in evolution of different communication pathways to access the information and the devices. The trust in the modern embedded solutions faces the challenges of multicore computing capabilities, increasing overlap with general computing architectures, and data analytic-aware computing hardware. In this chapter, we provide a modern perspective on the trust issues in embedded computing and devices. In addition, it should be noted that there is a high level of trust placed in many mission critical applications that use embedded systems. This makes this topic highly relevant and of prime importance for ensuring the robustness of embedded computing solutions in the future.

AB - The growth of the Internet since 2000, which was expected to happen in the next decade, brings several new challenges in embedded computing. With most embedded devices getting connected to the Internet, the information risk due to its value, and the risk associated with information storage, transfer, and duplication is high. The critical aspect of this information in the embedded world is that the majority of this information has a direct impact on the physical world. For example, consider an Internet-enabled control system that has access to the information acquired from the sensors; this information can be used to manipulate, undo, or modify the operating conditions of the system, and would have a significant impact on the physical world. In the past, the embedded systems, due to its isolated existence, had less worries on the need for trust and information security. The access to the embedded devices was usually restricted and different from the microprocessor pathway. However, beginning in 2009, this scenario started changing mainly because embedded devices are becoming Internet enabled, resulting in evolution of different communication pathways to access the information and the devices. The trust in the modern embedded solutions faces the challenges of multicore computing capabilities, increasing overlap with general computing architectures, and data analytic-aware computing hardware. In this chapter, we provide a modern perspective on the trust issues in embedded computing and devices. In addition, it should be noted that there is a high level of trust placed in many mission critical applications that use embedded systems. This makes this topic highly relevant and of prime importance for ensuring the robustness of embedded computing solutions in the future.

UR - http://www.scopus.com/inward/record.url?scp=85054666704&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85054666704&partnerID=8YFLogxK

U2 - 10.1201/b16318

DO - 10.1201/b16318

M3 - Chapter

SN - 9781466568440

SP - 361

EP - 369

BT - Managing Trust in Cyberspace

PB - CRC Press

ER -