Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Security Impact on Embedded System Performance
2014 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

This research evaluates complexity of proper security implementation in embedded devices that possess additional challenge of constrained operational environment – e.g. limited memory, limited processing power and limited energy consumption. Term complexity express ability (or lack of) to implement appropriate security mechanisms, without need for hardware design changes or time-consuming software modifications.Actual security requirements are analysed according to ISO/IEC 27001:2013 standard and implemented in publicly available open-source embedded devices and prototypes created during this research. Implementation outcomes are evaluated against previously listed complexity attributes.Second analysis is performed on data gathered through resource measurements during security requirement implementation and additional experiments. It will attempt to identify relation between additional instructions processing (program code execution) against energy consumption.Important part of this research consists of practical experiments that are performed with both open-source and commercial hardware. Device operation is tested with applied security measures and without them. Energy consumption is measured 100 to 25000 times per second depending on each case. The results give an insight on what is required for security implementation on embedded devices and what are the implications.

Place, publisher, year, edition, pages
2014.
Keywords [en]
Technology
Keywords [sv]
Teknik
Identifiers
URN: urn:nbn:se:ltu:diva-45612Local ID: 34b52403-f46d-4f0d-8e6c-c9d9f1b76fbaOAI: oai:DiVA.org:ltu-45612DiVA, id: diva2:1018908
External cooperation
Subject / course
Student thesis, at least 30 credits
Educational program
Information Security, master's level
Supervisors
Note

Validerat; 20140620 (global_studentproject_submitter)

Available from: 2016-10-04 Created: 2016-10-04 Last updated: 2016-10-14Bibliographically approved

Open Access in DiVA

fulltext(1130 kB)485 downloads
File information
File name FULLTEXT02.pdfFile size 1130 kBChecksum SHA-512
d96b421fabb5eb1d5f89395795591206b1355ce7a37538f9daf9c60e013dba107495a687bb45a9447ff21d063e22186cf8c4643e4955a1b454856597090c741c
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Krumins, Ingus

Search outside of DiVA

GoogleGoogle Scholar
Total: 485 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 199 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf