The Security Vulnerabilities on Internet-Enabled Embedded Systems
Abstract
As technology is improved, mobile and small devices have been started to be used more often in e-government and smart city applications. Although IoT devices are exposed to attack, they do not have security standards and proper built-in measures known by all. It is very difficult to define the security breaches in the embedded systems, and it is a low possibility to detect the vulnerabilities. Remote analysis of embedded systems is very difficult. Embedded systems with the most security concerns are networked embedded systems. This year, the ban on Huawei products by the US and a number of western countries is due to the main concerns in cyber security. IoT and embedded system security vulnerabilities in critical infrastructures can now become an international problem involving the military and governments. For this reason, a study carried out according to the general structure of embedded systems to define and overcome these deficits. In this work, security vulnerabilities in networked embedded systems and security standards against these vulnerabilities are examined within the literature to propose main characteristics of a secure IoT in both government and business cyber environments.
Keywords
References
- [1] Aydın, H. (2016, January 24). GÖMÜLÜ SİSTEMLER(EMBEDDED SYSTEM). Retrieved from https://yazilimdnyasi.wordpress.com/2016/01/24/gomulu-sistemler/
- [2] Dickie, J. (2003, March 31). The How And Why Behind Internet-Enabled Embedded Systems. Retrieved from Electronic Design: http://www.electronicdesign.com/embedded/how-and-why-behind-internet-enabled-embedded-systems
- [3] Herger, A. (2016, February 4). Embedded Systems Engineering. Retrieved from Designing with Embedded Security in Mind: Starting Early and at the Edge: http://eecatalog.com/IoT/2016/02/04/designing-with-embedded-security-in-mind-starting-early-and-at-the-edge/
- [4] Karataş, G. (2016). Mobil Cihazlarda Güvenlik-Tehditler ve Temel Stratejiler. Istanbul Commerce University Journal of Science, 55-75.
- [5] Michael Vai, D. J. (2016). Secure Embedded Systems. Lincoln Laboratory Journal , 110-122.
- [6] Özcanhan, H. (2011). Gömülü Sistem Uygulamalarına Yapılan Saldırılar ve Ağ Bağlantılı Gömülü Sistemlerin Sağlanması. Elektrik-Elektronik ve Bilgisayar Sempozyumu.
- [7] Ukil, A. (2011). Embedded Security for Internet of Things. 2nd IEEE National Conference on Emerging Trends and Applications in Computer Science (NCETACS). Shillong, INDIA.
- [8] S., Robert; “The Convenience/Privacy Trade-off on the Internet of Things, "Wired Innovation Insights Blog, 17 Aralık 2013, http://insights.wired.com/profiles/blogs/the-convenience-privacy-trade-off-on-the-internet-of-things?xg_source=activity#axzz3MNq2UmCe
Details
Primary Language
English
Subjects
Engineering
Journal Section
Review
Publication Date
December 31, 2019
Submission Date
May 14, 2019
Acceptance Date
December 15, 2019
Published in Issue
Year 2019 Volume: 12 Number: 3
Cited By
Embedded Systems and Application Areas in Engineering
Uluslararası Muhendislik Arastirma ve Gelistirme Dergisi
https://doi.org/10.29137/umagd.1053602