Full metadata record
DC FieldValueLanguage
dc.contributor.authorMeisterhans, Judith-
dc.contributor.authorDoran, Hans Dermot-
dc.contributor.authorZimmerli, Lea-
dc.contributor.authorRüst, Andreas-
dc.date.accessioned2022-01-21T16:07:58Z-
dc.date.available2022-01-21T16:07:58Z-
dc.date.issued2021-06-
dc.identifier.urihttps://digitalcollection.zhaw.ch/handle/11475/23982-
dc.description.abstractCurrent security concerns are forcing the re-design of secure networked embedded devices. Security is known to be computationally expensive and so substantial additional costs can be expected with post-hoc addition of security features. This cost can articulate itself in additional energy requirements, a concern for IoT devices, and increased computational power a concern for both cost efficient automation components and IoT devices. One typical approach is the use of secure elements to provide a speedup of cryptographic algorithms. Another approach is a security-aware co-design. In this presentation we compare design using secure elements with the co-design approach. We begin by outlining the two design methodologies and their effect on the implementation and the choice of components for secure devices. We then discuss computational cost, security of implementation, footprint and other issues like testability and maintainability to leave the listener with a series of implementation options and key points to be aware of. We provide measurement results to support our arguments.de_CH
dc.language.isoende_CH
dc.rightsLicence according to publishing contractde_CH
dc.subjectIT securityde_CH
dc.subjectReal time ethernetde_CH
dc.subjectAutomationde_CH
dc.subjectIoTde_CH
dc.subjectHW-SW co-designde_CH
dc.subjectFPGAde_CH
dc.subject.ddc006: Spezielle Computerverfahrende_CH
dc.titleA comparison of security implementations of embedded networked devicesde_CH
dc.typeKonferenz: Sonstigesde_CH
dcterms.typeTextde_CH
zhaw.departementSchool of Engineeringde_CH
zhaw.organisationalunitInstitute of Embedded Systems (InES)de_CH
zhaw.conference.details14. Embedded Computing Conference, Winterthur (online), 1. Juni 2021de_CH
zhaw.funding.euNode_CH
zhaw.originated.zhawYesde_CH
zhaw.publication.statuspublishedVersionde_CH
zhaw.publication.reviewPeer review (Abstract)de_CH
zhaw.author.additionalNode_CH
zhaw.display.portraitYesde_CH
Appears in collections:Publikationen School of Engineering

Files in This Item:
There are no files associated with this item.
Show simple item record
Meisterhans, J., Doran, H. D., Zimmerli, L., & Rüst, A. (2021, June). A comparison of security implementations of embedded networked devices. 14. Embedded Computing Conference, Winterthur (Online), 1. Juni 2021.
Meisterhans, J. et al. (2021) ‘A comparison of security implementations of embedded networked devices’, in 14. Embedded Computing Conference, Winterthur (online), 1. Juni 2021.
J. Meisterhans, H. D. Doran, L. Zimmerli, and A. Rüst, “A comparison of security implementations of embedded networked devices,” in 14. Embedded Computing Conference, Winterthur (online), 1. Juni 2021, Jun. 2021.
MEISTERHANS, Judith, Hans Dermot DORAN, Lea ZIMMERLI und Andreas RÜST, 2021. A comparison of security implementations of embedded networked devices. In: 14. Embedded Computing Conference, Winterthur (online), 1. Juni 2021. Conference presentation. Juni 2021
Meisterhans, Judith, Hans Dermot Doran, Lea Zimmerli, and Andreas Rüst. 2021. “A Comparison of Security Implementations of Embedded Networked Devices.” Conference presentation. In 14. Embedded Computing Conference, Winterthur (Online), 1. Juni 2021.
Meisterhans, Judith, et al. “A Comparison of Security Implementations of Embedded Networked Devices.” 14. Embedded Computing Conference, Winterthur (Online), 1. Juni 2021, 2021.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.