This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Integrity in embedded control networks
May-June 2013 (vol. 11 no. 3)
pp. 61-63
Philip Koopman, Carnegie Mellon University
Christopher Szilagyi, Carnegie Mellon University
As threats from malicious attackers increase, integrity approaches in networked embedded systems will have to evolve to provide both the security and safety aspects of integrity in a unified approach. And they'll have to do it on a shoestring, using only a few bits per message. To help achieve this, you can exploit two embedded-systems characteristics: the periodic sampling of messages and the system's inertia.
Index Terms:
Online services,Internet,Malware,Computer security,Computer hacking,Computer viruses,MAC,Online services,Internet,Malware,Computer security,Computer hacking,Computer viruses,authentication,Online services,Internet,Malware,Computer security,Computer hacking,Computer viruses,spoofing,computer safety,networked embedded systems,integrity,Controller Area Network,message authentication code
Citation:
Philip Koopman, Christopher Szilagyi, "Integrity in embedded control networks," IEEE Security & Privacy, vol. 11, no. 3, pp. 61-63, May-June 2013, doi:10.1109/MSP.2013.61
Usage of this product signifies your acceptance of the Terms of Use.