The Community for Technology Leaders
Green Image
Issue No. 03 - May-June (2013 vol. 11)
ISSN: 1540-7993
pp: 61-63
Christopher Szilagyi , Carnegie Mellon University
Philip Koopman , Carnegie Mellon University
ABSTRACT
As threats from malicious attackers increase, integrity approaches in networked embedded systems will have to evolve to provide both the security and safety aspects of integrity in a unified approach. And they'll have to do it on a shoestring, using only a few bits per message. To help achieve this, you can exploit two embedded-systems characteristics: the periodic sampling of messages and the system's inertia.
INDEX TERMS
Online services, Internet, Malware, Computer security, Computer hacking, Computer viruses, MAC, Online services, Internet, Malware, Computer security, Computer hacking, Computer viruses, authentication, Online services, Internet, Malware, Computer security, Computer hacking, Computer viruses, spoofing, computer safety, networked embedded systems, integrity, Controller Area Network, message authentication code
CITATION
Christopher Szilagyi, Philip Koopman, "Integrity in embedded control networks", IEEE Security & Privacy, vol. 11, no. , pp. 61-63, May-June 2013, doi:10.1109/MSP.2013.61
101 ms
(Ver )