A Survey on Embedded System Security: Cryptographic Techniques and Vulnerability Mitigation

  • Sandeep Kulkarni Student, Department of Computer Engineering, Ujjain Engineering College, Ujjain, India

Abstract

Embedded systems are increasingly deployed in critical applications, including IoT devices, industrial automation, healthcare, and automotive systems. However, their growing connectivity and resource constraints make them vulnerable to a range of cyber threats. This paper provides a comprehensive survey of embedded system security, focusing on cryptographic techniques and vulnerability mitigation strategies. We discuss hardware and software-based cryptographic implementations, lightweight encryption schemes, and secure key management. Additionally, we explore common security vulnerabilities in embedded systems, including side-channel attacks, firmware tampering, and physical attacks, along with countermeasures such as secure boot, intrusion detection, and trusted execution environments. The paper concludes with insights into future research directions and emerging trends in embedded security.

References

1.Jacquemart Q. Applied Cryptography.
2. Menezes AJ, Van Oorschot PC, Vanstone SA. Handbook of applied cryptography. CRC press; 2018 Dec 7.
3. Paar C, Pelzl J. A Textbook for Students and Practitioners. Understanding Cryptography, Springer. 2009.
4. Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems.
Communications of the ACM. 1978 Feb 1;21(2):120-6.
5. Kocher PC. Timing attacks on implementations of Diffie- Hellman, RSA, DSS, and other systems. InAdvances in
Cryptology—CRYPTO’96: 16th Annual International Cryptology Conference Santa Barbara, California, USA
August 18–22, 1996 Proceedings 16 1996 (pp. 104-113). Springer Berlin Heidelberg.
6. Kelsey J, Schneier B, Wagner D, Hall C. Side channel cryptanalysis of product ciphers. In Computer Security—
ESORICS 98: 5th European Symposium on Research in Computer Security Louvain-la-Neuve, Belgium September 16–18, 1998 Proceedings 5 1998 (pp. 97-110). Springer Berlin Heidelberg.
7. Güneysu T, Paar C. Ultra high performance ECC over NIST primes on commercial FPGAs. In Cryptographic
Hardware and Embedded Systems–CHES 2008: 10th International Workshop, Washington, DC, USA, August
10-13, 2008. Proceedings 10 2008 (pp. 62-78). Springer Berlin Heidelberg.
8. Smart NP. Cryptography made simple. Springer; 2016.
9. Bhunia S, Tehranipoor MM. Hardware security: a handson learning approach. Morgan Kaufmann; 2018 Oct 30.
10. Huang Z, Wang Q, Chen Y, Jiang X. A survey on machine learning against hardware trojan attacks:
Recent advances and challenges. IEEE Access. 2020 Jan 8;8:10796-826.
11. Lesi V, Jovanov I, Pajic M. Security-aware scheduling of embedded control tasks. ACM Transactions on Embedded Computing Systems (TECS). 2017 Sep 27;16(5s):1-21.
12. Suh GE, Devadas S. Physical unclonable functions for device authentication and secret key generation.
In Proceedings of the 44th annual design automation conference 2007 Jun 4 (pp. 9-14).
13. Wang Y, Wang J, Zhang W, Zhan Y, Guo S, Zheng Q, Wang X. A survey on deploying mobile deep learning applications: A systemic and technical perspective. Digital Communications and Networks. 2022 Feb
1;8(1):1-7.
14. Zhou Y, Feng D. Side-channel attacks: Ten years after its publication and the impacts on cryptographic module
security testing. Cryptology ePrint Archive. 2005.
15. Wallrabenstein JR. Practical and secure IoT device authentication using physical unclonable functions.
In2016 IEEE 4th international conference on future internet of things and cloud (FiCloud) 2016 Aug 22 (pp. 99-106). IEEE.
16. Conti M, Dragoni N, Lesyk V. A survey of man in the middle attacks. IEEE communications surveys & tutorials. 2016 Mar 29;18(3):2027-51.
17. Rajendran J, Sam M, Sinanoglu O, Karri R. Security analysis of integrated circuit camouflaging. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security 2013 Nov 4 (pp. 709-720).
Published
2025-05-03
How to Cite
KULKARNI, Sandeep. A Survey on Embedded System Security: Cryptographic Techniques and Vulnerability Mitigation. Journal of Advanced Research in Embedded System, [S.l.], v. 12, n. 1&2, p. 7-12, may 2025. ISSN 2395-3802. Available at: <http://www.thejournalshouse.com/index.php/ADR-Journal-Embedded-Systems/article/view/1440>. Date accessed: 04 may 2025.