2014
DOI: 10.4018/978-1-4666-6194-3.ch005
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerabilities of Secure and Reliable Low-Power Embedded Systems and Their Analysis Methods

Abstract: Due to the increase in popularity of mobile devices, it has become necessary to develop a low-power design methodology in order to build complex embedded systems with the ability to minimize power usage. In order to fulfill power constraints and security constraints if personal data is involved, test and verification of a design's functionality are imperative tasks during a product's development process. Currently, in the field of secure and reliable low-power embedded systems, issues such as peak power consum… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…To supplement the communication handling requirements for the NFC reader, and also preceding and subsequent data and security processing, we introduce another process MCU that works either along with the BCC chip or on top of the BCC functional block. In most scenarios, the communication between the CCBs and the BMS controller is established using either a Controller Area Network (CAN) protocol, or some other form of network connection, like Ethernet, Transformer Physical Layer (TPL), or SPI [33].One BMS controller can communicate with multiple CCBs, depending on the system and protocol limitations [1], [4].…”
Section: Design Of the Novel Bms Nfc Sensor Readoutmentioning
confidence: 99%
See 2 more Smart Citations
“…To supplement the communication handling requirements for the NFC reader, and also preceding and subsequent data and security processing, we introduce another process MCU that works either along with the BCC chip or on top of the BCC functional block. In most scenarios, the communication between the CCBs and the BMS controller is established using either a Controller Area Network (CAN) protocol, or some other form of network connection, like Ethernet, Transformer Physical Layer (TPL), or SPI [33].One BMS controller can communicate with multiple CCBs, depending on the system and protocol limitations [1], [4].…”
Section: Design Of the Novel Bms Nfc Sensor Readoutmentioning
confidence: 99%
“…Since battery modules are usually enclosed in a protective case together with a BCC, the main potential attack vectors on these modules would be the ones initiated through counterfeiting [27]. It is important that only battery cells that come from valid and approved manufactures are installed, as inadequate battery cells could potentially lead to hazards through compromising the BMS controller, or even going higher to the high-speed network outside the BMS environment [33].…”
Section: Security Mechanisms a Battery Module Authentication Protocolmentioning
confidence: 99%
See 1 more Smart Citation