Secure Smart Embedded Devices, Platforms and Applications

  • 12h 22m
  • Keith Mayes (eds), Konstantinos Markantonakis
  • Springer
  • 2014
  • Presents a broad range of cross-industry/discipline topics related to secure embedded systems, with chapters that are authored by experienced industry experts and applicable to real-world problems
  • Useful as a subject overview and as an in-depth reference, making it suitable for a wide range of readers including researchers, experts and managers from industry and government
  • Serves as a reminder of technical and practical issues for IT users who still depend on the critical security provided by small embedded systems

New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and considerations, while focusing strongly on technical and practical security issues.

The benefits and pitfalls of developing and deploying applications that rely on embedded systems and their security functionality are presented. A sufficient level of technical detail to support embedded systems is provided throughout the text, although the book is quite readable for those seeking awareness through an initial overview of the topics. This edited volume benefits from the contributions of industry and academic experts and helps provide a cross-discipline overview of the security and practical issues for embedded systems, tokens, and platforms. It is an ideal complement to the earlier work, Smart Cards Tokens, Security and Applications from the same editors.

About the Editors

Konstantinos Markantonakis B.Sc. (Lancaster University), M.Sc., MBA, Ph.D. (London) received his B.Sc. (Hons) in Computer Science from Lancaster University in 1995, his M.Sc. in Information Security in 1996, his Ph.D. in 2000 and his MBA in International Management in 2005 from RHUL. He is currently a Reader (Associate Professor) in the ISG. His main research interests include smart card security and applications, secure cryptographic protocol design, Public Key Infrastructures (PKI) and key management, embedded system security, mobile phone operating systems/platform security, NFC/RFID security, grouping proofs, electronic voting protocols. Since completing his Ph.D., he has worked as an independent consultant in a number of information security and smart card related projects. He has worked as a Multi-application Smart Card Manager in VISA International EU, responsible for multi-application smart card technology for southern Europe. More recently, he was working as a Senior Information Security Consultant for Steer Davies Gleave, responsible for advising transport operators and financial institutions on the use of smart card technology. He is also a member of the IFIP Working Group 8.8 on Smart Cards. He has published more than 90 papers in international conferences and journals. He continues to act as a consultant on a variety of topics including smart card security, key management, information security protocols, mobile devices, smart card migration program planning/project management for financial institutions, transport operators and technology integrators.

Keith Mayes is the Director of the Information Security Group-Smart Card Centre (ISG-SCC) at RHUL. He is also the Founder and Managing Director of the consulting company Crisp Telecom Limited. He is currently a non-executive independent Director of AIMs listed GMO ltd., a provider of mobile services in China and a Director of IWICS Europe Limited, a 4G mesh radio network company. Dr. Mayes has a Bachelor of Science degree in Electronic Engineering and a Ph.D. in Digital Image Processing from the University of Bath. He is a Chartered Engineer and Member of the Institute of Engineering and Technology. He is also a Member of the Licensing Executives Society and a Founder Associate Member of the Institute of Information Security Professionals. During a long and varied industry career he has worked for Philips, Honeywell Aerospace & Defence, Racal Research and finally for the Vodafone Group as the Global SIM Manager responsible for SIM card strategy and harmonisation. Aside from his current research and teaching focus on smart cards, RFIDs and security, he has maintained an active interest in mobile communications, hardware and software development, Intellectual Property and radio relay trials.

In this Book

  • Foreword
  • ISG Smart Card Centre—Members Message
  • An Introduction to Smart Cards and RFIDs
  • Embedded DSP Devices
  • Microprocessors and Microcontrollers Security
  • An Introduction to the Trusted Platform Module and Mobile Trusted Module
  • Hardware and VLSI Designs
  • Information Security Best Practices
  • Smart Card Security
  • Graphics Processing Units
  • A Survey of Recent Results in FPGA Security and Intellectual Property Protection
  • Mobile Communication Security Controllers
  • Security of Embedded Location Systems
  • Automotive Embedded Systems Applications and Platform Embedded Security Requirements
  • Analysis of Potential Vulnerabilities in Payment Terminals
  • Wireless Sensor Nodes
  • Near Field Communication
  • The BIOS and Rootkits
  • Hardware Security Modules
  • Security Evaluation and Common Criteria
  • Physical Security Primitives—A Survey on Physically Unclonable Functions and PUF-Based Security Solutions
  • SCADA System Cyber Security
  • An Overview of PIC Microcontrollers and Their Suitability for Cryptographic Algorithms
  • An Introduction to Java Card Programming
  • A Practical Example of Mobile Phone Application Using SATSA (JSR 177) API
  • Wireless Sensors (Languages/Programming/Developments Tools/Examples)
  • Errata to—Secure Smart Embedded Devices, Platforms and Applications
  • Errata to—Secure Smart Embedded Devices, Platforms and Applications
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Rating 4.5 of 35 users Rating 4.5 of 35 users (35)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)