2020 IEEE 33rd International System-on-Chip Conference (SOCC) 2020
DOI: 10.1109/socc49529.2020.9524778
|View full text |Cite
|
Sign up to set email alerts
|

Evolution of Embedded Platform Security Technologies: Past, Present & Future Challenges

Abstract: In recent years, the proliferation of intelligent embedded technologies is opening venues to new service and computing models, providing diverse socio-economic benefits. These intelligent technologies are giving rise to a wide range of public and private applications by sharing and analysing generated data. This includes smart home, smart health, smart city, autonomous vehicles, smart grid and smart manufacturing etc. However, where this sharing of data brings benefits and opportunities, it simultaneously pres… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…By 2026, it is estimated that the 5G market targeting the aviation industry will grow to $3.9 billion [3]. Though, where the technological evolution of embedded systems [4] and adoption of advanced autonomous technologies bring benefits (e.g. broader connectivity), it equally opens doors to a wide range of vulnerabilities and attack vectors [5].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…By 2026, it is estimated that the 5G market targeting the aviation industry will grow to $3.9 billion [3]. Though, where the technological evolution of embedded systems [4] and adoption of advanced autonomous technologies bring benefits (e.g. broader connectivity), it equally opens doors to a wide range of vulnerabilities and attack vectors [5].…”
Section: Introductionmentioning
confidence: 99%
“…This process shall enable system designers to systematically define, assess, design, implement, verify, and validate the system's safety and security requirements through the system design phases and operational life cycle. The RA2 shall establish resilience [4] by providing prevention, detection, response and recovery capabilities to ensure security and functional safety (fail-operational, fail-safe and fault-tolerant) [5], [11], [12] of UAM missions. This paper extends [9] and complements previously published research works [12], [13], [14], [15].…”
Section: Introductionmentioning
confidence: 99%