Security Protocols for the Embedded Internet
Remotely controlling devices over the Internet has become popular over the last few years. Internetaccessibility enhances the functionality of devices by allowing remote control, diagnostics, updates, and monitoring. As the Internet community becomes larger and more devices are added, the chances that a device will be disabled by malicious attacks increases. Security becomes an important aspect to consider when network capability is designed into a device. In some cases, simply controlling who can access a device will suffice, while in other cases, the information sent over the network also needs protection. This paper will review security attacks, requirements, and implementation with a focus on suitability for embedded systems.
Please disable any pop-up blockers for proper viewing of this Whitepaper.