Skip to main content
Book cover

Trusted Computing for Embedded Systems

  • Book
  • © 2015

Overview

  • Enables readers to address a variety of security threats to embedded hardware and software
  • Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems
  • Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (14 chapters)

  1. Introduction

  2. Applications-Use Cases

  3. Building Blocks

Keywords

About this book

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc.

·         Enables readers to address a variety of security threats to embedded hardware and software;

·         Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems;

·         Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems.

 

Editors and Affiliations

  • Thales Communications, Colombes, France

    Bernard Candaele

  • Department of Computer Science, National Technical University of Athens, Athens, Greece

    Dimitrios Soudris, Iraklis Anagnostopoulos

Bibliographic Information

  • Book Title: Trusted Computing for Embedded Systems

  • Editors: Bernard Candaele, Dimitrios Soudris, Iraklis Anagnostopoulos

  • DOI: https://doi.org/10.1007/978-3-319-09420-5

  • Publisher: Springer Cham

  • eBook Packages: Engineering, Engineering (R0)

  • Copyright Information: Springer International Publishing Switzerland 2015

  • Hardcover ISBN: 978-3-319-09419-9Published: 29 December 2014

  • Softcover ISBN: 978-3-319-36279-3Published: 22 September 2016

  • eBook ISBN: 978-3-319-09420-5Published: 11 December 2014

  • Edition Number: 1

  • Number of Pages: XXVI, 299

  • Number of Illustrations: 49 b/w illustrations, 102 illustrations in colour

  • Topics: Circuits and Systems, Processor Architectures, Electronics and Microelectronics, Instrumentation, Systems and Data Security

Publish with us