Skip to main content
Go to the home page of the European Commission (opens in new window)
English en
CORDIS - EU research results
CORDIS
Content archived on 2024-05-29

Security for embedded systems on chip

Objective

In the Post-PC world computations move from a central processor based model to one where computations move close to the environment. Wireless embedded devices, like cell phones, PDA's, ambient intelligent systems, environment monitoring, intelligent home appliances pick up information from the environment and process it in a distributed fashion, local to the events. This has a profound impact on security. It used to be that security protocols and algorithms ran on powerful processors, which were assumed to run in a secure environment. Security then focuses on protecting the distrusted communication links. Examples are firewalls and VPN's. In an environment of small-embedded distributed, wireless connected devices, this basic assumption does not hold anymore.

The embedded device itself is vulnerable to attacks, ranging from radio jamming to theft to side-channel attacks. The focus of this proposal is the efficient support of security in resource-constrained devices. Embedded devices have limited energy supply or are battery operated, run on small-embedded processors and have a limited amount of storage. Both the communication between devices and the devices themselves need security protection. An embedded system ¡s only as secure as its weakest link. Hence, we propose a systematic comprehensive approach to the problem. We plan to integrate a security vision in a SoC (System-on-chip) integrated circuit design flow.

This means that the different abstraction levels of the design need consideration.
1) At the protocol level, we investigate the scalability, the energy and memory cost of key distribution protocols. This takes into account the computation versus communication trade-off (e.g. radio energy or bandwidth constraints).
2) At the architecture level, energy efficient, expressed in cipher bits per Joule, and side-channel resistant co-processors for encryption algorithms will be developed.
3) Security has a time and area

Fields of science (EuroSciVoc)

CORDIS classifies projects with EuroSciVoc, a multilingual taxonomy of fields of science, through a semi-automatic process based on NLP techniques. See: The European Science Vocabulary.

You need to log in or register to use this function

Topic(s)

Calls for proposals are divided into topics. A topic defines a specific subject or area for which applicants can submit proposals. The description of a topic comprises its specific scope and the expected impact of the funded project.

Call for proposal

Procedure for inviting applicants to submit project proposals, with the aim of receiving EU funding.

FP6-2002-MOBILITY-12
See other projects for this call

Funding Scheme

Funding scheme (or “Type of Action”) inside a programme with common features. It specifies: the scope of what is funded; the reimbursement rate; specific evaluation criteria to qualify for funding; and the use of simplified forms of costs like lump sums.

IRG - Marie Curie actions-International re-integration grants

Coordinator

KATHOLIEKE UNIVERSITEIT LEUVEN
EU contribution
No data
Total cost

The total costs incurred by this organisation to participate in the project, including direct and indirect costs. This amount is a subset of the overall project budget.

No data
My booklet 0 0