Embedded System Security Risk in a Green-House Environment

Embedded System Security Risk in a Green-House Environment

Trailokya Oraon
DOI: 10.4018/978-1-4666-0978-5.ch020
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Embedded systems are extensively used in the field of pervasive computing. These systems are used to such an extent that embedded systems are now controlled and monitored from remote locations by using Web services. Internet authorities are able to assign every device a unique Internet protocol address with the introduction of IPv6 on the Web. Peer-to-peer communication between Internet-enabled devices helped Web services to make performance improvement. On the worse side, it created new attacks on the components used in the embedded systems. The chapter discusses the details of security issues on a Web-enabled embedded system used in greenhouse environment. The devices used in greenhouse environment are monitored and controlled by different software components used in the entire system. Various vulnerabilities are introduced during entire development process of the greenhouse environment. The problem is to search the real threats, then define security policies and implement them during development process. The chapter discusses most of the vulnerabilities of a generalized greenhouse project and tries to find out possible security techniques to deal with the vulnerabilities. Instead of showing the design to build a greenhouse embedded system, it shows to introduce security policies at various levels of life-cycle, be it before development, during development, or after development.
Chapter Preview
Top

Life-Cycle Of Embedded System For Greenhouse Environment

In general, there are three phases of any embedded system:

  • Development of the system for the environment

  • Deployment and use of the system in the environment

  • Disposal/Removal/Transfer of the system from the environment

Complete Chapter List

Search this Book:
Reset