**3. Security attacks**

In order to protect systems from attacks, security experts must assess and identify the risks and vulnerabilities of the system and define how to use mechanisms

**95**

*Embedded Devices Security Based on ICMetric Technology*

that ensure security for the safety of the system. Section below presents a discussion

1.Focused attack: this type of attack focuses on specific systems and does not restrict to money, resources, and time. The most practical examples of these type of attacks are targeting to defence installations and penetrating enemy

2.Cryptanalytic attacks: cryptanalysis attacks have the ability to decrypt the ciphered text without accessing the encryption keys. These attacks are com-

3.Network attacks: at present, systems are vulnerable to external attack through networks. This type of attack is done through monitoring, password hiding,

The system is exposed to different types of attacks; some of these attacks are presented in the following subsections. Generally, expected attacks are divided into

1.Threats on availability: attacks' types on availability are the strongest, and we

a.Message suppression attack: packets are dropped by the attackers from the network, they exploit these packets in other time. This type of attack

b.Drop the package**:** black hole attack is a dropping attack where the exist-

2.Threats to integrity: an example of this threat is alteration attack that happens when the attack changes message content. Re-send or delay of the message is

3.Threats on authentication: fabrication attack is an example of this threat where attackers can gain their goals by broadcasting false messages in the network.

An embedded system is a special-purpose computer system, which is fully encapsulated in the device it controls. These systems have special requirements and complete pre-defined tasks [3]. It consists of a combination of hardware and software; it is designed for dedicated functions. Embedded systems include several elements; each of them has a pre-defined task, and these differ from the typical

three groups: attacks against availability, authenticity, and confidentiality :

ence of this type of attack is the reason of package losing.

These false messages are certificates, warnings, and identities.

of possible attacks of the system and their propagation in daily life.

Many types of attacks are described below with some detail:

*DOI: http://dx.doi.org/10.5772/intechopen.89240*

**3.1 Attacks types**

communication lines.

and spoofing.

**3.2 Targets of attacks**

bined plain and cypher text attacks.

will mention two categories which are:

causes a lot of problems in the network.

considered as one of the forms of this attack.

**4. Embedded devices security**

desktop or laptop computer.

that ensure security for the safety of the system. Section below presents a discussion of possible attacks of the system and their propagation in daily life.
