**6. Objectives**

*Service Robotics*

**Figure 1.**

*Embedded system applications.*

Embedded system spread in many devices, and the users of these devices are capable of performing almost all the network/internet applications that run on these devices. These devices are also involved in transport of secure data over public

As a result, security in embedded systems has spread every passing day in many fields like aerospace, telecom, healthcare, and wearable devices. **Figure 1** illustrates embedded systems applications such as railways, mobile phones, consumer elec-

Embedded devices spread in a wide range of applications, and these devices handle critical information. For this reason, it is desirable to have some security mechanism deployed on embedded devices either in the form of software or hardware. However, embedded devices security is a challenging function and treated an open research case due to the resource-constrained nature of these devices. The security of embedded systems can become an issue, even bigger than the insufficiency of security of current desktop computers. The reason for this lack of security is hardware devices' constraints when performing measures of security and security cost. Manufacturers attempt to reduce costs of production to gain a market advantage for price critical products. Many of application is heavily based on embedded systems that present in all our lives aspects. Embedded system devices are often networked via wireless communication links to accomplish advantageous tasks. However, the communication channel that is characterised by the wireless nature between the embedded devices makes them vulnerable to attacks and adversaries. Therefore, security of embedded systems is a main aspect of embedded systems design and is currently a major field

Many protection techniques have been proposed that try to provide security still do not interest on the most serious matter about who has access to the system. An alternate approach for providing the security of system from measurable properties of a target device is named ICMetric. In this chapter, ICMetric technology exploits the characteristic and behaviour of an embedded system to obtain a collection of properties and features, which aims to uniquely identify and secure an embedded system based on its own behavioural identity. The ICMetric technology allows a device to generate an identity which is used for authentication and a range of other

networks that require defence from unauthorised access.

tronics, tables, laptops, and healthcare application.

**96**

of scientific research.

**5. Problem definition**

cryptographic services.

In this chapter, the ICMetric technology is utilised to develop embedded devices security. This technology proposes using features of a device to generate ICMetric number used for device identification. The objectives behind using ICMetric were to overcome the problems related to accuracy rate, the failure to detect new attacks and the increased number of false alarms.

In this chapter, the objectives are as follows:


#### **7. Integrated circuit metric technology**

Encryption systems rely on the use of algorithms which in turn depend on the use of the secret key which is stored. Trying to increase the size of the key to stop

the brute force, but increasing the size of the key cannot always protect the security of the system and deter theft [4].

In order to eliminate the theft and by relying on the special features of each device, we can create an identification for each device, and this identification is called ICMetric. Other hardware techniques differ from the ICMetric technology in the selection of device characteristics. Traditional fingerprinting techniques depend on the characteristics that are easily exposed to capture, deception, or repetition by the attackers. ICMetric technology uses internal behaviour that increase the complexity of generated ICMetric and they are hard for an attacker to predict or spoof at runtime such as features that can be employed for creation an ICMetric are Media Access Control (MAC) addresses and serial numbers. Other features are utilised, which are application usage special task, such as browsing histories, camera resolutions, common user files, and system profiles [4].

ICMetric technology retains the idea of storing the key where there is no encryption key in the system; this will reduce the attackers. It uses hardware and software features of device to create ICMetric, which will be used in encryption services. There is a similarity between the biometric systems and the ICMetric, as these systems used features for identification of different persons. Similarly, ICMetric uses the characteristics of the device to identify each device uniquely and thus eliminates the idea of stored keys and deters theft of stored keys.

ICMetrics points to a new technique that can be employed to extract features from the hardware and software environment of a system. Every device is singular in its internal environment and then the features that make every device diverse can be employed to create a unique and single number for each device. It is based on the next concepts:


The generation of ICMetric system is comprised of two phases: calibration phase to collect detailed knowledge and operational phase to distribute each extracted features for typical sensors.

#### **7.1 Calibration phase**

At this phase, the characteristics are documented and analysed, normalisation distributions are utilised on feature values noticed in the system. A device ICMetric basis number can be created by applying statistical and mathematical operations on the extracted feature values. This phase is utilised once only when the system needs the ICMetric basis number. The features on which the ICMetric is based are unique; therefore, it is difficult for the attacker to detect or generate it. This is an important case to improve the ICMetric strength.

**99**

**Figure 2.**

*Intelligent wheelchair.*

*Embedded Devices Security Based on ICMetric Technology*

either feature concatenation or feature addition.

elderly individuals [6]. **Figure 2** states intelligent wheelchair.

usage and to provide identification of intelligent wheelchair.

**9. Appling ICMetric technology in intelligent wheelchairs**

devices and improves security by reducing fraudulent activity.

In this chapter, ICMetric technology is integrated into an intelligent wheelchair.

In order to ensure effective usage of the intelligent wheelchair and the need to protect the safety of each wheelchair, it is advantageous to provide identification of intelligent wheelchair to confirm the user's right to access the system and information and defend against identity theft and fraud. For achieving these aims, ICMetrics represents a new method for generating unique identifiers for embedded

**8. Intelligent wheelchair application**

Operational phase follows the calibration phase where the unique number is generated depending on the extracted features. The preprocessing phase can be applied to generate unique features that distinguish it from others [5]. In this phase, an effort is made to generate a resulting device ICMetric basis number through

Some companies produce different types of an intelligent wheelchair. An intelligent wheelchair can be defined as a uniquely modified powered wheelchair which is provided with a control system and variant sensors. Intelligent wheelchair is designed to provide several services to users in different ways. It eliminates the user's responsibility for moving the wheelchair. User types of intelligent wheelchairs are different according to their situations and disabilities. According to this, there will be different designs of intelligent wheelchair. The aim of intelligent wheelchair is to grant higher independence to people with lower mobility such as disabled or

In this chapter, ICMetric technology is integrated into an intelligent wheelchair. MEMS sensors embedded in intelligent wheelchair are utilised to ensure effective

*DOI: http://dx.doi.org/10.5772/intechopen.89240*

**7.2 Operational phase**
