**4. Embedded devices security**

An embedded system is a special-purpose computer system, which is fully encapsulated in the device it controls. These systems have special requirements and complete pre-defined tasks [3]. It consists of a combination of hardware and software; it is designed for dedicated functions. Embedded systems include several elements; each of them has a pre-defined task, and these differ from the typical desktop or laptop computer.

**Figure 1.** *Embedded system applications.*

Embedded system spread in many devices, and the users of these devices are capable of performing almost all the network/internet applications that run on these devices. These devices are also involved in transport of secure data over public networks that require defence from unauthorised access.

As a result, security in embedded systems has spread every passing day in many fields like aerospace, telecom, healthcare, and wearable devices. **Figure 1** illustrates embedded systems applications such as railways, mobile phones, consumer electronics, tables, laptops, and healthcare application.

Embedded devices spread in a wide range of applications, and these devices handle critical information. For this reason, it is desirable to have some security mechanism deployed on embedded devices either in the form of software or hardware. However, embedded devices security is a challenging function and treated an open research case due to the resource-constrained nature of these devices. The security of embedded systems can become an issue, even bigger than the insufficiency of security of current desktop computers. The reason for this lack of security is hardware devices' constraints when performing measures of security and security cost. Manufacturers attempt to reduce costs of production to gain a market advantage for price critical products.

Many of application is heavily based on embedded systems that present in all our lives aspects. Embedded system devices are often networked via wireless communication links to accomplish advantageous tasks. However, the communication channel that is characterised by the wireless nature between the embedded devices makes them vulnerable to attacks and adversaries. Therefore, security of embedded systems is a main aspect of embedded systems design and is currently a major field of scientific research.

## **5. Problem definition**

Many protection techniques have been proposed that try to provide security still do not interest on the most serious matter about who has access to the system. An alternate approach for providing the security of system from measurable properties of a target device is named ICMetric. In this chapter, ICMetric technology exploits the characteristic and behaviour of an embedded system to obtain a collection of properties and features, which aims to uniquely identify and secure an embedded system based on its own behavioural identity. The ICMetric technology allows a device to generate an identity which is used for authentication and a range of other cryptographic services.

**97**

*Embedded Devices Security Based on ICMetric Technology*

In addition, some security techniques depend on the stored keys to enable secure

In this chapter, the ICMetric technology is utilised to develop embedded devices security. This technology proposes using features of a device to generate ICMetric number used for device identification. The objectives behind using ICMetric were to overcome the problems related to accuracy rate, the failure to detect new attacks

• Utilising ICMetric technology that depend on features that make each device different to generate a single and unique number called ICMetric number used

an identification that provides security of embedded devices. To achieve this, possible properties and features are investigated which can be used for the

• Solving security problem presented in embedded device by applying device

• Proving that MEMS sensors can be used to improve security and apply identification of device. Bias reading generated by these sensors can be utilised to

• Applying some statistical and mathematical analysis on bias readings extracted from MEMS sensors to provide ICMetric number used for identification and

• Training and testing dataset by using Support Vector Machine (SVM).

• Testing and evaluating system performance metrics, which are confused

• Evaluating additional performance metrics such as packet delivery rate,

Encryption systems rely on the use of algorithms which in turn depend on the use of the secret key which is stored. Trying to increase the size of the key to stop

• Demonstrating that it is possible to use the features of a device to create

information. Such techniques have a failure when the stored keys compromised the security of any data protected by these keys. Thus, it is important to employ security mechanisms to protect these systems from attackers. ICMetric technology has been designed as a method of deterring key theft by exploiting features of device to provide ICMetric number that will be utilised for identification of device. ICMetric number is not stored on the system and generated only when it is required

*DOI: http://dx.doi.org/10.5772/intechopen.89240*

and the increased number of false alarms.

creation of an ICMetric of a device.

provide identification of device.

matrix, accuracy rate, and error rate.

**7. Integrated circuit metric technology**

throughput rate, and end-to-end delay rate.

other security services.

for device identification.

authentication.

In this chapter, the objectives are as follows:

by lightweight equation.

**6. Objectives**

*Embedded Devices Security Based on ICMetric Technology DOI: http://dx.doi.org/10.5772/intechopen.89240*

In addition, some security techniques depend on the stored keys to enable secure information. Such techniques have a failure when the stored keys compromised the security of any data protected by these keys. Thus, it is important to employ security mechanisms to protect these systems from attackers. ICMetric technology has been designed as a method of deterring key theft by exploiting features of device to provide ICMetric number that will be utilised for identification of device. ICMetric number is not stored on the system and generated only when it is required by lightweight equation.
