Subscribe Now Subscribe Today
Science Alert
 
Blue
   
Curve Top
Research Journal of Information Technology
  Year: 2012 | Volume: 4 | Issue: 3 | Page No.: 61-72
DOI: 10.3923/rjit.2012.61.72
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Firmware for Data Security: A Review

Siva Janakiraman, Rengarajan Amirtharajan, K. Thenmozhi and John Bosco Balaguru Rayappan

Abstract:
The survey is made to find the various research articles that are published over the past 16 years in the area of security implementations with various embedded systems using three well known electronic data bases SCOPUS, IEEE Xplorer and Science Direct. More precisely, what it would cover? And to know the firmware development for microcontrollers and how to incorporate data security through cryptography is also discussed. The survey also takes into account the works that are carried out independently in specific type of crypto algorithm among the various types such as symmetric, asymmetric, block and stream cipher including the light weight algorithms. The major focus of the study lies in analyzing the feasibility in developing firmware for various cryptography algorithms on low, medium and high end microcontrollers that are well suitable for the development of wireless sensor nodes. Furthermore, this survey would explore various methods and tools used to analyze the important parameters like memory footprint and execution time and also suggest future recommendation for improving data security.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Graphical Password Authentication Scheme for Embedded Platform
  •    Least Significant Bit but Quantum Bit: A Quasi Stego
  •    Why Information Security Demands Transform Domain, Compression and Encryption?
  •    Galois Field Proficient Product for Secure Image Encryption on FPGA
  •    Hardware/Software Co-Design Implementations of Elliptic Curve Cryptosystems
  •    High Performance Elliptic Curve GF(2m) Crypto-processor
  •    Two-layer Cellular Automata Based Cryptography
  •    Encryption Algorithm of RSH (Round Sheep Hash)
How to cite this article:

Siva Janakiraman, Rengarajan Amirtharajan, K. Thenmozhi and John Bosco Balaguru Rayappan, 2012. Firmware for Data Security: A Review. Research Journal of Information Technology, 4: 61-72.

DOI: 10.3923/rjit.2012.61.72

URL: https://scialert.net/abstract/?doi=rjit.2012.61.72

COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 

Curve Bottom