Science Alert
Curve Top
Research Journal of Information Technology
  Year: 2012 | Volume: 4 | Issue: 3 | Page No.: 61-72
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Firmware for Data Security: A Review

Siva Janakiraman, Rengarajan Amirtharajan, K. Thenmozhi and John Bosco Balaguru Rayappan

The survey is made to find the various research articles that are published over the past 16 years in the area of security implementations with various embedded systems using three well known electronic data bases SCOPUS, IEEE Xplorer and Science Direct. More precisely, what it would cover? And to know the firmware development for microcontrollers and how to incorporate data security through cryptography is also discussed. The survey also takes into account the works that are carried out independently in specific type of crypto algorithm among the various types such as symmetric, asymmetric, block and stream cipher including the light weight algorithms. The major focus of the study lies in analyzing the feasibility in developing firmware for various cryptography algorithms on low, medium and high end microcontrollers that are well suitable for the development of wireless sensor nodes. Furthermore, this survey would explore various methods and tools used to analyze the important parameters like memory footprint and execution time and also suggest future recommendation for improving data security.
PDF Fulltext XML References Citation Report Citation
  •    Graphical Password Authentication Scheme for Embedded Platform
  •    Least Significant Bit but Quantum Bit: A Quasi Stego
  •    Why Information Security Demands Transform Domain, Compression and Encryption?
  •    Galois Field Proficient Product for Secure Image Encryption on FPGA
  •    Logic Elements Consumption Analysis of Cellular Automata Based Image Encryption on FPGA
  •    Hardware/Software Co-Design Implementations of Elliptic Curve Cryptosystems
  •    High Performance Elliptic Curve GF(2m) Crypto-processor
  •    Two-layer Cellular Automata Based Cryptography
  •    Encryption Algorithm of RSH (Round Sheep Hash)
  •    Sensitivity of Changing the RSA Parameters on the Complexity and Performance of the Algorithm
How to cite this article:

Siva Janakiraman, Rengarajan Amirtharajan, K. Thenmozhi and John Bosco Balaguru Rayappan, 2012. Firmware for Data Security: A Review. Research Journal of Information Technology, 4: 61-72.





Curve Bottom