A Review of Security Protocols for Embedded Systems in Critical Infrastructure

Authors

  • B. Vincentelli, K.R. Schaumont Author

DOI:

https://doi.org/10.31838/ESA/02.01.01

Keywords:

Software Optimization in Embedded Systems; Embedded System Performance Evaluation; Embedded System Design Challenges; Ultra-Low Power Embedded Systems

Abstract

A broad application of embedded systems into critical infrastructure sectors 
represents an era of unprecedented connectivity and automation. While 
this technological revolution has brought us back into the 21st century, it 
has brought some new vulnerabilities that need robust security protocols 
in place. This work provides a comprehensive review of the evolution of 
embedded system security in critical infrastructure, with a focus on key 
challenges, emerging threats, and the most meaningful solutions of the 
field. However, as our world gets more and more interlinked, the security 
of our embedded systems in critical infrastructure becomes of a primary 
importance. These embedded technologies are critical to power grids and 
transportation networks as well as healthcare facilities and industrial con
trol systems of modern society. At no other time has the need to protect 
these systems from cyber threats been needed more, since attacks could 
tie into widespread disruption, economic losses, and even loss of life. In 
this article we take a deep look at embedded system security protocol, and 
the role they play to protect critical infrastructure from malicious actors. 
In this overview of the key challenges, we’ll investigate the special plight of 
various sectors, examine the latest security techniques, and look at possible 
paths for future research and development in this critical domain. If we take 
a deep dive into embedded system security complexities, we could improve 
our efforts towards building more resilient and secure critical infrastructure 
for the next generations.

Downloads

Published

2025-03-18

Issue

Section

Articles

How to Cite

B. Vincentelli, K.R. Schaumont. (2025). A Review of Security Protocols for Embedded Systems in Critical Infrastructure. SCCTS Journal of Embedded Systems Design and Applications , 2(1), 1-11. https://doi.org/10.31838/ESA/02.01.01