Embedded Systems Security
Network & System Security

SwRI engineers use state-of-the-art test equipment, software
tools, and laboratory facilities to evaluate the
capabilities, benefits, performance, and costs associated
with alternative embedded system implementation.

A variety of embedded systems security services is offered by extensively experienced engineers at SwRI.
Implementing security in embedded systems and providing secure communications paths back into the enterprise are paramount. Experienced engineers at Southwest Research Institute (SwRI) offer a variety of security technologies, embedded security services, and solutions.
Embedded Security Services at SwRI
Trade-space analysis and security testing are among the many security services offered by SwRI. Others include designs for a variety of embedded systems and domains such as:
- Network-enabled devices
- Machine information security
- Advanced metering infrastructure
- SCADA security
- Weaponry
- Sensors
- Situational awareness systems
Threat to Embedded Devices
The evolution of computing and information technology is resulting in migration beyond centralized enterprise and desktop systems and out to increasingly sophisticated embedded devices in the field. As information is pushed to the edge of the extended network, increased opportunities exist for:
- Devices to be compromised
- Intellectual property to be stolen
- Information to be exploited and/or altered
Cyber Security Solutions
The multidisciplinary approach used by our engineers brings together the disparate worlds of security and embedded systems. To determine the most efficient ways to meet security needs on resource-limited platforms, these engineers have extensively studied embedded applications of various encryption and authentication technologies such as:
- Rivest, Shamir, and Adelman (RSA)
- Elliptic curve cryptography (ECC)
- Public key infrastructure (PKI)
Related Terminology
embedded devices • limited communications channels • network-enabled weaponry • situational awareness support systems • intellectual property protections • secure communications • advanced metering infrastructure • SCADA security • embedded software development • embedded hardware development • radio communications • network communications • cyber security • elliptic curve cryptography