Abstract:
The paper encompasses a design conception for combined embedded device security to be applied within the development process of protection mechanisms for systems and services of complex security on rail transport. A model and technique proposed are intended for configuring embedded device security components developed taking into consideration expert knowledge in the embedded security field. The goal of the configuration process is to find a security configuration that meets all necessary security requirements and constraints of the device platform, satisfies set resource consumption criteria and does not contain known types of security component inconsistencies.
Keywords:embedded devices, information security, configuring process.