International Journal of Innovative Science Engineering and Technology (IJISET)
One of the most important challenges that need to be currently faced in securing resource-constrained embedded systems is optimizing the trade-off between resources used and security requirements. Security is constantly evolving as threats change over time. As a device becomes popular exists in the market longer, it becomes more susceptible to attack. Many devices in the past were not designed to be field programmable or accept updates without significant modifications. Those days are gone. Devices today must be field upgradeable to not only change and improve functionality, but to deal with bugs and security issues.