Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content.
You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Managing your cookies

Our website uses cookies. You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button.

Necessary cookies

These are essential for the user navigation and allow to give access to certain functionalities such as secured zones accesses. Without these cookies, it won’t be possible to provide the service.
Matomo on premise

Marketing cookies

These cookies are used to deliver advertisements more relevant for you, limit the number of times you see an advertisement; help measure the effectiveness of the advertising campaign; and understand people’s behavior after they view an advertisement.
Adobe Privacy policy | Marketo Privacy Policy | MRP Privacy Policy | AccountInsight Privacy Policy | Triblio Privacy Policy

Social media cookies

These cookies are used to measure the effectiveness of social media campaigns.
LinkedIn Policy

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Skip to main content

Cybersecurity and embedded defence systems

Episode 2

How to prevent security from compromising performance?

Contact us

How to prevent security from compromising performance?

In an embedded system, where capacities are constrained, computing power is the object of a fierce battle. Automata, operational functions, tactical data processing… each one legitimately claims their share. Despite their growing importance and the emergence of new risks linked to increasing connectivity, IT security tools (antivirus, firewall, encryption…) are not always a top priority. Cybersecurity must therefore find its place in an environment constrained by strict technical and operational requirements. The distribution and availability of computing power is therefore the subject of a competition for which ingenuity is required.

A constrained world

Embedded systems, particularly in the aeronautical and military sectors, are subject to a number of constraints that must be taken into account in the design of cybersecurity systems. First of all, there are physical constraints – weight, size, temperature, etc. – which drastically limit the field of possibilities. Added to this, there are energy consumption constraints with the sovereign aim of increasing the aircraft’s autonomy as much as possible, for which a few extra minutes of flight can make all the difference. This quest for the lowest energy consumption also creates other constraints, such as memory capacity. In order to minimise the losses caused by successive voltage conversions, specific power supply cards are also sometimes created, whose efficiency requires that a certain energy package be scrupulously respected, which is another constraint!

It is also essential to consider the notion of real-time processing for an onboard defence system. This requirement, related to the operational availability of the system and the entire platform, is crucial given the criticality of the events managed during a mission. It is therefore unacceptable for the triggering of an antivirus to disrupt real-time processing and the reliability and accuracy of the data processed.

Cybersecurity tools are not exempt from operational constraints either. For example, the time required to perform a check can extend the time required to turn on or start up the onboard system and consequently the aircraft. If the system is critical to the success of the mission, a trade-off must be made between safety requirements and operational availability. The same is true for the emergency shutdown, launched when the system could end up in the wrong hands, where a balance must be found between the efficiency of the operation and its duration.

Finally, the choice of components is itself limited. On the one hand, there is very little cybersecurity software developed specifically to meet the requirements of embedded defence systems. On the other hand, the functionalities provided by these tools for embedded defence are subject to export restrictions, which may contraindicate their implementation in a system. Depending on the case, these may be outright bans (e.g., imposed by the U.S. ITAR regulations) or conditional authorisations (e.g., a limited number of units). Often, these limitations prevent the use of components dedicated to cryptography, which forces the implementation of encryption modules on general-purpose processors, which thus use up some of their power.

Anticipation, ingenuity, rigor

In short, obtaining the required level of security while minimising power consumption is like squaring the circle. To solve it, it is crucial to take cybersecurity into account upstream, right from the system specification stages, because it will then be very difficult – if not impossible – to insert new requirements into a set optimised for so many interdependent constraints. You have to ask yourself what the risks are, what level of protection you are aiming for and what components are suitable for this.

From there, development is a matter of anticipation, ingenuity and rigor. Anticipation of all the requirements within the limits of an acceptable risk. Ingenuity to find ways to guarantee safety without losing performance. Rigor, finally, when it comes to minimising the size of the code, checking the absence of dead code (superfluous remnants of development and sources of vulnerability), or applying good coding practices that allow both to limit risks and optimise performance.

Find the right balance

The challenge is not just to allocate computing power, but also to reconcile the various security and operational requirements, while taking into account the various environmental constraints of the embedded system. This is a complex triptych, which requires a 360° control of the system, the platform in which it will be embedded, and the broader environment in which it will evolve.

This challenge, whether operational, technological or safety-related, is manageable as long as the parties involved (the platform manufacturer, the safety approval authority and the embedded system manufacturer) discuss and agree on the system’s priorities. Anticipation, convergence and collaboration are the key words.

About Atos ALSe

Specialised in the design of embedded systems for defence platforms, the Air Land Sea electronics (ALSe) activity of the Atos Group develops methods and technological know-how to meet their specific cybersecurity challenges:

  • comply with information systems security requirements;
  • respect the specifications related to the constraints of critical environments;
  • maintain the appropriate level of performance;
  • guarantee the operational readiness of the systems to ensure that mission execution is not compromised.

About the authors

Norbert Di Costanzo

Chief Operating Officer and senior member of Atos scientific community

Norbert is Chief Operating Officer of Air Land Sea electronics solutions at Atos, a position he has held since 2012. Norbert is part of the Atos communities of experts specialised in advanced computing and hard/firmware.

Francis Raguin

Aeronautical Project Director

Francis is project director of Atos’ Air Land Sea electronics activities, a position he has held since 2017. Francis is specialised in project management in embedded systems for aeronautics and DO178/254 development methodology.