Font Size: a A A

Study On Implementation And Security Analysis For Embedded Internet

Posted on:2003-12-03Degree:DoctorType:Dissertation
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:1118360065962198Subject:Electronic Science and Technology
Abstract/Summary:PDF Full Text Request
The application of Internet has come into everywhere for people's daily life. With the rapid development of Internet, besides computer, a great number of electric instruments begin to access Internet, which leads to the development of Embedded Internet technology (El)The key points about El are cost efficient and security ability. 8bit processor, for its low cost, is widely used by different electric instruments. More attention has paid to the realization of El technology on 8bit processor, because it will bring immense economy benefits, but as our knowledge, little research work has been reported so far. In this paper, the realizing El technology and the solution of security ability based on Sbit processor has been studied in detail. The main contributions of the paper are as follow:(1) Implement El in normal Sbit CPU. Developed the idea of subset partition and predigestion for TCP/DP. By this idea, a set of special access protocols, called EIAP (embedded internet access protocol) has been presented.(2) Base on the security analysis, special for Sbit processor used in El, a set of security control protocols, named EIACP, which includes session protocol-, key-create protocol and key-resume protocol has been developed.(3) Presented the design reference of hash algorithm and block cipher suitable for Sbit processor based on die EIACP protocol.The contributions maintained above have been successfully used in some El application products. Shown in Appendix A.
Keywords/Search Tags:Embedded Internet, Embedded System, Network Security, Hash Algorithm, Block Cipher
PDF Full Text Request
Related items