Font Size: a A A

Resarch Of Security Between Network File Transmission Based On VxWorks

Posted on:2011-04-23Degree:MasterType:Thesis
Country:ChinaCandidate:Z L TianFull Text:PDF
GTID:2178330332960385Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
This topic took the engineering applications of current embedded devices (based on VxWorks operating system) as the background, and was studied for the security problems of important documents which were stolen and tampered in the network file transfer process.Take the cryptology theory, the information security technology as the methods, also combine military as well as the civil embedded equipment's characteristic and the network functional requirements. Based on the operating system VxWorks , designed a plan that was about network file transmission on security.Firstly, it has been introduced the information security technology that commonly used, moreover, deeply studied the real-time operating system VxWorks and its development environment Tornado.Then,analyzed concretely several important protocols in the stacks of TCP/IP,also discussed the network file transmission security hidden risks being that had been existed on VxWorks in addition to the security settings.Via in-depth analysis of IPSec security protocol principles and SSL protocol priniples used by the the last operated system Windows,Linux which were in the network information transmission,and following this idea. In allusion to the deficiencies of VxWorks operating system, it has been proposed a plan which is based on the structure of network layer and Cryptography security structure.Designed a security protocol based on FTP in the layer of application,meantime,the modules of the encryption and decryption as well as that of authentication have been designed on the client and server,the algorithms of encryption and authentication involved in modules used the current more mature cryptography techniques.By the characteristics of the embedded devices and its request on security,chose encryption algorithms Rijndael,Gost and Blowfish which encrypt better and had small influences on transmission speed,chose authentication algorithms MD5 and SHA-1. Moreover,detailed the design idea ,principles and realization of program as well as the realization method.Finally,ensured the confidentiality and integrity of networks during the transfer through the encoding software.It takes two computers based on VxWorks operaing system which connected by Ethernet as host computer to transfer files.Takes a computer based on Windows operating system as a monitor that's connected by the Hub on the midway between two host computers,and sniffer software running on the Windows OS captures file dates tranfered at any time.The topic of study brought forward solution for the network file transfer on security in embedded devices based on VxWorks operating system.While played a role in promoting for technological development of the network file transfer in embedded system ,also had a certain praticale significance and reference value.
Keywords/Search Tags:Network file transmission, Security protocols, VxWorks, Encryption, Authentication
PDF Full Text Request
Related items