Font Size: a A A

Research And Realization On Security Mechanism Of Embedded Rtos Vxworks

Posted on:2010-01-26Degree:MasterType:Thesis
Country:ChinaCandidate:L TianFull Text:PDF
GTID:2198330338976283Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the extensive application and continuous development of embedded systems, especially with the integration of embedded devices and network, the security problems of embedded system become increasingly highlighted and one of the urgent issues need to be resolved. The operating system is the core of embedded systems; its security is the basis for embedded system security. This paper researches in the enhancing security of VxWorks operating system which is an excellent real-time embedded operating system (RTOS).With in-depth study of RTOS VxWorks's kernel Wind and theories and implementations of existing operating system security technology, based on the fact that the kernel Wind has a strong real-time nature but the lack of safety precautions, this paper makes the following points to improve: Through the introduction of mandatory access control mechanisms (MAC)to enhance the VxWorks system security, insuring all accesses to the system resources are controlled; Based on the fact that RTOS and its security needs are unique, presents a multi-policies integration model which is suitable to RTOS system and achieve the integration of multi-policies formulation; MAC uses this multi-policies integration model to achieve multi-policies load and determine. In order to ensure the system's real-time after the use of security mechanism, minimize the impact on system overhead, use policy cache mechanism.This paper puts forward a security architecture which is suitable for RTOS VxWorks, gives the detailed design thought of the architecture and key data structure, and implements a Wind kernel security enhancement system prototype. The test and the evaluation of the prototype system are also completed.
Keywords/Search Tags:VxWorks, Operating System security, Security Architecture, Multi-Policy Integration, Mandatory access control mechanisms (MAC), Real-time system
PDF Full Text Request
Related items