Font Size: a A A

Embedded Internet Security

Posted on:2005-08-30Degree:MasterType:Thesis
Country:ChinaCandidate:C H SunFull Text:PDF
GTID:2208360122980475Subject:Computer applications
Abstract/Summary:PDF Full Text Request
Internet has spread all over the world. It is main method to get all kinds of information and communicate with each other. Embedded System combine with Internet, more and more embedded systems are connecting to company intranets or to the Internet. Such network connections can greatly enhance an embedded system's utility and capability. Electric instrument access Internet is a great trend now days.Embedded Internet technology resolved the problem of access Internet of electric instrument, as a resolute, it can be applied to wide fields, such as Intelligent Transportation, IA, Industrial Control, POS Terminal, and Inspection of Environment. More and more companies made their productions have more powerful functions to different to others'.Embedded Internet technology resolved the problem of access Internet of electric instrument, on the other hand, open character of Internet bring us a security problem. Electric instrument should not access Internet unless the issue of security has not been resolved. The security of Embedded Internet will greatly infect the development of Embedded Internet.In this paper, the resolution of Embedded Internet security based on 32bit processor has been studied in detail. The main contributions of the paper are as follows:1. Base on the OSI security model, the Specific Security Mechanisms for Embedded Internet are analyzed, a set of security control protocols named EISCP(Embedded Internet Security Communication Protocol) is developed, which is adapt to the 32bit processor and distributed network construction.2. The design of security communication protocol based on Hash algorithm and block cipher algorithm suitable for 32bit processor is presented. A rekeying method that can provide Data Confidentiality Services and Data Integrity Services is given.3. Base on the theory of embedded database and the requirement of security services, an embedded database is analyzed and realized, which can provide Authentication Services, Access Control Services and Nonrepudiation Services.The security protocol designed in this paper is implemented on the Embedded system of appendix A.
Keywords/Search Tags:Embedded Internet, Network Security, Cipher Algorithm, Embedded Database
PDF Full Text Request
Related items