Font Size: a A A

Design Of Security And Usability Of Embedded Dependable Computer System

Posted on:2012-02-27Degree:MasterType:Thesis
Country:ChinaCandidate:J LiFull Text:PDF
GTID:2218330362450423Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Since the development of new technologies is going faster and faster, embedded system has an important role in many fields, such as aerospace, military and industry. In some fields, the dependability of the system becomes very important, and the design of embedded system must be considered along with the specific application. Nowadays, researches on dependable embedded system are considerable. Security and fault-tolerance examples of techniques are used to assure the dependability of such systems. This paper aims to present researches and implementation of usability and security for system applications based on the embedded dependable control system.In the design of usability, the user requirements are mainly considered. Firstly, based on the JFFS2 file system, the document storage subsystem is presented. It provides a good interactive platform, through the log file storage, update, query and other functions. In addition, some targeted peripheral devices are developed, such as multi-mode keyboard, the aid LCD which displays system status information, and wireless communication devices for control outputs.In the design of security, the system requirements are mainly considered. To ensure the high security and reliability of the key system data and program, the concept of multi-level authentication and three methods of devastation were proposed. The design and implementation of self-destruction system with multiple strategies are presented, which is in combination with multi-level identity authentication technology. The technology is provided a high-security protection for the system.In addition, the reliability of embedded control systems is derived by using two methods. The result shows that the system meets the high reliability. Meanwhile, in order to test the function of system's usability and security, the various relevant modules are tested.
Keywords/Search Tags:Fault-tolerance, Embedded, High dependability, Usability, Security
PDF Full Text Request
Related items