Securing real-time field area network using small cards
Field area networks are rapidly expanding to include a wide range of applications. Intelligent nodes on the network will be installed in a small to medium geographical area to monitor and control processes. Such nodes are generally connected to a centralized gateway used by a service provider to mon...
Main Author: | |
---|---|
Other Authors: | |
Published: |
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/2263/24153 Hancke, G 2004, Securing real-time field area network using small cards, MSc dissertation, University of Pretoria, Pretoria, viewed yymmdd < http://hdl.handle.net/2263/24153 > http://upetd.up.ac.za/thesis/available/etd-04262005-170814/ |
id |
ndltd-netd.ac.za-oai-union.ndltd.org-up-oai-repository.up.ac.za-2263-24153 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-netd.ac.za-oai-union.ndltd.org-up-oai-repository.up.ac.za-2263-241532017-07-20T04:10:32Z Securing real-time field area network using small cards Hancke, Gerhard P. Penzhorn, W.T. upetd@ais.up.ac.za Cryptography Smart cards Field area networks Information security UCTD Field area networks are rapidly expanding to include a wide range of applications. Intelligent nodes on the network will be installed in a small to medium geographical area to monitor and control processes. Such nodes are generally connected to a centralized gateway used by a service provider to monitor and control various applications. The growth in popularity of ubiquitous computing requires the use of embedded network processors in everyday objects. Even though the idea of interaction between the digital devices around us could bring a great deal of convenience it also introduces great risks. Therefore such applications would not only require measurement, control and communication functionality but also a high level of security. Smart cards offer a simple, inexpensive method of incorporating a cryptographic processor into an embedded system that will allow for the implementation of security services. A field area network has resource limitations that influence security service implementation, such as low bandwidth, limited processing power, limited storage capacity and limited communication protocols. This dissertation discussed the implementation of a security policy for embedded field area networks used in distributed real-time applications, using smart card technology. The primary objective is to formulate a policy that can be implemented to secure a field area network. The secondary objective is to determine whether this policy can be implemented using mechanisms provided by smart card technology, while maintaining reasonable system performance. It states the approach taken to finding a viable solution to the problem defined above. A comprehensive literature study provides background on relevant technology and possible solutions. In a system overview the system’s boundaries and functional requirements are defined. The implementation section outlines possible solutions and describes how these can be implemented. Evaluation, verification and quantification of the performance of the proposed system are performed according to the experimental procedures described. The results obtained are documented and discussed. In the conclusion the proposed solution and the findings from the results are placed in context. Future topics of research in this field are suggested. Dissertation (MSc)--University of Pretoria, 2006. Computer Science unrestricted 2013-09-06T16:47:20Z 2005-05-05 2013-09-06T16:47:20Z 2004-04-17 2006-05-05 2005-04-26 Dissertation http://hdl.handle.net/2263/24153 Hancke, G 2004, Securing real-time field area network using small cards, MSc dissertation, University of Pretoria, Pretoria, viewed yymmdd < http://hdl.handle.net/2263/24153 > http://upetd.up.ac.za/thesis/available/etd-04262005-170814/ © 2004, University of Pretoria. All rights reserved. The copyright in this work vests in the University of Pretoria. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of the University of Pretoria. |
collection |
NDLTD |
sources |
NDLTD |
topic |
Cryptography Smart cards Field area networks Information security UCTD |
spellingShingle |
Cryptography Smart cards Field area networks Information security UCTD Hancke, Gerhard P. Securing real-time field area network using small cards |
description |
Field area networks are rapidly expanding to include a wide range of applications. Intelligent nodes on the network will be installed in a small to medium geographical area to monitor and control processes. Such nodes are generally connected to a centralized gateway used by a service provider to monitor and control various applications. The growth in popularity of ubiquitous computing requires the use of embedded network processors in everyday objects. Even though the idea of interaction between the digital devices around us could bring a great deal of convenience it also introduces great risks. Therefore such applications would not only require measurement, control and communication functionality but also a high level of security. Smart cards offer a simple, inexpensive method of incorporating a cryptographic processor into an embedded system that will allow for the implementation of security services. A field area network has resource limitations that influence security service implementation, such as low bandwidth, limited processing power, limited storage capacity and limited communication protocols. This dissertation discussed the implementation of a security policy for embedded field area networks used in distributed real-time applications, using smart card technology. The primary objective is to formulate a policy that can be implemented to secure a field area network. The secondary objective is to determine whether this policy can be implemented using mechanisms provided by smart card technology, while maintaining reasonable system performance. It states the approach taken to finding a viable solution to the problem defined above. A comprehensive literature study provides background on relevant technology and possible solutions. In a system overview the system’s boundaries and functional requirements are defined. The implementation section outlines possible solutions and describes how these can be implemented. Evaluation, verification and quantification of the performance of the proposed system are performed according to the experimental procedures described. The results obtained are documented and discussed. In the conclusion the proposed solution and the findings from the results are placed in context. Future topics of research in this field are suggested. === Dissertation (MSc)--University of Pretoria, 2006. === Computer Science === unrestricted |
author2 |
Penzhorn, W.T. |
author_facet |
Penzhorn, W.T. Hancke, Gerhard P. |
author |
Hancke, Gerhard P. |
author_sort |
Hancke, Gerhard P. |
title |
Securing real-time field area network using small cards |
title_short |
Securing real-time field area network using small cards |
title_full |
Securing real-time field area network using small cards |
title_fullStr |
Securing real-time field area network using small cards |
title_full_unstemmed |
Securing real-time field area network using small cards |
title_sort |
securing real-time field area network using small cards |
publishDate |
2013 |
url |
http://hdl.handle.net/2263/24153 Hancke, G 2004, Securing real-time field area network using small cards, MSc dissertation, University of Pretoria, Pretoria, viewed yymmdd < http://hdl.handle.net/2263/24153 > http://upetd.up.ac.za/thesis/available/etd-04262005-170814/ |
work_keys_str_mv |
AT hanckegerhardp securingrealtimefieldareanetworkusingsmallcards |
_version_ |
1718497567157780480 |