Font Size: a A A

Analyzing And Modeling Of IPSec For Electric System Communications

Posted on:2007-09-07Degree:MasterType:Thesis
Country:ChinaCandidate:W W DuanFull Text:PDF
GTID:2132360215476005Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The development of the communication technology makes our life rapid and convenient, also brings a new technology revolution in the traditional industry field. Taking the power system as an example, the embedded control equipments make the long-distance control and surveillance come true by the data transfer ability of GSM, CDMA and Internet. That improves the efficiency greatly. However, the problem of network security appears at the same time. The purpose of this thesis is raising a general security protocol model that is fit for embedded system with various network applications, software and hardware. In this way, the designers of embedded system will be extricated from the complicated security design of network communications.First of all, the thesis introduces the process of long-distance communication for embedded system. From equipments to embedded gateway and from gateway to long-distance controlling system, the most serious threaten is from Internet.Second, the thesis searches for a suitable security protocol according to the general performance of the design. Then it chooses the necessary modules of the final selected IPSec protocol based on the characters of embedded system. The tasks are selecting the main security protocol and the exchanging pattern.After the introduction of formal model and formal language, the thesis model the selected IPSec protocol groupware using SDL language to enhance the general performance of security protocols and ensure the consistency for the exchange. The task includes, first, dividing IPSec into several function modules, then modeling each function module (the SA_SPD_block that is used to comput and search safety strategy and security alliance, the IKE_block that is responsible for the private keys exchange, the AH_bolck which is concerned about AH authentication).After the modeling, the thesis emulates IPSec model using the model emulation tool and analyses the security function of the model.At last, the thesis generally explains the transition from the model to a executable code.
Keywords/Search Tags:Communications Security, IPSec, SDL, Embedded System, Formal Method
PDF Full Text Request
Related items