Font Size: a A A

The Research Of Security Of Information Appliance

Posted on:2008-03-07Degree:MasterType:Thesis
Country:ChinaCandidate:C C ZhangFull Text:PDF
GTID:2178360215987462Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the application of its being more and more widespread, especially integrated with Internet, embedded systems function as information and resource Nodes, which becomes more and more obvious. System designers regard safety as an adjunctive attribute in the past, such as encryption algorithms, safe protocols etc. Now, it is important to regard safety as a new aspect that is considered with cost, function and capability in the process of design. As one branch of the embedded system, Information Appliance not only inherits its universal characteristics, but also has its own characteristics. The security of digital home that been made up of information appliances cries for a safety mechanism.The standard of information appliance has not set down, and all kinds of arisen standards are lack of compatibility. Then security, which is a content of the research of information appliance, has not been unified. The present research aims to make the standard studying part from concrete products to reach bigger compatibility, and bring forward a feasible universal safety mechanism of information appliances on the basis of research in system structure of information appliances.This article first discusses the characteristic of information appliances and embedded security, introduces the object-oriented concept into the architecture research of information appliances, takes IAIDL as a foundation, discusses the architecture research of information appliances embarking from the information appliances' work flows, including the information appliances' interior logical architecture, the home gateway's logical architecture and the information appliances' remote controller's logical architecture, and uses a SX52 singlechip integrated peripheral circuit, virtual peripheral equipments and the virtual network protocol software module to built a simulant information appliances' platform successfully by ways of B/S and C/S. Then it discusses the security of information appliances from three different levels, and separately studies the information appliances status authentication and the access control and the audit trail. By comparing all authentication mechanisms with each other and all access control model and integrating information appliances' characteristics, it designs the X.509 certificate that has permissive information, describes the process of status authentication of information appliances, and advances the mechanism of status authentication and the model of access control for information appliances, which is based on CORBA safe mechanism and the Object-based Access Control Model. Finally it gives primary contents of information appliances' audit trail.This article introduces the object-oriented concept into the architecture research of information appliances, builds the basal experiment platform for the research of information appliances, and brings forward the safety mechanism suitable for information appliances, which is significant for further research of information appliances.
Keywords/Search Tags:Object-Oriented, Information Appliance Architecture, Information Appliance Security, Embedded System
PDF Full Text Request
Related items