Title page for ETD etd-04262005-170814


Document Type Master's Dissertation
Author Hancke, Gerhard Petrus
URN etd-04262005-170814
Document Title Securing real-time field area network using small cards
Degree MSc
Department Computer Science
Supervisor
Advisor Name Title
Prof W T Penzhorn Committee Chair
Keywords
  • cryptography
  • smart cards
  • field area networks
  • information security
Date 2004-04-17
Availability unrestricted
Abstract
Field area networks are rapidly expanding to include a wide range of applications. Intelligent nodes on the network will be installed in a small to medium geographical area to monitor and control processes. Such nodes are generally connected to a centralized gateway used by a service provider to monitor and control various applications. The growth in popularity of ubiquitous computing requires the use of embedded network processors in everyday objects. Even though the idea of interaction between the digital devices around us could bring a great deal of convenience it also introduces great risks. Therefore such applications would not only require measurement, control and communication functionality but also a high level of security.

Smart cards offer a simple, inexpensive method of incorporating a cryptographic processor into an embedded system that will allow for the implementation of security services. A field area network has resource limitations that influence security service implementation, such as low bandwidth, limited processing power, limited storage capacity and limited communication protocols.

This dissertation discussed the implementation of a security policy for embedded field area networks used in distributed real-time applications, using smart card technology. The primary objective is to formulate a policy that can be implemented to secure a field area network. The secondary objective is to determine whether this policy can be implemented using mechanisms provided by smart card technology, while maintaining reasonable system performance. It states the approach taken to finding a viable solution to the problem defined above. A comprehensive literature study provides background on relevant technology and possible solutions. In a system overview the systemís boundaries and functional requirements are defined. The implementation section outlines possible solutions and describes how these can be implemented. Evaluation, verification and quantification of the performance of the proposed system are performed according to the experimental procedures described. The results obtained are documented and discussed. In the conclusion the proposed solution and the findings from the results are placed in context. Future topics of research in this field are suggested.

Files
  Filename       Size       Approximate Download Time (Hours:Minutes:Seconds) 
 
 28.8 Modem   56K Modem   ISDN (64 Kb)   ISDN (128 Kb)   Higher-speed Access 
  00front.pdf 949.75 Kb 00:04:23 00:02:15 00:01:58 00:00:59 00:00:05
  01chapter1.pdf 1.72 Mb 00:07:57 00:04:05 00:03:34 00:01:47 00:00:09
  02chapter2.pdf 9.93 Mb 00:45:58 00:23:38 00:20:41 00:10:20 00:00:52
  03chapter3.pdf 1.56 Mb 00:07:13 00:03:42 00:03:15 00:01:37 00:00:08
  04chapter4.pdf 1.57 Mb 00:07:15 00:03:43 00:03:15 00:01:37 00:00:08
  05chapter5.pdf 6.40 Mb 00:29:36 00:15:13 00:13:19 00:06:39 00:00:34
  06chapter6.pdf 1.06 Mb 00:04:54 00:02:31 00:02:12 00:01:06 00:00:05
  07chapter7.pdf 1.71 Mb 00:07:55 00:04:04 00:03:33 00:01:46 00:00:09
  08chapter8.pdf 649.72 Kb 00:03:00 00:01:32 00:01:21 00:00:40 00:00:03
  09references.pdf 978.44 Kb 00:04:31 00:02:19 00:02:02 00:01:01 00:00:05

Browse All Available ETDs by ( Author | Department )

If you have more questions or technical problems, please Contact UPeTD.