원문정보
초록
영어
Data availability service is now ubiquitously practical from the high-end systems such as routers, gateways, firewalls, and web servers to the low-end systems such as smart phone, tablet, etc…with the emerging growth of the embedded systems, there is parallel rapid increase in the amount of information flowing across intranets and the Internet. Hence, security has become an essential part of today’s computing world. This promise of universal connectivity for embedded systems creates increased possibilities for malicious users to gain unauthorized access to sensitive information. This paper presents a framework for HNS in which an embedded encryption protocol scheme enables negotiation between entities to specify authorization requirements that must be met before accessing the network and data.
목차
1. Introduction
2. Literature Review
3. The Proposed Embedded Encryption Protocol
4. Security Analysis
4.1. Masquerading User Attack
4.2. Masquerading Gateway Attack
4.3. Mutual Authentication
4.4. Session Key Establishment
5. Conclusion
Acknowledgements
References
