Network Security in Embedded System Using TLS
نویسندگان
چکیده
منابع مشابه
Smart Parking and Security System Using Embedded
Project is designed with Microcontroller, LCD Display, Relays, Gate model, GSM Module, RFID Reader, IR sensors. The Microcontroller programmed to interface the RFID reader with the microcontroller to scan the RFID tag to read the amount. It uses IR sensor to identify the availability of free space in the parking area. Parking space are secured by gate system. So the gate is opened only for the ...
متن کاملTransport Layer Security (TLS) Authorization Using KeyNote
This document specifies the use of the KeyNote trust-management system as an authorization extension in the Transport Layer Security (TLS) Handshake Protocol, according to guidelines in RFC 5878. Extensions carried in the client and server hello messages confirm that both parties support the desired authorization data types. Then, if supported by both the client and the server, KeyNote credenti...
متن کاملEmbedded System Security
F rom cars to cell phones, video equipment to MP3 players, and dishwashers to home ther-mostats—embedded computers increasingly permeate our lives. But security for these systems is an open question and could prove a more difficult long-term problem than security does today for desktop and enterprise computing. Security issues are nothing new for embedded systems. In 2001, Peter Shipley and Sim...
متن کاملOptimization of TLS security protocol using the adaptable security model
Security protocols used in today’s communication are complex and it is very difficult to analyze and optimize them. Literature reports some results which optimize security protocols. In the case of devices with limited resources (mobile phones, PDA, sensors) the speed and efficiency of the process is crucial for their stable work. Security methods used during transporting the data between parti...
متن کاملNetwork Working Group Netconf over Transport Layer Security (tls)
This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) controlling t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Security and Its Applications
سال: 2016
ISSN: 1738-9976,1738-9976
DOI: 10.14257/ijsia.2016.10.2.33