Network Security in Embedded System Using TLS

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Smart Parking and Security System Using Embedded

Project is designed with Microcontroller, LCD Display, Relays, Gate model, GSM Module, RFID Reader, IR sensors. The Microcontroller programmed to interface the RFID reader with the microcontroller to scan the RFID tag to read the amount. It uses IR sensor to identify the availability of free space in the parking area. Parking space are secured by gate system. So the gate is opened only for the ...

متن کامل

Transport Layer Security (TLS) Authorization Using KeyNote

This document specifies the use of the KeyNote trust-management system as an authorization extension in the Transport Layer Security (TLS) Handshake Protocol, according to guidelines in RFC 5878. Extensions carried in the client and server hello messages confirm that both parties support the desired authorization data types. Then, if supported by both the client and the server, KeyNote credenti...

متن کامل

Embedded System Security

F rom cars to cell phones, video equipment to MP3 players, and dishwashers to home ther-mostats—embedded computers increasingly permeate our lives. But security for these systems is an open question and could prove a more difficult long-term problem than security does today for desktop and enterprise computing. Security issues are nothing new for embedded systems. In 2001, Peter Shipley and Sim...

متن کامل

Optimization of TLS security protocol using the adaptable security model

Security protocols used in today’s communication are complex and it is very difficult to analyze and optimize them. Literature reports some results which optimize security protocols. In the case of devices with limited resources (mobile phones, PDA, sensors) the speed and efficiency of the process is crucial for their stable work. Security methods used during transporting the data between parti...

متن کامل

Network Working Group Netconf over Transport Layer Security (tls)

This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) controlling t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Security and Its Applications

سال: 2016

ISSN: 1738-9976,1738-9976

DOI: 10.14257/ijsia.2016.10.2.33