Tesi etd-11122009-150439 |
Link copiato negli appunti
Tipo di tesi
Tesi di laurea specialistica
Autore
CRISCIANI, FLAVIO
URN
etd-11122009-150439
Titolo
Dynamic Negotiation of Security Protocols in Distributed Systems
Dipartimento
INGEGNERIA
Corso di studi
INGEGNERIA INFORMATICA
Relatori
relatore Prof. Dini, Gianluca
relatore Prof. Fanucci, Luca
relatore Prof. Fanucci, Luca
Parole chiave
- distributed systems
- dynamic
- embedded systems
- negotiation
- security
Data inizio appello
17/12/2009
Consultabilità
Non consultabile
Data di rilascio
17/12/2049
Riassunto
Nowadays, recent technological innovations in low-power, low-cost communication miniature computing devices and sensors, make it possible to use them in an increasingly wide range of objects including home appliances, cars, transport infrastructures, buildings and people. Furthermore, their communication capabilities make it possible to build Networked Embedded Systems (NES) in which devices collaborate with each other and exhibit autonomous and coordinated behaviour.
Security, is a crucial requirement for an increasing number of embedded systems, ranging from low-end systems such as PDAs, wireless handsets and networked sensors to high-end systems such as routers, gateways and storage servers. Technological growth, that spurred the development of these electronic types of systems, also ushered in the growth of adversary powers and sophistication in making attacks to those systems.
In this work SecCom component has been implemented, it provides the secure communication service according to the application security policy.
An application security policy defines the sets of protocols that have to be applied in order to protect the communication among components in different physical devices. Moreover, in order to support recongurability, SecCom could negotiate the secure communication protocol as well as the
cryptographic algorithms necessary to implement it.
Security, is a crucial requirement for an increasing number of embedded systems, ranging from low-end systems such as PDAs, wireless handsets and networked sensors to high-end systems such as routers, gateways and storage servers. Technological growth, that spurred the development of these electronic types of systems, also ushered in the growth of adversary powers and sophistication in making attacks to those systems.
In this work SecCom component has been implemented, it provides the secure communication service according to the application security policy.
An application security policy defines the sets of protocols that have to be applied in order to protect the communication among components in different physical devices. Moreover, in order to support recongurability, SecCom could negotiate the secure communication protocol as well as the
cryptographic algorithms necessary to implement it.
File
Nome file | Dimensione |
---|---|
La tesi non è consultabile. |