SlideShare a Scribd company logo
1 of 4
SECURE COMMUNICATION FRAMEWORK FOR EMBEDDED
NETWORKING
A Report
Submitted in partial fulfillment of the
requirements for the award of the degree
of
BACHELOR OF TECHNOLOGY
in
ELECTRONICS AND COMMUNICATION ENGINEERING
by
SANDEEPAN SENGUPTA
USHNISH CHOWDHURY
TAMOJIT SAHA
MOUMITA DAS
SHAMIK GUPTA
DEBKANYA BASU
Supervisor
ASHIM KAR, PhD
DEPARTMENT OF ELECTRONICS AND COMMUNICATIONENGINEERING
TECHNO INDIA UNIVERSITY, EM – 4/1, SECTOR – V, SALT-LAKE
KOLKATA – 700091(INDIA)
January, 2017
ABSTRACT
Information security is a challenging issue in any modern-day events or applications. In order to address
such issues for embedded networks a framework need to be introduced. A comprehensible, easy to
implement yet robust framework can handle such issues. In this specific project, we are aiming at
achieving a platform neutral, hardware independent framework.
INTRODUCTION
Information security is a persisting issue since the beginning of information age and it is becoming an
even challenging field as more and more connected devices and communication standards (like Internet of
Things) have been introduced in the recent years. Majority of the devices associated with these
technologies have embedded systems built-in. So, a framework utilizing those embedded systems can
potentially address the security issues. As majority of these systems are vendor specific the framework
has to be flexible, cross platform compatible and independent of hardware architecture.
SCOPE
For the sake of simplicity, the scope of the project will be limited to generic full duplex topology. No
higher security issues (like internet security) or physical threats are considered in this framework.
FRAMEWORK
The basic constituents of any communication topology is as follows: -
1. Sender
2. Receiver
3. Communication channel
4. Information
5. Protocol
To implement the framework following elements need to be incorporated. These elements will
be used by different constituents of communication topology. The elements are:-
1. Secured database
2. Self-contained auto adaptation engine
Explanation
The working of framework can be demonstrated by explaining the prototype implementation.
Let’s consider a scenario where all possible events are pre-recorded in a database. The
database can only be accessed by an authenticated set of embedded systems associated with the
networked devices. It is recommended to choose existing cryptographic algorithms to ensure
authentication method in order to maximize its portability to different systems. If the system
doesn’t have a native cryptographic engine embedded in it, encryptable EEPROMs (like
ATSHA204) can be incorporated increasing its portability even more by reducing hardware
dependency.
Another line of defense can be safeguarding the communication channel. This can be
achieved by following the steps mentioned below: -
(1) Encrypting the communication channel.
(2) Introducing a secured hand-shake before establishing the communication.
(3) Incorporating intrusion detection techniques.
(4) Using self-adaptive frames without having any major structural restriction.
Let’s consider a system having n number of functions and each function have Pn number of
parameters. So the number of all possible events for the system will be the sum of the product of
these two. All these possible events will be stored in the secured database. To ensure its security
conventional methods (like Hashed table) can be adapted with a cryptographic security on top of
it. The table may also contain different set of encryption strategy, different types of frame format
presets and other necessary parts of the framework. This database is undoubtedly the single most
important element of the framework.
The framework will govern the communication using the following technique. Sender
will scan for a valid receiver and handshake request will be sent. If valid response is received (by
verifying all the necessary security checks and references) sender will acknowledge the existence
of a valid receiver and will perform a key exchange. This key will be used by either side to
decrypt/encrypt packages sent from the other side.
The decrypted message signal will not contain any actual information. Instead it will
contain the reference index of the desired event stored in the database. Again, this will limit the
information safety to the database only. Even if some invalid receiver or interception device
manages to syphon some information, the information will actually be some reference number
and will be useless without the database. The database itself will not be fixed. During each
power-on events it will be recreated from the said encrypted memory storage, so the event
indexes will change dynamically making it even difficult to penetrate.
In case of intrusion the message segments will be swapped and constituent parameters
(initiation identifier length, original information length, CRC length etc.) will be either padded
differently or will be reduced. It is essential to have multiple frame structure strategy and
multiple swapping strategy. This will add another layer of security on the existing model.
Conclusion
From the above explanation it can be concluded that, the defensive measures taken are crafted
out of proven security technologies ensuring the ease of implementation but put together in such
a way that it ensures modest level of safeguarding for embedded networking devices. The
database can be a single point of failure in this framework making it the prime target of a
security threat and simultaneously it will be easier for the network manager as the database will
be the only element having a physical safety flaw that needs to be managed externally.

More Related Content

What's hot

AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKSAN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKScsandit
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
 
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...IJECEIAES
 
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...IJNSA Journal
 
Network security ppt
Network security pptNetwork security ppt
Network security pptvidyapol01
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...IEEEMEMTECHSTUDENTPROJECTS
 
A securing symmetric key distribution
A securing symmetric key distributionA securing symmetric key distribution
A securing symmetric key distributionvinothp2k
 
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...Roshith S Pai
 
Security Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area NetworksSecurity Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area NetworksCSCJournals
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...LeMeniz Infotech
 
Multi-stage secure clusterhead selection using discrete rule-set against unkn...
Multi-stage secure clusterhead selection using discrete rule-set against unkn...Multi-stage secure clusterhead selection using discrete rule-set against unkn...
Multi-stage secure clusterhead selection using discrete rule-set against unkn...IJECEIAES
 
Using distributed firewalls in securing LANs
Using distributed firewalls in securing LANsUsing distributed firewalls in securing LANs
Using distributed firewalls in securing LANsANTHONY C. OKIGBO
 
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKA-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKEditor IJMTER
 
V 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 chV 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 chIJECEIAES
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network securityNEHA PATEL
 
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...IJERA Editor
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Tương Hoàng
 

What's hot (18)

AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKSAN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
 
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
 
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
 
A securing symmetric key distribution
A securing symmetric key distributionA securing symmetric key distribution
A securing symmetric key distribution
 
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
 
A Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor NetworkA Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor Network
 
Security Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area NetworksSecurity Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area Networks
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 
Multi-stage secure clusterhead selection using discrete rule-set against unkn...
Multi-stage secure clusterhead selection using discrete rule-set against unkn...Multi-stage secure clusterhead selection using discrete rule-set against unkn...
Multi-stage secure clusterhead selection using discrete rule-set against unkn...
 
Using distributed firewalls in securing LANs
Using distributed firewalls in securing LANsUsing distributed firewalls in securing LANs
Using distributed firewalls in securing LANs
 
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKA-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
 
V 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 chV 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 ch
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network security
 
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
 

Similar to Final_year_project_documentation

IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
CONTEXT-AWARE SECURITY MECHANISM FOR MOBILE CLOUD COMPUTING
CONTEXT-AWARE SECURITY MECHANISM FOR MOBILE CLOUD COMPUTING CONTEXT-AWARE SECURITY MECHANISM FOR MOBILE CLOUD COMPUTING
CONTEXT-AWARE SECURITY MECHANISM FOR MOBILE CLOUD COMPUTING IJNSA Journal
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADARITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADAcsandit
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)JIEMS Akkalkuwa
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...IJECEIAES
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET Journal
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationijmnct
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresMohammed Saqib
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYIJCI JOURNAL
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber SecurityJAZEEL K T
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
 

Similar to Final_year_project_documentation (20)

IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
CONTEXT-AWARE SECURITY MECHANISM FOR MOBILE CLOUD COMPUTING
CONTEXT-AWARE SECURITY MECHANISM FOR MOBILE CLOUD COMPUTING CONTEXT-AWARE SECURITY MECHANISM FOR MOBILE CLOUD COMPUTING
CONTEXT-AWARE SECURITY MECHANISM FOR MOBILE CLOUD COMPUTING
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADARITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data application
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
1678 1683
1678 16831678 1683
1678 1683
 
1678 1683
1678 16831678 1683
1678 1683
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
 

More from Ushnish Chowdhury

More from Ushnish Chowdhury (14)

IAENG_membership_184027
IAENG_membership_184027IAENG_membership_184027
IAENG_membership_184027
 
IAENG_membership_184027
IAENG_membership_184027IAENG_membership_184027
IAENG_membership_184027
 
Ushnish Chowdhury Internship Certificate_Tangerine Creative Lab
Ushnish Chowdhury Internship Certificate_Tangerine Creative LabUshnish Chowdhury Internship Certificate_Tangerine Creative Lab
Ushnish Chowdhury Internship Certificate_Tangerine Creative Lab
 
Philips Lighting Passport Certificate
Philips Lighting Passport CertificatePhilips Lighting Passport Certificate
Philips Lighting Passport Certificate
 
OptiLamp_Version_5
OptiLamp_Version_5OptiLamp_Version_5
OptiLamp_Version_5
 
Ushnish Class X result
Ushnish Class X resultUshnish Class X result
Ushnish Class X result
 
Ushnish Class X result
Ushnish Class X resultUshnish Class X result
Ushnish Class X result
 
Ushnish Class XII result
Ushnish Class  XII resultUshnish Class  XII result
Ushnish Class XII result
 
TIU-Semester-6
TIU-Semester-6TIU-Semester-6
TIU-Semester-6
 
TIU-Semester-5
TIU-Semester-5TIU-Semester-5
TIU-Semester-5
 
TIU-Semester-4
TIU-Semester-4TIU-Semester-4
TIU-Semester-4
 
TIU-Semester-3
TIU-Semester-3TIU-Semester-3
TIU-Semester-3
 
TIU-Semester-2
TIU-Semester-2TIU-Semester-2
TIU-Semester-2
 
TIU-Semester-1
TIU-Semester-1TIU-Semester-1
TIU-Semester-1
 

Final_year_project_documentation

  • 1. SECURE COMMUNICATION FRAMEWORK FOR EMBEDDED NETWORKING A Report Submitted in partial fulfillment of the requirements for the award of the degree of BACHELOR OF TECHNOLOGY in ELECTRONICS AND COMMUNICATION ENGINEERING by SANDEEPAN SENGUPTA USHNISH CHOWDHURY TAMOJIT SAHA MOUMITA DAS SHAMIK GUPTA DEBKANYA BASU Supervisor ASHIM KAR, PhD
  • 2. DEPARTMENT OF ELECTRONICS AND COMMUNICATIONENGINEERING TECHNO INDIA UNIVERSITY, EM – 4/1, SECTOR – V, SALT-LAKE KOLKATA – 700091(INDIA) January, 2017 ABSTRACT Information security is a challenging issue in any modern-day events or applications. In order to address such issues for embedded networks a framework need to be introduced. A comprehensible, easy to implement yet robust framework can handle such issues. In this specific project, we are aiming at achieving a platform neutral, hardware independent framework. INTRODUCTION Information security is a persisting issue since the beginning of information age and it is becoming an even challenging field as more and more connected devices and communication standards (like Internet of Things) have been introduced in the recent years. Majority of the devices associated with these technologies have embedded systems built-in. So, a framework utilizing those embedded systems can potentially address the security issues. As majority of these systems are vendor specific the framework has to be flexible, cross platform compatible and independent of hardware architecture. SCOPE For the sake of simplicity, the scope of the project will be limited to generic full duplex topology. No higher security issues (like internet security) or physical threats are considered in this framework. FRAMEWORK The basic constituents of any communication topology is as follows: - 1. Sender 2. Receiver 3. Communication channel 4. Information 5. Protocol
  • 3. To implement the framework following elements need to be incorporated. These elements will be used by different constituents of communication topology. The elements are:- 1. Secured database 2. Self-contained auto adaptation engine Explanation The working of framework can be demonstrated by explaining the prototype implementation. Let’s consider a scenario where all possible events are pre-recorded in a database. The database can only be accessed by an authenticated set of embedded systems associated with the networked devices. It is recommended to choose existing cryptographic algorithms to ensure authentication method in order to maximize its portability to different systems. If the system doesn’t have a native cryptographic engine embedded in it, encryptable EEPROMs (like ATSHA204) can be incorporated increasing its portability even more by reducing hardware dependency. Another line of defense can be safeguarding the communication channel. This can be achieved by following the steps mentioned below: - (1) Encrypting the communication channel. (2) Introducing a secured hand-shake before establishing the communication. (3) Incorporating intrusion detection techniques. (4) Using self-adaptive frames without having any major structural restriction. Let’s consider a system having n number of functions and each function have Pn number of parameters. So the number of all possible events for the system will be the sum of the product of these two. All these possible events will be stored in the secured database. To ensure its security conventional methods (like Hashed table) can be adapted with a cryptographic security on top of it. The table may also contain different set of encryption strategy, different types of frame format presets and other necessary parts of the framework. This database is undoubtedly the single most important element of the framework. The framework will govern the communication using the following technique. Sender will scan for a valid receiver and handshake request will be sent. If valid response is received (by verifying all the necessary security checks and references) sender will acknowledge the existence of a valid receiver and will perform a key exchange. This key will be used by either side to decrypt/encrypt packages sent from the other side. The decrypted message signal will not contain any actual information. Instead it will contain the reference index of the desired event stored in the database. Again, this will limit the
  • 4. information safety to the database only. Even if some invalid receiver or interception device manages to syphon some information, the information will actually be some reference number and will be useless without the database. The database itself will not be fixed. During each power-on events it will be recreated from the said encrypted memory storage, so the event indexes will change dynamically making it even difficult to penetrate. In case of intrusion the message segments will be swapped and constituent parameters (initiation identifier length, original information length, CRC length etc.) will be either padded differently or will be reduced. It is essential to have multiple frame structure strategy and multiple swapping strategy. This will add another layer of security on the existing model. Conclusion From the above explanation it can be concluded that, the defensive measures taken are crafted out of proven security technologies ensuring the ease of implementation but put together in such a way that it ensures modest level of safeguarding for embedded networking devices. The database can be a single point of failure in this framework making it the prime target of a security threat and simultaneously it will be easier for the network manager as the database will be the only element having a physical safety flaw that needs to be managed externally.