SlideShare a Scribd company logo
SECURE COMMUNICATION
FRAMEWORK
FOR
EMBEDDED NETWORKING
ABSTRACT
Information security is a challenging issue in any modern-
day events or applications. In order to address such issues
for embedded networks a framework need to be introduced.
A comprehensible, easy to implement yet robust framework
can handle such issues. In this specific project, we are aiming
at achieving a platform neutral, hardware independent
framework.
INTRODUCTION
Information security is a persisting issue since the beginning of
information age and it is becoming an even challenging field as more
and more connected devices and communication/networking
standards(e.g. Internet of Things) have been introduced in the recent
years. Majority of the devices associated with these technologies have
embedded systems built-in. So, a framework utilizing those embedded
systems can potentially address the security issues. As majority of
these systems are vendor specific, the framework has to be flexible,
cross platform compatible and independent of hardware architecture.
SCOPE
For the sake of simplicity, the scope of the project will be
limited to isolated intranet on generic full duplex
topology. No conventional security threats (like internet
security)or physical threats are handled in this framework.
This framework is intended to be implemented on custom
industrial, scientific and medical networks running on
proprietary physical hardware and protocols.
FRAMEWORK
The basic constituents of any communication topology are as follows:
1. Sender
2. Receiver
3. Communication channel
4. Information
5. Protocol
To implement the framework following elements need to be being corporated. These
elements will be used by different constituents of communication topology. The elements
are:
1. Secured database
2. Self-contained auto adaptation engine
The framework will be implemented on a logical level making it independent of
hardware protocol
PRINCIPLE
The working of framework can be demonstrated by explaining the
prototype implementation.
Let’s consider a scenario where all possible events are pre-recorded in a
lookup table constructed from a database. The database can only be
accessed by an authenticated set of embedded systems associated with
the networked devices. It is recommended to choose existing
cryptographic algorithms (like AES, RSA, SHA256 etc.) as
authentication method in order to maximize its portability to different
systems.
If the system doesn’t have a native cryptographic engine embedded in it,
dedicated crypto-authentication EEPROMs (e.g. ATSHA204) can be
incorporated as storage increasing framework portability even more by
reducing architecture dependency.
Another line of defense can be safeguarding the communication channel. This
can be achieved by following the steps mentioned below:
1. Encrypting the communication channel.
2. Introducing a secured hand-shake before establishing the
communication.
3. Incorporating intrusion detection techniques.
4. Using self-adaptive frames without having any major structural
restriction.
CONCLUSION
From the above explanation, it can be concluded that, the
defensive measures taken are crafted out of proven security
technologies ensuring the ease of implementation but put
together in such a way that it ensures modest level of
safeguarding for embedded networking devices. The database
can be a single point of failure in this framework making it the
prime target of a security threat and simultaneously it will be
easier for the network manager as the database will be the only
element requiring attention to ensure security.

More Related Content

What's hot

Computer security aspects in
Computer security aspects inComputer security aspects in
Computer security aspects inVishnu Suresh
 
Network security & information security maintainence modified
Network security & information security maintainence modifiedNetwork security & information security maintainence modified
Network security & information security maintainence modified
Keerthan Shetty
 
3 (data security in local network using)
3 (data security in local network using)3 (data security in local network using)
3 (data security in local network using)
JIEMS Akkalkuwa
 
Php developer
Php developerPhp developer
Php developer
Ertugrul Akbas
 
PhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-SecurityPhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-Security
Phdtopiccom
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSahithi Naraparaju
 
NSTISSI 4011 INFOSEC PROFESSIONALS CERT
NSTISSI 4011 INFOSEC PROFESSIONALS CERTNSTISSI 4011 INFOSEC PROFESSIONALS CERT
NSTISSI 4011 INFOSEC PROFESSIONALS CERTArgyrios Alexopoulos
 
PhD-Guidance-in-Security
PhD-Guidance-in-SecurityPhD-Guidance-in-Security
PhD-Guidance-in-Security
Phdtopiccom
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
university of education,Lahore
 
42
4242
Software Defined Networking with WiFi Research Projects
Software Defined Networking with WiFi Research ProjectsSoftware Defined Networking with WiFi Research Projects
Software Defined Networking with WiFi Research Projects
Network Simulation Tools
 
SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...
SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...
SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...
Danube University Krems, Centre for E-Governance
 
UTM & Next-Gen Firewall Solution: What's the difference?
UTM & Next-Gen Firewall Solution: What's the difference?UTM & Next-Gen Firewall Solution: What's the difference?
UTM & Next-Gen Firewall Solution: What's the difference?
Seqrite
 
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEEMEMTECHSTUDENTPROJECTS
 

What's hot (19)

Computer security aspects in
Computer security aspects inComputer security aspects in
Computer security aspects in
 
Network security & information security maintainence modified
Network security & information security maintainence modifiedNetwork security & information security maintainence modified
Network security & information security maintainence modified
 
3 (data security in local network using)
3 (data security in local network using)3 (data security in local network using)
3 (data security in local network using)
 
Php developer
Php developerPhp developer
Php developer
 
Steganography
SteganographySteganography
Steganography
 
PhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-SecurityPhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-Security
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
NSTISSI 4011 INFOSEC PROFESSIONALS CERT
NSTISSI 4011 INFOSEC PROFESSIONALS CERTNSTISSI 4011 INFOSEC PROFESSIONALS CERT
NSTISSI 4011 INFOSEC PROFESSIONALS CERT
 
Firewall
FirewallFirewall
Firewall
 
PhD-Guidance-in-Security
PhD-Guidance-in-SecurityPhD-Guidance-in-Security
PhD-Guidance-in-Security
 
CaselliM_CV
CaselliM_CVCaselliM_CV
CaselliM_CV
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Jb ia
Jb   iaJb   ia
Jb ia
 
42
4242
42
 
Ch16
Ch16Ch16
Ch16
 
Software Defined Networking with WiFi Research Projects
Software Defined Networking with WiFi Research ProjectsSoftware Defined Networking with WiFi Research Projects
Software Defined Networking with WiFi Research Projects
 
SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...
SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...
SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...
 
UTM & Next-Gen Firewall Solution: What's the difference?
UTM & Next-Gen Firewall Solution: What's the difference?UTM & Next-Gen Firewall Solution: What's the difference?
UTM & Next-Gen Firewall Solution: What's the difference?
 
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
 

Viewers also liked

SAP Sales Automation
SAP Sales Automation SAP Sales Automation
SAP Sales Automation
SAP Customer Experience
 
YH87 - Merchandise
YH87 - MerchandiseYH87 - Merchandise
YH87 - Merchandise
YellowHouse87
 
Resume - Namrata Pawar
Resume - Namrata PawarResume - Namrata Pawar
Resume - Namrata PawarNamrata Pawar
 
Media plemininary Powerpoint
Media plemininary Powerpoint Media plemininary Powerpoint
Media plemininary Powerpoint
Casey Bennett
 
gizi buruk
gizi burukgizi buruk
gizi buruk
bellaristianaa
 
Labour Management System (Web Based)
Labour Management System (Web Based)Labour Management System (Web Based)
Labour Management System (Web Based)
Seo Jets
 
Perlembagaan kelab guru 3
Perlembagaan kelab guru 3Perlembagaan kelab guru 3
Perlembagaan kelab guru 3
PadangNenas
 
The Future of Sales Is Marketing
The Future of Sales Is MarketingThe Future of Sales Is Marketing
The Future of Sales Is Marketing
SAP Customer Experience
 
YH87 - Portronics
YH87 - PortronicsYH87 - Portronics
YH87 - Portronics
YellowHouse87
 
Mini Estrapolazione Menù R.A.
Mini Estrapolazione Menù R.A.Mini Estrapolazione Menù R.A.
Mini Estrapolazione Menù R.A.Roberto Abbadati
 
Ympäristö ja proteiinit, Sanna Hietala
Ympäristö ja proteiinit, Sanna HietalaYmpäristö ja proteiinit, Sanna Hietala
FoodAfrica seminar presentation WP6, Nick Minot
FoodAfrica seminar presentation WP6, Nick MinotFoodAfrica seminar presentation WP6, Nick Minot
FoodAfrica seminar presentation WP6, Nick Minot
Natural Resources Institute Finland (Luke) / Luonnonvarakeskus (Luke)
 
Portfolio Marcello Pisu lo res
Portfolio Marcello Pisu lo resPortfolio Marcello Pisu lo res
Portfolio Marcello Pisu lo resMarcello Pisu
 

Viewers also liked (14)

SAP Sales Automation
SAP Sales Automation SAP Sales Automation
SAP Sales Automation
 
YH87 - Merchandise
YH87 - MerchandiseYH87 - Merchandise
YH87 - Merchandise
 
Resume - Namrata Pawar
Resume - Namrata PawarResume - Namrata Pawar
Resume - Namrata Pawar
 
Media plemininary Powerpoint
Media plemininary Powerpoint Media plemininary Powerpoint
Media plemininary Powerpoint
 
gizi buruk
gizi burukgizi buruk
gizi buruk
 
2016 CV Marzelle Fineberg
2016 CV Marzelle Fineberg2016 CV Marzelle Fineberg
2016 CV Marzelle Fineberg
 
Labour Management System (Web Based)
Labour Management System (Web Based)Labour Management System (Web Based)
Labour Management System (Web Based)
 
Perlembagaan kelab guru 3
Perlembagaan kelab guru 3Perlembagaan kelab guru 3
Perlembagaan kelab guru 3
 
The Future of Sales Is Marketing
The Future of Sales Is MarketingThe Future of Sales Is Marketing
The Future of Sales Is Marketing
 
YH87 - Portronics
YH87 - PortronicsYH87 - Portronics
YH87 - Portronics
 
Mini Estrapolazione Menù R.A.
Mini Estrapolazione Menù R.A.Mini Estrapolazione Menù R.A.
Mini Estrapolazione Menù R.A.
 
Ympäristö ja proteiinit, Sanna Hietala
Ympäristö ja proteiinit, Sanna HietalaYmpäristö ja proteiinit, Sanna Hietala
Ympäristö ja proteiinit, Sanna Hietala
 
FoodAfrica seminar presentation WP6, Nick Minot
FoodAfrica seminar presentation WP6, Nick MinotFoodAfrica seminar presentation WP6, Nick Minot
FoodAfrica seminar presentation WP6, Nick Minot
 
Portfolio Marcello Pisu lo res
Portfolio Marcello Pisu lo resPortfolio Marcello Pisu lo res
Portfolio Marcello Pisu lo res
 

Similar to FY 2017 project version 2

Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
Ivan Carmona
 
Iaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloudIaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloud
Iaetsd Iaetsd
 
Using distributed firewalls in securing LANs
Using distributed firewalls in securing LANsUsing distributed firewalls in securing LANs
Using distributed firewalls in securing LANs
ANTHONY C. OKIGBO
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
JIEMS Akkalkuwa
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
aquazac
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
SubmissionResearchpa
 
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
IJIR JOURNALS IJIRUSA
 
Approach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed FirewallsApproach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed Firewalls
International Journal of Science and Research (IJSR)
 
Network security
Network securityNetwork security
Network security
Simalike Peter
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
Amber Wheeler
 
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADARITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
csandit
 
Luigi Roman - CybersecurityPointOfView-LR.pptx
Luigi Roman - CybersecurityPointOfView-LR.pptxLuigi Roman - CybersecurityPointOfView-LR.pptx
Luigi Roman - CybersecurityPointOfView-LR.pptx
FIWARE
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
Amare Kassa
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
Kamal Spring
 
Security Incidents
Security IncidentsSecurity Incidents
Security Incidents
belsis
 
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
ams1ams11
 
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-HiChapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
EstelaJeffery653
 

Similar to FY 2017 project version 2 (20)

Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
 
Iaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloudIaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloud
 
Using distributed firewalls in securing LANs
Using distributed firewalls in securing LANsUsing distributed firewalls in securing LANs
Using distributed firewalls in securing LANs
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
 
Tinysec
TinysecTinysec
Tinysec
 
Tinysec
TinysecTinysec
Tinysec
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
 
Approach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed FirewallsApproach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed Firewalls
 
Tdp.a029a10
Tdp.a029a10Tdp.a029a10
Tdp.a029a10
 
Network security
Network securityNetwork security
Network security
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
 
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADARITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
 
Luigi Roman - CybersecurityPointOfView-LR.pptx
Luigi Roman - CybersecurityPointOfView-LR.pptxLuigi Roman - CybersecurityPointOfView-LR.pptx
Luigi Roman - CybersecurityPointOfView-LR.pptx
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Security Incidents
Security IncidentsSecurity Incidents
Security Incidents
 
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
 
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-HiChapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
 

More from Ushnish Chowdhury

Ushnish Chowdhury Internship Certificate_Tangerine Creative Lab
Ushnish Chowdhury Internship Certificate_Tangerine Creative LabUshnish Chowdhury Internship Certificate_Tangerine Creative Lab
Ushnish Chowdhury Internship Certificate_Tangerine Creative LabUshnish Chowdhury
 
Philips Lighting Passport Certificate
Philips Lighting Passport CertificatePhilips Lighting Passport Certificate
Philips Lighting Passport CertificateUshnish Chowdhury
 

More from Ushnish Chowdhury (14)

IAENG_membership_184027
IAENG_membership_184027IAENG_membership_184027
IAENG_membership_184027
 
IAENG_membership_184027
IAENG_membership_184027IAENG_membership_184027
IAENG_membership_184027
 
Ushnish Chowdhury Internship Certificate_Tangerine Creative Lab
Ushnish Chowdhury Internship Certificate_Tangerine Creative LabUshnish Chowdhury Internship Certificate_Tangerine Creative Lab
Ushnish Chowdhury Internship Certificate_Tangerine Creative Lab
 
Philips Lighting Passport Certificate
Philips Lighting Passport CertificatePhilips Lighting Passport Certificate
Philips Lighting Passport Certificate
 
OptiLamp_Version_5
OptiLamp_Version_5OptiLamp_Version_5
OptiLamp_Version_5
 
Ushnish Class X result
Ushnish Class X resultUshnish Class X result
Ushnish Class X result
 
Ushnish Class X result
Ushnish Class X resultUshnish Class X result
Ushnish Class X result
 
Ushnish Class XII result
Ushnish Class  XII resultUshnish Class  XII result
Ushnish Class XII result
 
TIU-Semester-6
TIU-Semester-6TIU-Semester-6
TIU-Semester-6
 
TIU-Semester-5
TIU-Semester-5TIU-Semester-5
TIU-Semester-5
 
TIU-Semester-4
TIU-Semester-4TIU-Semester-4
TIU-Semester-4
 
TIU-Semester-3
TIU-Semester-3TIU-Semester-3
TIU-Semester-3
 
TIU-Semester-2
TIU-Semester-2TIU-Semester-2
TIU-Semester-2
 
TIU-Semester-1
TIU-Semester-1TIU-Semester-1
TIU-Semester-1
 

FY 2017 project version 2

  • 2. ABSTRACT Information security is a challenging issue in any modern- day events or applications. In order to address such issues for embedded networks a framework need to be introduced. A comprehensible, easy to implement yet robust framework can handle such issues. In this specific project, we are aiming at achieving a platform neutral, hardware independent framework.
  • 3. INTRODUCTION Information security is a persisting issue since the beginning of information age and it is becoming an even challenging field as more and more connected devices and communication/networking standards(e.g. Internet of Things) have been introduced in the recent years. Majority of the devices associated with these technologies have embedded systems built-in. So, a framework utilizing those embedded systems can potentially address the security issues. As majority of these systems are vendor specific, the framework has to be flexible, cross platform compatible and independent of hardware architecture.
  • 4. SCOPE For the sake of simplicity, the scope of the project will be limited to isolated intranet on generic full duplex topology. No conventional security threats (like internet security)or physical threats are handled in this framework. This framework is intended to be implemented on custom industrial, scientific and medical networks running on proprietary physical hardware and protocols.
  • 5. FRAMEWORK The basic constituents of any communication topology are as follows: 1. Sender 2. Receiver 3. Communication channel 4. Information 5. Protocol To implement the framework following elements need to be being corporated. These elements will be used by different constituents of communication topology. The elements are: 1. Secured database 2. Self-contained auto adaptation engine The framework will be implemented on a logical level making it independent of hardware protocol
  • 6. PRINCIPLE The working of framework can be demonstrated by explaining the prototype implementation. Let’s consider a scenario where all possible events are pre-recorded in a lookup table constructed from a database. The database can only be accessed by an authenticated set of embedded systems associated with the networked devices. It is recommended to choose existing cryptographic algorithms (like AES, RSA, SHA256 etc.) as authentication method in order to maximize its portability to different systems.
  • 7. If the system doesn’t have a native cryptographic engine embedded in it, dedicated crypto-authentication EEPROMs (e.g. ATSHA204) can be incorporated as storage increasing framework portability even more by reducing architecture dependency. Another line of defense can be safeguarding the communication channel. This can be achieved by following the steps mentioned below: 1. Encrypting the communication channel. 2. Introducing a secured hand-shake before establishing the communication. 3. Incorporating intrusion detection techniques. 4. Using self-adaptive frames without having any major structural restriction.
  • 8. CONCLUSION From the above explanation, it can be concluded that, the defensive measures taken are crafted out of proven security technologies ensuring the ease of implementation but put together in such a way that it ensures modest level of safeguarding for embedded networking devices. The database can be a single point of failure in this framework making it the prime target of a security threat and simultaneously it will be easier for the network manager as the database will be the only element requiring attention to ensure security.