View Full Document

Sizzle - A Standards-based end-to-end Security Architecture for the Embedded Internet



View the full content.
View Full Document
View Full Document

2 views

Unformatted text preview:

Sizzle A Standards based end to end Security Architecture for the Embedded Internet Vipul Gupta Matthew Millard Stephen Fung Yu Zhu Nils Gura Hans Eberle Sheueling Chang Shantz Sun Microsystems Laboratories 16 Network Circle UMPK16 160 Menlo Park CA 94025 vipul gupta sun com mmillard kos net fungstep hotmail com davidyuzhu hotmail com nils gura hans eberle sheueling chang sun com Abstract In the last several years the Internet has grown rapidly beyond servers desktops and laptops to include handheld devices like PDAs and smart phones There is now a growing realization that this trend will continue as increasing numbers of even simpler more constrained devices sensors home appliances personal medical devices get connected to the Internet The term embedded Internet is often used to refer to the phase in the Internet s evolution when it is invisibly and tightly woven into our daily lives Embedded devices with sensing and communication capabilities will enable the application of computing technologies in settings where they are unusual today habitat monitoring 26 medical emergency response 31 battlefield management and home automation Many of these applications have security requirements For example health information must only be made available to authorized personnel authentication and be protected from modification data integrity or disclosure confidentiality in transit Even seemingly innocuous data such as temperature and pressure readings may need to be secured Consider the case of a chemical plant where sensors are used to continuously monitor the reactions used in manufacturing the final product Without adequate security an attacker could feed highly abnormal readings into the monitoring system and trigger catastrophic reactions Secure Sockets Layer SSL 1 10 is the most popular security protocol on the Internet today It is built into many popular applications including all well known web browsers and is widely trusted to secure sensitive transactions including on



Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view Sizzle - A Standards-based end-to-end Security Architecture for the Embedded Internet and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Sizzle - A Standards-based end-to-end Security Architecture for the Embedded Internet and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?