ABSTRACT
An embedded system is a special purpose computer system, which is completely encapsulated in the device it controls. It has specific requirements and performs pre-defined tasks.
However, embedded systems, which is designed to capture, store, manipulate and access data of a sensitive nature, provides several challenges.
Security has been the subject of intensive research in the area of cryptography, computing, and networking.
Concisely, security is often mis-construed by embedded system designers as the addition of features, such as specific cryptographic algorithms and security protocols, to the system. In reality, it is an entirely new metric that designers consider throughout the design process, along with other metrics such as performance, cost and power.
This project has been designed to restrict access to individual protected data and files in a networked system through the use of encryption and decryption methods of file protection. It is implemented using visual basic programming and notepad for text input and output.
TABLE OF CONTENT
Title Page … … … … … … … … … i
Certification … … … … … … … … ii
Dedication … … … … … … … … … iii
Acknowledgement … … … … … … … … iv
Abstract … … … … … … … … … v
Table Of Content … … … … … … … … vi-viii
CHAPTER ONE
1.0 Introduction … … … … … … … … 1-2
1.1 Historical Background … … … … … … 2-3
1.2 Statement Of The Problem … … … … … 3-4
1.3 Objective Of Study … … … … … … 4-5
1.4 Benefits … … … … … … … … 5-6
1.5 Scope Of Study … … … … … … … 6
1.6 Limitations … … … … … … … … 7
1.7 Definition Of Terms … … … … … … 7-9
CHAPTER TWO
2.0 Review Of Related Work … … … … … 10
2.1 Introduction … … … … … … … … 10-11
2.2 Attacks On Embedded Systems … … … … … 11-14
2.3 Countermeasures To Avoid Attacks … … … … 14-16
2.4 Security Mechanisms … … … … … … 16-18
2.5 Embedded Network Security … … … … … 18
2.6 Encryption (Encipherment) … … … … … 18
2.7 Security Policy … … … … … … … 18-22
CHAPTER THREE
3.0 System Investigation And Analysis … … … … 23
3.1 System Investigation … … … … … … 23
3.2 Research Methodology … … … … … … 24
3.3 Methods Of Data Collection … … … … … 25
3.4 System Analysis … … … … … … … 26
3.4.1 Analysis Of Finding … … … … … … 26-27
3.5 Firewall Security … … … … … … … 27-28
3.6 Embedded Client … … … … … … … 28-29
3.7 Embedded Firewalls … … … … … … 29
3.8 Embedded System Restricted Access … … … … 30
CHAPTER FOUR
4.0 Design, Development, Implementation And Maintenance
Of The New System … … … … … … 31
4.1 System Design … … … … … … … 31-32
4.2 Hardware Requirements … … … … … … 32-34
4.3 Software Requirements … … … … … … 34-35
4.4 Organizational Requirement … … … … … 35-37
4.5 Proposal Of The New System … … … … … 37
4.6 Objective Of The New System … … … … … 37
4.7 System Development … … … … … … 38
4.7.1 Program Specification … … … … … … 38-40
4.7.2 Program Design … … … … … … … 41
4.7.3 Program Flowchart … … … … … … 41
4.7.4 Test Run … … … … … … … … 41
4.8 System Implementation … … … … … … 41-42
4.9 System Maintenance … … … … … … 42-43
CHAPTER FIVE
5.0 Recommendation And Conclusion … … … … 44
5.1 Recommendation … … … … … … … 44-45
5.2 Conclusion … … … … … … … … 45-46
Reference … … … … … … … … … 47-49
Appendix I: Program Flowchart
Appendix II: Program Test Run
Appendix III: program Design Code
MADUAKO, M (2020). EMBEDDED SYSTEM SECURITY DESIGN AND IMPLEMENTATION. Repository.mouau.edu.ng: Retrieved Dec 22, 2024, from https://repository.mouau.edu.ng/work/view/embedded-system-security-design-and-implementation
MOUAU/2003/3122, MADUAKO. "EMBEDDED SYSTEM SECURITY DESIGN AND IMPLEMENTATION" Repository.mouau.edu.ng. Repository.mouau.edu.ng, 25 Mar. 2020, https://repository.mouau.edu.ng/work/view/embedded-system-security-design-and-implementation. Accessed 22 Dec. 2024.
MOUAU/2003/3122, MADUAKO. "EMBEDDED SYSTEM SECURITY DESIGN AND IMPLEMENTATION". Repository.mouau.edu.ng, Repository.mouau.edu.ng, 25 Mar. 2020. Web. 22 Dec. 2024. < https://repository.mouau.edu.ng/work/view/embedded-system-security-design-and-implementation >.
MOUAU/2003/3122, MADUAKO. "EMBEDDED SYSTEM SECURITY DESIGN AND IMPLEMENTATION" Repository.mouau.edu.ng (2020). Accessed 22 Dec. 2024. https://repository.mouau.edu.ng/work/view/embedded-system-security-design-and-implementation