EMBEDDED SYSTEM SECURITY DESIGN AND IMPLEMENTATION

MADUAKO OBINNA MOSES MOUAU/2003/3122 | 61 pages (9030 words) | Projects

ABSTRACT

An embedded system is a special purpose computer system, which is completely encapsulated in the device it controls. It has specific requirements and performs pre-defined tasks.

However, embedded systems, which is designed to capture, store, manipulate and access data of a sensitive nature, provides several challenges.

Security has been the subject of intensive research in the area of cryptography, computing, and networking.

Concisely, security is often mis-construed by embedded system designers as the addition of features, such as specific cryptographic algorithms and security protocols, to the system. In reality, it is an entirely new metric that designers consider throughout the design process, along with other metrics such as performance, cost and power.

This project has been designed to restrict access to individual protected data and files in a networked system through the use of encryption and decryption methods of file protection. It is implemented using visual basic programming and notepad for text input and output.


TABLE OF CONTENT


Title Page i

Certification ii

Dedication iii

Acknowledgement iv

Abstract v

Table Of Content vi-viii


CHAPTER ONE

1.0 Introduction 1-2

1.1 Historical Background 2-3

1.2 Statement Of The Problem 3-4

1.3 Objective Of Study 4-5

1.4 Benefits 5-6

1.5 Scope Of Study 6

1.6 Limitations 7

1.7 Definition Of Terms 7-9


CHAPTER TWO

2.0 Review Of Related Work 10

2.1 Introduction 10-11

2.2 Attacks On Embedded Systems 11-14

2.3 Countermeasures To Avoid Attacks 14-16

2.4 Security Mechanisms 16-18

2.5 Embedded Network Security 18

2.6 Encryption (Encipherment) 18

2.7 Security Policy 18-22


CHAPTER THREE

3.0 System Investigation And Analysis 23

3.1 System Investigation 23

3.2 Research Methodology 24

3.3 Methods Of Data Collection 25

3.4 System Analysis 26

3.4.1 Analysis Of Finding 26-27

3.5 Firewall Security 27-28

3.6 Embedded Client 28-29

3.7 Embedded Firewalls 29

3.8 Embedded System Restricted Access 30


CHAPTER FOUR

4.0 Design, Development, Implementation And Maintenance

Of The New System 31

4.1 System Design 31-32

4.2 Hardware Requirements 32-34

4.3 Software Requirements 34-35

4.4 Organizational Requirement 35-37

4.5 Proposal Of The New System 37

4.6 Objective Of The New System 37

4.7 System Development 38

4.7.1 Program Specification 38-40

4.7.2 Program Design 41

4.7.3 Program Flowchart 41

4.7.4 Test Run 41

4.8 System Implementation 41-42

4.9 System Maintenance 42-43


CHAPTER FIVE

5.0 Recommendation And Conclusion 44

5.1 Recommendation 44-45

5.2 Conclusion 45-46

Reference 47-49

Appendix I: Program Flowchart

Appendix II: Program Test Run

Appendix III: program Design Code

Overall Rating

0.0

5 Star
(0)
4 Star
(0)
3 Star
(0)
2 Star
(0)
1 Star
(0)
APA

MADUAKO, M (2020). EMBEDDED SYSTEM SECURITY DESIGN AND IMPLEMENTATION. Repository.mouau.edu.ng: Retrieved Dec 22, 2024, from https://repository.mouau.edu.ng/work/view/embedded-system-security-design-and-implementation

MLA 8th

MOUAU/2003/3122, MADUAKO. "EMBEDDED SYSTEM SECURITY DESIGN AND IMPLEMENTATION" Repository.mouau.edu.ng. Repository.mouau.edu.ng, 25 Mar. 2020, https://repository.mouau.edu.ng/work/view/embedded-system-security-design-and-implementation. Accessed 22 Dec. 2024.

MLA7

MOUAU/2003/3122, MADUAKO. "EMBEDDED SYSTEM SECURITY DESIGN AND IMPLEMENTATION". Repository.mouau.edu.ng, Repository.mouau.edu.ng, 25 Mar. 2020. Web. 22 Dec. 2024. < https://repository.mouau.edu.ng/work/view/embedded-system-security-design-and-implementation >.

Chicago

MOUAU/2003/3122, MADUAKO. "EMBEDDED SYSTEM SECURITY DESIGN AND IMPLEMENTATION" Repository.mouau.edu.ng (2020). Accessed 22 Dec. 2024. https://repository.mouau.edu.ng/work/view/embedded-system-security-design-and-implementation

Please wait...