DocumentCode :
3371429
Title :
CPOP: Cryptography Process Offloading Proxy for Resource Constrained Devices
Author :
They, Yu-Shu ; Phang, Seong-Yee ; Lee, Sanggon ; Lee, HoonJae ; Lim, Hyotaek
Author_Institution :
Dept. of Ubiquitous & IT, Dongseo Univ., Pusan
fYear :
2008
fDate :
24-26 April 2008
Firstpage :
289
Lastpage :
294
Abstract :
Feasibility study on implementing a strong cryptographic function for resource constrained devices such as embedded devices has been carry out over the past. These studies found that it is not efficient to run an extensive security solution to those devices. For that reason, we tense to provide a security offloading approach to minimize the computing resources involved but maximizing the security functionality. The resource constrained devices will communicate to a centralize security server which we named it CPOP before sending or receiving packets from a not trusted network entity. CPOP is a cryptography process offloading proxy which will offload the cryptography processes such as encryption, decryption and etc to provide secure communication across the network. A prototype of CPOP has been developed and performance analyses results are obtained to justify the feasibility of our approach in providing security services to embedded devices with only limited processing capabilities.
Keywords :
cryptography; CPOP; cryptographic function; cryptography process offloading proxy; decryption; embedded devices; encryption; resource constrained devices; security offloading approach; service security; Authentication; Cryptography; Electrical products; IP networks; Information security; Internet; Network servers; Performance analysis; Protocols; Prototypes;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Security and Assurance, 2008. ISA 2008. International Conference on
Conference_Location :
Busan
Print_ISBN :
978-0-7695-3126-7
Type :
conf
DOI :
10.1109/ISA.2008.107
Filename :
4511579
Link To Document :
بازگشت