Implementation and Performance Evaluation of Embedded IPsec in Microkernel OS

被引:0
作者
Hamad, Mohammad [1 ]
Prevelakis, Vassilis [1 ]
机构
[1] Tech Univ Carolo Wilhelmina Braunschweig, Inst Comp & Commun Networks, Braunschweig, Germany
来源
2015 WORLD SYMPOSIUM ON COMPUTER NETWORKS AND INFORMATION SECURITY (WSCNIS) | 2015年
关键词
Embedded IPsec; LwIP; network security; Microkernel;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of the embedded systems and the wide use of them in many sensitive fields require safeguarding their communications. Internet Protocol Security (IPsec) is widely used to solve network security problems by providing confidentiality and integrity for the communications in the network, but it introduces communication overhead. This overhead becomes a critical factor with embedded systems because of their low computing power and limited resources. In this research, we studied the overhead of using embedded IPsec in constrained resource systems, which run microkernel operating system (OS), in terms of the network latency and throughput. To conduct our experiment first, we ran the test with an unmodified network stack, and then we ran the same test with the modified network stack which contains the IPsec implementation. Later, we compared the results obtained from these two sets of experiments to examine the overhead. Our research demonstrated that the overhead imposed by IPsec protocols is small and well within the capabilities of even low cost microcontrollers such as the one used in the Raspberry Pi computer.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] Portable, PTP-based Clock Synchronization Implementation for Microcontroller-based Systems and its Performance Evaluation
    Wiesner, Andras
    Kovacshazy, Tamas
    INTERNATIONAL IEEE SYMPOSIUM ON PRECISION CLOCK SYNCHRONIZATION FOR MEASUREMENT, CONTROL, & COMMUNICATION (IEEE ISPCS 2021), 2021,
  • [32] The Porting and Implementation of Light-Weight TCP/IP for Embedded Web Server
    Chen, Wei
    Qiu, Shu-Bo
    Zhang, Ying-Chun
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4190 - 4193
  • [33] RESEARCH AND IMPLEMENTATION OF SECURITY EVALUATION SYSTEM FOR NGN
    Yan, Danfeng
    Yang, Fangchun
    Wang, Wenbin
    CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 329 - 333
  • [34] Designing a Evaluation Tool for IT Security Solution Implementation for IT Enterprises
    Podzins, Oskars
    Romanovs, Andrejs
    2016 IEEE 4TH WORKSHOP ON ADVANCES IN INFORMATION, ELECTRONIC AND ELECTRICAL ENGINEERING (AIEEE), 2016,
  • [35] The Rationale for Distributed Semantics as a Topology Independent Embedded Systems Design Methodology and its Implementation in the Virtuoso RTOS
    Eric Verhulst
    Design Automation for Embedded Systems, 2002, 6 : 277 - 294
  • [36] The rationale for distributed semantics as a topology independent embedded systems design methodology and its implementation in the virtuoso RTOS
    Verhulst, E
    DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2002, 6 (03) : 277 - 294
  • [37] Design, Implementation and Performance Measurement of Raspberry Gate in the IoT Field
    Hu, Shuting
    Suzuki, Hironobu
    Kitaguchi, Yoshiaki
    Ohno, Hiroyuki
    Sampalli, Srinivas
    2019 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTERNET OF THINGS (CCIOT 2019), 2019, : 82 - 89
  • [38] Performance Evaluation of an Intrusion Detection System
    Saber, Mohammed
    Chadli, Sara
    Emharraf, Mohamed
    El Farissi, Ilhame
    PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2, 2016, 381 : 509 - 517
  • [39] The Performance Evaluation of Intrusion Detection Evaluation Method Based on Bayesian Theory
    Si, Haiyang
    Fang, Zhiyi
    Li, Ruixue
    Zhang, Jianli
    Li, Wei
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4843 - 4846
  • [40] An evaluation of videogame network architecture performance and security
    Bryant, Blake
    Saiedian, Hossein
    COMPUTER NETWORKS, 2021, 192