Implementation and Performance Evaluation of Embedded IPsec in Microkernel OS

被引:0
作者
Hamad, Mohammad [1 ]
Prevelakis, Vassilis [1 ]
机构
[1] Tech Univ Carolo Wilhelmina Braunschweig, Inst Comp & Commun Networks, Braunschweig, Germany
来源
2015 WORLD SYMPOSIUM ON COMPUTER NETWORKS AND INFORMATION SECURITY (WSCNIS) | 2015年
关键词
Embedded IPsec; LwIP; network security; Microkernel;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of the embedded systems and the wide use of them in many sensitive fields require safeguarding their communications. Internet Protocol Security (IPsec) is widely used to solve network security problems by providing confidentiality and integrity for the communications in the network, but it introduces communication overhead. This overhead becomes a critical factor with embedded systems because of their low computing power and limited resources. In this research, we studied the overhead of using embedded IPsec in constrained resource systems, which run microkernel operating system (OS), in terms of the network latency and throughput. To conduct our experiment first, we ran the test with an unmodified network stack, and then we ran the same test with the modified network stack which contains the IPsec implementation. Later, we compared the results obtained from these two sets of experiments to examine the overhead. Our research demonstrated that the overhead imposed by IPsec protocols is small and well within the capabilities of even low cost microcontrollers such as the one used in the Raspberry Pi computer.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Simulation Design and Performance Evaluation of LWIP System
    Zhu, Xiaorong
    Chen, Kexun
    Zhang, Xiaoyi
    Chen, Meijun
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON EDUCATION TECHNOLOGY AND COMPUTERS (ICETC 2018), 2018, : 369 - 373
  • [42] The implementation and performance/cost/power analysis of the network security accelerator on SoC applications
    Gu, RT
    Chung, KH
    Huang, IJ
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 348 - 352
  • [43] RETRACTED: Design and implementation of marine information management network security system based on artificial intelligence embedded technology (Retracted Article)
    Zhang, Kun
    Zhou, Yu
    Long, Haixia
    Wu, Shulei
    Wang, Chaoyang
    Hong, Haizhuang
    Fu, Xixi
    Wang, Haifeng
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2024, 46 (02) : 4817 - 4827
  • [44] Performance Evaluation of Network Scanning Tools with Operation of Firewall
    Im, Sun-young
    Shin, Seung-Hun
    Ryu, Ki Yeol
    Roh, Byeong-hee
    [J]. 2016 EIGHTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2016, : 876 - 881
  • [45] Performance Evaluation of DSR Protocol in MANET Untrustworthy Environment
    Menaka, R.
    Mathana, J. M.
    Dhanagopal, R.
    Sundarambal, B.
    [J]. 2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 1049 - 1052
  • [46] Attack Model and Performance Evaluation of Text Digital Watermarking
    Zhou, Xinmin
    Wang, Sichun
    Xiong, Shuchu
    Yu, Jianping
    [J]. JOURNAL OF COMPUTERS, 2010, 5 (12) : 1933 - 1941
  • [47] A Scalable High-Performance Virus Detection Processor Against a Large Pattern Set for Embedded Network Security
    Cheng, Chieh-Jen
    Wang, Chao-Ching
    Ku, Wei-Chun
    Chen, Tien-Fu
    Wang, Jinn-Shyan
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2012, 20 (05) : 841 - 854
  • [48] Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection
    Belavagi, Manjula C.
    Muniyal, Balachandra
    [J]. TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 117 - 123
  • [49] Towards the design of new cryptographic algorithm and performance evaluation measures
    Farooq, Anum
    Tariq, Sana
    Amin, Asjad
    Qureshi, Muhammad Ali
    Memon, Kashif Hussain
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (04) : 9709 - 9759
  • [50] Performance evaluation on IoT devices secure data delivery processes
    Georgiadis, Ioannis
    Dossis, Michael
    Kontogiannis, Sotirios
    [J]. 22ND PAN-HELLENIC CONFERENCE ON INFORMATICS (PCI 2018), 2018, : 306 - 311