中国韩国日本在线观看免费,A级尤物一区,日韩精品一二三区无码,欧美日韩少妇色

當(dāng)前位置:主頁 > 科技論文 > 計算機(jī)論文 >

基于ARM的嵌入式系統(tǒng)網(wǎng)絡(luò)接入安全研究

發(fā)布時間:2018-06-13 01:33

  本文選題:嵌入式 + Linux。 參考:《武漢工程大學(xué)》2013年碩士論文


【摘要】:信息化、智能化、網(wǎng)絡(luò)化已成為當(dāng)今社會的標(biāo)識符,嵌入式技術(shù)發(fā)展日趨穩(wěn)定,嵌入式系統(tǒng)廣泛地應(yīng)用到生活的各個領(lǐng)域中:智能家電、汽車電子、3G應(yīng)用等,并且對于這些應(yīng)用程序的開發(fā),具有非常重要的理論意義和現(xiàn)實(shí)意義。 本文研究的是基于ARM微處理器以太網(wǎng)電路的設(shè)計與實(shí)現(xiàn)。文章中首先構(gòu)造實(shí)現(xiàn)最小ARM系統(tǒng)中所外設(shè)的電路,其中包括SDRAM和FLASH芯片的接入。這里的ARM微處理器類型選取的是MICREL公司中的ARM922T芯片,該芯片集成了網(wǎng)絡(luò)控制器等功能,使得設(shè)計簡化,重點(diǎn)放在后面的數(shù)據(jù)加密和應(yīng)用軟件的識別中。然后搭建Linux系統(tǒng)使得通過宿主機(jī)來操作目標(biāo)機(jī),通過對交叉編譯的建立、根據(jù)目標(biāo)機(jī)U-Boot的移植、內(nèi)核移植和根文件系統(tǒng)的構(gòu)建實(shí)現(xiàn)Linux的操作。這些操作是必須的操作,是實(shí)現(xiàn)宿主機(jī)和目標(biāo)機(jī)聯(lián)系的重要過程。接著利用Linux實(shí)現(xiàn)協(xié)議棧各層協(xié)議之間的數(shù)據(jù)傳遞,包括ARP協(xié)議、ICMP協(xié)議、IP協(xié)議、TCP協(xié)議、UDP協(xié)議以及SOCKET通信機(jī)制。這些協(xié)議只和相鄰層之間通信,與其他層間相互屏蔽,用當(dāng)前模塊協(xié)議中的函數(shù)調(diào)用相鄰層中的函數(shù)實(shí)現(xiàn)信息的接收和發(fā)送等一系列操作。論文的最后講述如何將數(shù)據(jù)報文安全在網(wǎng)絡(luò)傳輸以及對網(wǎng)關(guān)流量的合理分配,,其中數(shù)據(jù)加密采用的是VPN中的IPSec技術(shù);對流量合理分配主要是通過局域網(wǎng)中客戶端的應(yīng)用軟件進(jìn)行監(jiān)控。 IPSec技術(shù)是在IP層對數(shù)據(jù)的加密/解密過程的操作,通過定義的或者動態(tài)獲取到的關(guān)聯(lián)數(shù)據(jù)庫和安全策略數(shù)據(jù)提供的素材,IPSec進(jìn)程模塊實(shí)現(xiàn)數(shù)據(jù)的加密/解密功能,其中加密中的密鑰是由IKE進(jìn)程實(shí)現(xiàn)。IKE協(xié)商過程中主要包括兩個階段:第一個階段為建立IPSec隧道準(zhǔn)備相關(guān)素材,包括使用加密算法的選擇、確認(rèn)對方身份等。第二階段正式建立IPSec隧道,這里進(jìn)行AH或者ESP的加密處理方法。IKE協(xié)商完成后便可以正常通信。 對具有娛樂性軟件的監(jiān)控主要的工作是識別這些有娛樂性的應(yīng)用軟件。識別這些軟件的有對固定端口的識別、固定IP地址的識別以及對應(yīng)用層數(shù)據(jù)包的特種字段識別。將這些識別出的軟件以二則表達(dá)式的方式存儲在配置文件中,以便以后的更新。搜索配置文件中的庫和對包的過濾都采用的是HASH算法,在包過濾算法中以源地址、目的地址、源端口、目的端口、協(xié)議類型作用HASH中的關(guān)鍵字,然后對應(yīng)特定的函數(shù)進(jìn)行計算,若和之前設(shè)定好的列表中的值相同,則對該包進(jìn)行處理;在與庫中做比對時,主要以應(yīng)用軟件的固定端口、IP和對用的應(yīng)用層特征字段進(jìn)行匹配,用HASH算法算出的值若與庫中的值相同,則通知用戶管理模塊某個用戶使用了什么樣的軟件。 社會信息化也向縱深方向發(fā)展,嵌入式系統(tǒng)應(yīng)用也在不斷加深,ARM和Linux技術(shù)這兩大熱點(diǎn),應(yīng)用范圍也將擴(kuò)大。所以在嵌入式系統(tǒng)中融入加密算法和監(jiān)控功具有很好的應(yīng)用價值。
[Abstract]:Information, intelligence and networking have become the identifiers of today's society. The development of embedded technology is becoming more and more stable. Embedded systems are widely used in various fields of life: intelligent home appliances, automotive electronics, 3G applications, etc. And for the development of these applications, has a very important theoretical and practical significance. This paper studies the design and implementation of Ethernet circuit based on arm microprocessor. In this paper, the peripheral circuits of the minimum arm system are constructed, including the access of SDRAM and flash chips. The ARM922T chip of MICREL company is selected as the type of arm microprocessor, which integrates the functions of network controller and makes the design simple. The emphasis is on the data encryption and application software identification. Then the Linux system is built to operate the target machine through the host computer, through the establishment of cross-compilation, according to the transplant of the target machine U-Boot, the kernel transplantation and the construction of root file system to realize the Linux operation. These operations are necessary operations and an important process to realize the connection between host and target machine. Then we use Linux to realize the data transfer between different layers of protocol stack, including ARP protocol, ICMP protocol, IP protocol, TCP protocol, UDP protocol and socket communication mechanism. These protocols only communicate with adjacent layers, shield each other with other layers, and use the functions in the current module protocol to call the functions in adjacent layers to realize a series of operations, such as receiving and sending information. At the end of the paper, how to transfer the data message safely in the network and distribute the gateway traffic reasonably, the IPSec technology in VPN is used in the data encryption. The reasonable distribution of traffic is mainly carried out through the application software of client in LAN. IPSec technology is the operation of encryption / decryption of data in IP layer. The IPSec process module realizes the encryption / decryption function of the data by defining or dynamically acquiring the associated database and the material provided by the security policy data. The key in encryption is implemented by Ike process. Ike negotiation mainly includes two stages: the first stage prepares relevant materials for establishing IPSec tunnel, including the choice of encryption algorithm, confirmation of the identity of the other party and so on. In the second stage, IPSec tunnel is formally established, where the encryption method of AH or ESP. Ike can communicate normally after negotiation. The main task of monitoring entertainment software is to identify these entertainment applications. The software can identify fixed ports, fixed IP addresses and special fields of application data packets. The identified software is stored in a configuration file as two expressions for future updates. The library in the search configuration file and the filter to the packet adopt the hash algorithm. In the packet filtering algorithm, the keywords in the hash are used as the source address, the destination address, the source port, the destination port, and the protocol type. If the values are the same as those in the previously set list, the packet is processed; when compared with the library, it is mainly matched by the fixed port IP of the application software and the application layer feature fields used. If the value calculated by the hash algorithm is the same as the value in the library, the user management module is informed of what kind of software is used by a user. With the development of social informatization, the application of embedded system is becoming more and more popular, such as arm and Linux technology, and the application scope will be expanded. So it has good application value to integrate encryption algorithm and monitoring work into embedded system.
【學(xué)位授予單位】:武漢工程大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2013
【分類號】:TP368.1;TN918.4

【共引文獻(xiàn)】

相關(guān)期刊論文 前10條

1 何浩;王玲;馬文科;;基于H.264無線網(wǎng)絡(luò)視頻監(jiān)控系統(tǒng)的設(shè)計[J];安防科技;2009年03期

2 李成;劉苗;徐偉偉;;基于開源GIS的煤礦地測數(shù)據(jù)服務(wù)平臺研究[J];安徽地質(zhì);2009年02期

3 楊柳,盧清萍;嵌入式系統(tǒng)與Nios[J];安徽工程科技學(xué)院學(xué)報(自然科學(xué)版);2005年02期

4 賀建立;吳瀛;;Linux系統(tǒng)構(gòu)建DNS服務(wù)[J];安徽建筑工業(yè)學(xué)院學(xué)報(自然科學(xué)版);2005年06期

5 張清;何金偉;魏旭輝;;人工影響天氣作業(yè)決策指揮系統(tǒng)解決方案[J];安徽農(nóng)業(yè)科學(xué);2009年15期

6 朱江洪;;VPN技術(shù)在農(nóng)村國土信息網(wǎng)絡(luò)建設(shè)中的應(yīng)用[J];安徽農(nóng)業(yè)科學(xué);2009年28期

7 洪艷偉;;基于DOC的嵌入式遠(yuǎn)程數(shù)據(jù)采集系統(tǒng)開發(fā)[J];信息安全與技術(shù);2011年12期

8 聶影;;探索網(wǎng)絡(luò)監(jiān)聽技術(shù)的檢測方法與實(shí)現(xiàn)方式[J];安陽工學(xué)院學(xué)報;2008年02期

9 姚婭川;;嵌入式圖像實(shí)時采集系統(tǒng)設(shè)計[J];半導(dǎo)體技術(shù);2010年07期

10 張吉贊,王恩波;基于網(wǎng)絡(luò)事件的入侵檢測信號的分析和處理[J];北方工業(yè)大學(xué)學(xué)報;2003年01期

相關(guān)會議論文 前10條

1 劉春光;李全鋼;張海華;;Google Earh及Protocol SNMP在宣鋼網(wǎng)絡(luò)實(shí)時監(jiān)控中的應(yīng)用[A];2011年河北省冶金信息化自動化年會論文集[C];2011年

2 汪成林;黃藝海;;一種改進(jìn)的SSL加密隧道的FTP系統(tǒng)[A];中國自動化學(xué)會控制理論專業(yè)委員會D卷[C];2011年

3 狄敏;王維;;利用TCP/IP協(xié)議實(shí)現(xiàn)西門子PLC和過程控制計算機(jī)的通信[A];全國冶金自動化信息網(wǎng)2012年年會論文集[C];2012年

4 張海峰;黃敬雄;謝維信;;無線傳感器網(wǎng)絡(luò)節(jié)點(diǎn)系統(tǒng)設(shè)計[A];第十三屆全國信號處理學(xué)術(shù)年會(CCSP-2007)論文集[C];2007年

5 張歡;;天津鋼鐵有限公司計算機(jī)主干網(wǎng)絡(luò)系統(tǒng)項(xiàng)目[A];節(jié)能環(huán)保 和諧發(fā)展——2007中國科協(xié)年會論文集(一)[C];2007年

6 付勝利;鐘方偉;傅仲逑;;基于嵌入式Linux的HTTP代理服務(wù)器的研究[A];2006北京地區(qū)高校研究生學(xué)術(shù)交流會——通信與信息技術(shù)會議論文集(下)[C];2006年

7 許昌俊;傅光軒;;基于移動IPv6的MPLS VPN構(gòu)建[A];2007北京地區(qū)高校研究生學(xué)術(shù)交流會通信與信息技術(shù)會議論文集(下冊)[C];2008年

8 李強(qiáng);;基于網(wǎng)絡(luò)的遠(yuǎn)動規(guī)約在電網(wǎng)調(diào)度系統(tǒng)中的應(yīng)用[A];2007年河北省電子學(xué)會、河北省計算機(jī)學(xué)會、河北省自動化學(xué)會、河北省人工智能學(xué)會、河北省計算機(jī)輔助設(shè)計研究會、河北省軟件行業(yè)協(xié)會聯(lián)合學(xué)術(shù)年會論文集[C];2007年

9 潘雪峰;劉智s

本文編號:2012032


資料下載
論文發(fā)表

本文鏈接:http://www.lk138.cn/kejilunwen/jisuanjikexuelunwen/2012032.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶73cbf***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com