By Topic

Security methods for Web-based applications on embedded system

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
C. Maharak ; Dept. of Comput. Eng., Chulalongkorn Univ., Bangkok, Thailand ; B. Sowanwanichakul

Currently, embedded system is becoming a main solution to most specific tasks because of its high stability, economic power consumption, portability, and usefulness. As a result, embedded system was used as a tiny computer to process many applications. Nowadays, new applications are developed using Web-based technologies, which users can access from anywhere through the Internet. However, data communicated between users and web-based applications may be revealed by anyone in the Internet, so secured communication is needed for Web-based applications. SSL standard was developed to handle this situation. Nevertheless, SSL is not appropriated with embedded system due to limited resources of the embedded system. This paper proposes the design and implementation of security methods that suitable with Web-based application on embedded system. By applied these methods with web-based applications, the embedded system is be able to communicate with users more confidently. These security methods use the advantage of digest authentication based on HTTP/1.1 and conceals data by using symmetric cryptography. The results indicate that using these methods expend more resources and time consuming. However, security is also necessary with sensitive data.

Published in:

TENCON 2004. 2004 IEEE Region 10 Conference  (Volume:C )

Date of Conference:

21-24 Nov. 2004