16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

246 Chapter 10<br />

10.5.1 SSH<br />

Sharing many similarities to a specialized version of SSL, the Secure Shell (SSH)<br />

protocol provides a secure Telnet-style console interface, as well as several other remoteaccess<br />

services. This is a highly useful tool for creating secure remote configuration<br />

interfaces, since it is geared toward remote shell functionality. Due to the similarity<br />

in abbreviations, SSH is often confused with SSL, but they are separate protocols<br />

developed by separate organizations (the Netscape Corporation created SSL, and SSH<br />

was developed by a Finnish researcher). The two protocols do share many similarities,<br />

such as the use of public-key encryption to exchange symmetric-key encryption keys<br />

and the inclusion of both authentication and encryption mechanisms. The current version<br />

of SSH is an updated variant of the original that provides more security and has been<br />

standardized by the IETF in RFC 4251.<br />

The SSH protocol is an important security tool and as an implementation that is provided<br />

as a standard utility in many operating systems. Also, like SSL, there is an open-source<br />

implementation available (www.openssh.com). For more information on SSH, check out<br />

RFC 4251 and Open SSH.<br />

10.5.2 IPSEC<br />

IPSEC is a protocol designed to work at the IP layer, and is widely used for implementing<br />

Virtual Private Networks. IPSEC is a security framework similar to SSL, but with a bit<br />

larger scope. The IPSEC protocol, described in RFC 2401, consists of various security<br />

mechanisms and policies that are used to build different kinds of secure tunnels between<br />

devices. The protocol is quite broad, and implementing it for an embedded system would<br />

represent many challenges. We mention IPSEC because it is an important component of<br />

network security, but SSL (or TLS) can be used for creating similar secure networking<br />

tunnels. SSL has the advantage of being a simpler protocol that is built on top of the<br />

underlying network stack (usually between the application and a TCP layer), whereas<br />

IPSEC is implemented lower in the stack, at the IP layer as seen in Figure 10.1 .<br />

10.5.3 Other Protocols<br />

Finally, to close out our discussion on security protocols, we will briefly mention a<br />

few other protocols and standards. There are literally hundreds of protocols available<br />

for security, many of them freely available through the IETF RFC standards. There are<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!