13.07.2015 Views

System Architecture Design

System Architecture Design

System Architecture Design

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

pSHIELD<strong>System</strong> <strong>Architecture</strong> <strong>Design</strong>PU3.2.3.6 Key ManagementA key management scheme is an integral part of any deployed security system. Whether thecryptographic approach followed is symmetric or asymmetric, the role of an efficient key managementscheme is vital. Such a scheme is affected by the system's architecture, device classes, deploymentenvironment, potential attacks and other factors. For example, a key management scheme for a secureWSN needs to deal with the limitations of such a system in terms of nodes computational, storage andenergy constraints in addition to expensive wireless communication. Essentially, key managementcomprises key pre-distribution approaches and other schemes dependent on the nature of the network. Inall cases, certain basic operations should be supported such as key addition, revocation and renewal.3.3 Network Layer Definitions3.3.1 General Network Layer descriptionNetwork Layer is responsible for delivering data packets of variable length between hosts belonging todifferent networks. Implementation depends on application environment and possible collaborativenetworks. Generally, it may include connectionless communication, hosts addressing and messageforwarding, with IP and IP-based protocols being the most popular technology patterns. Network Layerdesign goes in accordance with MAC specification and may involve topics, such as, selection of theInternet Protocol Suite, Mobile IP for IPv4/IPv6 and Security Management, where IPsec is an openstandard security scheme for authentication and encryption of IP packets.The pSHIELD Network Layer is charged with routing, multi-fold connectivity tasks and trusted datatransfer among system components. Representative (for the scope of pSHIELD) topology of participatingnodes and their homogeneous or not “islands”, form the network’s structure. The offered communicationcapabilities and overall network functions are presented. The interactions and communication with otherlayers and modules should be described through well defined interfaces. A conceptual and modularNetwork Layer architecture is designed through a methodology that encompasses all the critical featuresdescribed already as the focus of the current study. Network Layer multi-technology architectural design isbased on a series of “key” factors, adjusted in the view of pSHIELD networking needs. The mostprominent of these factors (to be taken under consideration) are the following:• 6 key concepts of pSHIELD• Network requirements, phrased in deliverable D2.1• Selection of Nodes• Security, Privacy and Dependability functions and features• Application Scenario• Software stack• Reference <strong>Architecture</strong>• Connectivity and Trusted Routing• Technology status• Metrics• Interactions and Interfaces, Cross Layer <strong>Architecture</strong>PUD2.3.2Issue 5 Page 38 of 122

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!