13.07.2015 Views

System Architecture Design

System Architecture Design

System Architecture Design

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

pSHIELD<strong>System</strong> <strong>Architecture</strong> <strong>Design</strong>PUShepherd platform provided by Telenor Objects acts as M2M platform. Shepherd allows any pluggableobjects (here micro and power nodes) to be connected to the platform through devices APIs and makesthe sensor information securely and reliably available to the service providers or users through applicationinterface.4.5 <strong>System</strong> <strong>Architecture</strong> SPD functionalitiesFollowing are the core SPD functionalities pSHIELD envisioned:• Identification: Identification process ascertains the identity of an entity. For example, the processvalidates that the individual or process presenting the identity is indeed the owner of the identity.pSHIELD system includes the identification process of several of its components such as nodes,applications, processes and individuals. A simple identification process in the middleware layercan validate the authorized nodes of the system.• Authentication: An entity usually makes claims about itself for identification towards a system.Then the system needs to verify the claims. A part of the entity’s identity attribute is used to verifythat the claims made by it about itself are true. Authentication is the process of identifying anindividual who wants to access a system. Access is granted when the presented claims is equalto the information stored in the system. An entity can be a node, an application, process or anindividual.• Security accounting and audit: Accounting functionality tracks security events such asauthentication and authorization failures. It mainly monitors the system from security point ofviews and keeps record of the events. Accounting includes the audit functionality. Security auditrefers to systematic and measurable assessment of security of system or application. It includesmainly security vulnerability analysis of system. A system may generate audit reports usingsoftware. Security audit can also be manual.• Integrity: The pSHIELD railway freight transportation scenario mainly aims at monitoringhazardous materials transported by trains in carriages equipped with a wireless sensor network,devices for intrusion detection and access control and a location-aware communicationtransceiver. Having a wireless monitoring system installed per train carriage increases the needfor security. It is essential, given the hazardous nature of the transported materials, to eliminateany risk of harming human lives or the environment through malicious attacks. Cryptographicfunctionality will be adopted to counter these malicious attacks. Cryptography has been anestablished mean for many years to provide security and information protection against differentforms of attacks. It is seen as the basis for the provision of different systems security,fundamentally by seeking to achieve a number of goals, that are: confidentiality, authenticity, dataintegrity and non-repudiation.PUD2.3.2Issue 5 Page 61 of 122

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!