|2/2013 - 4|
STFTP: Secure TFTP Protocol for Embedded Multi-Agent Systems CommunicationHORVAT, G. , ZAGAR, D. , MARTINOVIC, G.
|View the paper record and citations in|
|Click to see author's profile in SCOPUS, IEEE Xplore, Web of Science|
|Download PDF (929 KB) | Citation | Downloads: 1,796 | Views: 5,870|
software agents, embedded system, telecommunication, multiagent system, security, Secure TFTP, TFTP
embedded(12), systems(11), agent(10), design(9), security(8), system(7), link(7), protocol(6), software(5), authentication(5)
Blue keywords are present in both the references section and the paper title.
About this article
Date of Publication: 2013-05-31
Volume 13, Issue 2, Year 2013, On page(s): 23 - 32
ISSN: 1582-7445, e-ISSN: 1844-7600
Digital Object Identifier: 10.4316/AECE.2013.02004
Web of Science Accession Number: 000322179400004
SCOPUS ID: 84878949461
Today's embedded systems have evolved into multipurpose devices moving towards an embedded multi-agent system (MAS) infrastructure. With the involvement of MAS in embedded systems, one remaining issues is establishing communication between agents in low computational power and low memory embedded systems without present Embedded Operating System (EOS). One solution is the extension of an outdated Trivial File Transfer Protocol (TFTP). The main advantage of using TFTP in embedded systems is the easy implementation. However, the problem at hand is the overall lack of security mechanisms in TFTP. This paper proposes an extension to the existing TFTP in a form of added security mechanisms: STFTP. The authentication is proposed using Digest Access Authentication process whereas the data encryption can be performed by various cryptographic algorithms. The proposal is experimentally tested using two embedded systems based on micro-controller architecture. Communication is analyzed for authentication, data rate and transfer time versus various data encryption ciphers and files sizes. STFTP results in an expected drop in performance, which is in the range of similar encryption algorithms. The system could be improved by using embedded systems of higher computational power or by the use of hardware encryption modules.
|References|||||Cited By «-- Click to see who has cited this paper|
| J. Parab, S. A. Shinde, V. G. Shelake, R. K. Kamat, G. M. Naik, "Practical Aspects of Embedded System Design using Microcontrollers", Springer 2008, XXII, 150 p. |
[CrossRef] [SCOPUS Times Cited 7]
 J. P. Jamont, M. Occello. "Design of embedded multiagent systems: discussion about some specificities", Proc.of VII Agent-Oriented Software Engineering Technical Forum, Paris, France, 15. Dec. 2010.
 J. P. Jamont, M. Occello "Presentation on Design of embedded multiagent systems", VII Agent-Oriented Software Engineering Technical Forum, Paris, France, 15. Dec. 2010
 N. Tziritas, T. Loukopoulos, S. Lalis, P. Lampsas, "Agent placement in wireless embedded systems: Memory space and energy optimizations," Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW), 2010 IEEE International Symposium on , vol., no., pp.1-7, 19-23 April 2010
[CrossRef] [SCOPUS Times Cited 9]
 L. Yun, W. Xun, F. Yulian, Intelligence technology and information processing", Science Press, Beijing, 2003.
 M. Xinglu, Q. Yingjie, "Research on Embedded Agent System Architecture," International Conference on Embedded Software and Systems Symposia, 2008. ICESS Symposia '08., pp.142-145, 29-31 July 2008
[CrossRef] [SCOPUS Times Cited 4]
 Planning apart together - multi-agent system, [Online] Available: Temporary on-line reference link removed - see the PDF document
 R. Tynan, G.M.P. O'Hare, M.J. O'Grady, C. Muldoon, "Virtual Sensor Networks: An Embedded Agent Approach," Parallel and Distributed Processing with Applications, 2008. ISPA '08. International Symposium on, pp.926-932, 10-12 Dec. 2008
[CrossRef] [Web of Science Times Cited 9] [SCOPUS Times Cited 14]
 K. Sollins, "The TFTP Protocol (Revision 2)", RFC 1350, July 1992.
 G. Horvat, D. Sostaric, Z. Balkic "Cost-effective Ethernet Communication for Low Cost Microcontroller Architecture", International Journal of Electrical and Computer Engineering Systems, Vol 3. No 1, pp.1-8, 2012.
 G. Malkin, A. Harkin, "TFTP Option Extension", May 1998.
 Shamshirband, S. S., Shirgahi, H., Setayeshi, S., "Designing of Rescue Multi Agent System Based on Soft Computing Techniques," Advances in Electrical and Computer Engineering, vol. 10, no. 1, pp. 79-83, 2010,
[CrossRef] [Full Text] [Web of Science Times Cited 4] [SCOPUS Times Cited 5]
 Microchip Technology Inc., [Online] Available: Temporary on-line reference link removed - see the PDF document
 P. Kocher, R. Lee, G. McGraw, A. Raghunathan, S. Ravi, "Security as a new dimension in embedded system design," Proc. of. 41st Design Automation Conference, pp.753-760, 7-11 July 2004 [CiteSeerX]
 Z., Hengwei; W., Wei; G., Qiang; , "Research and Design of Secure Transmission Protocol Applied to Embedded System," Proc. of (ICICTA), 2012, pp.276-279, 12-14 Jan. 2012
[CrossRef] [SCOPUS Record]
 D. V. Bernardo, D. Hoang, "Protecting Next Generation High Speed Network Protocol - UDT through Generic Security Service Application Program Interface - GSS-API," Emerging Security Information Systems and Technologies (SECURWARE), 2010 Fourth International Conference on , vol., no., pp.266-272, 18-25 July 2010
[CrossRef] [SCOPUS Times Cited 7]
 B. Groza, P.-S. Murvay, I. Silea, T. Ionica, "Cryptographic Authentication on the Communication from an 8051 Based Development Board over UDP," Internet Monitoring and Protection, 2008. ICIMP '08. The Third International Conference on, pp.92-97, June 29 2008-July 5 2008
[CrossRef] [SCOPUS Times Cited 3]
 Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S., Leach, P., Luotonen, A. and L. Stewart, "HTTP Authentication: Basic and Digest Access Authentication", RFC 2617, June 1999.
 Fanbao Liu; , "On the Security of Digest Access Authentication," Proc. of CSE 2011, pp.427-434, 24-26 Aug. 2011,
[CrossRef] [SCOPUS Times Cited 10]
 Metzger, P.; Simpson, W., "IP Authentication using Keyed SHA"," RFC 1852, October 1995
 S. Manuel, "Classification and generation of disturbance vectors for collision attacks against SHA-1", In Proc. of Des. Codes Cryptography, 2011, pp.247-263.
 Z. Balkic; D. Sostaric and G. Horvat, "GeoHash and UUID Identifier for Multi-Agent Systems", Agent and Multi-Agent Systems. Technologies and Applications, Lecture Notes in Computer Science, , Volume 7327/2012, pp.290-298. Springer, June 2012.
[CrossRef] [SCOPUS Times Cited 37]
 Xie, T., Feng, D. "How to find weak input differences for MD5 collision attacks", IACR Cryptology ePrint Archive, Report 2009
 David J. Wheeler, Roger M. Needham, "TEA, a Tiny Encryption Algorithm" The Computer Laboratory, Cambridge University, 1994
 "Trivial File Transfer Protocol", [Online] Available: Temporary on-line reference link removed - see the PDF document
 C. M. Chu-Jenq, "Implementing a Secure Communication Protocol for Embedded Systems", [Online] Available: Temporary on-line reference link removed - see the PDF document
 Ali E. Taki El_Deen, Noha A. Hikal, "Microcontroller Application in Cryptography Techniques", Canadian Journal on Electrical and Electronics Engineering Vol. 1, No. 4, June 2010 [CiteSeerX]
 M. Pavlin, "Encription using low cost microcontrollers", Proc. of MIDEM - Society for Microelectronics, Electronic Components and Materials, cop. 2006, pp. 189-194
 G. Meiser, T. Eisenbarth, K. Lemke-Rust and C. Paar, "Software implementation of eSTREAM profile I ciphers on embedded 8-bit AVR microcontrollers", Workshop Record State of the Art of Stream Ciphers (SASC 07), 2007.
 S. Rinne, T. Eisenbarth, C. Paar, "Performance Analysis of Contemporary Light-Weight Block Ciphers on 8-bit Microcontrollers", Horst Gortz Institute for IT Security Ruhr University Bochum Germany, 2007.
 Eisenbarth, T.; Kumar, S.; , "A Survey of Lightweight-Cryptography Implementations," Design & Test of Computers, IEEE , vol.24, no.6, pp.522-533, Nov.-Dec. 2007
[CrossRef] [Web of Science Times Cited 246] [SCOPUS Times Cited 377]
 Lu Jiqiang, "Related-key rectangle attack on 36 rounds of the XTEA block cipher", International Journal of Information Security, Vol: 8 (1): pp. 1-11, 2009
[CrossRef] [Web of Science Times Cited 27] [SCOPUS Times Cited 44]
 A. Bogdanov, D. Khovratovich, C. Rechberger, "Biclique Cryptanalysis of the Full AES". IACR Cryptology ePrint Archive 2011: 449 (2011)
 Jiqiang Lu, "Cryptanalysis of Block Ciphers"; Technical Report RHUL-MA-2008-19, Department of Mathematics Royal Holloway, University of London, 2008
 C. C. Lu; S. Y. Tseng;, "Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter," Application-Specific Systems, Architectures and Processors, 2002. Proceedings. The IEEE International Conference on, pp. 277- 285, 2002
[CrossRef] [Web of Science Times Cited 71] [SCOPUS Times Cited 121]
 Knezevic M., Rozic V., Verbauwhede I., "Design Methods for Embedded Security", TELFOR Journal, Vol.1, No. 2, 2009,
 Ambrose, J. A.; Ragel, R. G.; Parameswaran, S.; , "A smart random code injection to mask power analysis based side channel attacks" Proc. of International Conference on Hardware/Software Codesign and System Synthesis 2007 5th, pp.51-56
[CrossRef] [SCOPUS Times Cited 18]
 Atmel AVR XMEGA A Manual, [Online] Available: Temporary on-line reference link removed - see the PDF document
 El. Equipment Manufacturer: MikroElektronika, [Online] Available: Temporary on-line reference link removed - see the PDF document
 Schramm, K.; Paar, C.; , "IT security project: implementation of the Advanced Encryption Standard (AES) on a smart card," Proceedings International Conference on Information Technology: Coding and Computing, 2004., vol.1, pp. 176- 180 Vol.1, 5-7 April 2004
[CrossRef] [Web of Science Times Cited 5] [SCOPUS Times Cited 6]
 Narayan, S.; Kolahi, S.S.; Sunarto, Y.; Nguyen, D.D.T.; Mani, P.; , "The Influence of Wireless 802.11g LAN Encryption Methods on Throughput and Round Trip Time for Various Windows Operating Systems," Proc. of CNSR 2008. 6th Annual, pp.171-175, 5-8 May 2008
 A. Murabito, "A comparison of efficiency, throughput, and energy requirements of wireless access points", University of New Hampshire, InterOperability Laboratory, March 2009.
 WireShark - Network Protocol Analyzer: [Online] Available: Temporary on-line reference link removed - see the PDF document
Web of Science® Citations for all references: 362 TCR
SCOPUS® Citations for all references: 662 TCR
Web of Science® Average Citations per reference: 8 ACR
SCOPUS® Average Citations per reference: 15 ACR
TCR = Total Citations for References / ACR = Average Citations per Reference
We introduced in 2010 - for the first time in scientific publishing, the term "References Weight", as a quantitative indication of the quality ... Read more
Citations for references updated on 2023-09-28 05:05 in 86 seconds.
Note1: Web of Science® is a registered trademark of Clarivate Analytics.
Note2: SCOPUS® is a registered trademark of Elsevier B.V.
Disclaimer: All queries to the respective databases were made by using the DOI record of every reference (where available). Due to technical problems beyond our control, the information is not always accurate. Please use the CrossRef link to visit the respective publisher site.
Faculty of Electrical Engineering and Computer Science
Stefan cel Mare University of Suceava, Romania
All rights reserved: Advances in Electrical and Computer Engineering is a registered trademark of the Stefan cel Mare University of Suceava. No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from the Editor. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Faculty of Electrical Engineering and Computer Science, Stefan cel Mare University of Suceava, Romania, if and only if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.
Permission for other use: The copyright owner's consent does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific written permission must be obtained from the Editor for such copying. Direct linking to files hosted on this website is strictly prohibited.
Disclaimer: Whilst every effort is made by the publishers and editorial board to see that no inaccurate or misleading data, opinions or statements appear in this journal, they wish to make it clear that all information and opinions formulated in the articles, as well as linguistic accuracy, are the sole responsibility of the author.