ebook img

Communicating Embedded Systems PDF

340 Pages·2010·5.588 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Communicating Embedded Systems

Communicating Embedded Systems Communicating Embedded Systems Network Applications Edited by Francine Krief First published 2008 in France by Hermes Science/Lavoisier entitled: Les systèmes embarqués communicants : mobilité, sécurité, autonomie © LAVOISIER 2008 First published 2010 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc. Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address: ISTE Ltd John Wiley & Sons, Inc. 27-37 St George’s Road 111 River Street London SW19 4EU Hoboken, NJ 07030 UK USA www.iste.co.uk www.wiley.com © ISTE Ltd 2010 The rights of Francine Krief to be identified as the author of this work have been asserted by her in accordance with the Copyright, Designs and Patents Act 1988. Library of Congress Cataloging-in-Publication Data Systèmes embarqués communicants. English Communicating embedded systems : network applications / edited by Francine Krief. p. cm. Includes bibliographical references and index. ISBN 978-1-84821-144-5 1. Networks on a chip. I. Krief, Francine. II. Title. TK5105.546.S9713 2010 621.3815'31--dc22 2009041894 British Library Cataloguing-in-Publication Data A CIP record for this book is available from the British Library ISBN 978-1-84821-144-5 Printed and bound in Great Britain by CPI Antony Rowe, Chippenham and Eastbourne Table of Contents General Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Chapter 1. Introduction to Embedded Systems . . . . . . . . . . . . . 1 Patrice KADIONIK 1.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2. Embedded system: a definition. . . . . . . . . . . . . . . . . . . . 3 1.3. Properties of an embedded system. . . . . . . . . . . . . . . . . . 4 1.4. The significance of Moore’s Law . . . . . . . . . . . . . . . . . . 6 1.5. Embedded systems and the system on silicon . . . . . . . . . . . 9 1.6. Embedded systems and communications. . . . . . . . . . . . . . 12 1.7. Embedded systems and security . . . . . . . . . . . . . . . . . . . 13 1.8. Embedded systems and time constraints . . . . . . . . . . . . . . 14 1.9. Embedded systems and free software. . . . . . . . . . . . . . . . 17 1.10. Embedded systems and their design . . . . . . . . . . . . . . . . 19 1.11. An example of multimedia embedded system design. . . . . . 20 1.12. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 1.13. Bibliography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Chapter 2. Quality-of-Service Routing in Mobile Ad Hoc Networks 29 Zoubir MAMMERI 2.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 2.2. Mobile ad hoc networks: concepts, characteristics, challenges. 31 2.2.1. Concepts and basic principles . . . . . . . . . . . . . . . . . . 31 2.2.2. Limits and challenges. . . . . . . . . . . . . . . . . . . . . . . 33 2.2.3. MAC protocols for ad hoc networks . . . . . . . . . . . . . . 35 2.2.4. Node mobility and location. . . . . . . . . . . . . . . . . . . . 36 2.3. QoS routing: general considerations. . . . . . . . . . . . . . . . . 37 vi Communicating Embedded Systems 2.3.1. Functions of routing protocols. . . . . . . . . . . . . . . . . . 38 2.3.2. Classification of routing protocols . . . . . . . . . . . . . . . 40 2.3.3. Expected routing protocol properties. . . . . . . . . . . . . . 43 2.3.4. QoS routing problems. . . . . . . . . . . . . . . . . . . . . . . 44 2.4. Best-effort routing protocols in MANETs . . . . . . . . . . . . . 47 2.4.1. Criteria for routing protocol classification. . . . . . . . . . . 47 2.4.2. Presentation of routing protocols . . . . . . . . . . . . . . . . 52 2.5. QoS routing in MANETs . . . . . . . . . . . . . . . . . . . . . . . 56 2.5.1. Approaches for QoS routing. . . . . . . . . . . . . . . . . . . 57 2.5.2. Resource reservation . . . . . . . . . . . . . . . . . . . . . . . 59 2.5.3. Examples of reservation methods. . . . . . . . . . . . . . . . 60 2.5.4. Estimation models. . . . . . . . . . . . . . . . . . . . . . . . . 65 2.5.5. Presentation of the main QoS routing protocols . . . . . . . 70 2.6. Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 2.7. Bibliography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Chapter 3. Self-Management of Ad Hoc Sensor Networks . . . . . . 81 Francine KRIEF 3.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 3.2. Wireless sensor networks . . . . . . . . . . . . . . . . . . . . . . . 82 3.2.1. Fields of application for sensor networks . . . . . . . . . . . 82 3.2.2. The principal components in a sensor . . . . . . . . . . . . . 83 3.2.3. Importance of energy in sensor networks . . . . . . . . . . . 85 3.2.4. Transmission technologies. . . . . . . . . . . . . . . . . . . . 85 3.2.5. Routing algorithms . . . . . . . . . . . . . . . . . . . . . . . . 86 3.2.6. Main commercial offerings. . . . . . . . . . . . . . . . . . . . 91 3.2.7. Key issues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 3.2.8. Projects on sensor networks . . . . . . . . . . . . . . . . . . . 93 3.3. Autonomic sensor networks. . . . . . . . . . . . . . . . . . . . . . 94 3.3.1. Autonomic networking . . . . . . . . . . . . . . . . . . . . . . 94 3.3.2. Self-configuration of sensor networks . . . . . . . . . . . . . 95 3.3.3. Self-healing of sensor networks. . . . . . . . . . . . . . . . . 96 3.3.4. Self-optimization of sensor networks. . . . . . . . . . . . . . 98 3.3.5. Self-protection of sensor networks . . . . . . . . . . . . . . . 98 3.3.6. Projects relating to autonomy in sensor networks . . . . . . 101 3.4. An example of self-configuration . . . . . . . . . . . . . . . . . . 102 3.4.1. Energy optimization and automatic classification . . . . . . 102 3.4.2. The LEA2C energy optimization algorithm. . . . . . . . . . 105 3.4.3. Performance evaluation of the LEA2C algorithm . . . . . . 106 3.4.4. Improvements to the LEA2C algorithm . . . . . . . . . . . . 108 3.5. Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 3.6. Bibliography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Table of Contents vii Chapter 4. RFID Technology. . . . . . . . . . . . . . . . . . . . . . . . . 113 Vincent GUYOT 4.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 4.2. Automatic identification systems. . . . . . . . . . . . . . . . . . . 113 4.2.1. Barcodes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 4.2.2. Optical character recognition (OCR) systems. . . . . . . . . 114 4.2.3. Biometric identification. . . . . . . . . . . . . . . . . . . . . . 114 4.2.4. Microchip cards . . . . . . . . . . . . . . . . . . . . . . . . . . 115 4.2.5. RFID systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 4.3. The components of an RFID system. . . . . . . . . . . . . . . . . 116 4.4. The different types of RFID systems . . . . . . . . . . . . . . . . 118 4.4.1. Bottom of the range RFID systems. . . . . . . . . . . . . . . 118 4.4.2. Mid-range RFID systems. . . . . . . . . . . . . . . . . . . . . 119 4.4.3. Top of the range RFID systems . . . . . . . . . . . . . . . . . 119 4.5. RF ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 4.6. Information security . . . . . . . . . . . . . . . . . . . . . . . . . . 120 4.6.1. Symmetric mutual authentication. . . . . . . . . . . . . . . . 121 4.6.2. Authentication with derived keys. . . . . . . . . . . . . . . . 123 4.6.3. Transfer encryption . . . . . . . . . . . . . . . . . . . . . . . . 123 4.7. Standards in force. . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 4.7.1. Animal identification . . . . . . . . . . . . . . . . . . . . . . . 125 4.7.2. Contactless chip cards. . . . . . . . . . . . . . . . . . . . . . . 125 4.7.3. Container identification. . . . . . . . . . . . . . . . . . . . . . 126 4.7.4. Merchandise management . . . . . . . . . . . . . . . . . . . . 126 4.8. Examples of implementations . . . . . . . . . . . . . . . . . . . . 127 4.8.1. Contactless chip cards. . . . . . . . . . . . . . . . . . . . . . . 127 4.8.2. Access to public transport . . . . . . . . . . . . . . . . . . . . 128 4.8.3. Access to ski slopes . . . . . . . . . . . . . . . . . . . . . . . . 130 4.8.4. Access control . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 4.8.5. Transportation systems . . . . . . . . . . . . . . . . . . . . . . 132 4.8.6. Animal identification . . . . . . . . . . . . . . . . . . . . . . . 134 4.8.7. Sporting events. . . . . . . . . . . . . . . . . . . . . . . . . . . 135 4.9. Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 4.10. Bibliography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Chapter 5. Hardware Security in Embedded Systems. . . . . . . . . 139 Lilian BOSSUET and Guy GOGNIAT 5.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 5.2. Embedded systems and their security issues. . . . . . . . . . . . 140 5.2.1. Design constraints in embedded systems . . . . . . . . . . . 141 5.2.2. Security issues in embedded systems. . . . . . . . . . . . . . 142 viii Communicating Embedded Systems 5.2.3. The main security threats. . . . . . . . . . . . . . . . . . . . . 144 5.3. Security of the system and its data. . . . . . . . . . . . . . . . . . 147 5.3.1. The principle of deep security (ICTER project) . . . . . . . 147 5.3.2. Properties of a secured embedded hardware system. . . . . 149 5.3.3. Hardware security solutions . . . . . . . . . . . . . . . . . . . 150 5.4. Secured hardware architectures for embedded systems . . . . . 155 5.4.1. Software and embedded data protection architectures. . . . 156 5.4.2. Architectures for protection of intellectual property. . . . . 160 5.4.3. Crypto-architecture for protecting communications and security applications. . . . . . . . . . . . . . . . . . . . . . . . . 164 5.4.4. Case study: SANES, a reconfigurable, secured hardware architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . 166 5.5. Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 5.6. Bibliography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Chapter 6. Communications Security in Embedded Systems. . . . . 175 Mohamed Aymen CHALOUF 6.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 6.2. Communications security . . . . . . . . . . . . . . . . . . . . . . . 176 6.2.1. Security attacks. . . . . . . . . . . . . . . . . . . . . . . . . . . 176 6.2.2. Security services. . . . . . . . . . . . . . . . . . . . . . . . . . 178 6.2.3. Cryptographic concepts. . . . . . . . . . . . . . . . . . . . . . 179 6.2.4. Security techniques . . . . . . . . . . . . . . . . . . . . . . . . 185 6.3. Communications security in embedded systems. . . . . . . . . . 195 6.3.1. Properties of embedded systems. . . . . . . . . . . . . . . . . 195 6.3.2. Problems encountered in security implementation in the embedded system . . . . . . . . . . . . . . . . . . . . . . . . . 196 6.3.3. Adapting security techniques to embedded systems . . . . . 198 6.3.4. A mini web server implementing SSL/TLS. . . . . . . . . . 201 6.3.5. An example of SSL/TLS usage in an embedded system . . 203 6.4. Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 6.5. Bibliography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 Chapter 7. Cross-Layer Adaptation for Multimedia Services in 802.11-Type Embedded Communications Systems . . . . . . . . . 207 Ismaïl DJAMA 7.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 7.2. Limits of layered structuring . . . . . . . . . . . . . . . . . . . . . 209 7.2.1. The network access layer. . . . . . . . . . . . . . . . . . . . . 210 7.2.2. The network layer . . . . . . . . . . . . . . . . . . . . . . . . . 214 7.2.3. The transport layer. . . . . . . . . . . . . . . . . . . . . . . . . 216 Table of Contents ix 7.2.4. The application layer . . . . . . . . . . . . . . . . . . . . . . . 217 7.3. The XL concept. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 7.3.1. Bottom-up approaches . . . . . . . . . . . . . . . . . . . . . . 220 7.3.2. Top-down approaches. . . . . . . . . . . . . . . . . . . . . . . 223 7.3.3. Mixed approaches . . . . . . . . . . . . . . . . . . . . . . . . . 225 7.4. Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 7.5. Bibliography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 Chapter 8. Relevance of the DTN Architecture to Mobile Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Olfa SAMET 8.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 8.2. Mobile ad hoc networks. . . . . . . . . . . . . . . . . . . . . . . . 236 8.2.1. Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 8.2.2. Characteristics of mobile ad hoc networks . . . . . . . . . . 237 8.2.3. Constraints of mobile ad hoc networks. . . . . . . . . . . . . 237 8.3. Challenged networks. . . . . . . . . . . . . . . . . . . . . . . . . . 239 8.3.1. Transmission links. . . . . . . . . . . . . . . . . . . . . . . . . 239 8.3.2. Network architecture . . . . . . . . . . . . . . . . . . . . . . . 240 8.3.3. User terminals . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 8.3.4. Communication protocols . . . . . . . . . . . . . . . . . . . . 241 8.4. Delay-tolerant networks. . . . . . . . . . . . . . . . . . . . . . . . 241 8.4.1. Definition and objectives. . . . . . . . . . . . . . . . . . . . . 241 8.4.2. Specifics of the DTN architecture. . . . . . . . . . . . . . . . 243 8.4.3. Protocol model of a DTN network . . . . . . . . . . . . . . . 252 8.4.4. Routing in a DTN network. . . . . . . . . . . . . . . . . . . . 254 8.5. Relevance of DTNs to ad hoc mobile networks. . . . . . . . . . 263 8.5.1. Links with long delays . . . . . . . . . . . . . . . . . . . . . . 264 8.5.2. Solution to the problems relating to high loss rates . . . . . 265 8.6. Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 8.7. Bibliography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 Chapter 9. Intelligent Interfaces and Mobile Communications . . . 267 Badr BENMAMMAR and Zeina EL-FERKH JRAD 9.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 9.2. Assisting the user with access to new internet services. . . . . . 269 9.2.1. Intelligent user interfaces. . . . . . . . . . . . . . . . . . . . . 270 9.2.2. General characteristics of an intelligent interface. . . . . . . 270 9.3. Modeling user behavior . . . . . . . . . . . . . . . . . . . . . . . . 272 9.3.1. Determining the contextual data of a profile . . . . . . . . . 273 9.3.2. General definition of pertinent characteristics. . . . . . . . . 274 x Communicating Embedded Systems 9.4. Synthesis of mobile and wireless networks. . . . . . . . . . . . . 276 9.4.1. WiMAX technology. . . . . . . . . . . . . . . . . . . . . . . . 278 9.4.2. WiMAX and QoS . . . . . . . . . . . . . . . . . . . . . . . . . 281 9.4.3. Mobile WiMAX and 4G . . . . . . . . . . . . . . . . . . . . . 282 9.5. References for intelligent interfaces for access to mobile networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 9.5.1. Predicting the mobility of users . . . . . . . . . . . . . . . . . 285 9.5.2. Negotiating the QoS for a mobile user. . . . . . . . . . . . . 288 9.6. Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 9.7. Bibliography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 Chapter 10. Routing and Mobility Management in Personal Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 Usman JAVAID and Francine KRIEF 10.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 10.2. Personal environments . . . . . . . . . . . . . . . . . . . . . . . . 303 10.2.1. Personal networks . . . . . . . . . . . . . . . . . . . . . . . . 303 10.2.2. Personal network federation . . . . . . . . . . . . . . . . . . 304 10.2.3. Personal ubiquitous environment . . . . . . . . . . . . . . . 305 10.3. Routing in personal environments . . . . . . . . . . . . . . . . . 306 10.3.1. Specificities of personal networks. . . . . . . . . . . . . . . 306 10.3.2. PNRP routing protocol . . . . . . . . . . . . . . . . . . . . . 308 10.3.3. Simulation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310 10.4. Gateway discovery . . . . . . . . . . . . . . . . . . . . . . . . . . 311 10.4.1. Gateway discovery in multi-hop networks. . . . . . . . . . 311 10.4.2. The ADD protocol. . . . . . . . . . . . . . . . . . . . . . . . 312 10.4.3. Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313 10.5. Mobility management . . . . . . . . . . . . . . . . . . . . . . . . 314 10.5.1. Mobility management in personal networks. . . . . . . . . 314 10.5.2. Mobility management architecture . . . . . . . . . . . . . . 314 10.5.3. Seamless multi-hop handover . . . . . . . . . . . . . . . . . 316 10.6. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319 10.7. Bibliography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319 List of Authors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321 Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323 General Introduction Embedded systems surround us and assist us in our daily lives. They are ubiquitous and dedicated to a precise task, and can be distinguished at application level as well as performance level. They are usually intended for wireless communication and have a complex design, as we often have to juggle very strict constraints in terms of integration and functionality (surface, power consumption, throughput, etc.). Today embedded systems are at the heart of the convergence of electronics/information technology (IT)/telecommunications and networks. This convergence requires us to familiarize ourselves with a range of disciplines. This book, compiled by experts in electronics, computer science, telecommunications and networks, aims to achieve this. Without being able to give a detailed discussion of all aspects relating to embedded systems design, this book comprehensively covers the issue of communication in embedded systems. This choice is easily justified by the fact that embedded systems are today overwhelmingly communications oriented and that communications and networks are an important sector for embedded systems. This book consists of 10 chapters. Chapter 1 is an introductory chapter, which presents the general characteristics of an embedded system, as well as the constraints that Introduction written by Francine KRIEF.

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.