JJAP Conf. Proc. 4, 011615 (2016) doi:10.7567/JJAPCP.4.011615
Home communications and services with enhanced security: Augmented embedded systems for communication appliances as an educational platform
- 1Graduate School of Science and Technology, Shizuoka University, Japan
- 2Department of Computer Science, Sapienza University of Rome, Italy
- Received September 25, 2015
- PDF (559 KB) |
The increased dependence on ICT services makes home users more vulnerable to online attacks, security breaches, identity thefts, and unauthorized access to valuable information if specific measures and precautions are not properly instated. Nowadays, wired communications are giving way to wireless, and most of the computing devices and appliances that we use are always online, hence potentially vulnerable to attacks and unauthorized access. We address such security issues by an embedded solution targeting home users and small home networks that could be employed on a wide range of communication hardware (e.g., home routers) as a replacement of the standard manufactures firmware. The design, development and all practical aspects of the integration of such embedded system solutions into existing communication appliances are considered as essential components of the Embedded Systems academic course with hands-on experience and practice on networking that we build.
Content from this work may be used under the terms of the Creative Commons Attribution 4.0 license. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
- 1 IBM, Beyond the Next Generation: Putting Advanced Network Security to Work, EMA White Paper, November 2012.
- 2 J. Oltsik, Integrated Network Security Architecture: Threat-focused Next-generation Firewall, ECS White Paper, September 2014.
- 3 J. Pan, SIGCSE’10, Milwaukee, Wisconsin, U.S.A., 2010, p. 133.
- 4 D. Heldenbrand and C. Carey, JCSC 23, 127 (2007).
- 5 H. Jasani, The 40th ASEE/IEEE Frontiers in Education Conf., Washington, DC, U.S.A., 2010, p. S3F1-6.
- 6 DD-WRT. URL: http://www.dd-wrt.com/, Retrieved July 2015.
- 7 OpenWRT. URL: https://openwrt.org/, Retrieved July 2015.
- 8 C. Palazzi, M. Brunati, and M. Roccetti, IEEE ICME 2010, p. 1701.
- 9 BUFFALO. URL: http://www.buffalo-technology.com/en/technology/partnered-software/dd-wrt/, Retrieved July 2015.
- 10 A. Tsow and M. Jakobsson, J. Digital Forensic Pract. 1, 179 (2006).