Chapter 5
Data Protection Protocols for Embedded Systems
Chapter Outline
5.1 Introduction
5.2.1 Generalized Model
5.2.1.1 Point-to-Point
5.2.1.2 Point-to-Multipoint
5.2.2 Choosing the Network Layer for Security
5.2.3 Ethernet Security Protocols
5.2.4 IPsec versus SSL
5.2.5 IPsec
5.2.5.1 Integrated versus Bump-in-the-Stack
5.2.5.2 IPsec RFCs
5.2.5.3 IKE
5.2.5.4 IPsec Hardware Offload
5.2.5.5 IPsec for Very Low Power Devices
5.2.5.6 HAIPE
5.2.6 SSL/TLS
5.2.7 Embedded VPN Clients
5.2.7.1 Openswan and Racoon2
5.2.7.2 OpenVPN
5.2.8 DTLS
5.2.9 SSH
5.2.9.1 Additional Protocols Based on SSH
5.2.9.2 OpenSSH
5.2.10 Custom ...
Get Embedded Systems Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.