Abstract
This chapter describes our experience porting a transport-layer cryptography service to an embedded microcontroller. We describe some key development issues and techniques involved in porting networked software to a connected, limited resource device such as the Rabbit RMC2000 we chose for this case study. We examine the effectiveness of a few proposed porting strategies by examining important program and run-time characteristics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
M. Barr. Programming Embedded Systems in C and C++. O Reilly & Associates, Inc., Sebastopol, California, 1999.
P. J. Brown. “Levels of Language for Portable Software.” Communications of the ACM, Vol. 15, No. 12, pp. 1059–1062, December 1972.
J. Daemen and V. Rijmen. “The Block Cipher Rijndael.” In Proceedings of the Third Smart Card Research and Advanced Applications Conference, 1998.
M. de Champlain. “Patterns to Ease the Port of Micro-Kernels in Embedded Systems.” In Proceedings of the 3rd Annual Conference on Pattern Languages of Programs (PLoP 96), Allterton Park, Illinois, June 1996.
T. Dierks and C. Allen. The TLS Protocol. Internet draft, Transport Layer Security Working Group, May 1997.
A. O. Freier, P. Karlton, and P. C. Kocher. The SSL Protocol. Internet draft, Transport Layer Security Working Group, Nov. 1996.
J. Gassle. “Dumb Mistakes.” The Embedded Muse Newsletter, August 7, 1997.
J. G. Gassle. The Art of Programming Embedded Systems. Academic Press, 1992.
A. Gokhale and D. C. Schmidt. “Techniques for Optimizing CORBA Middleware for Distributed Embedded Systems.” In Proceedings of INFOCOM 99, March 1999.
A. Goldberg, R. Buff, and A. Schmitt. “Secure Web Server Performance Using SSL Session Keys.” In Workshop on Internet Server Performance, held in conjunction with SIGMETRICS 98, June 1998.
D. R. Hanson. C Interfaces and Implementations-Techniques for Creating Reusable Software. Addison-Wesley, Reading, Massachussets, 1997.
B. W. Kernighan and D. M. Ritchie. The C Programming Langage. Prentice Hall, Englewood Cliffs, New Jersey, second edition, 1988.
J. Labrosse. MicroC/OS-II. CMP Books, Lawrence, Kansas, 1998.
R. Leupers. Code Optimization Techniques for Embedded Processors: Methods, Algorithms, and Tools. Kluwer Academic Publishers, 2000.
B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson. “Performance Comparison of the AES Submissions.” In Proceedings of the Second AES Candidate Conference, pp. 15–34, NIST, March 1999.
S. Vinoski. “CORBA: Integrating Diverse Applications Within Distributed Heterogeneous Environments.” IEEE Communications Magazine, Vol. 14, No. 2, February 1997.
C. Yang. “Performance Evaluation of AES/DES/Camellia on the 6805 and H8/300 CPUs.” In Proceedings of the 2001 Symposium on Cryptography and Information Security, pp. 727–730, Oiso, Japan, January 2001.
V. Zivojnovic, C. Schlager, and H. Meyr. “DSPStone: A DSP-oriented Benchmarking Methodology.” In International Conference on Signal Processing, 1995.
K. Zurell. C Programming for Embedded Systems. CMP Books, 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Kluwer Academic Publishers
About this chapter
Cite this chapter
Jan, S., de Dios, P., Edwards, S.A. (2003). Porting a Network Cryptographic Service to the RMC2000. In: Jerraya, A.A., Yoo, S., Verkest, D., Wehn, N. (eds) Embedded Software for SoC. Springer, Boston, MA. https://doi.org/10.1007/0-306-48709-8_13
Download citation
DOI: https://doi.org/10.1007/0-306-48709-8_13
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-7528-5
Online ISBN: 978-0-306-48709-5
eBook Packages: Springer Book Archive