Your Ad Here
Home Computer/Securities Science/Help Table/Cell Table\Cell

Friday, September 25, 2009

Multiple benefits

Lower device costs
Green Hills royalty-free licensing model is ideal for any wireless devices, eliminating the per unit cost to include this valuable software technology in your embedded devices. Whether you ship 10,000 or 1,000,000 units, you never pay a royalty.

Fast time-to-market
With all of the required software pre-integrated and working together, you don’t need to spend valuable time integrating components. Instead, you can focus on adding the unique features and capabilities that will differentiate your product in the market.


Security and reliability
Both security and reliability are critical when connecting devices over a wireless network. With the Green Hills Platform for Wireless Devices your device can take advantage of the proven security and reliability inherent to the INTEGRITY RTOS. INTEGRITY has an unmatched pedigree for security and reliability that includes multiple certifications by the FAA for flight critical electronics as well as formal methods analysis and NSA penetration testing performed on the security aspects of the OS.

INTEGRITY’s separation kernel architecture provides isolation, protection, and controlled access to system resources like network services, devices and even system memory and CPU cycles. Without these protection mechanisms devices are susceptible to infiltration, loss of critical data, and denial of service attacks. The ability to partition resources such as the drivers, network stacks, and applications makes INTEGRITY the clear choice for building secure and reliable systems.

For protecting data in transit, Green Hills has partnered with Devicescape to bring the gold standard in wireless security together with INTEGRITY. The Devicescape supplicant agent satisfies the supplicant requirements of both WPA and WPA2 standards. It supports both Personal and Enterprise modes and all the EAP methods mandated by the Wi-Fi Alliance for WPA2 compliance.

 
 WPA and WPA2
 
In 2003, the Wi-Fi Alliance introduced WPA to rectify the shortcomings of the original Wi-Fi security mechanism, WEP (Wireless Encryption Protocol). WPA2, introduced in 2004, implements all mandatory elements of IEEE’s security standard, 802.11i. WPA2 is backwards compatible with WPA, which includes a smaller subset of the 802.11i requirements. WPA and WPA2 can be enabled in two modes – Enterprise and Personal. Both modes provide user authentication and encryption of data traffic (see table below).

For user authentication, WPA and WPA2 use Pre-Shared Keys (PSK) in Personal Mode and 802.1x/Extensible Authentication Protocol (EAP) in Enterprise Mode. For encryption, WPA uses the Temporal Key Integrity Protocol (TKIP) whereas WPA2 uses the stronger Advanced Encryption Standard (AES). AES satisfies the Federal Information Processing Standard (FIPS) 140-2 specification, a security requirement of many government agencies.

No comments:

Post a Comment

Cell phone video surveillance solution
free counters
Website counter