留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

同轴接入设备的系统升级机制设计

崔竞飞 王劲林 张振

崔竞飞, 王劲林, 张振等 . 同轴接入设备的系统升级机制设计[J]. 北京航空航天大学学报, 2014, 40(10): 1355-1360. doi: 10.13700/j.bh.1001-5965.2013.0667
引用本文: 崔竞飞, 王劲林, 张振等 . 同轴接入设备的系统升级机制设计[J]. 北京航空航天大学学报, 2014, 40(10): 1355-1360. doi: 10.13700/j.bh.1001-5965.2013.0667
Cui Jingfei, Wang Jinlin, Zhang Zhenet al. Design of firmware upgrade algorithm for HINOC system[J]. Journal of Beijing University of Aeronautics and Astronautics, 2014, 40(10): 1355-1360. doi: 10.13700/j.bh.1001-5965.2013.0667(in Chinese)
Citation: Cui Jingfei, Wang Jinlin, Zhang Zhenet al. Design of firmware upgrade algorithm for HINOC system[J]. Journal of Beijing University of Aeronautics and Astronautics, 2014, 40(10): 1355-1360. doi: 10.13700/j.bh.1001-5965.2013.0667(in Chinese)

同轴接入设备的系统升级机制设计

doi: 10.13700/j.bh.1001-5965.2013.0667
基金项目: 中国科学院重点部署项目(KGZD-EW-103-4); 国家863计划资助项目(2011AA01A106)
详细信息
    作者简介:

    崔竞飞(1973-),男,山东蓬莱人,教授级高级工程师,cuijingfei@abs.ac.cn

    通讯作者:

    张振

  • 中图分类号: TN915

Design of firmware upgrade algorithm for HINOC system

  • 摘要: 高性能同轴网络(HINOC,High performance Network Over Coax)是面向下一代广播电视网的同轴电缆接入新技术,是实现模拟电视系统双向数字改造以及广播电视三网融合战略的关键技术之一.HINOC系统中的嵌入式设备HB(HINOC Bridge)与HM(HINOC Modem)需要通过在线升级实现软件版本的不断更新.针对目前一般的软件在线升级系统中普遍存在的整体加密传输效率低、硬件失效缺乏保护等问题,本升级系统设计在文件的传输和文件烧写的基本步骤上引入了文件差分编码解码、文件校验与加密解密以及异常保护机制.实际测试结果显示,升级系统能够满足HINOC系统在效率、安全性和可靠性方面的要求,保证了嵌入式系统的信息安全以及嵌入式设备在异常情况下的稳定工作.

     

  • [1] GY/T 265—2012 NGB宽带接主系统 HINOC传输和媒质接入控制技术规范[S] GY/T 265—2012 NGB broadband access system-technical specification of HINOC physical layer and media access control protocol[S](in Chinese)
    [2] 欧阳锋,崔竞飞, 赵玉萍,等.HINOC同轴电缆接入系统技术方案[J].广播与电视技术,2011,38(10):34-38 Ouyang Feng,Cui Jingfei,Zhao Yuping,et al.Technology of high performance network over coax[J].Radio & TV Broadcast Engineering,2011,38(10):34-38(in Chinese)
    [3] Cui W W, Duan X H,Yuan W,et al.Design and implementation of HINOC network management system based on SNMP[C]//Signal Processing, Communication and Computing(ICSPCC).Washington,D C:IEEE Computer Society,2012:527-532
    [4] 陈璐,钟声. 网络文件传输方法和系统:中国,102420822[P].2012-04-28 Chen Lu,Zhong Sheng.Transfer method and system of network file:China,102420822[P].2012-04-28(in Chinese)
    [5] David A. Security enhanced firmware update procedures in embedded systems[D].Linköping:Linköping University,2008
    [6] Andrew C. Secure firmware update:US,2006143600[P].2006-07-06
    [7] Ryozo K, Mariko K,Satoshi M,et al.A delta representation scheme for updating between versions of mobile phone software[J].Electronics and Communications in Japan,2007,90(7): 2637
    [8] 王广辉. 嵌入式固件远程升级技术的研究与实现[D].成都:电子科技大学,2011 Wang Guanghui.Design and implementation of remote upgrades based on embedded device[D].Chengdu:University of Electronic Science and Technology of China,2011(in Chinese)
    [9] 张绍兰. 几类密码Hash函数的设计与安全性分析[D].北京:北京邮电大学,2011 Zhang Shaolan.Design and security analysis on several cryptography hash functions[D].Beijing:Beijing University of Posts and Telecommunications,2011(in Chinese)
    [10] 梁杰. MD5-Hash函数的安全性分析[D].上海:上海交通大学,2007 Liang Jie.Security analysis of Hash function MD5[D].Shanghai:Shanghai Jiao Tong University,2007(in Chinese)
    [11] Putri Ratna A A, Dewi Purnamasari P,Shaugi A,et al.Analysis and comparison of MD5 and SHA-1 algorithm implementation in simple-O authentication based security system[C]//2013 International Conference on Quality in Research,QiR 2013-In Conjunction with ICCS 2013:The 2nd International Conference on Civic Space.Washington,D C:IEEE Computer Society,2013:99-104
    [12] Järvinen K, Tommiska M,Skyttä J.Hardware implementation analysis of the MD5 hash algorithm[C]//Proceedings of the Annual Hawaii International Conference on System Sciences.Washington,D C:IEEE Computer Society,2005:298
    [13] Ramesh A, Suruliandi A.Performance analysis of encryption algorithms for information security[C]//Proceedings of IEEE International Conference on Circuit,Power and Computing Technologies,ICCPCT 2013.Washington,D C:IEEE Computer Society,2013:840-844
    [14] Stallings W, Brown L.Computer security principles and practice[M].2nd ed.Upper Saddle River,New Jersey:Prentice Hall,2011:71-101
    [15] Wu X H, Zhou Y P.Analysis of data encryption algorithm based on WEB[C]//ICCET 2010-2010 International Conference on Computer Engineering and Technology,Proceedings.Piscataway,NJ:IEEE Computer Society,2010,7:673-677

  • 加载中
计量
  • 文章访问数:  892
  • HTML全文浏览量:  170
  • PDF下载量:  617
  • 被引次数: 0
出版历程
  • 收稿日期:  2013-11-19
  • 网络出版日期:  2014-10-20

目录

    /

    返回文章
    返回
    常见问答