![]() |
Re: NEW 2009 Control System Released
Without having read the entire thread, here's some thoughts:
Addendum:
|
Re: NEW 2009 Control System Released
If they want security, then why not just use WPA2 encryption [with certificates]?
For example, for general use at driver training, demonstrations, and possibly off-season events, either a public certificate can be used or they can just operate the robots over an unencrypted network. But at every event, a unique and time-sensitive certificate is loaded onto the controllers for WPA2 authentication. After the competition, the time-sensitive certificate deactivates, and the team can return to using the robot on unencrypted networks. |
Re: NEW 2009 Control System Released
Authentication of each and every packet on the wireless network is far more important in this environment than the conventional notion of wireless network security.
Lets assume that the field control system, the robots, and the operator stations are all connected to each other by one ethernet cable and no outside influence is possible. This is the goal of conventional wireless network security. You still want every packet from the field control system to be authenticated, so that the other nodes on the net can't spoof it. You also want every packet back and forth between your robot and your operator station to be authenticated so that another node on the net can't spoof this communication. Going further, if robots on your alliance are going to communicate with each other, you what these packets to be authenticated so that spoofing can't happen, and every robot would have to use public key methods to do this so that it can publish the data required to authenticate packets coming from it. If you are going to spend any effort on network security for the communication on the competition field, the best thing to do is assume that one of the nodes that you have allowed on the net will attempt a spoof. If you prevent that, you don't have to worry so much about what nodes get on the net. Eugene Quote:
|
Re: NEW 2009 Control System Released
um how about you set MAC authentication on the AP, simple and fairly effective, going to take people a little while to figure out your MAC.
All of those other ones take little time to crack. And people have enough trouble with getting radios to work at home and that is straight forward. Adding certs, now you are asking for it. Remember this is not a NSA secret project... Or is it, what have you all gotten me into. |
Re: NEW 2009 Control System Released
Quote:
|
Re: NEW 2009 Control System Released
Quote:
|
Re: NEW 2009 Control System Released
Quote:
Also, I'm feeling slightly better about the possibilities of C - because of this statement: -Parity between C/C++ and NI LabVIEW libraries If NI truly sticks to that and releases a C/C++ library when they review a labview one with the same basic functionality, it will all be good. |
Re: NEW 2009 Control System Released
It looks like the power distribution pannel produces 24 volts for the compact rio. So what happens under heavy load and the 12 volt battery is pulled very low? I don't see any back up battery. I didn't see any specs on power consumption for the rio and the moduals and the access point. Did some one forget how first teams love to abuse thier motors and Batteries? Seams to me there needs to be a battery back up.
|
Re: NEW 2009 Control System Released
It looks like the power distribution pannel produces 24 volts for the compact rio. So what happens under heavy load and the 12 volt battery is pulled very low? I don't see any back up battery. I didn't see any specs on power consumption for the rio and the moduals and the access point. Did some one forget how first teams love to abuse thier motors and Batteries? Seams to me there needs to be a battery back up.
|
Re: NEW 2009 Control System Released
Quote:
Water Game |
Re: NEW 2009 Control System Released
Quote:
|
Re: NEW 2009 Control System Released
Quote:
Secondly, dude, double post. Plz baleet won, kthnxbai. Quote:
Also, I love xkcd. That one didn't make sense to me either. |
Re: NEW 2009 Control System Released
Quote:
|
Re: NEW 2009 Control System Released
Quote:
The strength of a security system should lie in the attacker not knowing an easily-changed key, not in them not knowing the algorithm. |
Re: NEW 2009 Control System Released
Quote:
I agree that MAC filtering would probably suffice for differentiating between each robots traffic. However, I feel that wireless security is an important aspect to consider since, in the eventuality that there was a cracking attempt on the network, nobody would want to have their team and robot suffer. Network security at a FIRST event is once instance where I feel the Regan saying of "Trust but verify" is quite pertinent. Also, a second on Bongle's post as well; security through obscurity is one of those funny things that I've read about working out poorly more than a few times. |
| All times are GMT -5. The time now is 14:21. |
Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2017, Jelsoft Enterprises Ltd.
Copyright © Chief Delphi