|
|
|
![]() |
|
|||||||
|
||||||||
![]() |
| Thread Tools |
Rating:
|
Display Modes |
|
#121
|
|||||
|
|||||
|
Re: NEW 2009 Control System Released
Without having read the entire thread, here's some thoughts:
Addendum:
Last edited by Astronouth7303 : 18-04-2008 at 01:40. |
|
#122
|
|||||
|
|||||
|
Re: NEW 2009 Control System Released
If they want security, then why not just use WPA2 encryption [with certificates]?
For example, for general use at driver training, demonstrations, and possibly off-season events, either a public certificate can be used or they can just operate the robots over an unencrypted network. But at every event, a unique and time-sensitive certificate is loaded onto the controllers for WPA2 authentication. After the competition, the time-sensitive certificate deactivates, and the team can return to using the robot on unencrypted networks. |
|
#123
|
|||
|
|||
|
Re: NEW 2009 Control System Released
Authentication of each and every packet on the wireless network is far more important in this environment than the conventional notion of wireless network security.
Lets assume that the field control system, the robots, and the operator stations are all connected to each other by one ethernet cable and no outside influence is possible. This is the goal of conventional wireless network security. You still want every packet from the field control system to be authenticated, so that the other nodes on the net can't spoof it. You also want every packet back and forth between your robot and your operator station to be authenticated so that another node on the net can't spoof this communication. Going further, if robots on your alliance are going to communicate with each other, you what these packets to be authenticated so that spoofing can't happen, and every robot would have to use public key methods to do this so that it can publish the data required to authenticate packets coming from it. If you are going to spend any effort on network security for the communication on the competition field, the best thing to do is assume that one of the nodes that you have allowed on the net will attempt a spoof. If you prevent that, you don't have to worry so much about what nodes get on the net. Eugene Quote:
|
|
#124
|
|||
|
|||
|
Re: NEW 2009 Control System Released
um how about you set MAC authentication on the AP, simple and fairly effective, going to take people a little while to figure out your MAC.
All of those other ones take little time to crack. And people have enough trouble with getting radios to work at home and that is straight forward. Adding certs, now you are asking for it. Remember this is not a NSA secret project... Or is it, what have you all gotten me into. |
|
#125
|
||||
|
||||
|
Re: NEW 2009 Control System Released
Why is that such a strange thing? Microchip was the odd man out when it came to implementing a C++ implementation on their microcontrollers.
|
|
#126
|
|||
|
|||
|
Re: NEW 2009 Control System Released
They may be amortizing the expense across several years, then using the remaining revenue as a license fee to support operations and maintenance.
|
|
#127
|
||||
|
||||
|
Re: NEW 2009 Control System Released
Quote:
Also, I'm feeling slightly better about the possibilities of C - because of this statement: -Parity between C/C++ and NI LabVIEW libraries If NI truly sticks to that and releases a C/C++ library when they review a labview one with the same basic functionality, it will all be good. Last edited by Tom Line : 18-04-2008 at 07:53. |
|
#128
|
|||
|
|||
|
Re: NEW 2009 Control System Released
It looks like the power distribution pannel produces 24 volts for the compact rio. So what happens under heavy load and the 12 volt battery is pulled very low? I don't see any back up battery. I didn't see any specs on power consumption for the rio and the moduals and the access point. Did some one forget how first teams love to abuse thier motors and Batteries? Seams to me there needs to be a battery back up.
|
|
#129
|
|||
|
|||
|
Re: NEW 2009 Control System Released
It looks like the power distribution pannel produces 24 volts for the compact rio. So what happens under heavy load and the 12 volt battery is pulled very low? I don't see any back up battery. I didn't see any specs on power consumption for the rio and the moduals and the access point. Did some one forget how first teams love to abuse thier motors and Batteries? Seams to me there needs to be a battery back up.
|
|
#130
|
||||
|
||||
|
Re: NEW 2009 Control System Released
Quote:
Water Game |
|
#131
|
|||||
|
|||||
|
Re: NEW 2009 Control System Released
Quote:
|
|
#132
|
|||||
|
|||||
|
Re: NEW 2009 Control System Released
Quote:
Secondly, dude, double post. Plz baleet won, kthnxbai. Quote:
Also, I love xkcd. That one didn't make sense to me either. Last edited by synth3tk : 18-04-2008 at 09:33. |
|
#133
|
||||
|
||||
|
Re: NEW 2009 Control System Released
Just like all platforms. What you wrote isn't a strike against National Instruments more than a perfect example as to why HDLs are different from conventional computer languages. I was doing research on FPGAs and found that other people were amazed at the length of time for a simple VHDL example to compile. It makes sense because the compiling process isn't the same for a HDL as opposed to a language like C++.
Last edited by Adam Y. : 18-04-2008 at 09:38. |
|
#134
|
||||
|
||||
|
Re: NEW 2009 Control System Released
Quote:
The strength of a security system should lie in the attacker not knowing an easily-changed key, not in them not knowing the algorithm. |
|
#135
|
|||
|
|||
|
Re: NEW 2009 Control System Released
For reasons that eugenebrooks has covered (post #120), (post #123), namely being able to identify each node and prevent spoofing, simply filtering MAC addresses may not be enough. Both nodes that are supposed to be connected and/or a rouge node (say a malicious fan), could spoof a MAC address.
I agree that MAC filtering would probably suffice for differentiating between each robots traffic. However, I feel that wireless security is an important aspect to consider since, in the eventuality that there was a cracking attempt on the network, nobody would want to have their team and robot suffer. Network security at a FIRST event is once instance where I feel the Regan saying of "Trust but verify" is quite pertinent. Also, a second on Bongle's post as well; security through obscurity is one of those funny things that I've read about working out poorly more than a few times. Last edited by mgreenley : 18-04-2008 at 09:59. Reason: comment on Bongle's post |
![]() |
| Thread Tools | |
| Display Modes | Rate This Thread |
|
|
Similar Threads
|
||||
| Thread | Thread Starter | Forum | Replies | Last Post |
| Buying the 2009 control system | BornaE | FRC Control System | 9 | 16-10-2008 17:16 |
| 2009 Control System Feature Wishlist | tdlrali | FRC Control System | 47 | 17-06-2008 00:25 |
| pic: 2009 Control System, Mounted | Billfred | FRC Control System | 23 | 01-05-2008 19:02 |
| 2009 Control System Possibility? | Racer26 | Rumor Mill | 121 | 25-04-2008 09:05 |
| Forum Request: Post-2009 control system? | Billfred | CD Forum Support | 3 | 22-04-2008 16:22 |