Font Size: a A A

Research On The Key Technique For Data Storage Protection In Embedded System

Posted on:2014-08-31Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:2268330422474020Subject:Computer technology
Abstract/Summary:PDF Full Text Request
An in-depth analysis of memory security of embedded system is given in thisthesis. Targeting on the fact that the state-of-art system structurehas not been wellimproved, a more efficient modeling structure isdeveloped. This model aims atconstruct a secure execution environment,maintaining confidential and complete datastored in system. Mean while,data stored in external memory of embedded system isfully protected basedon research of the residual data in main memory. The contentandachievement of this research include:(1)Study the security problems that the embedded system faced with based on thecurrent storage security problems. Baleful attack of various levels that the embeddedsystem may suffer and the threats the attack may pose is analyzed in detail. Associatedcriterion for storage security of embedded system is proposed.(2) On the basis of an in-depth analysis of the state-of-art technical problems fromthe secure storage in embedded system, the protection for the confidentiality of datastorage together with its testing mechanism for completeness as well as the residual datain main memory are focused on, including an analysis for the advantages and weakness.Based on the comparison of a variety of security techniques, the most effective methodfor data storage security is come up with, and the encryption model and identificationmechanism for storage security are designed. A more effective modeling structure isproposed to enhance the protection for the security of external memory data of theembedded system by means of the introduction of OTP-based confidentiality protectionmodeling and CRC-based identification mechanism for completeness. Meanwhile, theresidual data in main memory are also encrypted. All of these techniques enhance theability to defend the safety from different aspects, constructing a safe environment forthe data storage in embedded system.(3) Simulation test for secure storage environment is carried out. The secureexecution environment and processor behavior is simulated under SimpleScalar tools byintroducing OTP-based confidentiality protection modeling and CRC-basedidentification mechanism for completeness. The secure technique proposed by thisresearch is verified for its scientificalness, practicality and reliability, indicating that thisresearch production can be technically applied.
Keywords/Search Tags:embedded system, secure storage, confidentiality, integrity
PDF Full Text Request
Related items