Font Size: a A A

Design And Implementation Of Cryptographic SoC Security Service Platform Based On ECos

Posted on:2016-10-20Degree:MasterType:Thesis
Country:ChinaCandidate:T DengFull Text:PDF
GTID:2308330482479181Subject:Microelectronics and Solid State Electronics
Abstract/Summary:PDF Full Text Request
Aiming at solving three main problem of the password security service system based on cryptographic SoC, of which the scalability is not strong enough, the reliability is poor and the safety is not enough, three methods corresponding to them were proposed. Considering the constraints and requirements on the size of the memory space and designing cost of the cryptographic SoC, a configurable operating system software was developed in order to solve the first problem, a least slack time first scheduling model based on PID feedback control was proposed in the light of the second one, a hardware/software co-security architecture and the secure boot process beyond it were designed corresponding to the third one. At last, the cryptographic security service system can be used to upgrade used and achieve a change from available to easy to use. In short, the main innovations of the paper in engineering and theory can be summarized as follows.1. Hardware/software co-security architecture was proposed.According to the main security threat facing the cryptographic SoC platform, a s oftware and hardware collaborative security architecture of which the hardware core is once programmable memory module and the software core is the system firmware b ased on configurable operating system was proposed. Based on this architecture, a sec ure boot process which contains the control of switching the testing interface, passwor d verification and a check on application integrity was designed. It could ensure the security of cryptographic SoC platform. The architecture is not only able to provide s ecurity for the cryptographic SoC platform in this paper, but also applicable to other embedded platforms and has excellent versatility.2. Configurable operating system software applicable to the cryptographic SoC platform was developed.Aiming at enhancing the scalability of cryptographic security service system, a F LASH driver and a virtual vector communication service for cryptographic SoC platfo rm were designed. Based on the two designs mentioned, eCos is transplanted into the new hardware platform successfully, so that the CPU type which eCos could support had been enriched. And then, the design of configurable operating system software was completed while the design of cryptographic security services was the core of th e work. It could enhance scalability and reliability of the cryptographic security servic e system and provide some reference for the embedded software development on the other platform. Finally, through the functional verification on the cryptographic securit y service system, the success of transplantation and the availability of configurable operating system software were proved.3. A scheduling model based on feedback control was proposed.In order to enhance the reliability of cryptographic security service system, a PI D-FC-LST task scheduling model based on PID feedback control was proposed. This model consists of an improved multi-level queue scheduler and four controllers, which are access controller, execution level controller, proportional-integral-derivative control ler and fuzzy controller. The parameters and level of real-time tasks are adjusted by f our controllers and then scheduled by multi-level queue scheduler. It could apply not only to the configurable operating system software, after some modification, would als o be able to serve more embedded platform. The theoretical simulation results show t hat the scheduling model could keep the system from overload and reduce the miss r ate of real-time tasks in a certain extent. The scheduling model could not only enhan ce the reliability of the system but also make full use of processor resources.
Keywords/Search Tags:eCos, Cryptographic SoC, Operating System on Chip, Cryptographic Security Service, Smbedded Real Time System, Real Time Scheduling Algorithm
PDF Full Text Request
Related items