Font Size: a A A

Embedded System Security Design Based On Trusted Computing Technology

Posted on:2019-01-17Degree:MasterType:Thesis
Country:ChinaCandidate:S J ChenFull Text:PDF
GTID:2348330542978191Subject:Engineering
Abstract/Summary:PDF Full Text Request
In the era of information explosion,on the one hand,along with the development of informationization,intellectualization and networking,embedded system obtained rapid development and popularization of application,has become an indispensable part of people in study,work and life,widely used in industrial control,traffic management,information household appliances,home intelligent management,POS network and environmental engineering,etc;on the other hand,due to the national level competition and confrontation,such as the US surveillance program PRISM,the security of the embedded system is becoming more and more important,so how to protect the confidential data will not be invaded in the embedded system has become a problem caused the majority of researchers pay close attention to one.At the same time,along with the embedded system has been applied gradually in the field of high credibility such as aerospace,military,industry,etc,people is higher and higher requirement for the credibility of the embedded system,the design and implementation technology of credible embedded system has become a important research subject for people.Security,as one of the important attributes of a credible embedded system,the study of security technology in a trusted embedded system is becoming more and more important.The trusted embedded system have a high request for safety when it applying in the special field,according to this requirement,this article first researched the technology of TPM which is widely used in current security field,and pointed at the specific requirements of the embedded system in the aspect of security,the reliable security mechanism of the embedded system has made the detailed analysis and design,throughing a combination of hardware and software to realized the embedded trusted system security mechanism,and finally chieved on a independent controllable IES series switch with this design,which resulted the switch implementing in hardware and software of the comprehensive safety control.In the aspect of hardware,Using the godson 2H of The Chinese academy of sciences as master processor,the autonomous switching chip of Centec networks,TCM as trusted comput module,and designed the framework of hardware driver of trusted computing embedded platform system;in the aspect of software,TPM driver program based on the trusted computing embedded platform system is designed and the trusted computing protocol stack in embedded environment is implemented.The protocol stack support including the key processing,bindings encapsulate data and authorization session,nonvolatile storage such as the use of the most important function of TPM,through a combination of hardware and software realization credible security mechanism of the embedded system.
Keywords/Search Tags:dependable computing, embedded system, trusted platform module TPM, security
PDF Full Text Request
Related items