Font Size: a A A

Research And Design Of Trusted Embedded Security Terminal

Posted on:2019-05-21Degree:MasterType:Thesis
Country:ChinaCandidate:J Y LiFull Text:PDF
GTID:2428330566976265Subject:Electrical engineering
Abstract/Summary:PDF Full Text Request
In the information age,with the rapid development of the national economy and relying on the background of“Made in China 2025”,embedded devices have become more widely used.The security of embedded devices has being paid more and more attention.However,the current power system requires a large number of embedded devices to support normal operation.Most of the security solutions for embedded products are protected by software,such as installing firewalls or anti-virus software.Because of the possibility that the software itself is tampered and attacked,this paper uses the trusted computing to design an embedded security terminal.The trusted computing technology originally used for PC platforms.Now it will be applied to the embedded ARM platform.The secure terminal is designed from the hardware of ARM platform and the underlying operating system.And the terminal supports the trusted startup function of Trusted Platform Module(TPM).Through the measurement of data integrity,the security terminal can identify whether the system data has been tampered with security issues.And the security of the terminal is guaranteed at the hardware level.This article first briefly introduces the background and research status of the topic selection,and then analyzes the application scenarios of embedded devices in power systems,and points out the threats to its security.After a brief introduction to the development of trusted computing.With the analysis of the structure,specifications and functions,the feasibility conclusion of the migration of the trusted computing software stack to the embedded system was obtained.After that,the simulation of the trusted computing on the PC platform was designed.It is necessary to build a simulation environment because it can reduce the cost of the earlier stage.With TPM_emulator simulator software,just build the package environment that the simulator depends on.Simulation results show that TPM_emulator can emulate the most functions of TPM platform.Combining the results of simulation experiments and the working characteristics of embedded systems,the overall hardware and software design of the system is presented.The hardware includes the Cortex platform with the S5PV210 chip as the core board.The AT97SC3205T chip produced by Atmel is used as the circuit design of the TPM platform.In terms of software,the communication method using the I~2C bus between the CPU and the TPM platform.Corresponding to the characteristics of the Cortex platform,the TrouSerS(TSS)migration problem was solved,and the Qt development environment was used to integrate the TPM management tool for viewing the TPM status into the ARM platform.In the testing process,combined with hardware and software design,an embedded trusted computing platform was built.Through the visual interface,the current system operating status can be viewed at any time.Finally,through the data encryption and decryption function of TPM,the sealing and unsealing operation is tested.
Keywords/Search Tags:Trusted Computing, Trusted Platform Module, Embedded System, Trusted Startup, AT97SC3205T
PDF Full Text Request
Related items