Visible to the public Research on Technology of Embedded System Security Protection Component

TitleResearch on Technology of Embedded System Security Protection Component
Publication TypeConference Paper
Year of Publication2020
AuthorsLiu, W., Niu, H., Luo, W., Deng, W., Wu, H., Dai, S., Qiao, Z., Feng, W.
Conference Name2020 IEEE International Conference on Advances in Electrical Engineering and Computer Applications( AEECA)
Date PublishedAug. 2020
ISBN Number978-1-7281-6521-9
Keywordscomposability, computer network management, computer network performance evaluation, computer network reliability, computer network security, Computers, cryptographic algorithm, cryptography, embedded security protection system, embedded system security protection, Embedded systems, graphical management interface, Internet of Things, Internet of Things development, IoT devices, Kernel, log management, Metrics, pubcrawl, Qt graphical management interface, resilience, Resiliency, security management, security management system, security policy management, TCP/IP protocol, TCPIP, transport protocols, Trusted Computing, trusted computing technology, whitelist management, whitelist-based security protection

With the development of the Internet of Things (IoT), it has been widely deployed. As many embedded devices are connected to the network and massive amounts of security-sensitive data are stored in these devices, embedded devices in IoT have become the target of attackers. The trusted computing is a key technology to guarantee the security and trustworthiness of devices' execution environment. This paper focuses on security problems on IoT devices, and proposes a security architecture for IoT devices based on the trusted computing technology. This paper implements a security management system for IoT devices, which can perform integrity measurement, real-time monitoring and security management for embedded applications, providing a safe and reliable execution environment and whitelist-based security protection for IoT devices. This paper also designs and implements an embedded security protection system based on trusted computing technology, containing a measurement and control component in the kernel and a remote graphical management interface for administrators. The kernel layer enforces the integrity measurement and control of the embedded application on the device. The graphical management interface communicates with the remote embedded device through the TCP/IP protocol, and provides a feature-rich and user-friendly interaction interface. It implements functions such as knowledge base scanning, whitelist management, log management, security policy management, and cryptographic algorithm performance testing.

Citation Keyliu_research_2020