期刊文献+

嵌入式实时操作系统可信计算技术研究 被引量:10

Research on Trusted Computing Technology in Embedded Real-time Operation System
下载PDF
导出
摘要 可信计算能有效提高嵌入式实时操作系统的安全性,但现有的可信计算技术较难满足该系统实时性和低功耗的要求。为此,提出一种基于VxWorks内核的可信计算解决方案。设计嵌入式实时可信平台模块和可信软件栈,实现基于完整性度量证书的信任链传递结构和轻量级访问控制框架。实验结果证明,可信平台模块相比SW-TPM模块平均命令执行时间节省了65.81%,轻量级访问控制框架对系统内核的性能影响也较小,可满足嵌入式实时操作系统的应用要求。 The Trusted Computing Technology(TCT) is an effective way to solve Embedded Real-time Operation System(ERTOS) security. However, the existing TCT is hard to satisfy the properties of real-time and low power consumption directly. Based on VxWorks kernel, this paper puts forward a solution of trusted computing by designing embedded real-time trusted computing module and trusted soitware stack, which can realize the chain of trust by using integrity measurement certificate and establish the lightweight access control architecture. Experimental results show that the average execution time of commands on trusted platform module saves 65.81% execution time compared with SW-TPM module. Lightweight access control affects the kernel by increasing few execution overhead, which can meet the ERTOS requirements of real-time and low power consumption as a whole.
出处 《计算机工程》 CAS CSCD 2014年第1期130-133,共4页 Computer Engineering
基金 国家自然科学基金资助项目(61003268)
关键词 嵌入式实时操作系统 可信计算 完整性度量证书 访问控制 实时调度 Embedded Real-time Operation System(ERTOS) trusted computing integrity measurement certificate access control real-time schedule
  • 相关文献

参考文献13

  • 1Ravi S, Raghunathan A, Kocher P, et al. Security in Embedded Systems: Design Challenges[J]. ACM Transactions on Embedded Computing Systems, 2004, 3(3): 461-491.
  • 2沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:252
  • 3Trusted Computing Group. Secure Embedded Platform with Trusted Computing: Automotive and Other Systems in the Internet of Things Must Be Protected[EB/OL]. (2012-06-10). htips://www.trustedcomputinggroup.org/resources/secure_emb edded-platforms with trusted_computingautomotive and ot her_systems in the internet of things_must_beprotected.
  • 4Johannes W. Trusted Computing Building Blocks for Embedded Linux-based ARM TrustZone Platforms[C]//Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing. Fairfax, USA: ACM Press, 2008.
  • 5Secure Architecture and Implementation of Xen on ARM for Mobile Devices[EB/OL]. (2007-04-21). http://xensource.conv' files/xensummit4/Secure Xen ARM xen-summit-04 07 Suh. pdf.
  • 6Embedded XEN Virtualization Framework[EB/OL]. (2012-12-11). http://source forge.net/proj ects/embeddedxen/.
  • 7Lucas D, Alexandra D, Christoph K. Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones[C]// Proceedings of the 6th ACM Workshop on Scalable Trusted Computing. Chicago, USA: ACM Press, 2011.
  • 8Das U-boot The Universal Boot Loader[EB/OL]. (2010- 12-08). http://sourceforge.net/proj ects/u-boot/.
  • 9Aaraj N, Raghunathan A, Jha N K. Analysis and Design of a Hardware/Software Trusted Platform Module for Embedded SystemsCJ]. ACM Transactions on Embedded Computing Systems, 2008, 8(1): 1-31.
  • 10Strasser M. Stamer H. A Software-based Trusted Platform Module Emulator[C]//Proceedings of the 1st International Conference on Trusted Computing and Trust in Information Technologies. Heidelberg, Germany: IEEE Press, 2008.

二级参考文献106

共引文献265

同被引文献89

引证文献10

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部