期刊文献+

一种TrustZone架构下的密钥管理机制 被引量:2

A key management mechanism basedon TrustZone architecture
原文传递
导出
摘要 针对嵌入式设备上用户隐私数据缺乏加密保护问题,提出一种TrustZone架构下的密钥管理机制。结合PUF技术与用户PIN码生成与设备、用户双关联的用户密钥,保护用户隐私数据的机密性和完整性;同时设计了一种适用于公用嵌入式设备的多用户数据保护场景,提供多用户密钥的生成、存储、更新和销毁方法。最后,描述了基于TrustZone密钥管理模块的实现方法,并进行安全性分析与效率测试,实验表明,该机制具有很好的安全性和密钥管理效率。 Aiming at the lack of encryption protection for user privacy data on embedded devices,a key management mechanism is proposed in TrustZone architecture. Combined with Physical Unclonable Function(PUF) technology and the user's PIN to generate the user key related to both device and user,the confidentiality and integrity of privacy data is protected. Meanwhile,a relatively thorough key management mechanism is designed formutli-user data protection scene in public embedded device to realize key generation,storage,update and destroy. Finally,this multi-user key management moduleisgiven and realizedin TrustZone. And its security and efficiencyis analyzed by experiments. The experiment result show that the mechanism is reliable secure and has high key management efficiency.
作者 崔晓煜 赵波 樊佩茹 肖钰 CUI Xiao-yu ZHAO Bo FAN Pei-ru XIAO Yu(Computer School, Wuhan University, Wuhan 430072, Hubei, China Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education, Wuhan University, Wuhan 430072, Hubei, China)
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2017年第6期92-98,共7页 Journal of Shandong University(Natural Science)
基金 国家高技术研究发展计划(863计划)(2015AA016002) 国家重点基础研究发展规划项目计划(2014CB340600) 江苏省自然科学基金青年基金(BK20130372)
关键词 TRUSTZONE 隐私数据 PUF 密钥管理 TrustZone data privacy PUF key management
  • 相关文献

参考文献1

二级参考文献62

  • 1Ravi S , Raghunathan A , et al. Security in embeddedsystems : Design challenges. ACM Transactions on EmbeddedComputing System s- 2004, 3 (3 ) : 461-491.
  • 2Kumar K. DRM on Android//Proceedings of the 10th IEEEIndia Conference. M um bai, India, 2013: 1-6.
  • 3Alves T , Felton D. TrustZone: Integrated hardware andsoftware security enabling trusted computing in embeddedsystem . Government Information Q uarterly, 2004, 3 (4 ) :18-24.
  • 4Anwar W , Lindskog D, et al. Redesigning secure elementaccess control for NFC enabled Android smartphones usingmobiletrusted computing//Proceedings of the 2013 InternationalConference on Information Society. Toronto, Canada,2013: 27-34.
  • 5ARM Limited. ARM Security Technology Building a SecureSystem using TrustZone Technology. W hite Paper, 2009.
  • 6Lee R B, Kwan P C S , et al. Architecture for protectingcritical secrets in microprocessors//Proceedings of the 32ndInternational Symposium on Computer Architecture. Madison,U SA , 2005: 2-13.
  • 7Wilson P- Frey A , et al. Implementing embedded security ondual-virtual-CPU systems//Proceedings of the Design andTest of ICs for Secure Embedded Computing. Shilong, India,2007: 582-591.
  • 8An Yang, Zhao Bo, Li IIong-Bo. Extension implementationof TCM in the embedded system based on FPGA//Proceedingsof the 2013 International Conference on Computer Scienceand Application. Wuhan, China, 2 0 13: 749-752.
  • 9Lie D, Thekkath C- et al. Architecture support for copy andtamper-resistant software//Proceedings of the ASP LOS-IX2000. Massachusetts, U SA, 2000: 1-10.
  • 10Suh G E- Clarke D- et al. AEGIS: Architecture for tamperevidentand tamper-resistant processing//Proceedings of the27th International Conference on Super computing. SanFrancisco, U S A ,2003: 1-12.

共引文献29

同被引文献18

引证文献2

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部