Light-Weight Security Protocol and Data Model for Chip-to-Chip Zero-Trust

被引:2
|
作者
Ahmed, Ashfaq [1 ]
Shoufan, Abdulhadi [1 ,2 ]
Belwafi, Kais [1 ]
机构
[1] Khalifa Univ, Ctr Cyber Phys Syst C2PS, Abu Dhabi, U Arab Emirates
[2] Khalifa Univ, Dept Elect Engn & Comp Sci, Abu Dhabi, U Arab Emirates
关键词
Secure protocol and data model (SPDM); automatic verification of internet security protocols and applications (AVISPA); secure protocol animator (SPAN); formal verification (FV); AUTHENTICATION; DESIGN;
D O I
10.1109/ACCESS.2023.3285630
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The semiconductor supply chain is vulnerable to multiple security attacks, such as hardware Trojan injection, intellectual property theft, and overproduction. The notion of zero-trust (ZT) - never trust, always verify - offers a promising opportunity for chip security by authenticating integrated circuits (ICs) when they are connected to critical computing systems. Before exchanging any data, the system establishes trust with the chip using industry security protocols. In this paper, we propose using the secure protocol and data model (SPDM) to establish chip-to-chip (C2C)-ZT communications. Furthermore, we present formal models for this solution and verify these models using state-of-the-art formal verification tools. The results show that the SPDM meets the requirements of the ZT architecture and can be used as a foundation for secure C2C interconnection.
引用
收藏
页码:60335 / 60348
页数:14
相关论文
共 41 条
  • [31] Fine-grained Big Data Security Method Based on Zero Trust Model
    Yang Tao
    Zhu Lei
    Peng Ruxiang
    2018 IEEE 24TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2018), 2018, : 1040 - 1045
  • [32] Fly-Over: A Light-Weight Distributed Power-Gating Mechanism for Energy-Efficient Networks-on-Chip
    Boyapati, Rahul
    Huang, Jiayi
    Wang, Ningyuan
    Kim, Kyung Hoon
    Yum, Ki Hwan
    Kim, Eun Jung
    2017 31ST IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS), 2017, : 708 - 717
  • [33] Comments on "Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems"
    Zhou, Caixue
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (07) : 1869 - 1870
  • [34] POSTER: Fly-Over: A Light-Weight Distributed Power-Gating Mechanism for Energy-Efficient Networks-on-Chip
    Boyapati, Rahul
    Huang, Jiayi
    Wang, Ningyuan
    Kim, Kyung Hoon
    Yum, Ki Hwan
    Kim, Eun Jung
    2016 INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURE AND COMPILATION TECHNIQUES (PACT), 2016, : 413 - 414
  • [35] LCD: Light-weight control model for data plane in software-defined wireless sensor networks
    Huang, Meigen
    Yu, Bin
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (06)
  • [36] Zero-trust-based security model against data breaches in the banking sector: A blockchain consensus algorithm
    Chaudhry U.B.
    Hydros A.K.M.
    IET Blockchain, 2023, 3 (02): : 98 - 115
  • [37] OBSERVE: Blockchain-based Zero Trust Security Protocol for Connected and Autonomous Vehicles (CAVs) Data Using Simple Machine Learning
    Sullivan, Bo
    Khan, Junaid Ahmed
    2024 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2024, : 554 - 559
  • [38] EF-CIM: An Endurance Friendly CIM Accelerator Using Embedded NVM With Bit-Aware Wear Leveling for Efficient Light-Weight On-Chip Training in Edge Devices
    Guo, Zhiwang
    Jiang, Jingwen
    Chen, Deyang
    Fang, Jinbei
    Yang, Jianguo
    Han, Jun
    Xue, Xiaoyong
    Zeng, Xiaoyang
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2024,
  • [39] A state-classification approach for light-weight robotic drilling using model-based data augmentation and multi-level deep learning
    Lu, Hao
    Zhao, Xingwei
    Tao, Bo
    Ding, Han
    MECHANICAL SYSTEMS AND SIGNAL PROCESSING, 2022, 167
  • [40] A Novel Pyra-Cryptosystem Relying Secure Light-Weight Data Exchange, Peer-to-Peer Authentication, and Secure Communication Session Key Management Approach-Based Model for Internet of Things Network Security
    Ankit Attkan
    Priyanka Ahlawat
    Virender Ranga
    SN Computer Science, 6 (1)