SoC Virtual Platform with Secure Key Generation Module for Embedded Secure Devices

被引:0
|
作者
Lim, Seung-Ho [1 ]
Lim, Hyeok-Jin [2 ]
Park, Seong-Cheon [2 ]
机构
[1] Hankuk Univ Foreign Studies, Div Comp Engn, Yongin, South Korea
[2] ETRI, Sudogwon Res Ctr, Seongnam, South Korea
来源
基金
新加坡国家研究基金会;
关键词
FHE; PUF; Secure Key Generation; SoC Virtual Platform;
D O I
10.3745/JIPS.01.0099
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the Internet -of -Things (IoT) or blockchain-based network systems, secure keys may be stored in individual devices; thus, individual devices should protect data by performing secure operations on the data transmitted and received over networks. Typically, secure functions, such as a physical unclonable function (PUF) and fully homomorphic encryption (FHE), are useful for generating safe keys and distributing data in a network. However, to provide these functions in embedded devices for IoT or blockchain systems, proper inspection is required for designing and implementing embedded system -on -chip (SoC) modules through overhead and performance analysis. In this paper, a virtual platform (SoC VP) was developed that includes a secure key generation module with a PUF and FHE. The SoC VP platform was implemented using SystemC, which enables the execution and verification of various aspects of the secure key generation module at the electronic system level and analyzes the system -level execution time, memory footprint, and performance, such as randomness and uniqueness. We experimentally verified the secure key generation module, and estimated the execution of the PUF key and FHE encryption based on the unit time of each module.
引用
收藏
页码:116 / 130
页数:15
相关论文
共 50 条
  • [1] Design and verification of Secure IoT Hub based on Virtual SoC Platform
    Varghese, Nelson Vithayathil
    Kim, Won Jong
    Kang, Shin Seok
    Lee, Hyo Seung
    2018 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2018, : 560 - 562
  • [2] Secure Key Generation and Distribution Protocol for Wearable Devices
    Revadigar, Girish
    Javali, Chitra
    Xu, Weitao
    Hu, Wen
    Jha, Sanjay
    2016 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATION WORKSHOPS (PERCOM WORKSHOPS), 2016,
  • [3] Ensuring Secure Application Execution and Platform-Specific Execution in Embedded Devices
    Lee, Robert P.
    Markantonakis, Konstantinos
    Akram, Raja Naeem
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2019, 18 (03)
  • [4] Secure Code Update for Embedded Devices via Proofs of Secure Erasure
    Perito, Daniele
    Tsudik, Gene
    COMPUTER SECURITY-ESORICS 2010, 2010, 6345 : 643 - 662
  • [5] Secure Elliptic Curve Generation and Key Establishment on a 802.11 WLAN Embedded Device
    Papaioannou, Panagiotis
    Nastou, Panagiotis
    Stamatiou, Yannis
    Zaroliagis, Christos
    ISADS 2009: 2009 INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2009, : 41 - +
  • [6] Embedded Platform Patterns for Distributed and Secure Logging
    Basic, Fikret
    Steger, Christian
    Kofler, Robert
    PROCEEDINGS OF THE EUROPEAN CONFERENCE ON PATTERN LANGUAGES OF PROGRAMS 2021, EUROPLOP 2021, 2021,
  • [7] Development of an Embedded Platform for Secure CPS Services
    Raes, Vincent
    Vossaert, Jan
    Naessens, Vincent
    COMPUTER SECURITY, 2017, 2018, 10683 : 19 - 34
  • [8] Efficient and Secure Fingerprint Verification for Embedded Devices
    Shenglin Yang
    Kazuo Sakiyama
    Ingrid Verbauwhede
    EURASIP Journal on Advances in Signal Processing, 2006
  • [9] Secure and Trusted Application Execution on Embedded Devices
    Markantonakis, Konstantinos
    Akram, Raja Naeem
    Msgna, Mehari G.
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, 2015, 9522 : 3 - 24
  • [10] Efficient and secure fingerprint verification for embedded devices
    Yang, Shenglin
    Sakiyama, Kazuo
    Verbauwhede, Ingrid
    EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2006, 2006 (1)