Research on Technology of Embedded System Security Protection Component
Title | Research on Technology of Embedded System Security Protection Component |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Liu, W., Niu, H., Luo, W., Deng, W., Wu, H., Dai, S., Qiao, Z., Feng, W. |
Conference Name | 2020 IEEE International Conference on Advances in Electrical Engineering and Computer Applications( AEECA) |
Date Published | Aug. 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-6521-9 |
Keywords | composability, computer network management, computer network performance evaluation, computer network reliability, computer network security, Computers, cryptographic algorithm, cryptography, embedded security protection system, embedded system security protection, Embedded systems, graphical management interface, Internet of Things, Internet of Things development, IoT devices, Kernel, log management, Metrics, pubcrawl, Qt graphical management interface, resilience, Resiliency, security management, security management system, security policy management, TCP/IP protocol, TCPIP, transport protocols, Trusted Computing, trusted computing technology, whitelist management, whitelist-based security protection |
Abstract | With the development of the Internet of Things (IoT), it has been widely deployed. As many embedded devices are connected to the network and massive amounts of security-sensitive data are stored in these devices, embedded devices in IoT have become the target of attackers. The trusted computing is a key technology to guarantee the security and trustworthiness of devices' execution environment. This paper focuses on security problems on IoT devices, and proposes a security architecture for IoT devices based on the trusted computing technology. This paper implements a security management system for IoT devices, which can perform integrity measurement, real-time monitoring and security management for embedded applications, providing a safe and reliable execution environment and whitelist-based security protection for IoT devices. This paper also designs and implements an embedded security protection system based on trusted computing technology, containing a measurement and control component in the kernel and a remote graphical management interface for administrators. The kernel layer enforces the integrity measurement and control of the embedded application on the device. The graphical management interface communicates with the remote embedded device through the TCP/IP protocol, and provides a feature-rich and user-friendly interaction interface. It implements functions such as knowledge base scanning, whitelist management, log management, security policy management, and cryptographic algorithm performance testing. |
URL | https://ieeexplore.ieee.org/document/9213603 |
DOI | 10.1109/AEECA49918.2020.9213603 |
Citation Key | liu_research_2020 |
- log management
- whitelist-based security protection
- whitelist management
- trusted computing technology
- Trusted Computing
- transport protocols
- TCPIP
- TCP/IP protocol
- security policy management
- security management system
- security management
- Resiliency
- resilience
- Qt graphical management interface
- pubcrawl
- Metrics
- composability
- Kernel
- IoT devices
- Internet of Things development
- Internet of Things
- graphical management interface
- embedded systems
- embedded system security protection
- embedded security protection system
- Cryptography
- cryptographic algorithm
- Computers
- computer network security
- computer network reliability
- computer network performance evaluation
- computer network management