计算机科学 ›› 2021, Vol. 48 ›› Issue (11A): 552-556.doi: 10.11896/jsjkx.210300237

• 信息安全 • 上一篇    下一篇

面向IOT芯片的安全启动算法分析与应用

宗思洁, 覃天, 贺龙兵   

  1. 东南大学微电子学院 南京210096
  • 出版日期:2021-11-10 发布日期:2021-11-12
  • 通讯作者: 贺龙兵(heloongbing@seu.edu.cn)
  • 作者简介:220184855@seu.edu.cn
  • 基金资助:
    航空科学基金项目(ASFC-20170269003)

Analysis and Application of Secure Boot Algorithm Based on IOT Chip

ZONG Si-jie, QIN Tian, HE Long-bing   

  1. School of Microelectronics,Southeast University,Nanjing 210096,China
  • Online:2021-11-10 Published:2021-11-12
  • About author:ZONG Si-jie,born in 1997,postgra-duate.Her main research interests include embedded software and so on.
    HE Long-bing,born in 1982,Ph.D,associate professor.His main research interests include microelectronics and solid-state electronics.
  • Supported by:
    Aeronautical Science Foundation of China(ASFC-20170269003).

摘要: RSA和ECC算法是目前应用于IOT(物联网)邻域的公钥加密算法标准。文中通过对比RSA和ECC算法的性能及安全性,优选ECC算法作为IOT应用的安全启动算法,提出了应用于IOT芯片启动的安全驱动解决方案。通过在IOT芯片上进行启动验证,结果表明,ECC算法可以应用于IOT芯片的启动,同时成本、性能、安全性表现更优。文中所研究的内容为物联网安全提供了解决方案。

关键词: RSA算法, 椭圆加密算法, 物联网安全, 系统启动

Abstract: RSA and ECC are currently standard public key encryption algorithm in IOT chips.By comparing the performance and security between RSA and ECC algorithms,ECC is found to be more suitable for IOT applications.A secure driver program is proposed as the solution of the secure startup of IOT chips.Experimental verification based on IOT chips demonstrates that ECC algorithm possesses several advantages including lower cost,higher performance,and better security.This paper provides a solution for the security development of the Internet of Things.

Key words: Elliptic curve cryptography, IOT security, RSA, Startup

中图分类号: 

  • TP309
[1]COLUMBUS L.2018 roundup of Internet of Things forecastsand marketestimates[EB/OL].https://www.forbes.com/sites/louiscolumbus/2018/12/13/2018-roundup-of-internet-of-things-forecasts-and-market-estimates/#428d6ab27d83,2018.
[2]COLUMBUS L.Roundup of Internet of Things forecasts and market estimates[EB/OL].https://www.forbes.com/sites/louiscolumbus/2016/11/27/roundup-of-internet-of-things-forecasts-and-market-estimates-2016/#27232e3d292d,2016.
[3]ZHOU H L,LQUO X H,FENG X S.Thematic analysis on security issues of the Internet of Things [J].Computer Knowledge and Technology,2019,15(12):17-18.
[4]BI R,LI X G,JIANG J.Internet of Things security incident cases and problem analysis [J].Telecommunications Network Technology,2014(12):10-13.
[5]YAN Z,ZHANG P,VASILAKOS A V.A survey on trust management for Internet of Things[J].Journal of Network & Computer Applications,2014,42(3):120-134.
[6]PETROULAKIS N E,TRAGOS E Z,FRAGKIADAKIS A G,et al.A lightweight framework for secure life-logging in smart environments[J].Information Security Tech.Report,2013,17(3):58-70.
[7]DI R,SALLERAS X,SIGNORINI M,et al.A blockchain-based Trust System for the Internet of Things[C]//ACM SACMAT 2018.ACM,2018.
[8]BYUNG-YOON S.A Public-key Cryptography Processor sup-porting P-224 ECC and 2048-bit RSA[J].Journal of IKEEE,2018,22(3):522-531.
[9]KOBLITZ N.Elliptic Curve Cryptosystem[J].Mathematics ofComputation,1987,47(177):203-209.
[10]BAO F,CHEN I R.Trust management for the internet of things and its application to service composition[C]//World of Wireless,Mobile & Multimedia Networks.IEEE,2012.
[1] 陈珂 苗付友 熊焰.
基于RSA的代理环签名方案

计算机科学, 2009, 36(2): 132-136.
[2] 李平,卢正鼎,邹复好,凌贺飞.
一个面向家庭网络的数字版权管理系统
Home Networks-oriented Digital Rights Management System
计算机科学, 2009, 36(11): 116-119.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!