Computer Science ›› 2021, Vol. 48 ›› Issue (11A): 552-556.doi: 10.11896/jsjkx.210300237

• Information Security • Previous Articles     Next Articles

Analysis and Application of Secure Boot Algorithm Based on IOT Chip

ZONG Si-jie, QIN Tian, HE Long-bing   

  1. School of Microelectronics,Southeast University,Nanjing 210096,China
  • Online:2021-11-10 Published:2021-11-12
  • About author:ZONG Si-jie,born in 1997,postgra-duate.Her main research interests include embedded software and so on.
    HE Long-bing,born in 1982,Ph.D,associate professor.His main research interests include microelectronics and solid-state electronics.
  • Supported by:
    Aeronautical Science Foundation of China(ASFC-20170269003).

Abstract: RSA and ECC are currently standard public key encryption algorithm in IOT chips.By comparing the performance and security between RSA and ECC algorithms,ECC is found to be more suitable for IOT applications.A secure driver program is proposed as the solution of the secure startup of IOT chips.Experimental verification based on IOT chips demonstrates that ECC algorithm possesses several advantages including lower cost,higher performance,and better security.This paper provides a solution for the security development of the Internet of Things.

Key words: Elliptic curve cryptography, IOT security, RSA, Startup

CLC Number: 

  • TP309
[1]COLUMBUS L.2018 roundup of Internet of Things forecastsand marketestimates[EB/OL].https://www.forbes.com/sites/louiscolumbus/2018/12/13/2018-roundup-of-internet-of-things-forecasts-and-market-estimates/#428d6ab27d83,2018.
[2]COLUMBUS L.Roundup of Internet of Things forecasts and market estimates[EB/OL].https://www.forbes.com/sites/louiscolumbus/2016/11/27/roundup-of-internet-of-things-forecasts-and-market-estimates-2016/#27232e3d292d,2016.
[3]ZHOU H L,LQUO X H,FENG X S.Thematic analysis on security issues of the Internet of Things [J].Computer Knowledge and Technology,2019,15(12):17-18.
[4]BI R,LI X G,JIANG J.Internet of Things security incident cases and problem analysis [J].Telecommunications Network Technology,2014(12):10-13.
[5]YAN Z,ZHANG P,VASILAKOS A V.A survey on trust management for Internet of Things[J].Journal of Network & Computer Applications,2014,42(3):120-134.
[6]PETROULAKIS N E,TRAGOS E Z,FRAGKIADAKIS A G,et al.A lightweight framework for secure life-logging in smart environments[J].Information Security Tech.Report,2013,17(3):58-70.
[7]DI R,SALLERAS X,SIGNORINI M,et al.A blockchain-based Trust System for the Internet of Things[C]//ACM SACMAT 2018.ACM,2018.
[8]BYUNG-YOON S.A Public-key Cryptography Processor sup-porting P-224 ECC and 2048-bit RSA[J].Journal of IKEEE,2018,22(3):522-531.
[9]KOBLITZ N.Elliptic Curve Cryptosystem[J].Mathematics ofComputation,1987,47(177):203-209.
[10]BAO F,CHEN I R.Trust management for the internet of things and its application to service composition[C]//World of Wireless,Mobile & Multimedia Networks.IEEE,2012.
[1] LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao. Collaborative Multicast Proactive Caching Scheme Based on AAE [J]. Computer Science, 2022, 49(9): 260-267.
[2] ZHANG Jia, DONG Shou-bin. Cross-domain Recommendation Based on Review Aspect-level User Preference Transfer [J]. Computer Science, 2022, 49(9): 41-47.
[3] CAO Xiao-wen, LIANG Mei-yu, LU Kang-kang. Fine-grained Semantic Reasoning Based Cross-media Dual-way Adversarial Hashing Learning Model [J]. Computer Science, 2022, 49(9): 123-131.
[4] HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329.
[5] SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177.
[6] YUAN Wei-lin, LUO Jun-ren, LU Li-na, CHEN Jia-xing, ZHANG Wan-peng, CHEN Jing. Methods in Adversarial Intelligent Game:A Holistic Comparative Analysis from Perspective of Game Theory and Reinforcement Learning [J]. Computer Science, 2022, 49(8): 191-204.
[7] DAI Zhao-xia, LI Jin-xin, ZHANG Xiang-dong, XU Xu, MEI Lin, ZHANG Liang. Super-resolution Reconstruction of MRI Based on DNGAN [J]. Computer Science, 2022, 49(7): 113-119.
[8] WU Zi-bin, YAN Qiao. Projected Gradient Descent Algorithm with Momentum [J]. Computer Science, 2022, 49(6A): 178-183.
[9] XU Guo-ning, CHEN Yi-peng, CHEN Yi-ming, CHEN Jin-yin, WEN Hao. Data Debiasing Method Based on Constrained Optimized Generative Adversarial Networks [J]. Computer Science, 2022, 49(6A): 184-190.
[10] YIN Xiu, LIU Xi-lin, LIU Xi-yu. Study on Computing Capacity of Novel Numerical Spiking Neural P Systems with MultipleSynaptic Channels [J]. Computer Science, 2022, 49(6A): 223-231.
[11] YAN Meng, LIN Ying, NIE Zhi-shen, CAO Yi-fan, PI Huan, ZHANG Lan. Training Method to Improve Robustness of Federated Learning [J]. Computer Science, 2022, 49(6A): 496-501.
[12] YIN Wen-bing, GAO Ge, ZENG Bang, WANG Xiao, CHEN Yi. Speech Enhancement Based on Time-Frequency Domain GAN [J]. Computer Science, 2022, 49(6): 187-192.
[13] XU Hui, KANG Jin-meng, ZHANG Jia-wan. Digital Mural Inpainting Method Based on Feature Perception [J]. Computer Science, 2022, 49(6): 217-223.
[14] LUO Jun-ren, ZHANG Wan-peng, LU Li-na, CHEN Jing. Survey on Online Adversarial Planning for Real-time Strategy Game [J]. Computer Science, 2022, 49(6): 287-296.
[15] GAO Zhi-yu, WANG Tian-jing, WANG Yue, SHEN Hang, BAI Guang-wei. Traffic Prediction Method for 5G Network Based on Generative Adversarial Network [J]. Computer Science, 2022, 49(4): 321-328.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!