使用TrustZone保护物联网设备架构

Takayuki Sasaki, Koki Tomita, Yuto Hayaki, Seng Pei Liew, Norio Yamagaki
{"title":"使用TrustZone保护物联网设备架构","authors":"Takayuki Sasaki, Koki Tomita, Yuto Hayaki, Seng Pei Liew, Norio Yamagaki","doi":"10.1109/SECONWorkshops50264.2020.9149772","DOIUrl":null,"url":null,"abstract":"IoT realizes efficient system such as smart cities, smart factories, and smart agriculture. However, there are risks of cyber attacks against the IoT with the potential to cause serious damage. To protect the IoT systems, protection of the entire system including end-point IoT devices is essential. However, existing software-based protection is insufficient against recent sophisticated attackers who disable or bypass security mechanisms. In this paper, to ensure correct operations of security mechanisms, we propose a secure IoT device architecture using TrustZone. A monitoring engine can be protected from attacks by deploying the engine in a secure world which is isolated from a non-secure. Here, a problem is that each secure and non-secure world has its own virtual memory and OS, thus the monitoring engine in the secure world cannot directly monitor software in the non-secure world. To cope with the semantic gap between the non-secure world and the secure world, the proposed architecture has two monitoring engines: a monitoring engine in the non-secure world for measuring software in the non-secure world and a monitoring engine in secure world for attesting the engine in non-secure world. Moreover, we implement the architecture and show the proposed architecture is feasible on the basis of its evaluation results.","PeriodicalId":341927,"journal":{"name":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Secure IoT Device Architecture Using TrustZone\",\"authors\":\"Takayuki Sasaki, Koki Tomita, Yuto Hayaki, Seng Pei Liew, Norio Yamagaki\",\"doi\":\"10.1109/SECONWorkshops50264.2020.9149772\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"IoT realizes efficient system such as smart cities, smart factories, and smart agriculture. However, there are risks of cyber attacks against the IoT with the potential to cause serious damage. To protect the IoT systems, protection of the entire system including end-point IoT devices is essential. However, existing software-based protection is insufficient against recent sophisticated attackers who disable or bypass security mechanisms. In this paper, to ensure correct operations of security mechanisms, we propose a secure IoT device architecture using TrustZone. A monitoring engine can be protected from attacks by deploying the engine in a secure world which is isolated from a non-secure. Here, a problem is that each secure and non-secure world has its own virtual memory and OS, thus the monitoring engine in the secure world cannot directly monitor software in the non-secure world. To cope with the semantic gap between the non-secure world and the secure world, the proposed architecture has two monitoring engines: a monitoring engine in the non-secure world for measuring software in the non-secure world and a monitoring engine in secure world for attesting the engine in non-secure world. Moreover, we implement the architecture and show the proposed architecture is feasible on the basis of its evaluation results.\",\"PeriodicalId\":341927,\"journal\":{\"name\":\"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECONWorkshops50264.2020.9149772\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECONWorkshops50264.2020.9149772","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

物联网实现智慧城市、智慧工厂、智慧农业等高效系统。然而,物联网存在网络攻击的风险,有可能造成严重损害。为了保护物联网系统,保护包括端点物联网设备在内的整个系统至关重要。然而,现有的基于软件的保护不足以抵御最近禁用或绕过安全机制的复杂攻击者。为了确保安全机制的正确运行,本文提出了一种使用TrustZone的安全物联网设备架构。通过将监视引擎部署在与非安全环境隔离的安全环境中,可以保护监视引擎免受攻击。这里的一个问题是,每个安全和非安全世界都有自己的虚拟内存和操作系统,因此安全世界中的监控引擎无法直接监控非安全世界中的软件。为了解决非安全世界和安全世界之间的语义差距,提出的体系结构有两个监控引擎:用于测量非安全世界中的软件的非安全世界中的监控引擎和用于证明非安全世界中的引擎的安全世界中的监控引擎。最后对该体系结构进行了实现,并根据评估结果证明了该体系结构的可行性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Secure IoT Device Architecture Using TrustZone
IoT realizes efficient system such as smart cities, smart factories, and smart agriculture. However, there are risks of cyber attacks against the IoT with the potential to cause serious damage. To protect the IoT systems, protection of the entire system including end-point IoT devices is essential. However, existing software-based protection is insufficient against recent sophisticated attackers who disable or bypass security mechanisms. In this paper, to ensure correct operations of security mechanisms, we propose a secure IoT device architecture using TrustZone. A monitoring engine can be protected from attacks by deploying the engine in a secure world which is isolated from a non-secure. Here, a problem is that each secure and non-secure world has its own virtual memory and OS, thus the monitoring engine in the secure world cannot directly monitor software in the non-secure world. To cope with the semantic gap between the non-secure world and the secure world, the proposed architecture has two monitoring engines: a monitoring engine in the non-secure world for measuring software in the non-secure world and a monitoring engine in secure world for attesting the engine in non-secure world. Moreover, we implement the architecture and show the proposed architecture is feasible on the basis of its evaluation results.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信