Download Trusted embedded System Operating System (TeSOS)
Transcript
• Memory performance (access speed of volatile storage and caches) • Processor speed for operations such as hashing, encryption, or decryption • Availability of cryptographic co-processors • Network performance • Storage performance (speed of persistent storage such as Electrically Erasable Programmable Read-Only Memory (EEPROM)) 5.1.4 Security Extensions Very often, hardware-based security extensions provide a higher degree of security than security mechanisms only based on software. Moreover, hardware-based security extensions are often more ecient in terms of speed and resource consumption. Therefore, it is analysed, whether the hardware platforms provide hardware-based security extensions, such as: Security domains / Isolation: Security domains are used to segment existing IT infrastruc- ture into logical zones with a common trust level. A security domain could be an isolated subset of a network or hardware/software system combined with the computing resources attached to that subset. Isolation is provided through software or hardware conguration (e.g., Virtual Local Area Networks (VLANs)), internal rewalls, or virtualisation. The level of security results from implementation of the policies, processes, and security technology deployed within a domain, as well as the isolation boundary that denes the domain edges. The most important techniques that help to secure WSNs are listed below: • Virtual address spaces • TrustZone (see Section 5.2.1) • Protection Rings • Other realisations of security domains Secure or authenticated boot: As described in Section 4.2.2, secure or authenticated boot gives the possibility to ensure that a platform only loads allowed components during bootstrapping. We focus on the the following techniques, to ensure the unchanged software state of a sensor node. • Texas-Instruments M-Shield: M-Shield is a security extension [JA] designed by Texas Instruments to provide a high-security solution inside mobile platforms. Key benets of M-Shield are on-chip cryptographic keys, secure execution environment, secure storage, secure chip-interconnects, Standard API to connect with TrustZone, Tampering detection, and high-performance hardware-based cryptographic accelerators. • TPM: A hardware device, protected against manipulation and designated for opt-in usage, providing protected capabilities and shielded locations. The Trusted Platform Module (TPM) is a passive component and contains engines for random number generation, calculation of hash values and RSA key generation. A TPM generates and stores keys, signs or binds data to the platform and provides secure storage of measurement information of the platform's current state. The TPM is available in two versions: The new version 1.2 specied in [TCG05a] and the deprecated version 1.1b specied in [TCG02] 42