• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

Computer Engineering & Science ›› 2022, Vol. 44 ›› Issue (03): 417-426.

• Computer Network and Znformation Security • Previous Articles     Next Articles

Comparison among embedded system security protection schemes and their application case analysis

CHEN Xiang-guo,SHANG Fan,SONG Jun-qiang   

  1. (College of Meteorology and Oceanology,National University of Defense Technology,Changsha 410073,China)
  • Received:2020-12-18 Revised:2021-03-16 Accepted:2022-03-25 Online:2022-03-25 Published:2022-03-24

Abstract: Due to the development of Internet of Things technology, the security protection of embedded systems has become a systemic problem that needs to be considered and tried to be solved urgently. A variety of embedded computer system security protection methods are compared, and ARM TrustZone security protection scheme is analyzed. The main differences between the two technologies (TrustZone-A and TrustZone-M) are analyzed, and the applicable scenarios and implementation characteristics of the two solutions are given. The implementation principle of the trusted startup process based on TrustZone technology is described, and the feasibility of the implementation of abnormal program detection based on the TrustZone-A monitoring mode code is discussed. Finally, combined with typical application scenarios, a security protection scheme based on TrustZone-M technology and an implementation example of a security communication protocol are designed and proposed.

Key words: embedded system, security protection, virtualization technology, TrustZone