145 60

Security SoC Architecture with Hardware-Based Pre-Authentication

Title
Security SoC Architecture with Hardware-Based Pre-Authentication
Author
김동규
Keywords
Authentication protocol; Hardware security; Security SoC
Issue Date
2019-10
Publisher
JICAS
Citation
IDEC Journal of Integrated Circuits and Systems, v. 5, no. 4, Page. 18-22
Abstract
Edge Devices with limited power and processing performance need the help of hardware-based security solutions in order to provide sufficient security services. The hardwarebased security solutions have been proposed to separate hardware resources into the secure area and the normal area and determine whether accessible according to the secure mode of the processor. The solutions determine secure mode based on the importance of the application or to let the user decide. However, this makes it possible for unauthorized users to access the secure area when the device is stolen or replicated. To solve this problem, we propose a hardware-based pre-authentication protocol which determines if the edge device is a safe situation. The proposed pre-authentication protocol includes all the processes the chip producing, issuing, and using. SoC with the Core-A processor and pre-authentication module was implemented as a hardware chip, and it was confirmed that Core-A enters secure mode after succeeding in the preauthentication protocol.
URI
http://jicas1.idec.or.kr/upfiles/jicas_books/up73H5zc.pdfhttps://repository.hanyang.ac.kr/handle/20.500.11754/154674
Appears in Collections:
COLLEGE OF ENGINEERING[S](공과대학) > ELECTRONIC ENGINEERING(융합전자공학부) > Articles
Files in This Item:
Security SoC Architecture with Hardware-Based Pre-Authentication.pdfDownload
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE