Skip to main content

2019 | OriginalPaper | Buchkapitel

An Approach of Implementing SW-TPM in Real-Time Operating System

verfasst von : Mingdi Xu, Xueyuan Gao, Fan Zhang

Erschienen in: Trusted Computing and Information Security

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Virus, trojan and malware on embedded systems have brought significant effect for the information security of the industrial control systems (ICS). ICS as the national core infrastructure, the security affects the national economy and livelihood of all people. Trusted computing technology (TCT) is a technology developed and promoted by the trusted computing group (TCG). At present, TCT has been applied to the general systems, such as multitasking and distributed systems. However, it is necessary to verify the feasibility of applying TCT to the specific systems with high real-time requirements. This paper implements a trusted real-time operating system (tRTOS) based on Preempt-rt, which turns the original linux kernel into a fully pre-emptible kernel. The soft-ware trusted platform module (SW-TPM) is built in the kernel mode to provide trusted computing services. After that, the schedule policy and priority of tpmd, which is the daemon of SW-TPM, have been adjusted. In this approach, tpmd may not be pre-empted while running. It means that, SW-TPM can provide services of encryption, attestation at real-time, which can meet the requirements of RTOS in embedded systems. This paper has measured the execution time of several TPM commands in the tRTOS and a contrast system. A comparative test is carried out between tRTOS and a non-real-time system. The result shows that, the average execution time of TPM commands in the tRTOS is reduced by 15.3% without system interference, and 32.7% with system interference.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Mattei, T.A.: Privacy, confidentiality, and security of health care information: lessons from the recent WannaCry cyber attack. World Neurosurg. 104, 972–974 (2017)CrossRef Mattei, T.A.: Privacy, confidentiality, and security of health care information: lessons from the recent WannaCry cyber attack. World Neurosurg. 104, 972–974 (2017)CrossRef
2.
Zurück zum Zitat Wang, Y., Wang, Y., Zhang, L.: Analysis and defense of the BlackEnergy malware in the Ukrainian electric power system. Chin. J. Netw. Inf. Secur. 1, 46–53 (2017) Wang, Y., Wang, Y., Zhang, L.: Analysis and defense of the BlackEnergy malware in the Ukrainian electric power system. Chin. J. Netw. Inf. Secur. 1, 46–53 (2017)
3.
Zurück zum Zitat Sun, Y., Jing, K., Wang, Y.: A network security protection research for industrial control system. J. Inf. Secur. Res. 3(2), 171–176 (2017) Sun, Y., Jing, K., Wang, Y.: A network security protection research for industrial control system. J. Inf. Secur. Res. 3(2), 171–176 (2017)
5.
Zurück zum Zitat Khalid, O., Rolfes, C., Ibing, A.: On implementing trusted boot for embedded systems. In: IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 75–80 (2013) Khalid, O., Rolfes, C., Ibing, A.: On implementing trusted boot for embedded systems. In: IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 75–80 (2013)
7.
Zurück zum Zitat Johannes, W.: Trusted computing building blocks for embedded linux-based ARM trustzone platforms. In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing. ACM Press, Fairfax (2008) Johannes, W.: Trusted computing building blocks for embedded linux-based ARM trustzone platforms. In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing. ACM Press, Fairfax (2008)
8.
Zurück zum Zitat Lucas, D., Alexandra, D., Christoph, K.: Trusted virtual domains on OKL4: secure information sharing on smartphones. In: Proceedings of the 6th ACM Workshop on Scalable Trusted Computing. ACM Press, Chicago (2011) Lucas, D., Alexandra, D., Christoph, K.: Trusted virtual domains on OKL4: secure information sharing on smartphones. In: Proceedings of the 6th ACM Workshop on Scalable Trusted Computing. ACM Press, Chicago (2011)
9.
Zurück zum Zitat Aaraj, N., Raghunathan, A., Jha, N.K.: Analysis and design of a hardware/software trusted platform module for embedded systems. ACM Trans. Embed. Comput. Syst. 8(1), 1–31 (2008)CrossRef Aaraj, N., Raghunathan, A., Jha, N.K.: Analysis and design of a hardware/software trusted platform module for embedded systems. ACM Trans. Embed. Comput. Syst. 8(1), 1–31 (2008)CrossRef
10.
Zurück zum Zitat Xu, M., Yang, L.: Research on trusted computing technology in embedded real-time operation system. Comput. Eng. 40(1), 130–133 (2014) Xu, M., Yang, L.: Research on trusted computing technology in embedded real-time operation system. Comput. Eng. 40(1), 130–133 (2014)
11.
Zurück zum Zitat Litayem, N., Ben Saoud, S.: Impact of the linux real-time enhancements on the system performances for multi-core intel architectures. Int. J. Comput. Appl. 17(3), 17–23 (2011) Litayem, N., Ben Saoud, S.: Impact of the linux real-time enhancements on the system performances for multi-core intel architectures. Int. J. Comput. Appl. 17(3), 17–23 (2011)
12.
Zurück zum Zitat Fayyad-Kazan, H., Perneel, L., Timmerman, M.: Linux Preempt-rt v2.6.33 versus v3.6.6: better or worse for real-time applications? ACM SIGBED Rev. 11(1), 26–31 (2014)CrossRef Fayyad-Kazan, H., Perneel, L., Timmerman, M.: Linux Preempt-rt v2.6.33 versus v3.6.6: better or worse for real-time applications? ACM SIGBED Rev. 11(1), 26–31 (2014)CrossRef
13.
Zurück zum Zitat Berger, S., Caceres, R.A., Goldman, K.: vTPM: virtualizing the trusted platform module. In: Conference on USENIX Security Symposium BC Canada, pp. 305–320. USENIX Association, Berkeley (2006) Berger, S., Caceres, R.A., Goldman, K.: vTPM: virtualizing the trusted platform module. In: Conference on USENIX Security Symposium BC Canada, pp. 305–320. USENIX Association, Berkeley (2006)
14.
Zurück zum Zitat Gleixner, T., Niehaus, D.: Hrtimers and beyond: transforming the linux time subsystems. In: Proceeding of the Linux Symposium, Ottawa, Ontario (2006) Gleixner, T., Niehaus, D.: Hrtimers and beyond: transforming the linux time subsystems. In: Proceeding of the Linux Symposium, Ottawa, Ontario (2006)
16.
Zurück zum Zitat Koolwal, K.: Myths and realities of real-time linux software systems. In: Proceedings of Eleventh Real-Time Linux Workshop, pp. 13–18 (2009) Koolwal, K.: Myths and realities of real-time linux software systems. In: Proceedings of Eleventh Real-Time Linux Workshop, pp. 13–18 (2009)
17.
Zurück zum Zitat Hall, C.E.J.: A real-time linux system for autonomous navigation and flight attitude control of an uninhabited aerial vehicle. In: Digital Avionics Systems, DASC Conference, vol. 1, pp. 1A1/1–1A1/9 (2001) Hall, C.E.J.: A real-time linux system for autonomous navigation and flight attitude control of an uninhabited aerial vehicle. In: Digital Avionics Systems, DASC Conference, vol. 1, pp. 1A1/1–1A1/9 (2001)
18.
Zurück zum Zitat Srinivasan, B., Hill, R., Pather, S.: KURT-linux support for synchronous fine-grain distributed computations. In: IEEE Real-Time Technology & Applications Symposium, pp. 78–81 (2000) Srinivasan, B., Hill, R., Pather, S.: KURT-linux support for synchronous fine-grain distributed computations. In: IEEE Real-Time Technology & Applications Symposium, pp. 78–81 (2000)
19.
Zurück zum Zitat Lin, K.J., Wang, Y.C.: The design and implementation of real-time schedulers in RED-linux. Proc. IEEE 91(7), 1114–1130 (2003)CrossRef Lin, K.J., Wang, Y.C.: The design and implementation of real-time schedulers in RED-linux. Proc. IEEE 91(7), 1114–1130 (2003)CrossRef
Metadaten
Titel
An Approach of Implementing SW-TPM in Real-Time Operating System
verfasst von
Mingdi Xu
Xueyuan Gao
Fan Zhang
Copyright-Jahr
2019
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-5913-2_7