[1]戴计生,王成杰,李 益,等.嵌入式控制软件保密性设计研究与应用[J].机车电传动,2018,(05):56-60.[doi:10.13890/j.issn.1000-128x.2018.05.013]
 DAI Jisheng,WANG Chengjie,LI Yi,et al.Research and Application of Embedded Control Software Security Design[J].Electric Drive for Locomotives,2018,(05):56-60.[doi:10.13890/j.issn.1000-128x.2018.05.013]
点击复制

嵌入式控制软件保密性设计研究与应用()
分享到:

机车电传动[ISSN:1000-128X/CN:43-1125/U]

卷:
期数:
2018年05期
页码:
56-60
栏目:
研究开发
出版日期:
2018-09-10

文章信息/Info

Title:
Research and Application of Embedded Control Software Security Design
文章编号:
1000-128X(2018)05-0056-05
作者:
戴计生1王成杰2李 益2陈俊波1李 程2
(1. 株洲中车时代电气股份有限公司,湖南 株洲 412001; 2. 中车株洲所电气技术与材料工程研究院,湖南 株洲 412001)
Author(s):
DAI Jisheng1 WANG Chengjie2 LI Yi2 CHEN Junbo1 LI Cheng2
( 1. Zhuzhou CRRC Times Electric Co., Ltd., Zhuzhou, Hunan 412001, China; 2. CRRC ZIC Research Institute of Electrical Technology and Material Engineering, Zhuzhou, Hunan 412001, China )
关键词:
加密安全认证嵌入式控制软件保密设计
Keywords:
encryption security authentication embedded control software security design
分类号:
TP311.5
DOI:
10.13890/j.issn.1000-128x.2018.05.013
文献标志码:
A
摘要:
分析了当前嵌入式控制软件所面临的主要安全威胁:克隆、反向工程、篡改,从安全认证芯片、程序加解密与完整性验证、安全处理器3 个方面,提出了针对嵌入式控制软件的保密设计策略及其安全性分析,设计了一种基于安全认证芯片、对称和非对称加密算法、安全密钥存储器的嵌入式控制软件保密应用解决方案,可实现对软件的机密性、完整性和抗否认性保护,为嵌入式控制软件保密性设计提供参考。
Abstract:
Security threats faced by embedded control software were analyzed: cloning, reverse engineering, and tampering. The embedded control software security design strategies and security analysis were presented from three aspects of security authentication chip, program encryption and decryption, integrity verification, and security processor. Finally, based on security authentication chip, symmetric and asymmetric encryption algorithm and embedded control softwarre for secure key memory, a security application solution was designed, which could protect the confidentiality, integrity and non-denied of the software. It has great reference value for the embedded controller design.

参考文献/References:

[1] GIORDANO P. 嵌入式系统“多大程度的安全才算安全”[J]. 电子产品世界,2009,16(8):52-54.
[2] 王沁. FPGA 设计安全性综述[J]. 小型微型计算机系统, 2010,7(7):1333-1337.
[3] MCEVOY R, TUNSTALL M, MURPHY C, et al. Differential power analysis of HMAC based on SHA-2, and countermeasures [C]// Information Security Applications, International Workshop, Wisa 2007. Jeju Island, Korea: DBLP, 2007:317-332.
[4] ZHOU X, TANG X. Research and implementation of RSA algorithm for encryption and decryption[C]// Proceedings of 2011 6th international forum on strategic technology. Harbin, Heilongjiang:IEEE, 2011: 1118-1121.
[5] DAEMEN J, RIJMEN V. The design of Rijndael:AES - the advanced encryption standard[M]. Berlin:Springer-Verlag Berlin and Heidelberg GmbH & Co, 2013.
[6] SOMANI U, LAKHANI K, MUNDRA M. Implementing digital signature with RSA encryption algorithm to enhance the Data security of cloud in cloud computing[C]//Parallel distributed and grid computing(PDGC), 2010 1st International conference on parallel distributed and grid computing. Solan, India:IEEE, 2010: 211-216.
[7] 韩煜. 嵌入式系统安全的密码算法及实现技术研究[D]. 武汉:华中科技大学,2008.
[8] CHRISTOPHE, TREMLET. 工业系统需要使用安全IC 增强保护[J]. 中国电子商情:基础电子,2013(3):22-26.
[9] Ma x im I n t e r g r a t e d , MAX32590-De e pCo v e r S e c u r e Microcontroller with ARM926EJ-S Processor Core[EB/OL]. (2016-10)[2017-08-22]. https://datasheets.maximintegrated. com/en/ds/MAX32590.pdf.
[10] Maxim Intergrated, DE28E15-DeepCover Secure Authenticator with 1-Wire SHA-256 and 512-Bit User EEPROM[EB/OL]. (2015-03)[2017-08-22]. https://datasheets.maximintegrated. com/en/ds/DS28E15.pdf.

备注/Memo

备注/Memo:
作者简介:戴计生(1983-),男,高级工程师,从事嵌入式控制软件和PHM 技术的研发工作。
更新日期/Last Update: 2018-09-10