STBEAT: Software Update on Trusted Environment Based on ARM TrustZone
Qi-Xian Huang,
Min-Yi Chiu,
Chi-Shen Yeh and
Hung-Min Sun ()
Additional contact information
Qi-Xian Huang: Institute of Information Systems and Applications, National Tsing Hua University, Hsinchu 300, Taiwan
Min-Yi Chiu: Institute of Information Systems and Applications, National Tsing Hua University, Hsinchu 300, Taiwan
Chi-Shen Yeh: Institute of Information Security, National Tsing Hua University, Hsinchu 300, Taiwan
Hung-Min Sun: Department of Computer Science, National Tsing Hua University, Hsinchu 300, Taiwan
Sustainability, 2022, vol. 14, issue 20, 1-20
Abstract:
In recent years, since edge computing has become more and more popular, its security issues have become apparent and have received unprecedented attention. Thus, the current research concentrates on security not only regarding devices such as PCs, smartphones, tablets, and IoTs, but also the automobile industry. However, since attack vectors have become more sophisticated than ever, we cannot just protect the zone above the system software layer in a certain operating system, such as Linux, for example. In addition, the challenges in IoT devices, such as power consumption, performance efficiency, and authentication management, still need to be solved. Since most IoT devices are controlled remotely, the security regarding system maintenance and upgrades has become a big issue. Therefore, a mechanism that can maintain IoT devices within a trusted environment based on localhost or over-the-air (OTA) will be a viable solution. We propose a mechanism called STBEAT, integrating an open-source project with ARM TrustZone to solve the challenges of upgrading the IoT system and updating system files more safely. This paper focuses on the ARMv7 architecture and utilizes the security stack from TrustZone to OP-TEE under the STM32 board package, and finally obtains the security key from the trusted application, which is used to conduct the cryptographic operations and then install the newer image on the MMC interface. To sum up, we propose a novel software update strategy and integrated ARM TrustZone security extension to beef up the embedded ecosystem.
Keywords: ARM TrustZone security; access control; data security; embedded software; embedded system; STM32 (search for similar items in EconPapers)
JEL-codes: O13 Q Q0 Q2 Q3 Q5 Q56 (search for similar items in EconPapers)
Date: 2022
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/2071-1050/14/20/13660/pdf (application/pdf)
https://www.mdpi.com/2071-1050/14/20/13660/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jsusta:v:14:y:2022:i:20:p:13660-:d:949649
Access Statistics for this article
Sustainability is currently edited by Ms. Alexandra Wu
More articles in Sustainability from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().