Security SoC Architecture with Hardware-Based Pre-AuthenticationSecurity SoC Architecture with Hardware-Based Pre-Authentication
- Other Titles
- Security SoC Architecture with Hardware-Based Pre-Authentication
- Authors
- 공원배; 최필주; Kim, Dong Kyue
- Issue Date
- 2019
- Publisher
- 한국과학기술원 반도체설계교육센터
- Keywords
- Authentication protocol; Hardware security; Security SoC
- Citation
- IDEC Journal of Integrated Circuits and Systems, v.5, no.4, pp.17 - 22
- Journal Title
- IDEC Journal of Integrated Circuits and Systems
- Volume
- 5
- Number
- 4
- Start Page
- 17
- End Page
- 22
- URI
- https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/15185
- Abstract
- Edge Devices with limited power and processing performance need the help of hardware-based security solutions in order to provide sufficient security services. The hardware-based security solutions have been proposed to separate hardware resources into the secure area and the normal area and determine whether accessible according to the secure mode of the processor. The solutions determine secure mode based on the importance of the application or to let the user decide. However, this makes it possible for unauthorized users to access the secure area when the device is stolen or replicated. To solve this problem, we propose a hardware-based pre-authentication protocol which determines if the edge device is a safe situation. The proposed pre-authentication protocol includes all the processes the chip producing, issuing, and using. SoC with the Core-A processor and pre-authentication module was implemented as a hardware chip, and it was confirmed that Core-A enters secure mode after succeeding in the pre-authentication protocol.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - 서울 공과대학 > 서울 융합전자공학부 > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.