TUHH Open Research
Help
  • Log In
    New user? Click here to register.Have you forgotten your password?
  • English
  • Deutsch
  • Communities & Collections
  • Publications
  • Research Data
  • People
  • Institutions
  • Projects
  • Statistics
  1. Home
  2. TUHH
  3. Publication References
  4. Performance of secure boot in embedded systems
 
Options

Performance of secure boot in embedded systems

Publikationstyp
Conference Paper
Date Issued
2019-05
Sprache
English
Author(s)
Profentzas, Christos  
Gunes, Mirac
Nikolakopoulos, Yiannis  
Landsiedel, Olaf  
Almgren, Magnus  
TORE-URI
https://hdl.handle.net/11420/53884
Start Page
198
End Page
204
Article Number
8804799
Citation
Proceedings - 15th Annual International Conference on Distributed Computing in Sensor Systems, DCOSS 2019: 8804799, 198-204
Contribution to Conference
15th Annual International Conference on Distributed Computing in Sensor Systems, DCOSS 2019  
Publisher DOI
10.1109/DCOSS.2019.00054
Scopus ID
2-s2.0-85071944341
ISBN
978-1-7281-0570-3
978-1-7281-0571-0
With the proliferation of the Internet of Things (IoT), the need to prioritize the overall system security is more imperative than ever. The IoT will profoundly change the established usage patterns of embedded systems, where devices traditionally operate in relative isolation. Internet connectivity brought by the IoT exposes such previously isolated internal device structures to cyber-attacks through the Internet, which opens new attack vectors and vulnerabilities. For example, a malicious user can modify the firmware or operating system by using a remote connection, aiming to deactivate standard defenses against malware. The criticality of applications, for example, in the Industrial IoT (IIoT) further underlines the need to ensure the integrity of the embedded software. One common approach to ensure system integrity is to verify the operating system and application software during the boot process. However, safety-critical IoT devices have constrained boot-up times, and home IoT devices should become available quickly after being turned on. Therefore, the boot-time can affect the usability of a device. This paper analyses performance trade-offs of secure boot for medium-scale embedded systems, such as Beaglebone and Raspberry Pi. We evaluate two secure boot techniques, one is only software-based, and the second is supported by a hardware-based cryptographic storage unit. For the software-based method, we show that secure boot merely increases the overall boot time by 4%. Moreover, the additional cryptographic hardware storage increases the boot-up time by 36%.
Subjects
Embedded Systems | Internet of Things | Secure Boot | System Security
DDC Class
600: Technology
TUHH
Weiterführende Links
  • Contact
  • Send Feedback
  • Cookie settings
  • Privacy policy
  • Impress
DSpace Software

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science
Design by effective webwork GmbH

  • Deutsche NationalbibliothekDeutsche Nationalbibliothek
  • ORCiD Member OrganizationORCiD Member Organization
  • DataCiteDataCite
  • Re3DataRe3Data
  • OpenDOAROpenDOAR
  • OpenAireOpenAire
  • BASE Bielefeld Academic Search EngineBASE Bielefeld Academic Search Engine
Feedback