Hardware Security Module Cryptosystem Using Petri Net

Billel Guechi, Mohammed Redjimi

Abstract


An embedded system is a combination of hardware and software designed to perform specific functions. It consists of SoCs (system on chip) that it relies on to do its computing work. A key feature of an embedded system is that it consumes less power and components occupy less space on the IC (integrated circuit) thus, the use of SoCs. Embedded system manufacturers get these SoCs from third-party companies to reduce their time to market. That would increase the possibility of the systems to be compromised. In this paper, we present a novel approach to securing such critical systems. For that, we made a Hardware Security Module (HSM), which consists of secure SoC with encrypt/decrypt engine that use Petri net for algorithm modulation to secure data flow. We ensure that the system uses genuine firmware and data is secured since we use encrypt/decrypt algorithms only known to manufacturers.

Keywords


Secure SoC; HSM;Time to market; Petri net; Encryption/Decryption System

References


Y. Zhang, "A Systematic Security Design Approach for Heterogeneous Embedded Systems," 2021 IEEE 10th Global Conference on Consumer Electronics (GCCE), pp. 500-502, 2021.

J. Rajendran, A. M. Dhandayuthapany, V. Vedula and R. Karri, "Formal Security Verification of Third Party Intellectual Property Cores for Information Leakage," 2016 29th International Conference on VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID), pp. 547-552, 2016.

B. Guechi, & M. Redjimi, "Hardware Trojan Detection in Heterogeneous Systems on Chip". In Innovations in Smart Cities Applications Volume 4: The Proceedings of the 5th International Conference on Smart City Applications (pp. 1105-1116). Springer International Publishing, 2021.

C. Lesjak, H. Bock, D. Hein and M. Maritsch, "Hardware-secured and transparent multi-stakeholder data exchange for industrial IoT," 2016 IEEE 14th International Conference on Industrial Informatics (INDIN), pp. 706-713, 2016.

R. Kloibhofer, E. kristen and L. Davoli "LoRaWAN with HSM as a security improvement for agriculture applications." In: International Conference on Computer Safety, Reliability, and Security. Springer, Cham, pp. 176-188, 2020.

M. Canim, M. Kantarcioglu and B. Malin, "Secure Management of Biomedical Data With Cryptographic Hardware," in IEEE Transactions on Information Technology in Biomedicine, vol. 16, no.1,pp. 166-175,2012.

M. Lorch, J. Basney and D. Kafura, "A hardware-secured credential repository for Grid PKIs," IEEE International Symposium on Cluster Computing and the Grid, pp. 640-647, 2004.

R. Abdulwahid Albeer, H. A. Lafta, and H. Karim, "Key Stream Cipher Based on Coloured Petri Nets" in The 9th International Conference on Applied Science and Technology (ICAST 2021),pp. 1-8,2022.

M.I. Mary Metilda, D. Lalitha, S. Vaithyasubramanian,"Password generation using array generating interval timed colored Petri net (AGITCPN) for effective security" Theoretical Computer Science,Vol. 929,pp. 114-123,2022.

M. Malenko, L. B. Ribeiro, and M. Baunach. "Improving security and maintainability in modular embedded systems with hardware support: work-in-progress". In Proceedings of the 2021 International Conference on Hardware/Software Codesign and System Synthesis (CODES/ISSS '21). Association for Computing Machinery, New York, NY, USA, pp. 35–36, 2021.

J. Haj-Yahya, M. M. Wong, V. Pudi, S. Bhasin and A. Chattopadhyay, "Lightweight Secure-Boot Architecture for RISC-V System-on-Chip," 20th International Symposium on Quality Electronic Design (ISQED), pp. 216-223, 2019.

A. Rodrigues, J. C. Resende and R. chaves. "SmartFusion2 SoC as a Security Module for the IoT world". In 19th ACM International Conference on Computing Frontiers (CF’22), Torino, Italy, pp.1-9, 2022.

N. Zupan, P. Kasinathan, J. Cuellar, and M. Sauer, "Secure Smart Contract Generation Based on Petri Nets," in Blockchain Technology for Industry 4.0,Springer,2020.


Full Text: PDF

Refbacks

  • There are currently no refbacks.


 

Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
ISSN 2089-3272

Creative Commons Licence

This work is licensed under a Creative Commons Attribution 4.0 International License.

web analytics
View IJEEI Stats

https://fjot.anfe.fr/https://tokorumput.com/wp-content/slot-depo-10k/https://classyfm.co.id/frontend/sigmaslot/https://mediapencerahanbangsa.co.id/https://pdamindramayu.co.id/images/luar/https://pdamindramayu.co.id/demo/https://learning.modernland.co.id/api/toto/https://learning.modernland.co.id/git/slot-depo-10k/https://aihc.amexihc.org/toto/https://cstvcnmt.gialai.gov.vn/demo/https://bundamediagrup.co.id/wp-includes/idn/https://fjot.anfe.fr/js/https://www.chiesadellarte.org/https://www.rollingcarbon.org/https://www.savebugomaforest.org/https://www.sigmaslot-profil.com/https://www.doxycycline365.com/https://thailottonew.site/https://hipnose.in/https://tennishope.orghttps://serenityprime.net/https://bundamediagrup.co.id/depo10k/https://bundamediagrup.co.id/akun/demo/https://loa.tsipil-uii.ac.id/sg-gacor/http://snabm.unim.ac.id/depo-10k/http://snabm.unim.ac.id/lib/slot-maxwin/http://103.165.243.97/doc/sign/slot-thailand/https://appv2.tanahlautkab.go.id/doc/unsign/http://mysimpeg.gowakab.go.id/mysimpeg/maxwin/https://ijatr.polban.ac.id/toto/https://loa.tsipil-uii.ac.id/scatter-hitam/https://ijatr.polban.ac.id/docs/https://simba.cilacapkab.go.id/idnslot/https://sigmawin88.comhttps://perijinan.blitarkota.go.id/assets/jp-gacor/https://perijinan.blitarkota.go.id/data/depo-10k/https://simba.cilacapkab.go.id/api/demo/https://simba.cilacapkab.go.id/api/http://103.165.243.97/doc/sv388/http://103.165.243.97/doc/thailand/https://www.remap.ugto.mx/pages/slot-luar-negeri-winrate-tertinggi/http://www.inmedsur.cfg.sld.cu/docs/https://waper.serdangbedagaikab.go.id/storage/idn/https://bakesbangpol.katingankab.go.id/uploads/pulsahttps://conference.stikesalifah.ac.id/thailand/