Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
725244 | The Journal of China Universities of Posts and Telecommunications | 2013 | 7 Pages |
Abstract
This paper firstly analyzes the background of the Internet of things (IoT) and describes the trusted computing technologies concept about trusted cryptography modules (TCM), then describes its basic hierarchy and gives a basic security model based on a simple IoT system. And based on this security model, a secure solution of trusted IoT has been built by using the TCM-based technology, and it covers secure boot, secure storage, platform metrics and trusted reports, key functions, and then gives the protocol design with these functions. After analysis results, the solution can provide safeguard of security and trustworthy for their development and application.
Related Topics
Physical Sciences and Engineering
Engineering
Electrical and Electronic Engineering