Development of trusted boot process for wireless sensor node using ARM11 platform / Lukman Hakim Adnan

Trusted platforms have been proposed as a promising approach for providing security for wireless sensor nodes platform, particularly, from physical type of attacks. However, implementation of a separate Trusted Platform Module (TPM) chip on the platform is not acceptable in the design of wireless se...

Full description

Saved in:
Bibliographic Details
Main Author: Adnan, Lukman Hakim
Format: Thesis
Language:English
Published: 2013
Online Access:https://ir.uitm.edu.my/id/eprint/18342/3/18342.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Trusted platforms have been proposed as a promising approach for providing security for wireless sensor nodes platform, particularly, from physical type of attacks. However, implementation of a separate Trusted Platform Module (TPM) chip on the platform is not acceptable in the design of wireless sensor nodes because it increases the size and total power consumption of the node. Alternative to that is to use embedded microprocessors with built-in security module, which implements functions similar to the TPM, on the embedded processor. However, since the sensor node is a resource constrained platform with limited processing capabilities, it is important to ensure that the computation and energy consumption for running security functions in the microprocessor are at an acceptable rate. In this study, a trusted boot process for sensor node is developed to provide a trusted platform for wireless sensor node. It comprises of first and second level boot process. The purpose of this research is to implement the “trusted boot process” on the embedded microprocessor to provide security on the hardware layer of sensor node. The proposed system involves integration of hardware and software subsystems. The hardware subsystem, utilize ARM1176JZF-S Development Board with ICE-JTAG. For the software subsystem, the proposed system will have two levels of boot process; which are first level bootloader, acting as the root of trust of the system and, second level bootloader with security module to check the integrity of the kernel or applications that will run on the platform. The results show that the proposed system is able to provide basic security implementations to support image verification of a sensor node through trusted boot process. A brief energy consumption study is also presented to support the work