Skip to main content

Real-Time Trusted Computing Technology for Xenomai

  • Conference paper
  • First Online:
Trusted Computing and Information Security (CTCIS 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 704))

Included in the following conference series:

Abstract

With the development of science and technology, embedded system plays an indispensable part in our daily life. Real time operating system (RTOS) is the critical part of it. To meet the stringent response time requirements, Xenomai is developed as a software framework adding real-time capabilities to the mainline linux kernel. And on the hand, the security of RTOS is a rising issue for computer industrial development, as RTOS used to be considered safer than other system. Therefore, trusted platform module (TPM) is proposed to ensure security form a hardware perspective. In this work, we built a trusted real-time platform based on dual kernel architecture. It comprises host OS and guest OS, which are implemented by trusted virtualization platform (TVP) and Xenomai respectively. In the platform, TVP was based on SW-TPM. Then some tests were carried out to verify performance of system that we built. The result shows that compared with original linux kernel, the average rate of time saving by our platform is 49.52%. The TPM commands executed in the present system is faster than that runs as binary file in the SW-TPM alone.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Koeberl, P., Schulz, S., Sadeghi, A.R., et al.: TrustLite: a security architecture for tiny embedded devices. In: EuroSys 2014 Proceedings of the Ninth European Conference on Computer Systems. ACM Press, Amsterdam, pp. 1–14, 14–16 April 2014

    Google Scholar 

  2. Hambarde, P., Varma, R., Jha, S.: The survery of real time operating system RTOS. In: Proceeding of International Conference on Electronic Systems, Signal Processing and Computing Technologies (ICESC). IEEE Press, Nagpur, pp. 34–39, 9–11 Jan 2014

    Google Scholar 

  3. Rautmare, S.: SCADA system security: challenges and recommendations. In: Annual of IEEE India Conference. IEEE Press, Hyderabad, pp. 1–4, 16–18 Dec 2011

    Google Scholar 

  4. Chung, W.L., Zhu, Q., Phung, C., et al.: Security-aware mapping for CAN-based real-time distributed automotive system. In: International Conference on Computer-Aided Design. IEEE Press, San Jose, pp. 115–121, 18–21 Nov 2013

    Google Scholar 

  5. Mohd, A.M.I., Jamalul, A.M., Haibah, H., et al.: Trusted real time operating System: identifying its characteristics. In: IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE). IEEE Press, Kota Kinabalu, pp. 83–88, 3–4 Dec 2012

    Google Scholar 

  6. Strasser, M., Stamer, H.: A software-based trusted platform module emulator. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 33–47. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-68979-9_3

    Chapter  Google Scholar 

  7. Khalid, O., Rolfes, C., Ibing, A.: On implementing trusted boot for embedded systems. In: IEEE International Symposium on Hardware-oriented Security and Trust (HOST). IEEE Press, Austin, pp. 75–80, 2–3 June 2013

    Google Scholar 

  8. Xenomai.: Xenomai White paper[EB/OL] (2014). http://xenomai.org/2014/06/xenomai-white-paper/

  9. TVP Trusted Virtualization Platform Deployment[EB/OL] (2015). https://www.oerc.ox.ac.uk/sites/default/files/uploads/ProjectFiles/MyTrustedCloud/TrustedVirtualizationPlatformDeployment.pdf

  10. Aaraj, N., Raghunathan, A., Ravi, S., et al.: Energy and execution time analysis of a software-based trusted platform module. In: Proceedings of Design, Automation and Test in Europe Conference and Exhibition (DATE). IEEE Press, Nice, pp. 1–6, 16–20 April 2007

    Google Scholar 

  11. Kerry, M.: RSA vs. ECC comparison for embedded systems white paper[EB/OL] (2016). http://www.atmel.com/Images/Atmel-8951-CryptoAuth-RSA-ECC-Comparison-Embedded-Systems-WhitePaper.pdf

Download references

Acknowledgments

This work is supported by National Nature Science Foundation of China under grant 61502438, 61272452 and 61403350.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fan Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xu, M., Gao, X., Gao, Y., Zhang, F. (2017). Real-Time Trusted Computing Technology for Xenomai. In: Xu, M., Qin, Z., Yan, F., Fu, S. (eds) Trusted Computing and Information Security. CTCIS 2017. Communications in Computer and Information Science, vol 704. Springer, Singapore. https://doi.org/10.1007/978-981-10-7080-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7080-8_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7079-2

  • Online ISBN: 978-981-10-7080-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics