×

开发无线硬件防篡改保护

消耗积分:0 | 格式:rar | 大小:0.15 MB | 2017-05-24

分享资料个

开发无线硬件防篡改保护
 
  从智能卡到智能仪表,有许多不同的方式无线节点可以在物联网攻击。本文着眼于设备的方式是防止各种恶意代码篡改,从物理微分功率分析(DPA)和设计师的方式可以对他们的保护,包括设计技术和实现物理不可克隆功能(PUF)。
 
  保护信息安全是物联网的关键挑战之一。无线通信是一个关键技术,在这个推出,使传感器和控制节点,易于安装和管理在互联网上。通过加密来保护无线链路是一个关键的设计技术,无线节点本身很容易受到篡改。这可以截获被采集的数据、加密密钥或代码本身。黑客可能是为了个人利益,改变无线连接的智能电表中的数据,或从近场通信(NFC)信用卡和借记卡拦截数据的国际团伙。
 
  开发无线硬件防篡改保护
 
  There are various techniques for tampering, especially for capturing the encryption keys. Once a hacker has access to these, all the data in the system is potentially available, giving all sorts of insights into the activity of the node and as a result into the activity of the wallet, home or factory.
 
  Anti-tampering is a key element in the design of smart meters, NFC chips and wireless IoT nodes, so understanding the attack mechanisms is vital.
 
  The smartcard industry typically places attacks into one of three categories. Non-invasive side channel attacks use information out of the power profile or the electromagnetic emanation, while fault attacks use laser light or glitches in the voltage to change how a chip responds. The power of this technique can be seen in the recent glitch in the Raspberry Pi 2 low-cost computer board that resets when exposed to a camera flash. A third technique is reverse engineering by stripping down the layers of the chip to discover the transistor structure and access data, particularly in the read-only memory, as a result.
 

声明:本文内容及配图由入驻作者撰写或者入驻合作网站授权转载。文章观点仅代表作者本人,不代表电子发烧友网立场。文章及其配图仅供工程师学习之用,如有内容侵权或者其他违规问题,请联系本站处理。 举报投诉

评论(0)
发评论

下载排行榜

全部0条评论

快来发表一下你的评论吧 !