Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (1)

Search Parameters:
Keywords = SWTPM

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 28388 KiB  
Article
Software Trusted Platform Module (SWTPM) Resource Sharing Scheme for Embedded Systems
by Da-Chuan Chen, Guan-Ruei Chen and Yu-Ping Liao
Sensors 2025, 25(12), 3828; https://doi.org/10.3390/s25123828 - 19 Jun 2025
Viewed by 398
Abstract
Embedded system networks are widely deployed across various domains and often perform mission-critical tasks, making it essential for all nodes within the system to be trustworthy. Traditionally, each node is equipped with a discrete Trusted Platform Module (dTPM) to ensure network-wide trustworthiness. However, [...] Read more.
Embedded system networks are widely deployed across various domains and often perform mission-critical tasks, making it essential for all nodes within the system to be trustworthy. Traditionally, each node is equipped with a discrete Trusted Platform Module (dTPM) to ensure network-wide trustworthiness. However, this study proposes a cost-effective system architecture that deploys software-based TPMs (SWTPMs) on the majority of nodes, while reserving dTPMs for a few central nodes to maintain overall system integrity. The proposed architecture employs IBMACS for system integrity reporting. In addition, a database-based anomaly detection (AD) agent is developed to identify and isolate untrusted nodes. A traffic anomaly detection agent is also introduced to monitor communication between servers and clients, ensuring that traffic patterns remain normal. Finally, a custom measurement kernel is implemented, along with an activation agent, to enforce a measured boot process for custom applications during startup. This architecture is designed to safeguard mission-critical embedded systems from malicious threats while reducing deployment costs. Full article
(This article belongs to the Special Issue Privacy and Security for IoT-Based Smart Homes)
Show Figures

Figure 1

Back to TopTop