Page 76 - 2024S
P. 76

UEC Int’l Mini-Conference No.52                                                               69









                    Realization of Secure Communication in Low-power RISC-V

                                   System-on-Chips for IoT Applications


                              Tuan-Kiet DANG , Trong-Thuc HOANG, Cong-Kha PHAM
                                                 ∗
                                  Department of Computer and Network Engineerings
                                       The University of Electro-Communications
                                                      Tokyo, Japan


             Keywords: RISC-V, System-on-Chip, Secure Communication, Hardware Security



                                                        Abstract
                    In an Internet-of-Thing network, security is a crucial aspect of communication between numerous
                 sensor devices and the server. A safe communication channel reduces the risk of eavesdropping and
                 tampering with the sensor data from unauthenticated parties. Moreover, a highly secure communication
                 protocol ensures data integrity and privacy in a massive network. However, IoT endpoint devices,
                 as their nature, are limited in resources and computation efficiency, meanwhile, the mathematical
                 foundation of highly secure communication demands extensive computational costs. Following the
                 trend of applying free and open-source computer architecture, this research aims to develop a well-
                 rounded RISC-V system to leverage the cost of secure communication and low power demands for IoT
                 devices. To achieve the target, problems to be solved include: (a)research for a lightweight approach
                 for secure communication (b)developing robust and low-cost cryptography primitives (TRNG, PUF,
                 etc.), (c)reducing the computation cost of cryptography algorithms, (d)connecting the pieces to create
                 a trusted execution environment.


































               ∗
                The author is supported by (MICH) MEXT Scholarship.
   71   72   73   74   75   76   77   78   79   80   81