Design of Volatile USB Storage Device Based on Information Security

Zhong Wujie, Pan Ziqing, Wang Yongwei, Shi Gongcheng, Zhang Chengwei, Zhong Guohui

Integrated Circuits and Embedded Systems ›› 2022, Vol. 22 ›› Issue (9) : 41-44.

PDF(1251 KB)
PDF(1251 KB)
Integrated Circuits and Embedded Systems ›› 2022, Vol. 22 ›› Issue (9) : 41-44.
TECHNOLOGY REVIEW

Design of Volatile USB Storage Device Based on Information Security

  • Zhong Wujie, Pan Ziqing, Wang Yongwei, Shi Gongcheng, Zhang Chengwei, Zhong Guohui
Author information +
History +

Abstract

Universal Serial Bus (USB) is a widely used hardware interface for mass storage devices.USB MSDs are widely used in daily life,because they can provide high transmission speed and are relatively convenient to carry.But these characteristics also make the data in USB MSDs easy to attack and steal.Traditional data security methods generally use authentication systems to prevent information leakage.This method can guarantee data security to a certain extent,but there is also the risk of authentication failure or hardware brute force cracking.This article proposes a hardware security solution based on SDRAM storage media and Cortex-M4 microprocessor,which can ensure that the data in USB MSDs is lost after they are disconnected from the host for several minutes.

Key words

USB / mass storage devices / SDRAM / STM32

Cite this article

Download Citations
Zhong Wujie, Pan Ziqing, Wang Yongwei, Shi Gongcheng, Zhang Chengwei, Zhong Guohui. Design of Volatile USB Storage Device Based on Information Security[J]. Integrated Circuits and Embedded Systems. 2022, 22(9): 41-44

References

[1] Iqbal W,Abbas H,Daneshmand M,et al.An in-depth analysis of IoT security requirements,challenges,and their countermeasures via software-defined security[J].IEEE Internet of Things Journal,2020,7(10):10250-10276.
[2] Bhattasali T,Chaki R,Sanyal S.Sleep deprivation attack detection in wireless sensor network[J].arXiv preprint arXiv:1203.0231,2012.
[3] D Puthal,S Nepal,R Ranjan,et al.Threats to networking cloud and edge datacenters in the Internet of Things[J]. IEEE Cloud Comput.,2016,3(3):64-71.
[4] B Balamurugan,D Biswas.Security in network layer of IoT: Possible measures to preclude[C]//in Security Breaches and Threat Prevention in the Internet of Things.Hoboken,NJ,USA:IGI Glob,2017:46-75.
[5] Lee K,Yeuk H,Choi Y,et al.Safe Authentication Protocol for Secure USB Memories[J].J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.,2010,1(1):46-55.
[6] Lee K,Pho S,Yim K.Reversability assessment on secure usb memories[C]//2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.IEEE,2011:6-8.
[7] Lee S H,Yim K B,Lee I Y.A secure solution for USB flash drives using FAT file system structure[C]//2010 13th International Conference on Network-Based Information Systems.IEEE,2010:487-492.
[8] Sebastian A,Sankar K S.A secure and reliable method to protect usb data[J].Aptikom Journal on Computer Science and Information Technologies,2019,4(2):57-60.
[9] Xin R,Li Y,Liu Y,et al.System design scheme of configurable secure memory chip[C]//2017 9th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC).IEEE,2017:280-283.
[10] ST.STM32Cube USB device library,2019.
[11] Bill McFerrin.INFORMATION TECHNOLOGY-SCSI Multimedia Commands – 3 (MMC-3),1997.
[12] Bhati I,Chang M T,Chishti Z,et al.DRAM refresh mechanisms,penalties,and trade-offs[J].IEEE Transactions on Computers,2015,65(1):108-121.
PDF(1251 KB)

Accesses

Citation

Detail

Sections
Recommended

/