Home > Published Issues > 2025 > Volume 20, No. 2, 2025 >
JCM 2025 Vol.20(2): 214-220
Doi: 10.12720/jcm.20.2.214-220

SASL-JTAG+: An Enhanced Lightweight and Secure JTAG Authentication Mechanism for IoT Systems with Diverse Devices

Hisashi Okamoto1,*, Shaoqi Wei1, Senling Wang1, Hiroshi Kai1, Hiroshi Takahashi1, Yoshinobu Higami1, Akihiro Shimizu2, Tianming Ni3, and Xiaoqing Wen4
1Graduate School of Science and Engineering, Ehime University, Matsuyama, Japan
2Graduate School of Engineering, Kochi University of Technology, Kami, Japan
3Graduate School of Engineering, Anhui Polytechnic University, Wuhu, China
4Graduate School of Engineering, Kyushu Institute of Technology, Iizuka, Japan
Email: m819001h@mails.cc.ehime-u.ac.jp (H.O.); k819002y@mails.cc.ehime-u.ac.jp (S.Q.W.); wang@cs.ehime-u.ac.jp (S.L.W.); kai@cs.ehime-u.ac.jp (H.K.); takahashi@cs.ehime-u.ac.jp (H.T.); higami@cs.ehime-u.ac.jp (Y.H.); shimizu.akihiro@kochi-tech.ac.jp (A.S.); timmyni126@126.com (T.M.N.); wen@csn.kyutech.ac.jp (X.Q.W.)
*Corresponding author

Manuscript received January 9, 2025; revised February 21, 2025; accepted February 24, 2025; published April 23, 2025.

Abstract—Joint Test Action Group (JTAG) interface is widely used in integrated circuits for functional testing and in-system debugging, ensuring high reliability throughout the silicon life cycle. However, it has also been identified as a potential vulnerability to the cyberattacks. Traditional security countermeasures such as adding authentication mechanism to restrict access to authorized users, often rely on uniform authentication credentials. This approach poses challenges for edge devices with varying computational capacities. Moreover, strengthening authentication security can lead to compatibility issues with embedded hardware on client devices, limiting scalability. To address these challenges, we propose Simple and Secure password authentication protocol, Light processing version based Joint Test Action Group plus Version (SASL-JTAG+), an enhanced JTAG authentication mechanism utilizing the Simple and Secure Password Authentication Protocol, Light Processing Version (SAS-L) protocol that enables one-time password authentication with adjustable bit lengths, tailored to the computational capacities of authenticators and target devices. The new approach provides robust security for devices with performance and cost constraints, offering flexible authentication data within a unified system. As a result, SASL-JTAG+ provides a scalable, long-term solution for securing IoT systems accommodating both legacy and modern devices while adapting to evolving technological demands.
 
Keywords—Internet of Things (IoT), edge devices, Cyber-Physical System (CPS), simple and secure password authentication protocol, Light Processing Version (SAS-L), Joint Test Action Group (JTAG), dependability

 
Cite: Hisashi Okamoto, Shaoqi Wei, Senling Wang, Hiroshi Kai, Hiroshi Takahashi, Yoshinobu Higami, Akihiro Shimizu, Tianming Ni, and Xiaoqing Wen, “SASL-JTAG+: An Enhanced Lightweight and Secure JTAG Authentication Mechanism for IoT Systems with Diverse Devices," Journal of Communications, vol. 20, no. 2, pp. 214-220, 2025.


Copyright © 2025 by the authors. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).