Trustful Remote-Sensing Architectures based on Hardware-Security

Dominic Peter Pirker, Thomas Fischer, Harald Wiltschnig, Rainer Matischek, Christian Steger

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

Information, probably the most valuable good nowadays, is collected by billions of connected devices around the world and beyond. The processing of information is mostly done remotely with respect to the sensed environment. Therefore, it is crucial to establish trust between the sensing device and the processing entity. The exponential growth of available connected devices requires dependable technical solutions, despite the multitude of different sensors available. Depending on the application, processing manipulated data could lead to dramatic consequences.In this paper, variants of architectures for trustful remote-sensing of critical data are proposed and evaluated against state-of-the-art concepts with respect to security and transmission overhead. To establish trust, key material is required to per-form certain cryptographic operations. Concepts with hardware-security support are considered in order to provide a dedicated root of trust and protect the key material. The evaluation shows that state-of-the-art architectures lack certain security-related properties, which widens the surface for attack scenarios. The proposed solutions are hardened against certain attacks by implementing dedicated security mechanisms to provide trustful, remotely sensed information.
Originalspracheenglisch
Titel 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
DOIs
PublikationsstatusVeröffentlicht - 2021
Veranstaltung12th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference: UEMCON 2021 - Virtuell, Österreich
Dauer: 1 Dez. 20214 Dez. 2021

Konferenz

Konferenz12th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference
KurztitelUEMCON 2021
Land/GebietÖsterreich
OrtVirtuell
Zeitraum1/12/214/12/21

Fingerprint

Untersuchen Sie die Forschungsthemen von „Trustful Remote-Sensing Architectures based on Hardware-Security“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren