Trustful Remote-Sensing Architectures based on Hardware-Security

Dominic Peter Pirker, Thomas Fischer, Harald Wiltschnig, Rainer Matischek, Christian Steger

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review


Information, probably the most valuable good nowadays, is collected by billions of connected devices around the world and beyond. The processing of information is mostly done remotely with respect to the sensed environment. Therefore, it is crucial to establish trust between the sensing device and the processing entity. The exponential growth of available connected devices requires dependable technical solutions, despite the multitude of different sensors available. Depending on the application, processing manipulated data could lead to dramatic consequences.In this paper, variants of architectures for trustful remote-sensing of critical data are proposed and evaluated against state-of-the-art concepts with respect to security and transmission overhead. To establish trust, key material is required to per-form certain cryptographic operations. Concepts with hardware-security support are considered in order to provide a dedicated root of trust and protect the key material. The evaluation shows that state-of-the-art architectures lack certain security-related properties, which widens the surface for attack scenarios. The proposed solutions are hardened against certain attacks by implementing dedicated security mechanisms to provide trustful, remotely sensed information.
Original languageEnglish
Title of host publication 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
Publication statusPublished - 2021
Event12th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference: UEMCON 2021 - Virtuell, Austria
Duration: 1 Dec 20214 Dec 2021


Conference12th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference
Abbreviated titleUEMCON 2021


Dive into the research topics of 'Trustful Remote-Sensing Architectures based on Hardware-Security'. Together they form a unique fingerprint.

Cite this