Security for Building Automation with Hardware-Based Node Authentication

被引:0
|
作者
Fischer, Thomas [1 ]
Lesjak, Christian [1 ]
Hoeller, Andrea [1 ]
Steger, Christian [2 ]
机构
[1] Infineon Technol Austria AG, Design Ctr Graz, Graz, Austria
[2] Graz Univ Technol, Inst Tech Informat, Graz, Austria
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Providing reasonable security is a fundamental requirement in building and home automation. The authenticity of devices must be protected to prevent cloned or corrupted devices from joining a private network. State-of-the-art systems already provide secured communication links either by a security layer in the interface protocol stack (e.g. the Security Manager Protocol in Bluetooth Low Energy) or by using the Transport Layer Security (TLS) protocol on top of the interface protocol. These solutions have in common that they only protect the communication links. Thus the system is still vulnerable to active and passive physical attacks that aim to clone the device or to extract the used keys. We show an approach with off-the-shelf security trust anchors that allows securing a device against such attacks. The proposed solution allows product authentication with low-cost ready-to use components which can be easily integrated in an architecture similar to existing proposals. We demonstrate the feasibility of the approach by presenting a prototype implementation and discuss performance and security implications. The results indicate that the proposed architecture provides reasonable security at acceptable costs and can serve as template for many applications in the Internet of Things (IoT) context.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Hardware-based IT security - Security Token Technologies in Automation
    Runde, Markus
    Niemann, Karl-Heinz
    Tebbe, Christopher
    [J]. ATP EDITION, 2012, (03): : 42 - 49
  • [2] Application of hardware-based IT security measures in automation networks
    Runde, Markus
    Niemann, K. -H.
    Hausmann, Stefan
    Heiss, Stefan
    [J]. AUTOMATION 2012, 2012, 2171 : 391 - 394
  • [3] Virtualization and hardware-based security
    Perez, Ronald
    Sailer, Reiner
    van Doorn, Leendert
    [J]. IEEE SECURITY & PRIVACY, 2008, 6 (05) : 24 - 31
  • [4] Security by design: Hardware-based Security in Windows 8
    EMEA, United Kingdom
    [J]. Comput. Fraud Secur., 2013, 5 (18-20):
  • [5] Remote User Authentication Scheme with Hardware-Based Attestation
    Nor, Fazli Bin Mat
    Jalil, Kamarularifin Abd
    Ab Manan, Jamalul-lail
    [J]. SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 437 - +
  • [6] Privacy Enhancements for Hardware-Based Security Modules
    Pasupathinathan, Vijayakrishnan
    Pieprzyk, Josef
    Wang, Huaxiong
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, 2011, 130 : 224 - +
  • [7] Security Primitives for Reconfigurable Hardware-Based Systems
    Huffmire, Ted
    Levin, Timothy
    Thuy Nguyen
    Irvine, Cynthia
    Brotherton, Brett
    Wang, Gang
    Sherwood, Timothy
    Kastner, Ryan
    [J]. ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2010, 3 (02)
  • [8] An Effective Hardware-Based Bidirectional Security Aware M-Payment System by Using Biometric Authentication
    Yomas, Jerrin
    Kiran, N. Chitra
    [J]. SOFTWARE ENGINEERING METHODS IN INTELLIGENT ALGORITHMS, VOL 1, 2019, 984 : 99 - 108
  • [9] Configurable Hardware-Based Radio Interferometric Node Localization
    Szilvasi, Sandor
    Sallai, Janos
    Amundson, Isaac
    Volgyesi, Peter
    Ledeczi, Akos
    [J]. 2010 IEEE AEROSPACE CONFERENCE PROCEEDINGS, 2010,
  • [10] Hardware-based Novel Authentication Scheme for Advanced Metering Infrastructure
    Nath, Atul Prasad Deb
    Amsaad, Fathi
    Choudhury, Muhtadi
    Niamat, Mohammed
    [J]. PROCEEDINGS OF THE 2016 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON) AND OHIO INNOVATION SUMMIT (OIS), 2016, : 364 - 371