Secure Key Management in Embedded Systems: A First Proposal

被引:1
|
作者
Jank, Gorazd [1 ]
Schmidt, Silvia [1 ]
Koschuch, Manuel [1 ]
机构
[1] Univ Appl Sci, Competence Ctr IT Secur, FH Campus Wien, Vienna, Austria
关键词
Constrained Devices; Decision-making; Embedded Systems; Internet of Things; Secure Key Management; SCHEMES;
D O I
10.5220/0010475600810091
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet-of-Things (IoT) domain is highly heterogeneous and comprises a multitude of different devices. Because of this variety, many projects require unique compositions of tools, systems, and use cases. In addition, embedded devices are highly optimized and due to that are subject to different constraints. The interconnection of such products for data analysis or cooperation simultaneously increases the attack surface, which leads to requiring efficient cryptographic methods for the protection of data and communication. To enable this, a secure key management approach is needed. In practice however, there are still difficulties regarding the implementation and associated decision making of said management. All the more so since a generic one-size-fits-all approach in such a complex heterogeneous environment as the IoT simply does not exist. This paper aims to provide initial guidelines to argue the choice of a secure key management approach. To do so the state-of-the-art is presented and benefits as well as limits are evaluated. After that a set of factors and a first taxonomy are presented, which influence the final key management solution.
引用
收藏
页码:81 / 91
页数:11
相关论文
共 50 条
  • [1] Fault Management for Secure Embedded Systems
    Sveda, Miroslav
    2009 FOURTH INTERNATIONAL CONFERENCE ON SYSTEMS (ICONS), 2009, : 23 - 28
  • [2] A FRAMEWORK FOR SECURE CRYPTOGRAPHIC KEY MANAGEMENT SYSTEMS
    Varalakshmi, P.
    Shajina, A. R.
    Kanimozhi, T.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 319 - 323
  • [3] A Secure Key Management Scheme for Heterogeneous Secure Vehicular Communication Systems
    LEI Ao
    Chibueze Ogah
    Philip Asuquo
    Haitham Cruickshank
    SUN Zhili
    ZTECommunications, 2016, 14(S1) (S1) : 21 - 31
  • [4] A novel key-embedded scheme for secure video multicast systems
    Yin, Hao
    Qiu, Feng
    Lin, Chuang
    Min, Geyong
    Chu, Xiaowen
    COMPUTERS & ELECTRICAL ENGINEERING, 2006, 32 (05) : 376 - 393
  • [5] Efficient and Secure Key Management for Conditional Access Systems
    Pal, Om
    Alam, Bashir
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2020, 66 (01) : 1 - 10
  • [6] A Novel Key Management Scheme for Wireless Embedded Systems
    Lu, Yung-Feng
    Kuo, Chin-Fu
    Pang, Ai-Chun
    APPLIED COMPUTING REVIEW, 2012, 12 (01): : 50 - 59
  • [7] A secure group key management scheme for wireless cellular systems
    Um, Hwayoung
    Delp, Edward J.
    International Journal of Network Security, 2008, 6 (01) : 40 - 52
  • [8] Secure Architecture for Embedded Systems
    Vai, Michael
    Nahill, Ben
    Kramer, Josh
    Geis, Michael
    Utin, Dan
    Whelihan, David
    Khazan, Roger
    2015 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE (HPEC), 2015,
  • [9] Proposal for Secure Key Distribution Using Classical Optics
    Haist, Tobias
    Osten, Wolfgang
    OPTICAL SUPERCOMPUTING, PROCEEDINGS, 2009, 5882 : 99 - 101
  • [10] A Key Management Framework to Secure IoMT-enabled Healthcare Systems
    De Ree, Marcus
    Vizar, Damian
    Mantas, Georgios
    Bastos, Joaquim
    Kassapoglou-Faist, Corinne
    Rodriguez, Jonathan
    2021 IEEE 26TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2021,