Secure Key Management in Embedded Systems: A First Proposal

被引:1
|
作者
Jank, Gorazd [1 ]
Schmidt, Silvia [1 ]
Koschuch, Manuel [1 ]
机构
[1] Univ Appl Sci, Competence Ctr IT Secur, FH Campus Wien, Vienna, Austria
关键词
Constrained Devices; Decision-making; Embedded Systems; Internet of Things; Secure Key Management; SCHEMES;
D O I
10.5220/0010475600810091
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet-of-Things (IoT) domain is highly heterogeneous and comprises a multitude of different devices. Because of this variety, many projects require unique compositions of tools, systems, and use cases. In addition, embedded devices are highly optimized and due to that are subject to different constraints. The interconnection of such products for data analysis or cooperation simultaneously increases the attack surface, which leads to requiring efficient cryptographic methods for the protection of data and communication. To enable this, a secure key management approach is needed. In practice however, there are still difficulties regarding the implementation and associated decision making of said management. All the more so since a generic one-size-fits-all approach in such a complex heterogeneous environment as the IoT simply does not exist. This paper aims to provide initial guidelines to argue the choice of a secure key management approach. To do so the state-of-the-art is presented and benefits as well as limits are evaluated. After that a set of factors and a first taxonomy are presented, which influence the final key management solution.
引用
收藏
页码:81 / 91
页数:11
相关论文
共 50 条
  • [21] Designing Secure and Resilient Embedded Avionics Systems
    Li, Jason H.
    Schafer, Douglas
    Whelihan, David
    Lassini, Stefano
    Evancich, Nicholas
    Kwak, Kyung Joon
    Vai, Michael
    Whitman, Haley
    2018 IEEE CYBERSECURITY DEVELOPMENT CONFERENCE (SECDEV 2018), 2018, : 139 - 139
  • [22] An Approach for the Design of Secure Communication in Embedded Systems
    Ocenasek, Pavel
    HUMAN INTERFACE AND THE MANAGEMENT OF INFORMATION: DESIGNING INFORMATION ENVIRONMENTS, PT I, 2009, 5617 : 579 - 586
  • [23] Three Design Dimensions of Secure Embedded Systems
    Schaumont, Patrick
    Aysu, Aydin
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2013, 2013, 8204 : 1 - 20
  • [24] Secure Embedded Hypervisor based Systems for Automotive
    Thiebaut, Stefaan Sonck
    De Rosa, Antonio
    Sasse, Ralph
    2016 46TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2016, : 211 - 212
  • [25] Secure and Stateful Power Transitions in Embedded Systems
    Archanaa S. Krishnan
    Charles Suslowicz
    Patrick Schaumont
    Journal of Hardware and Systems Security, 2020, 4 (4) : 263 - 276
  • [26] Secure software delivery and installation in embedded systems
    Adelsbach, A
    Huber, U
    Sadeghi, AR
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 255 - 267
  • [27] Tamper resistance mechanisms for secure embedded systems
    Ravi, S
    Raghunathan, A
    Chakradhar, S
    17TH INTERNATIONAL CONFERENCE ON VLSI DESIGN, PROCEEDINGS: DESIGN METHODOLOGIES FOR THE GIGASCALE ERA, 2004, : 605 - 611
  • [28] Secure embedded systems: the threat of reverse engineering
    McLoughlin, Ian
    PROCEEDINGS OF THE 2008 14TH IEEE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, 2008, : 729 - 736
  • [29] Hardware Support for Secure Processing in Embedded Systems
    Mao, Shufu
    Wolf, Tilman
    IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (06) : 847 - 854
  • [30] Secure and efficient group key management with shared key derivation
    Lin, Jen-Chiun
    Huang, Kuo-Hsuan
    Lai, Feipei
    Lee, Hung-Chang
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 192 - 208