Secure Key Management in Embedded Systems: A First Proposal

被引:1
|
作者
Jank, Gorazd [1 ]
Schmidt, Silvia [1 ]
Koschuch, Manuel [1 ]
机构
[1] Univ Appl Sci, Competence Ctr IT Secur, FH Campus Wien, Vienna, Austria
关键词
Constrained Devices; Decision-making; Embedded Systems; Internet of Things; Secure Key Management; SCHEMES;
D O I
10.5220/0010475600810091
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet-of-Things (IoT) domain is highly heterogeneous and comprises a multitude of different devices. Because of this variety, many projects require unique compositions of tools, systems, and use cases. In addition, embedded devices are highly optimized and due to that are subject to different constraints. The interconnection of such products for data analysis or cooperation simultaneously increases the attack surface, which leads to requiring efficient cryptographic methods for the protection of data and communication. To enable this, a secure key management approach is needed. In practice however, there are still difficulties regarding the implementation and associated decision making of said management. All the more so since a generic one-size-fits-all approach in such a complex heterogeneous environment as the IoT simply does not exist. This paper aims to provide initial guidelines to argue the choice of a secure key management approach. To do so the state-of-the-art is presented and benefits as well as limits are evaluated. After that a set of factors and a first taxonomy are presented, which influence the final key management solution.
引用
收藏
页码:81 / 91
页数:11
相关论文
共 50 条
  • [31] Key Management in Secure Satellite Multicast Using Key Hypergraphs
    Ding, Yan
    Zhou, Xian-wei
    Cheng, Zhi-mi
    Wu, Qi-wu
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 70 (04) : 1859 - 1883
  • [32] Hardware support for secure processing in embedded systems
    Mao, Shufu
    Wolf, Tilman
    2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 483 - +
  • [33] Key Management in Secure Satellite Multicast Using Key Hypergraphs
    Yan Ding
    Xian-wei Zhou
    Zhi-mi Cheng
    Qi-wu Wu
    Wireless Personal Communications, 2013, 70 : 1859 - 1883
  • [34] An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems
    Chaeikar, Saman Shojae
    Alizadeh, Mojtaba
    Tadayon, Mohammad Hesam
    Jolfaei, Alireza
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 10158 - 10171
  • [35] Proposal strategies of key management for data encryption in SCADA network of electric power systems
    Kang, D. J.
    Lee, J. J.
    Kim, B. H.
    Hur, D.
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2011, 33 (09) : 1521 - 1526
  • [36] Implementation of Symmetric Cryptography in Embedded Systems for Secure Measurement Systems
    Bilski, Piotr
    Winiecki, Wieslaw
    Adamski, Tomasz
    2011 IEEE INTERNATIONAL INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE (I2MTC), 2011, : 1288 - 1293
  • [37] A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery
    Rafi, Amir
    Shepherd, Carlton
    Markantonakis, Konstantinos
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 549 - 558
  • [38] Secure decentralized multicast key management scheme
    Yang, Ming
    Xiao, Yang
    Lu, Shan-Shan
    Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition), 2008, 9 (01): : 20 - 24
  • [39] Secure Authentication and Key Management with Blockchain in VANETs
    Tan, Haowen
    Chung, Ilyong
    Chung, Ilyong (iyc@chosun.ac.kr), 1600, Institute of Electrical and Electronics Engineers Inc., United States (08): : 2482 - 2498
  • [40] Secure Authentication and Key Management With Blockchain in VANETs
    Tan, Haowen
    Chung, Ilyong
    IEEE ACCESS, 2020, 8 : 2482 - 2498