loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Witali Bartsch 1 ; Prosanta Gope 2 ; Elif Kavun 3 ; Owen Millwood 2 ; Andriy Panchenko 4 ; Aryan Pasikhani 2 and Ilia Polian 5

Affiliations: 1 PointBlank Security, Steen Harbach AG, Leverkusen, Germany ; 2 Department of Computer Science, The University of Sheffield, U.K. ; 3 Faculty of Computer Science and Mathematics, University of Passau, Germany ; 4 Chair of IT Security, Brandenburg University of Technology (BTU), Cottbus, Germany ; 5 Institute of Computer Architecture and Computer Engineering, University of Stuttgart, Germany

Keyword(s): Secure Processor Architecture, Secure IoT, Hardware Fingerprinting, PUFs, Attack-Resilient Hardware.

Abstract: The overwhelmingly widespread use of Internet of Things (IoT) in different application domains brought not only benefits, but, alas, security concerns as a result of the increased attack surface and vectors. One of the most critical mechanisms in IoT infrastructure is key management. This paper reflects on the problems and challenges of existing key management systems, starting with the discussion of a recent real-world attack. We identify and elaborate on the drawbacks of security primitives based purely on physical variations and – after highlighting the problems of such systems – continue on to deduce an effective and cost-efficient key management solution for IoT systems extending the symbiotic security approach in a previous work. The symbiotic architecture combines software, firmware, and hardware resources for secure IoT while avoiding the traditional scheme of static key storage and generating entropy for key material on-the-fly via a combination of a Physical Unclonable Func tion (PUF) and pseudo-random bits pre-populated in firmware. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.218.172.249

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Bartsch, W.; Gope, P.; Kavun, E.; Millwood, O.; Panchenko, A.; Pasikhani, A. and Polian, I. (2023). Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond. In Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-624-8; ISSN 2184-4356, SciTePress, pages 583-591. DOI: 10.5220/0011726900003405

@conference{icissp23,
author={Witali Bartsch. and Prosanta Gope. and Elif Kavun. and Owen Millwood. and Andriy Panchenko. and Aryan Pasikhani. and Ilia Polian.},
title={Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond},
booktitle={Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP},
year={2023},
pages={583-591},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0011726900003405},
isbn={978-989-758-624-8},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP
TI - Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond
SN - 978-989-758-624-8
IS - 2184-4356
AU - Bartsch, W.
AU - Gope, P.
AU - Kavun, E.
AU - Millwood, O.
AU - Panchenko, A.
AU - Pasikhani, A.
AU - Polian, I.
PY - 2023
SP - 583
EP - 591
DO - 10.5220/0011726900003405
PB - SciTePress