Cyber Physical Systems typically operate unattended in hostile outdoor environments. A lot of effort has has been made to protect the communication between sensing nodes and the processing infrastructure. However, with regards to physical protection of a node, assessing the integrity of its hardware/software is a challenging issue. In this paper, we propose and evaluate a node architecture which makes use of Trusted Platform Module (TPM) to perform cryptographic operations in a trustworthy manner. TPM builds a chain of trust which enforces a trustability relationship among the node's components. In such context, the node will function only if all the hardware and software configurations have been verified by means of cryptographic operations. Moreover, using tamper resistant hardware we will ensure that the cryptographic keys do not leave a secure perimeter.
Advancing WSN physical security adopting TPM-based architectures / Barbareschi, M.; Battista, E.; Mazzeo, A.; Venkatesan, S.. - (2014), pp. 394-399. (Intervento presentato al convegno 15th IEEE International Conference on Information Reuse and Integration, IEEE IRI 2014 tenutosi a usa nel 2014) [10.1109/IRI.2014.7051916].
Advancing WSN physical security adopting TPM-based architectures
Barbareschi M.
;Battista E.;
2014
Abstract
Cyber Physical Systems typically operate unattended in hostile outdoor environments. A lot of effort has has been made to protect the communication between sensing nodes and the processing infrastructure. However, with regards to physical protection of a node, assessing the integrity of its hardware/software is a challenging issue. In this paper, we propose and evaluate a node architecture which makes use of Trusted Platform Module (TPM) to perform cryptographic operations in a trustworthy manner. TPM builds a chain of trust which enforces a trustability relationship among the node's components. In such context, the node will function only if all the hardware and software configurations have been verified by means of cryptographic operations. Moreover, using tamper resistant hardware we will ensure that the cryptographic keys do not leave a secure perimeter.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.