A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices

Public Key Cryptography enables entity authentication protocols based on a platform's knowledge of other platforms' public key. This is particularly advantageous for embedded systems, such as FPGA platforms, with limited or none read-protected memory resources. For access control systems,...

Full description

Saved in:
Bibliographic Details
Main Authors: Alexander Klimm, Benjamin Glas, Matthias Wachs, Sebastian Vogel, Klaus D. Müller-Glaser, Jürgen Becker
Format: Article
Language:English
Published: Wiley 2011-01-01
Series:International Journal of Reconfigurable Computing
Online Access:http://dx.doi.org/10.1155/2011/820454
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832559919822274560
author Alexander Klimm
Benjamin Glas
Matthias Wachs
Sebastian Vogel
Klaus D. Müller-Glaser
Jürgen Becker
author_facet Alexander Klimm
Benjamin Glas
Matthias Wachs
Sebastian Vogel
Klaus D. Müller-Glaser
Jürgen Becker
author_sort Alexander Klimm
collection DOAJ
description Public Key Cryptography enables entity authentication protocols based on a platform's knowledge of other platforms' public key. This is particularly advantageous for embedded systems, such as FPGA platforms, with limited or none read-protected memory resources. For access control systems, an access token is authenticated by the mobile system. Only the public key of authorized tokens needs to be stored inside the mobile platform. At some point during the platform's lifetime, these might need to be updated in the field due to loss or damage of tokens. This paper proposes a holistic approach for an automotive access control system based on Public Key Cryptography. Next to a FPGA-based hardware architecture, we focus on a secure scheme for key flashing of public keys to highly mobile systems. The main goal of the proposed scheme is the minimization of online dependencies to Trusted Third Parties, Certification Authorities, or the like, to enable key flashing in remote locations with only minor technical infrastructure. Introducing trusted mediator devices, new tokens can be authorized and later their public key can be flashed into a mobile system on demand.
format Article
id doaj-art-9b0c3ec8c05e431c80028725396a6b33
institution Kabale University
issn 1687-7195
1687-7209
language English
publishDate 2011-01-01
publisher Wiley
record_format Article
series International Journal of Reconfigurable Computing
spelling doaj-art-9b0c3ec8c05e431c80028725396a6b332025-02-03T01:28:54ZengWileyInternational Journal of Reconfigurable Computing1687-71951687-72092011-01-01201110.1155/2011/820454820454A Security Scheme for Dependable Key Insertion in Mobile Embedded DevicesAlexander Klimm0Benjamin Glas1Matthias Wachs2Sebastian Vogel3Klaus D. Müller-Glaser4Jürgen Becker5Institute for Information Processing Technology, Karlsruhe Institute of Technology (KIT), 76021 Karlsruhe, GermanyInstitute for Information Processing Technology, Karlsruhe Institute of Technology (KIT), 76021 Karlsruhe, GermanyInstitute for Information Processing Technology, Karlsruhe Institute of Technology (KIT), 76021 Karlsruhe, GermanyInstitute for Information Processing Technology, Karlsruhe Institute of Technology (KIT), 76021 Karlsruhe, GermanyInstitute for Information Processing Technology, Karlsruhe Institute of Technology (KIT), 76021 Karlsruhe, GermanyInstitute for Information Processing Technology, Karlsruhe Institute of Technology (KIT), 76021 Karlsruhe, GermanyPublic Key Cryptography enables entity authentication protocols based on a platform's knowledge of other platforms' public key. This is particularly advantageous for embedded systems, such as FPGA platforms, with limited or none read-protected memory resources. For access control systems, an access token is authenticated by the mobile system. Only the public key of authorized tokens needs to be stored inside the mobile platform. At some point during the platform's lifetime, these might need to be updated in the field due to loss or damage of tokens. This paper proposes a holistic approach for an automotive access control system based on Public Key Cryptography. Next to a FPGA-based hardware architecture, we focus on a secure scheme for key flashing of public keys to highly mobile systems. The main goal of the proposed scheme is the minimization of online dependencies to Trusted Third Parties, Certification Authorities, or the like, to enable key flashing in remote locations with only minor technical infrastructure. Introducing trusted mediator devices, new tokens can be authorized and later their public key can be flashed into a mobile system on demand.http://dx.doi.org/10.1155/2011/820454
spellingShingle Alexander Klimm
Benjamin Glas
Matthias Wachs
Sebastian Vogel
Klaus D. Müller-Glaser
Jürgen Becker
A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
International Journal of Reconfigurable Computing
title A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
title_full A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
title_fullStr A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
title_full_unstemmed A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
title_short A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
title_sort security scheme for dependable key insertion in mobile embedded devices
url http://dx.doi.org/10.1155/2011/820454
work_keys_str_mv AT alexanderklimm asecurityschemefordependablekeyinsertioninmobileembeddeddevices
AT benjaminglas asecurityschemefordependablekeyinsertioninmobileembeddeddevices
AT matthiaswachs asecurityschemefordependablekeyinsertioninmobileembeddeddevices
AT sebastianvogel asecurityschemefordependablekeyinsertioninmobileembeddeddevices
AT klausdmullerglaser asecurityschemefordependablekeyinsertioninmobileembeddeddevices
AT jurgenbecker asecurityschemefordependablekeyinsertioninmobileembeddeddevices
AT alexanderklimm securityschemefordependablekeyinsertioninmobileembeddeddevices
AT benjaminglas securityschemefordependablekeyinsertioninmobileembeddeddevices
AT matthiaswachs securityschemefordependablekeyinsertioninmobileembeddeddevices
AT sebastianvogel securityschemefordependablekeyinsertioninmobileembeddeddevices
AT klausdmullerglaser securityschemefordependablekeyinsertioninmobileembeddeddevices
AT jurgenbecker securityschemefordependablekeyinsertioninmobileembeddeddevices