A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
Public Key Cryptography enables entity authentication protocols based on a platform's knowledge of other platforms' public key. This is particularly advantageous for embedded systems, such as FPGA platforms, with limited or none read-protected memory resources. For access control systems,...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2011-01-01
|
Series: | International Journal of Reconfigurable Computing |
Online Access: | http://dx.doi.org/10.1155/2011/820454 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832559919822274560 |
---|---|
author | Alexander Klimm Benjamin Glas Matthias Wachs Sebastian Vogel Klaus D. Müller-Glaser Jürgen Becker |
author_facet | Alexander Klimm Benjamin Glas Matthias Wachs Sebastian Vogel Klaus D. Müller-Glaser Jürgen Becker |
author_sort | Alexander Klimm |
collection | DOAJ |
description | Public Key Cryptography enables entity authentication protocols based on a platform's knowledge of other platforms' public key. This is particularly advantageous for embedded systems, such as FPGA platforms, with limited or none read-protected memory resources. For access control systems, an access token is authenticated by the mobile system. Only the public key of authorized tokens needs to be stored inside the mobile platform. At some point during the platform's lifetime, these might need to be updated in the field due to loss or damage of tokens. This paper proposes a holistic approach for an automotive access control system based on Public Key Cryptography. Next to a FPGA-based hardware architecture, we focus on a secure scheme for key flashing of public keys to highly mobile systems. The main goal of the proposed scheme is the minimization of online dependencies to Trusted Third Parties, Certification Authorities, or the like, to enable key flashing in remote locations with only minor technical infrastructure. Introducing trusted mediator devices, new tokens can be authorized and later their public key can be flashed into a mobile system on demand. |
format | Article |
id | doaj-art-9b0c3ec8c05e431c80028725396a6b33 |
institution | Kabale University |
issn | 1687-7195 1687-7209 |
language | English |
publishDate | 2011-01-01 |
publisher | Wiley |
record_format | Article |
series | International Journal of Reconfigurable Computing |
spelling | doaj-art-9b0c3ec8c05e431c80028725396a6b332025-02-03T01:28:54ZengWileyInternational Journal of Reconfigurable Computing1687-71951687-72092011-01-01201110.1155/2011/820454820454A Security Scheme for Dependable Key Insertion in Mobile Embedded DevicesAlexander Klimm0Benjamin Glas1Matthias Wachs2Sebastian Vogel3Klaus D. Müller-Glaser4Jürgen Becker5Institute for Information Processing Technology, Karlsruhe Institute of Technology (KIT), 76021 Karlsruhe, GermanyInstitute for Information Processing Technology, Karlsruhe Institute of Technology (KIT), 76021 Karlsruhe, GermanyInstitute for Information Processing Technology, Karlsruhe Institute of Technology (KIT), 76021 Karlsruhe, GermanyInstitute for Information Processing Technology, Karlsruhe Institute of Technology (KIT), 76021 Karlsruhe, GermanyInstitute for Information Processing Technology, Karlsruhe Institute of Technology (KIT), 76021 Karlsruhe, GermanyInstitute for Information Processing Technology, Karlsruhe Institute of Technology (KIT), 76021 Karlsruhe, GermanyPublic Key Cryptography enables entity authentication protocols based on a platform's knowledge of other platforms' public key. This is particularly advantageous for embedded systems, such as FPGA platforms, with limited or none read-protected memory resources. For access control systems, an access token is authenticated by the mobile system. Only the public key of authorized tokens needs to be stored inside the mobile platform. At some point during the platform's lifetime, these might need to be updated in the field due to loss or damage of tokens. This paper proposes a holistic approach for an automotive access control system based on Public Key Cryptography. Next to a FPGA-based hardware architecture, we focus on a secure scheme for key flashing of public keys to highly mobile systems. The main goal of the proposed scheme is the minimization of online dependencies to Trusted Third Parties, Certification Authorities, or the like, to enable key flashing in remote locations with only minor technical infrastructure. Introducing trusted mediator devices, new tokens can be authorized and later their public key can be flashed into a mobile system on demand.http://dx.doi.org/10.1155/2011/820454 |
spellingShingle | Alexander Klimm Benjamin Glas Matthias Wachs Sebastian Vogel Klaus D. Müller-Glaser Jürgen Becker A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices International Journal of Reconfigurable Computing |
title | A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices |
title_full | A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices |
title_fullStr | A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices |
title_full_unstemmed | A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices |
title_short | A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices |
title_sort | security scheme for dependable key insertion in mobile embedded devices |
url | http://dx.doi.org/10.1155/2011/820454 |
work_keys_str_mv | AT alexanderklimm asecurityschemefordependablekeyinsertioninmobileembeddeddevices AT benjaminglas asecurityschemefordependablekeyinsertioninmobileembeddeddevices AT matthiaswachs asecurityschemefordependablekeyinsertioninmobileembeddeddevices AT sebastianvogel asecurityschemefordependablekeyinsertioninmobileembeddeddevices AT klausdmullerglaser asecurityschemefordependablekeyinsertioninmobileembeddeddevices AT jurgenbecker asecurityschemefordependablekeyinsertioninmobileembeddeddevices AT alexanderklimm securityschemefordependablekeyinsertioninmobileembeddeddevices AT benjaminglas securityschemefordependablekeyinsertioninmobileembeddeddevices AT matthiaswachs securityschemefordependablekeyinsertioninmobileembeddeddevices AT sebastianvogel securityschemefordependablekeyinsertioninmobileembeddeddevices AT klausdmullerglaser securityschemefordependablekeyinsertioninmobileembeddeddevices AT jurgenbecker securityschemefordependablekeyinsertioninmobileembeddeddevices |