Cyber Physical Systems typically operate unattended in hostile outdoor environments. A lot of effort has has been made to protect the communication between sensing nodes and the processing infrastructure. However, with regards to physical protection of a node, assessing the integrity of its hardware/software is a challenging issue. In this paper, we propose and evaluate a node architecture which makes use of Trusted Platform Module (TPM) to perform cryptographic operations in a trustworthy manner. TPM builds a chain of trust which enforces a trustability relationship among the node's components. In such context, the node will function only if all the hardware and software configurations have been verified by means of cryptographic operations. Moreover, using tamper resistant hardware we will ensure that the cryptographic keys do not leave a secure perimeter.

Advancing WSN physical security adopting TPM-based architectures / Barbareschi, M.; Battista, E.; Mazzeo, A.; Venkatesan, S.. - (2014), pp. 394-399. (Intervento presentato al convegno 15th IEEE International Conference on Information Reuse and Integration, IEEE IRI 2014 tenutosi a usa nel 2014) [10.1109/IRI.2014.7051916].

Advancing WSN physical security adopting TPM-based architectures

Barbareschi M.
;
Battista E.;
2014

Abstract

Cyber Physical Systems typically operate unattended in hostile outdoor environments. A lot of effort has has been made to protect the communication between sensing nodes and the processing infrastructure. However, with regards to physical protection of a node, assessing the integrity of its hardware/software is a challenging issue. In this paper, we propose and evaluate a node architecture which makes use of Trusted Platform Module (TPM) to perform cryptographic operations in a trustworthy manner. TPM builds a chain of trust which enforces a trustability relationship among the node's components. In such context, the node will function only if all the hardware and software configurations have been verified by means of cryptographic operations. Moreover, using tamper resistant hardware we will ensure that the cryptographic keys do not leave a secure perimeter.
2014
978-1-4799-5880-1
Advancing WSN physical security adopting TPM-based architectures / Barbareschi, M.; Battista, E.; Mazzeo, A.; Venkatesan, S.. - (2014), pp. 394-399. (Intervento presentato al convegno 15th IEEE International Conference on Information Reuse and Integration, IEEE IRI 2014 tenutosi a usa nel 2014) [10.1109/IRI.2014.7051916].
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11588/915786
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 13
  • ???jsp.display-item.citation.isi??? 8
social impact