security.wiznet.de

Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond - Scientific paper

Abstract

The overwhelmingly widespread use of Internet of Things (IoT) in different application domains brought not only benefits, but, alas, security concerns as a result of the increased attack surface and vectors. One of the most critical mechanisms in IoT infrastructure is key management. This paper reflects on the problems and challenges of existing key management systems, starting with the discussion of a recent real-world attack. We identify and elaborate on the drawbacks of security primitives based purely on physical variations and – after highlighting the problems of such systems – continue on to deduce an effective and cost-efficient key management solution for IoT systems extending the symbiotic security approach in a previous work. The symbiotic architecture combines software, firmware, and hardware resources for secure IoT while avoiding the traditional scheme of static key storage and generating entropy for key material on-the-fly via a combination of a Physical Unclonable Func tion (PUF) and pseudo-random bits pre-populated in firmware.

Read Full Article
Authors:
Witali Bartsch
Witali Bartsch

Dipl.-Ing. IT Security
Head of Security Solutions

Owen Millwood
Owen Millwood

Security Architect

Prosanta Gope
Prosanta Gope

Dr.

Elif Bilge Kavun
Elif Bilge Kavun

Prof. Dr.

Andriy Panchenko
Andriy Panchenko

Prof. Dr.-Ing.

Ilia Polian
Ilia Polian

Prof. Dr. rer. nat. habil.