Conferences and supporting programme
Secure Device Management for the Internet of Things
Many devices in the critical infrastructure are connected to the Internet ? traffic lights, water treatment plants, wind turbines, etc. Far-reaching introduction of IT technologies has made these infrastructures not only increasingly complex, but more vulnerable to cyber attack. Network security is increasingly difficult. Internet-connected devices require a reliable root of trust (RoT) to secure software and operations. An RoT consists of an immutable piece of hardware and trusted boot code, as well as a device-unique cryptographic identity that can be verified by the cloud infrastructure. Existing methods often rely on keys stored in one-time programmable memory, not scalable to the billions of devices in the IoT. In this presentation we introduce an alternative method, based on Physical Unclonable Functions (PUFs), for secure creation of a cryptographic identity. PUF technology enables a device's main processor chip to generate a cryptographic identity based on its unique silicon characteristics. To make these identities easily manageable, we introduce the concept of a 'security manager' service, which handles the complexity of securing connections among devices in the connected critical infrastructure. We describe protocols for device enrollment, authentication, (de)commissioning, encrypted communications, and secure updates. The application provider can use this service to securely operate all its devices, increasing trust and security in the infrastructure around us.
--- Date: 28.02.2019 Time: 12:00 - 12:30 Location: Conference Counter NCC Ost