Publications

On the secure distribution of vendor-specific keys in deployment scenarios

AuthorKuntze, Nicolai; Fuchs, Anderas; Rudolph, Carsten
Date2015
TypeConference Paper
AbstractProduct counterfeit is a tremendous challenge for vendors in many areas. Particularly important is a prevention of product counterfeit where products like telecommunication devices interact with other systems and thus a malfunctioning of a single device can jeopardize the complete system. This can also deteriorate the reputation of the vendor. Furthermore, violation of intellectual properties can cause financial losses. Detection of product counterfeit can be based on tracking back each device to the production process of the vendor to ensure the product origin. Devices without a verified source can then be considered counterfeit with a high potential to be malicious or of low quality. Vendors already apply vendor-specific security technologies protecting the distribution. These often empl oy special hardware-based security mechanisms specifically designed for a particular range of products. This publication shows the usage of the already available Trusted Platform Module to allow for distribution channel protection and to leverage overall security by allowing the secure identification of a specific device. It also explains a few additional Trusted Platform Module functionalities that can be used.
ConferenceInternational Conference on ICT Systems Security and Privacy Protection (SEC) <30, 2015, Hamburg>
PartFederrath, H.: ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015: Hamburg, Germany, May 26-28, 2015, Proceedings. Cham: Springer International Publishing, 2015. (IFIP International Federation for Information Processing 455), pp. 630-644
PartnISBN : 9783319184661 (print), 9783319184678 (online)