Trusted Computing Concepts for Resilient Embedded Networks

Trusted Computing concepts have proven well in the conventional oce ICT area. Since interconnected embedded devices have penetrated many application areas with high requirements for safety and security, the risk of ICT-based attacks is considerably growing. Consequently additional security measures are of utmost importance which can give assurance in the correct behavior of the device. Introducing Trusted Computing to embedded architectures on the one hand raises new problem statements which have to be solved, however on the other hand due to the dierent operating environment new possibilities of implementing security features open up. This paper presents a prototype for embedded Trusted Computing on networked ARM-based systems addressing these issues. In detail it covers dierent approaches for the establishment of initial trust into an individual device as well as health monitoring, system attestation and reporting capabilities. In addition a proposal for easy set-up-, update- and maintenanceprocedures will be given. Besides, the fundamental ideas of this work can be easily adopted to other embedded architectures.

[1]  Trent Jaeger,et al.  Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.

[2]  Carsten Rudolph,et al.  On the automatic establishment of security relations for devices , 2013, 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013).