Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

On the secure distribution of vendor-specific keys in deployment scenarios

 
: Kuntze, Nicolai; Fuchs, Anderas; Rudolph, Carsten

:

Federrath, H. ; International Federation for Information Processing -IFIP-; International Federation for Information Processing -IFIP-, Technical Committee 11, Security and Protection in Information Processing Systems:
ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015 : Hamburg, Germany, May 26-28, 2015, Proceedings
Cham: Springer International Publishing, 2015 (IFIP International Federation for Information Processing 455)
ISBN: 978-3-319-18466-1 (Print)
ISBN: 978-3-319-18467-8 (Online)
ISBN: 3-319-18466-0
S.630-644
International Conference on ICT Systems Security and Privacy Protection (SEC) <30, 2015, Hamburg>
Englisch
Konferenzbeitrag
Fraunhofer SIT ()

Abstract
Product counterfeit is a tremendous challenge for vendors in many areas. Particularly important is a prevention of product counterfeit where products like telecommunication devices interact with other systems and thus a malfunctioning of a single device can jeopardize the complete system. This can also deteriorate the reputation of the vendor. Furthermore, violation of intellectual properties can cause financial losses. Detection of product counterfeit can be based on tracking back each device to the production process of the vendor to ensure the product origin. Devices without a verified source can then be considered counterfeit with a high potential to be malicious or of low quality. Vendors already apply vendor-specific security technologies protecting the distribution. These often empl oy special hardware-based security mechanisms specifically designed for a particular range of products. This publication shows the usage of the already available Trusted Platform Module to allow for distribution channel protection and to leverage overall security by allowing the secure identification of a specific device. It also explains a few additional Trusted Platform Module functionalities that can be used.

: http://publica.fraunhofer.de/dokumente/N-379332.html