2011
DOI: 10.1155/2011/820454
|View full text |Cite
|
Sign up to set email alerts
|

A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices

Abstract: Public Key Cryptography enables entity authentication protocols based on a platform's knowledge of other platforms' public key. This is particularly advantageous for embedded systems, such as FPGA platforms, with limited or none read-protected memory resources. For access control systems, an access token is authenticated by the mobile system. Only the public key of authorized tokens needs to be stored inside the mobile platform. At some point during the platform's lifetime, these might need to be updated in th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2012
2012
2013
2013

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 16 publications
(19 reference statements)
0
3
0
Order By: Relevance
“…The auto-reconfiguration is the capacity of a system to reconfigure itself during runtime and without external influence. In such design, a System on Chip (SoC) is implemented in a reconfigurable FPGA, and it includes a controller used to communicate, reconfigure the partial reconfigurable region (Interface Configuration Access Port-ICAP) and manage the resulting data [7][8][9][10][11][12][13][14]. Therefore, partial-reconfiguration technology allows a node (RSN) to be auto-reconfigurable.…”
Section: Auto-reconfiguration Self-organized Wireless Sensors Networkmentioning
confidence: 99%
“…The auto-reconfiguration is the capacity of a system to reconfigure itself during runtime and without external influence. In such design, a System on Chip (SoC) is implemented in a reconfigurable FPGA, and it includes a controller used to communicate, reconfigure the partial reconfigurable region (Interface Configuration Access Port-ICAP) and manage the resulting data [7][8][9][10][11][12][13][14]. Therefore, partial-reconfiguration technology allows a node (RSN) to be auto-reconfigurable.…”
Section: Auto-reconfiguration Self-organized Wireless Sensors Networkmentioning
confidence: 99%
“…Generally, mobile authentication [21][22][23][24] can be implemented via traditional public-key cryptography [6,13]. However, mobile devices suffer from limited computation and battery capacity.…”
Section: Introductionmentioning
confidence: 99%
“…In real-world operation, the introduction of public keys is done in the field where user device is not necessarily under the control of OEM and a live online connection to OEM may not be possible. PKC is computationally very expensive, especially when aiming for high security levels [19]. More fine-grained access control commonly involves the use of access control matrices which specify permissions indexed by authenticated subject and object (resource), or equivalently, per-object access control lists specifying privileges associated with authenticated users [20].…”
Section: Introductionmentioning
confidence: 99%