The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2022
DOI: 10.1109/access.2022.3217815
|View full text |Cite
|
Sign up to set email alerts
|

Integration of Hardware Security Modules and Permissioned Blockchain in Industrial IoT Networks

Abstract: Hardware Security Modules (HSM) serve as a hardware based root of trust that offers physical protection while adding a new security layer in the system architecture. When combined with decentralized access technologies as Blockchain, HSM offers robustness and complete reliability enabling secured end-to-end mechanisms for authenticity, authorization and integrity. This work proposes an efficient integration of HSM and Blockchain technologies focusing on, mainly, public-key cryptography algorithms and standards… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 55 publications
(53 reference statements)
0
8
0
Order By: Relevance
“…Smart home devices have varying lifespans and may become vulnerable to security exploits as they age or become obsolete. Researchers propose security-aware practices such as secure firmware updates, end-of-life protocols, and responsible disposal mechanisms to mitigate the risks of dormant vulnerabilities and ensure the long-term security of smart home infrastructures [62]. By addressing security issues at each stage of the device lifecycle, stakeholders can minimize exposure to potential threats and maintain the integrity of smart home environments [8].…”
Section: Security-aware Device Lifecycle Managementmentioning
confidence: 99%
“…Smart home devices have varying lifespans and may become vulnerable to security exploits as they age or become obsolete. Researchers propose security-aware practices such as secure firmware updates, end-of-life protocols, and responsible disposal mechanisms to mitigate the risks of dormant vulnerabilities and ensure the long-term security of smart home infrastructures [62]. By addressing security issues at each stage of the device lifecycle, stakeholders can minimize exposure to potential threats and maintain the integrity of smart home environments [8].…”
Section: Security-aware Device Lifecycle Managementmentioning
confidence: 99%
“…A method to prevent malicious attacks such as spoofing has been proposed by generating a device-specific signature using a function that cannot be duplicated physically, i.e., Physically Unclonable Function (PUF) [17]. Cabrera Gutierrez et al [18] claim that the robustness and reliability of HSM are essential for IoT devices. While countermeasures to improve the security based on these HSMs can optimize the design of IoT devices for specific purposes, development time and cost increase since different hardware and software designs are required for each application.…”
Section: Analysis Of Existing Security Service For Iot Devicesmentioning
confidence: 99%
“…Elliptic Curve Cryptography is a relatively new type of cryptography that Koblitz et al 25 independently proposed in the latter half of the 19th century. Due to the same level of security they offer with significantly smaller key sizes than traditional public-key cryptosystems, it has since attracted a lot of attention and grown immensely popular 26,27 . The ECC includes key exchange, the Elliptic Curve Digital Signature Algorithm(ECDSA), and all pertinent asymmetric cryptographic primitives 28,29 .…”
Section: Elliptic Curvementioning
confidence: 99%