HARDWARE ROOT OF TRUST BASED TPM: THE INHERENT OF 5IRECHAIN SECURITY

Authors: Vilma Mattila, Prateek Dwivedi, Pratik Gauri & Dhanraj Dadhich

ABSTRACT

The hardware root of trust is already a critical component of the security architecture of enterprise and government networks that allows for efficiently deployed and managed data protection across the entire data life cycle. For all these reasons, the TPM will be a major area of attention for security professionals today and tomorrow. The 5ire ecosystem ensures that all the nodes in the blockchain ecosystem establish a certain level of trust. A hardware root of trust based on the Trusted Platform Module (TPM) is introduced for this purpose. A TPM device will allow the 5ire nodes to remotely attest the devices for any malicious code.

Keywords: TPM; Trusted Platform; 5irechain Security; Privacy

REFERENCES

  • Perrig, R. Szewczyk, V. Wen, D. culler, D. Tygar. SPINS: Security protocols for sensor network. Wireless Networks Jounral, 2002.
  • Bahga, A., Madisetti, V.K., Blockchain platform for industrial Internet of Things, J. Softw. Eng. Appl. 9(10), 533 (2016)
  • Boohyung Lee, Jong-Hyouk Lee, Blockchain-based secure firmware update for embedded devices in an Internet of Things environment, The Journal of Supercomputing, Volume 73, Issue 3, March 2017
  • Boudguiga et al, Towards Better Availability and Accountability for IoT Updates by means of a Blockchain, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Paris, France
  • Endpoint Security: Hardware Roots of Trust,” by Derek Brink, June 2012. http://www.aberdeen.com/Aberdeen-Library/7080/RA-trusted-computing-security.aspx
  • Internet of Things, IEEE Access, V. 4, 2016
  • K Christidis, M Devetsikiotis, Blockchains and Smart Contracts for the
  • Kouzinopoulos C.S. et al., Using Blockchains to Strengthen the Security of Internet of Things. Security in Computer and Information Sciences. Euro-CYBERSEC 2018, vol 821. Springer,
  • Basagni, K. Herrin, E. Rosti, and D. Bruschi. Secure pebblenets. In Proceedings of ACM MOBICHOC.
  • J. S. Zhu, S. Setia. LEAP: Efficient security mechanism for largescale distributed sensor networks. ACM CCS. 2003.
  • Safenet, a TCG member, is the supplier of HSMs to Amazon Web Services (AWS), which announced the CloudHSM product in April of 2013. http://aws.amazon.com/cloudhsm
  • Shepherd et al, Secure and Trusted Execution: Past, Present, and Future – A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems, 2016 IEEE Trustcom, Tianjin, China
  • SJ Johnston, M Scott, SJ Cox, Recommendations for securing Internet of Things devices using commodity hardware, IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA, 2016
  • TCG, “How to Use the TPM: A Guide to Hardware-Based Endpoint Security, http://www.trustedcomputinggroup.org/resources/how_to_use_the_tpm_a_guide_to_hard warebased_endpoint_security
  • Trusted Computing Group: http://www.trustedcomputinggroup.org/