Loading [MathJax]/extensions/TeX/ietmacros.js
Adaptive Security: Certificate and Key Rotation for Firmware Integrity | IEEE Conference Publication | IEEE Xplore

Adaptive Security: Certificate and Key Rotation for Firmware Integrity


Abstract:

This paper provides an overview of several device architectures that allow for key rotation. Key rotation is important due to the frequency of lost signing keys, but it i...Show More

Abstract:

This paper provides an overview of several device architectures that allow for key rotation. Key rotation is important due to the frequency of lost signing keys, but it is difficult for Industrial Internet of Things (IIOT) devices due to limited resources during a secure boot process and the constraints of the firmware utilities that come from the chip vendors. The intent of this paper is to provide a practitioner’s perspective on this challenge and the tradeoff in hopes of inviting comments from chip vendors and the broader community.
Date of Conference: 18-20 October 2023
Date Added to IEEE Xplore: 08 November 2023
ISBN Information:
Conference Location: Atlanta, GA, USA
Citations are not available for this document.

I. Introduction

IIOT is becoming increasingly valuable to operations because of its low cost and can be updated with features tailored to precise user needs. Risks from IIOT connections are generally known [1], however much of the discussion is focused on secure communication and cloud configurations [2]. As practitioners, we have experienced difficulties in finding specific guidance on device security topics, such as secure boot, provisioning sequences, key rotation, and others, even though the device is the most exposed component of the IIOT system.

Cites in Papers - |

Cites in Papers - Other Publishers (1)

1.
Sunil Joshi, Kenneth Crowther, Jarvis Robinson, "Tradeoffs in Key Rotation Strategies for Industrial Internet of Things Devices and Firmware", Applied Sciences, vol.14, no.21, pp.9942, 2024.

References

References is not available for this document.