2008 IEEE International Workshop on Hardware-Oriented Security and Trust 2008
DOI: 10.1109/hst.2008.4559060
|View full text |Cite
|
Sign up to set email alerts
|

Reassessing the TCG specifications for trusted computing in mobile and embedded systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 23 publications
0
9
0
Order By: Relevance
“…PHYSICAL DESIGN OF THE SENSOR NODE According to TCG documents [3], trust is defined as an entity that always behave in the expected manner for the intended purpose. In addition, from the TCG definitions, identity of the entity is equal to measurement.…”
Section: IImentioning
confidence: 99%
See 1 more Smart Citation
“…PHYSICAL DESIGN OF THE SENSOR NODE According to TCG documents [3], trust is defined as an entity that always behave in the expected manner for the intended purpose. In addition, from the TCG definitions, identity of the entity is equal to measurement.…”
Section: IImentioning
confidence: 99%
“…This technique is believed to be capable of reducing the size of the sensor node, and processing time and preventing software and physical attacks as well as providing other benefits. Johann et al in his paper [3] also concluded that hardware based security features need to be integrated into the processor to avoid vulnerabilities such as those which exist in today's personal computer. Besides secure implementation, the node also should communicate in a trusted environment.…”
Section: Introductionmentioning
confidence: 99%
“…The cost of TPM enabled device is high, as identified in Reference 21. The cost of a TPM hardware may be higher than what is affordable in a typical embedded device.…”
Section: Proposed Security Mechanismsmentioning
confidence: 99%
“…Encryption and decryption used RSA algorithm with default 2048-bit, SHA-1 hash and random key generator. TPM can be implemented in a dedicated chip, co-processor or in software (Grobschadl et al, 2008) where the configuration of TPM is vendor specific and is not specified by TCG. Fig.…”
Section: Trusted Platform Modulementioning
confidence: 99%
“…This technique is believed to be capable of reducing the size of the sensor node, decreasing the processing time and preventing software and physical attacks as well as providing other benefits. Johann et al in his paper (Grobschadl et al, 2008) also conclude that hardware based security features need to be integrated into the processor to avoid vulnerabilities such as those which exist in today's personal computer. Besides secure implementation, the node also should communicate in a trusted environment.…”
mentioning
confidence: 99%