TY - GEN
T1 - Mobile components security
AU - Arazi, Benjamin
PY - 2008/12/1
Y1 - 2008/12/1
N2 - Secure communications among mobile components, like wireless sensors and RFID tags, emerge as a fundamental branch of network security, needing message confidentiality, integrity and authentication. That is: protecting the content of transmitted information, assuring that it was not altered during transmission, and proving that it was sent by an approved identified source. Object integrity is another very relevant security application. Here, the purpose is to prove that an object, having storage and transmission facilities, is not cloned. We treat the hardware implementation of security measures in mobile components while considering two major issues: Resource constraints: Such components operate under highly constrained conditions, posing a demand for minimal logic hardware while providing for approved and recognized security level. Memory security: Wireless Sensors and RFID tags are deployed in hostile environments, enhancing a need for tamper-proof storage of their secret keys. The contribution of the paper is 3-fold: - We present a novel approach to hardware minimization, serving message security while relying on approved security levels,- We show that memory security is not merely a physical problem, apparently independent of the served applications. This observation can be made general. Attention is devoted to recently announced logic gates fabrication techniques, and their relation to the devised approach, as well as their potential contribution to general security applications.
AB - Secure communications among mobile components, like wireless sensors and RFID tags, emerge as a fundamental branch of network security, needing message confidentiality, integrity and authentication. That is: protecting the content of transmitted information, assuring that it was not altered during transmission, and proving that it was sent by an approved identified source. Object integrity is another very relevant security application. Here, the purpose is to prove that an object, having storage and transmission facilities, is not cloned. We treat the hardware implementation of security measures in mobile components while considering two major issues: Resource constraints: Such components operate under highly constrained conditions, posing a demand for minimal logic hardware while providing for approved and recognized security level. Memory security: Wireless Sensors and RFID tags are deployed in hostile environments, enhancing a need for tamper-proof storage of their secret keys. The contribution of the paper is 3-fold: - We present a novel approach to hardware minimization, serving message security while relying on approved security levels,- We show that memory security is not merely a physical problem, apparently independent of the served applications. This observation can be made general. Attention is devoted to recently announced logic gates fabrication techniques, and their relation to the devised approach, as well as their potential contribution to general security applications.
KW - DNA computing
KW - Memory tampering
KW - Mobile components
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=62849126503&partnerID=8YFLogxK
U2 - 10.1145/1413140.1413179
DO - 10.1145/1413140.1413179
M3 - Conference contribution
AN - SCOPUS:62849126503
SN - 9781605580982
T3 - CSIIRW'08 - 4th Annual Cyber Security and Information Intelligence Research Workshop: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead
BT - CSIIRW'08 - 4th Annual Cyber Security and Information Intelligence Research Workshop
T2 - 4th Annual Cyber Security and Information Intelligence Research Workshop: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead, CSIIRW'08
Y2 - 12 May 2008 through 14 May 2008
ER -