Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Hardware Root of Trust on IoT Gateway
Halmstad University, School of Information Technology.
Halmstad University, School of Information Technology.
2019 (English)Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

Gateways play a vital role in the Internet of Things (IoT) infrastructure. Gateways are widely used and their usage range from industries to smart homes. As they have expanded nowadays to have internet connectivity which raises certain security issues like being exposed to various threats and cyber-attacks such as rootkits, bootkits. Many researches and developmentswere made to countermeasure these problems. One of the significant developments was Root ofTrust (RoT). RoT can be enabled both by using hardware such as a chip named Trusted PlatformModule (TPM) and using software like Trusted Execution Environment (TEE).We propose amethod on how to enable RoT using the chip TPM 2.0 on a product, a Gateway named GWen from the company HMS Industrial Networks AB using the TPM software stack TSS2.0. We have performed tests on cryptographic operations such as key generation, key usage, and secure key storage and have shown the results in this report. Based on our results, adding and enabling the TPM 2.0 to the GWen enhances the security of its Linux distribution and makes it possible tosecurely identify and authenticate the gateway based on its secret keys that are stored securelyinside it’s TPM.

Place, publisher, year, edition, pages
2019.
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:hh:diva-40120OAI: oai:DiVA.org:hh-40120DiVA, id: diva2:1334382
External cooperation
HMS Industrial Networks AB
Subject / course
Digital Forensics
Educational program
Master's Programme in Network Forensics, 60 credits
Supervisors
Examiners
Available from: 2019-07-05 Created: 2019-07-02 Last updated: 2019-07-05Bibliographically approved

Open Access in DiVA

fulltext(2312 kB)49 downloads
File information
File name FULLTEXT02.pdfFile size 2312 kBChecksum SHA-512
4699b166a2546522bbfc341df2040cb9de2845671e409a522ca9c38c6843dea68dece332b2669c78cee95bee77ce235f9b51b45a63417dbc4cf3cc9740a6228e
Type fulltextMimetype application/pdf

By organisation
School of Information Technology
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 49 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 258 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf