Fortified-Grid: Fortifying Smart Grids through the Integration of the Trusted Platform Module in Internet of Things Devices [PDF]
This paper presents a hardware-assisted security primitive that integrates the Trusted Platform Module (TPM) into IoT devices for authentication in smart grids.
Giriraj Sharma+2 more
doaj +3 more sources
A novel architecture to virtualise a hardware-bound trusted platform module
Security and trust are particularly relevant in modern softwarised infrastructures, such as cloud environments, as applications are deployed on platforms owned by third parties, are publicly accessible on the Internet and can share the hardware with other tenants.
Marco De Benedictis+4 more
semanticscholar +4 more sources
Software Trusted Platform Module (SWTPM) Resource Sharing Scheme for Embedded Systems [PDF]
Embedded system networks are widely deployed across various domains and often perform mission-critical tasks, making it essential for all nodes within the system to be trustworthy.
Da-Chuan Chen+2 more
doaj +3 more sources
Blockchain-Based Services Implemented in a Microservices Architecture Using a Trusted Platform Module Applied to Electric Vehicle Charging Stations [PDF]
Microservice architectures exploit container-based virtualized services, which rarely use hardware-based cryptography. A trusted platform module (TPM) offers a hardware root for trust in services that makes use of cryptographic operations.
Antonio J. Cabrera-Gutiérrez+5 more
doaj +3 more sources
Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges [PDF]
With the increasing day-to-day acceptance of IOT computing, the issues related to it are also getting more attention. The current IOT computing infrastructure brings some security challenges concerned with the users/customers and CSP. The users can store
Mohammad Faisal+4 more
doaj +3 more sources
A Brief Reflection on Trusted Platform Module Support
: Trusted Computing and its Trusted Platform Module were introduced about 20 years ago. However, their impact is still limited, only a small number of applications use a TPM, only a few people know that their computer hosts one and what it can be used ...
Martin Pirker, R Haas
semanticscholar +3 more sources
A hijacker’s guide to communication interfaces of the trusted platform module
In this paper, we analyze the communication of trusted platform modules and their interface to the hosting platforms. While trusted platform modules are considered to be tamper resistant, the communication channel between these modules and the rest of the trusted platform turns out to be comparatively insecure.
Johannes Winter, Kurt Dietrich
semanticscholar +4 more sources
Using Trusted Platform Module (TPM) to Secure Business [PDF]
Safety of human life during journey is one of most important objective of intelligent transportation system (ITS). Potential safety and non -safety applications of vehicular ad hoc network (VANET) also provides safety of human lives and also comfort ...
Irshad Ahmed Sumra, Halabi Hasbullah
semanticscholar +4 more sources
Cryptographic Considerations for Automation and SCADA Systems Using Trusted Platform Modules [PDF]
The increased number of cyber threats against the Supervisory Control and Data Acquisition (SCADA) and automation systems in the Industrial-Internet-of-Things (IIoT) and Industry 4.0 era has raised concerns in respect to the importance of securing ...
Alexandra Tidrea+2 more
doaj +5 more sources
A Method of Data Storage and Management of Embedded Trusted Platform Module [PDF]
This paper firstly discusses the data storage and management of trusted platform module (TPM) system on a trusted PC, mainly including certificates and keys, platform configuration registers (PCR), and firmware program.
Gang Liu, Xun Zhang, Yuan Zhang
semanticscholar +5 more sources