Home // SECURWARE 2011, The Fifth International Conference on Emerging Security Information, Systems and Technologies // View article
Protecting Remote Component Authentication
Authors:
Rainer Falk
Steffen Fries
Keywords: device authentication, counterfeiting, tunneled authentication
Abstract:
Component authentication allows verifying the genuineness of various components being part of a machine or a system or connected to control equipment. Various technologies are used, ranging from holograms, hidden marks, special inks to cryptography-based component authentication. Typical cryptography-based mechanisms employ a challenge-response-based component authentication mechanism. These mechanisms have been designed originally for a local verification, i.e., for an authentication performed in direct vicinity of the product to be verified. This paper describes an attack on challenge-response component authentication when supporting a remote component authentication and describes a new security measure to prevent this attack.
Pages: 19 to 24
Copyright: Copyright (c) IARIA, 2011
Publication date: August 21, 2011
Published in: conference
ISSN: 2162-2116
ISBN: 978-1-61208-146-5
Location: Nice/Saint Laurent du Var, France
Dates: from August 21, 2011 to August 27, 2011