scispace - formally typeset
Search or ask a question
Author

Andrea Hoeller

Bio: Andrea Hoeller is an academic researcher from Infineon Technologies. The author has contributed to research in topics: Private network & Transport Layer Security. The author has an hindex of 2, co-authored 3 publications receiving 10 citations.

Papers
More filters
Proceedings ArticleDOI
23 Apr 2018
TL;DR: This paper supports developers in identifying the implications of using TPMs on the dependability of their system by considering the resulting safety, reliability, and availability and discusses the potential of enhancing the dependable of TPM services by applying traditional redundancy techniques.
Abstract: Cyber physical systems are the key innovation driver for many domains such as automotive, avionics, industrial process control, and factory automation. However, their interconnection potentially provides adversaries easy access to sensitive data, code, and configurations. If attackers gain control, material damage or even harm to people must be expected. To counteract data theft, system manipulation and cyber-attacks, security mechanisms must be embedded in the cyber physical system. Adding hardware security in the form of the standardized Trusted Platform Module (TPM) is a promising approach. At the same time, traditional dependability features such as safety, availability, and reliability have to be maintained. To determine the right balance between security and dependability it is essential to understand their interferences. This paper supports developers in identifying the implications of using TPMs on the dependability of their system.We highlight potential consequences of adding TPMs to cyber-physical systems by considering the resulting safety, reliability, and availability. Furthermore, we discuss the potential of enhancing the dependability of TPM services by applying traditional redundancy techniques.

12 citations

Proceedings ArticleDOI
01 Sep 2017
TL;DR: The results indicate that the proposed architecture provides reasonable security at acceptable costs and can serve as template for many applications in the Internet of Things (IoT) context.
Abstract: Providing reasonable security is a fundamental requirement in building and home automation. The authenticity of devices must be protected to prevent cloned or corrupted devices from joining a private network. State-of-the-art systems already provide secured communication links either by a security layer in the interface protocol stack (e.g. the Security Manager Protocol in Bluetooth Low Energy) or by using the Transport Layer Security (TLS) protocol on top of the interface protocol. These solutions have in common that they only protect the communication links. Thus the system is still vulnerable to active and passive physical attacks that aim to clone the device or to extract the used keys. We show an approach with off-the-shelf security trust anchors that allows securing a device against such attacks. The proposed solution allows product authentication with low-cost ready-to-use components which can be easily integrated in an architecture similar to existing proposals. We demonstrate the feasibility of the approach by presenting a prototype implementation and discuss performance and security implications. The results indicate that the proposed architecture provides reasonable security at acceptable costs and can serve as template for many applications in the Internet of Things (IoT) context.

4 citations

Patent
02 Oct 2013
TL;DR: In this paper, a processing device for multiplication of a first polynomial with a second polynomial is described, including a first memory storing a representation of the first polynomials, a second memory storing pre-determined results of the multiplications of the second polynomials, and a third memory for storing the result of the multiplication.
Abstract: According to one embodiment, a processing device for multiplying a first polynomial with a second polynomial is described including a first memory storing a representation of the first polynomial, a controller configured to separate the first polynomial into parts, a second memory storing pre-determined results of the multiplications of the second polynomial with possible forms of the parts of the first polynomial, a third memory for storing the result of the multiplication, an address logic, configured to determine, for each part of the first polynomial, a start address of a memory block of the second memory based on the form of the part and the location of the part within the first polynomial and an adder configured to add, for each determined address of the memory block of the second memory, the content of the memory block of the second memory at least partially to the contents of the third memory, wherein the data element of the third memory to which the content of a data element of the memory block of the second memory is added is the same for a plurality of the parts of the first polynomial.

Cited by
More filters
Journal ArticleDOI
TL;DR: This paper consists of two contributions: the primary contribution is a systematic review of the literature over the period 2011–2019 on IIoT Security, focusing on how the relatively new paradigm of Fog computing can be leveraged to address these requirements, and thus improve the security of the IIeT.
Abstract: A key application of the Internet of Things (IoT) paradigm lies within industrial contexts. Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry 4.0, promises to revolutionize production and manufacturing through the use of large numbers of networked embedded sensing devices, and the combination of emerging computing technologies, such as Fog/Cloud Computing and Artificial Intelligence. The IIoT is characterized by an increased degree of inter-connectivity, which not only creates opportunities for the industries that adopt it, but also for cyber-criminals. Indeed, IoT security currently represents one of the major obstacles that prevent the widespread adoption of IIoT technology. Unsurprisingly, such concerns led to an exponential growth of published research over the last few years. To get an overview of the field, we deem it important to systematically survey the academic literature so far, and distill from it various security requirements as well as their popularity. This paper consists of two contributions: our primary contribution is a systematic review of the literature over the period 2011–2019 on IIoT Security, focusing in particular on the security requirements of the IIoT. Our secondary contribution is a reflection on how the relatively new paradigm of Fog computing can be leveraged to address these requirements, and thus improve the security of the IIoT.

173 citations

Proceedings ArticleDOI
15 Apr 2019
TL;DR: This paper represents a preliminary work towards a systematic literature review of IIoT security requirements, focusing on the research method that will be used in the systematic work and a quantitative analysis of the results produced by the study selection process.
Abstract: Industry 4.0 and, in particular, Industrial Internet of Things (IIoT) represent two of the major automation and data exchange trends of the 21st century, driving a steady increase in the number of smart embedded devices used by industrial applications. However, IoT devices suffer from numerous security flaws, resulting in a number of large scale cyber-attacks. In this light, Fog computing, a relatively new paradigm born from the necessity of bridging the gap between Cloud computing and IoT, can be used as a security solution for the IIoT. To achieve this, the first step is to clearly identify the security requirements of the IIoT that can be subsequently used to design security solutions based on Fog computing. With this in mind, our paper represents a preliminary work towards a systematic literature review of IIoT security requirements. We focus on two key steps of the review: (1) the research method that will be used in the systematic work and (2) a quantitative analysis of the results produced by the study selection process. This lays the necessary foundations to enable the use of Fog computing as a security solution for the IIoT.

22 citations

Book ChapterDOI
01 Jan 2019
TL;DR: This chapter introduces a detailed survey of threats and security challenges in different components of the Industry 4.0 systems and categorizes them based on their possible impact on systems.
Abstract: Although the concept of Industry 4.0 was introduced in 2011 at the Hannover Fair, it was only recently that it gained major attention. The fourth industrial revolution, referred to as Industry 4.0, is based mainly on cyber-physical systems along with their supporting technologies. The four design principles of Industry 4.0 are interoperability, information transparency, technical assistance, and decentralized decisions. Each one of these design principles generates new attack surfaces that can be exploited by malicious attackers. As with any other system, security challenges arise with every new technology used. These challenges can range from simple threats that can easily be mitigated or even ignored, all the way up to threats that can render the whole system unusable. In this chapter, we introduce a detailed survey of threats and security challenges in different components of the Industry 4.0 systems. These threats will be categorized based on their possible impact on systems, and information about some countermeasures will be introduced as well.

18 citations

DOI
22 Sep 2021
TL;DR: In this article, a systematic literature review method was used to examine the various capabilities, boards, and structures of blockchain technology, and the expected result of this research is that blockchain technology can create trust and security in cooperative settings.
Abstract: The website currently has no separate provisions to distinguish between an organization or an individual. In other words, cooperatives are expected to be able to collect and store their client data. Such a rule has a high cost for specialist cooperatives, as most of the data is copied to multiple servers, difficult to prove by a large amount of user information around the world, and various certification arrangements for various administrations. The aim of this research is that individual data can be collected safely and reliably for information mining, profiling, and data storage. The ideal order would act naturally with a sovereign personality, another type of character that each client has and controls. This setup will incorporate compressed people's way of life like cryptographically checked characteristic settings backed by trusted backers. Individuals provide evidence of personality and participation by providing a workable part of their character to organizational specialists. Consent to access may also be revoked as a result of giving the individual full control over his or her information. Using a systematic literature review method, this research fundamentally examines the various capabilities, boards, and structures of Blockchain technology. Synopsis of the latest Blockchain-based personalities, executives, and lever arrangements from 2017 to 2021. The expected result of this research is that Blockchain technology can create trust and security in cooperative settings.

15 citations

Journal ArticleDOI
27 Sep 2019-Sensors
TL;DR: This paper attempts to respond to the security issue caused by legacy structures using insecure communication protocols (e.g., Modbus TCP, DNP3, S7), presenting a different perspective focused on the capabilities of a trusted platform module (TPM).
Abstract: The increased number of cyber threats against the Supervisory Control and Data Acquisition (SCADA) and automation systems in the Industrial-Internet-of-Things (IIoT) and Industry 4.0 era has raised concerns in respect to the importance of securing critical infrastructures and manufacturing plants. The evolution towards interconnection and interoperability has expanded the vulnerabilities of these systems, especially in the context of the widely spread legacy standard protocols, by exposing the data to the outside network. After gaining access to the system data by launching a variety of attacks, an intruder can cause severe damage to the industrial process in place. Hence, this paper attempts to respond to the security issue caused by legacy structures using insecure communication protocols (e.g., Modbus TCP, DNP3, S7), presenting a different perspective focused on the capabilities of a trusted platform module (TPM). Furthermore, the intent is to assure the authenticity of the data transmitted between two entities on the same (horizontal interoperation) or different (vertical interoperation) hierarchical levels communicating through Modbus TCP protocol based on functionalities obtained by integrating trusted platform modules. From the experimental results perspective, the paper aims to show the advantages of integrating TPMs in automation/SCADA systems in terms of security. Two methods are proposed in order to assure the authenticity of the messages which are transmitted, respectively the study presents the measurements related to the increased time latency introduced due to the proposed concept.

13 citations