BAS + ECE February 2015 - page 15

15
S
afety
& S
ecurity
February 2015
can be efficiently protected using this hardware-based approach.
Coming back to the initial point of discussion - new business models
and opportunities in the context of the Internet of Things - there are
already numerous use cases and examples demonstrating how hard-
ware-based security solutions add real value in terms of integrity and
reliability of connected devices.
For example Infineon has been shipping TPMs for devices running
Google’s Chrome-based operating system since 2011. The Infineon
TPM is an integral part of the security architecture of Google
Chromebooks which were designed to provide a fast, simple and
secured experience for people who use computing devices primarily
to access the Internet and use web-based applications. One key part
of their design is called defense in depth, which provides multiple
levels of protection against malware.
Meanwhile the structure of the TPM standard was enhanced with
some specific functions and interfaces added to support new applica-
tions. New profiles of the TPMs can address security relevant applica-
tions in the IT industry, but also in embedded systems, smartphones,
communications equipment, industrial automation or automotive. In
addition TPMs include a comprehensive software stack enabling a
secure upgrade.
Automotive is a also an arising field of application - as there are a lot
of features and functions already widely based on hardware security,
designed in response to the level of security required by the specific
application. The microcontrollers of the AURIX family for example
provide special function blocks such as security hardware extensions
(SHE) or hardware security modules (HSM). The HSM takes care of
secured communication with other microcontrollers by signing mes-
sages or even using full encryption.
Furthermore, the HSM can be used to securely boot the microcon-
troller in order to prevent attacks from viruses and Trojans, and to
prevent unauthorized access. With regard to the fact that the car is
becoming an increasingly connected computing device communicat-
ing with other vehicles and infrastructure, TPMs will become indis-
pensable to protect the car’s communication interfaces from hacker
attackers or malware during software updates.
n
Figure 2. The microcontrollers of the AURIX family provide special
function blocks such as security hardware extensions (SHE) or hard-
ware security modules (HSM).
1...,5,6,7,8,9,10,11,12,13,14 16,17,18,19,20,21,22,23,24,25,...56
Powered by FlippingBook