Advances in Protecting Remote Component Authentication
Component authentication allows verifying the originality of various components being part of a machine or a system, or being connected to control equipment. Various technologies are available, ranging from holograms, hidden marks, and special inks to cryptography-based component authentication. Typical applied cryptography-based mechanisms employ a challenge-response-based component authentication mechanism. These component authentication mechanisms have been designed originally for local genuineness verification, i.e., for an authentication performed in direct vicinity of the component to be verified. However, it may be useful to support also a remote component authentication, e.g., to verify the integrity of the control system including its periphery from a central monitoring station.
Provided by: IARIA Topic: Security Date Added: Jul 2012 Format: PDF