Abstract
The types of physical attacks on smart grid devices range from simple approaches, such as exploiting open interfaces, over side-channel attacks, to sophisticated methods such as fault attacks or integrated circuit (IC) reverse engineering. The basic methods to counteract such attacks include a system design, where information is also protected inside a device, and where no unwanted interfaces are exposed. Hardware security modules can be used to store secret data, such as key material, in a way that is more difficult to access by an attacker. They can be also used as a trust anchor for providing tamper resistance, and to prove a device’s integrity to a third party. A new alternative, and a main focus of this chapter, are physical uncloneable functions, where the individual characteristic of physical parameters of a piece of hardware are used to derive individual fingerprints used as a cornerstone for future encryption approaches.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.