IIC Journal of Innovation 3rd Edition | Page 15

Blurry Box Encryption Scheme and Why it Matters to Industrial IoT
3. Code modification 4. Insertion of traps, i. e., program code which is not functionally required, but can lock the keys 5. Selection of code variants in a secure element hardware 6. State behavior of decryption hardware
5.2 PROTECTION AGAINST COUNTERFEITING
Using the mechanisms above – and storing cryptographic keys in unclonable, secure hardware – provides protection against counterfeiting. According to a survey by German engineering federation VDMA published in 2016 8, 90 % of industrial machine vendors are affected by product piracy – half of them by the counterfeiting of entire machines. Dr. Festge, president of VDMA( Verband Deutscher Maschinen- und Anlagenbau, Mechanical Engineering Industry Association), said“ As data is becoming the lifeblood of commercial value creation, counterfeiters and product pirates will be taking the same route. Simply copying the nuts and bolts or discrete circuitry will not be enough for them. They will be targeting digital designs, the software running on our machines, and the data stored in our databases.”
5.3 PROTECTION AGAINST TAMPERING
Pieces of machinery are increasingly brought to life by software. It is the software operating the device that enables functions and features, making it essential that only genuine, not manipulated program code from authorized parties can be executed. Protected code cannot be tampered with and can execute secure mechanisms for software updates and upgrades.
5.4 BENEFITS OF SOFTWARE LICENSING
By shifting the added value from hardware to software, vendors can benefit from cheaper logistics and production. Devices, machines, and software are deployed in identical versions for all users. Only the individual licensing decides how the vendor’ s product can be used in practice. License deployment is unique for each product or user, but also highly automated through integration in ERP systems like SAP or ecommerce platforms.
More important than cost reduction are the opportunities this creates for expanding one’ s target group by tailoring solutions to each customer’ s needs and configuring product features via licensing. Furthermore, an app-store-like concept can be introduced to seize new post-sales opportunities or recurring revenue streams in the form of pay-per-use or subscription models and more. This helps vendors increase their revenues over their products’ lifetime, gives users more flexibility, and reduces upfront investments.
The security goals and possible benefits of these solutions are illustrated in these use cases.
8
Steffen Zimmermann,“ Study on Product Piracy 2016,” VDMA, April 2016( http:// pks. vdma. org / article /- / articleview / 13069313)
- 14- June 2016