Skip to main content

Node in 5ireChain to be Attested with Hardware Root of Trust

In the face of increasing sophistication of cyber attacks, the need for an immutable security protocol cannot be downplayed. The hardware components of a network infrastructure can be the point of penetration into a network. With malicious code installed in a hardware, the entire network can be taken down by attackers. 5ire is using Hardware Root of Trust to ensure that the program running on their nodes is malware-free. 

Node in 5ireChain to be Attested with Hardware Root of Trust

In network computing, one thing is certain, there is a threat nearby. But the fear remains the uncertainty of the next victim. 

While the computing world looks for an ultimate solution to secure their network perimeter from existing threats, cyber attackers are committing as much hard work to develop a malware that will penetrate the most secured network. 

Cyber warfare continues as security gets more sophisticated and comprehensive. However, as the world gets more decentralized and connected, new loopholes are inadvertently created.  The incentives of a successful penetration into a network gets more juicy and attackers will never sheath their sword. 

The security of a network is considered a priority. This is even more the case with blockchain networks as they grapple with the trilemma. 

In a bid to deploy a foolproof security layer to the 5ireChain network, 5ire is utilizing hardware root of trust at the foundation of its security layers.

How Hardware Root of Trust Works

Hardware root of Trust is a security protocol that embeds security to the hardware component of a network infrastructure. Here the security layer descends beyond the software aspects. 

Hardware RoT is the first coach in a chain of security protocols. It works with TPM burned into the hardware infrastructure by the manufacturer, attesting that the program running in the hardware is not infected. This is a zero-trust security model because the need to trust the program is eliminated while guaranteeing its safety with a manufacturer-embedded security. 

5ire ensures that all nodes in the 5ireChain ecosystem  establish a certain level of trust. 5ire is introducing a hardware-based root of  trust based on Trusted Platform Module (TPM) technology. 

A TPM device will  allow 5ire nodes to remotely attest devices for any malicious code. TPM  contains a key pair called an Endorsement Key (EK). This is burned inside the  TPM device at the time of manufacture and even the manufacturer does not  know the private key as it is generated inside the TPM device using a random  seed. 

EK cannot be used to directly sign any piece of data, rather it is used to  generate another key pair called the attestation key (AK). An AK can be used  to sign attestation data inside the TPM device. This data is stored in platform  configuration registers (PCR), which act as applications’ hashes, starting when  the node starts and assisting in identifying malicious applications running on  a node. 5ireChain will ensure that all the block-assembling nodes participating  in the network are running similar applications when they boot.

The target of cyber attacks has gone beyond the software a computer is running or its network infrastructure to include the hardwares in which these programs are hosted. The role of hardware in a security outfit is paramount to the integrity of the entire security network. This is because software security is irrelevant if the hardware is already tampered with. 

With hardware RoT, the operating system running in a hardware device is scrutinized to ensure it is not infected. Since this security layer is embedded to the hardware and cannot be changed, it provides an impenetrable security layer on which other security layers directly or indirectly depend on.

Media Contact
Company Name: 5ire
Contact Person: Vilma Mattila
Email: Send Email
Country: United Kingdom

Data & News supplied by
Stock quotes supplied by Barchart
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms and Conditions.