An example operation includes one or more of detecting, by a component in a transport, that another component has been removed, detecting, by the component, that a replacement component has been added in the transport, providing, by the component, data to the replacement component, wherein the data attempts to subvert an authorized functionality of the replacement component, and responsive to a non-subversion of the authorized functionality, permitting, by the component, use of the authorized functionality of the replacement component.