Hardware Security Assurance in Emerging IoT Applications

被引:0
|
作者
Dofe, Jaya [1 ]
Frey, Jonathan [1 ]
Yu, Qiaoyan [1 ]
机构
[1] Univ New Hampshire, Dept Elect & Comp Engn, Durham, NH 03824 USA
关键词
Internet-of-Things (IoT); Hardware Security; Security Assurance; Hardware Trojan;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Things (IoT) offers a more advanced service than a single device or an isolated system, as IoT connects diverse components, such as sensors, actuators, and embedded devices through the internet. As predicted by Cisco, there will be 50 billion IoT connected devices by 2020. Integration of such a tremendous number of devices into IoT potentially brings in a new concern, system security. In this work, we review two typical hardware attacks that can harm the emerging IoT applications. As IoT devices typically have limited computation power and need to be energy efficient, sophisticated cryptographic algorithms and authentication protocols are not suitable for every IoT device. To simultaneously thwart hardware Trojan and side-channel analysis attacks, we propose a low-cost dynamic permutation method for IoT devices. Experimental results show that the proposed method achieves 5.8X higher accumulated partial guessing entropy than the baseline, thus strengthening the IoT processing unit against hardware attacks.
引用
收藏
页码:2050 / 2053
页数:4
相关论文
共 50 条
  • [31] The Applications of NVM Technology in Hardware Security
    Yang, Chaofei
    Liu, Beiye
    Wang, Yandan
    Chen, Yiran
    Li, Hai
    Zhang, Xian
    Sun, Guangyu
    2016 INTERNATIONAL GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI), 2016, : 311 - 316
  • [32] Applications of Machine Learning in Hardware Security
    Halak, Basel
    Mispan, Mohd Syafiq
    2022 2ND INTERNATIONAL CONFERENCE OF SMART SYSTEMS AND EMERGING TECHNOLOGIES (SMARTTECH 2022), 2022, : 212 - 213
  • [33] GARMDROID: IoT Potential Security Threats Analysis Through the Inference of Android Applications Hardware Features Requirements
    Rodriguez-Mota, Abraham
    Jorge Escamilla-Ambrosio, Ponciano
    Happa, Jassim
    Aguirre-Anaya, Eleazar
    APPLICATIONS FOR FUTURE INTERNET, AFI 2016, 2017, 179 : 63 - 74
  • [34] Security Vulnerabilities in Consumer IoT Applications
    Shakdher, Arjun
    Agrawal, Suyash
    Yang, Baijian
    2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 1 - 6
  • [35] Serverless Security Analysis for IoT Applications
    Ortega Candel, Jose Manuel
    Mora Gimeno, Francisco Jose
    Mora Mora, Higinio
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING & AMBIENT INTELLIGENCE (UCAMI 2022), 2023, 594 : 393 - 400
  • [36] Security Analysis for SmartThings IoT Applications
    Schmeidl, Florian
    Nazzal, Bara'
    Alalfi, Manar H.
    2019 IEEE/ACM 6TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT 2019), 2019, : 25 - 29
  • [37] Using Emerging Technologies for Hardware Security Beyond PUFs
    Chen, An
    Hu, X. Sharon
    Jin, Yier
    Niemier, Michael
    Yin, Xunzhao
    PROCEEDINGS OF THE 2016 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2016, : 1544 - 1549
  • [38] Hardware Security in the Era of Emerging Device and System Technologies
    Mentens, Nele
    IEEE SECURITY & PRIVACY, 2024, 22 (03) : 4 - 6
  • [39] Hardware Security in Emerging Technologies: Vulnerabilities, Attacks, and Solutions
    Karimi, Naghmeh
    Basu, Kanad
    Chang, Chip-Hong
    Fung, Jason M.
    IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2021, 11 (02) : 223 - 227
  • [40] An Overview of Medical Electronic Hardware Security and Emerging Solutions
    Taheri, Shayan
    Asadizanjani, Navid
    ELECTRONICS, 2022, 11 (04)