IIoTEED: An Enhanced, Trusted Execution Environment for Industrial IoT Edge Devices

被引:2
|
作者
Pinto, Sandro [1 ]
Gomes, Tiago [1 ]
Pereira, Jorge [1 ]
Cabral, Jorge [2 ]
Tavares, Adriano [2 ]
机构
[1] Univ Minho, Embedded Syst Res Grp, Ctr Algoritmi, Braga, Portugal
[2] Univ Minho, Braga, Portugal
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the advent of the Internet of Things (IoT), security has emerged as a major design goal for smart connected devices. This explosion in connectivity created a larger attack surface area. Software-based approaches have been applied for security purposes; however, these methods must be extended with security-oriented technologies that promote hardware as the root of trust. The ARM TrustZone can enable trusted execution environments (Tees), but existing solutions disregard real-time needs. Here, the authors demonstrate why TrustZone is becoming a reference technology for securing IoT edge devices, and how enhanced Tees can help meet industrial IoT applications' real-time requirements.
引用
收藏
页码:40 / 47
页数:8
相关论文
共 50 条
  • [41] Research of a trusted execution environment module for multiple platforms
    Zhang, Qian-Ying
    Zhao, Shi-Jun
    Feng, Wei
    Qin, Yu
    Feng, Deng-Guo
    Tongxin Xuebao/Journal on Communications, 2014, 35 : 72 - 85
  • [42] Analysis of Trusted Execution Environment usage in Samsung KNOX
    Atamli-Reineh, Ahmad
    Borgaonkar, Ravishankar
    Balisane, Ranjbar A.
    Petracca, Giuseppe
    Martin, Andrew
    SYSTEX 2016: 1ST WORKSHOP ON SYSTEM SOFTWARE FOR TRUSTED EXECUTION, 2016,
  • [43] A Unified Trustworthy Environment Establishment Based on Edge Computing in Industrial IoT
    Wang, Tian
    Wang, Pan
    Cai, Shaobin
    Ma, Ying
    Liu, Anfeng
    Xie, Mande
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (09) : 6083 - 6091
  • [44] Secure and efficient multifunctional data aggregation without trusted authority in edge-enhanced IoT
    Wu, Qiyu
    Zhou, Fucai
    Xu, Jian
    Wang, Qiang
    Feng, Da
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 69
  • [45] A Design and Verification Methodology for a TrustZone Trusted Execution Environment
    Sun, Haiyong
    Lei, Hang
    IEEE ACCESS, 2020, 8 : 33870 - 33883
  • [46] Blockchain Query Framework Based on Trusted Execution Environment
    Zhang, Yufan
    Wu, Yaojiang
    Wang, Junjie
    Liu, Bokun
    Liu, Aodi
    Chen, Xiaowei
    2024 5TH INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKS AND INTERNET OF THINGS, CNIOT 2024, 2024, : 182 - 185
  • [47] IceClave: A Trusted Execution Environment for In-Storage Computing
    Kang, Luyi
    Xue, Yuqi
    Jia, Weiwei
    Wang, Xiaohao
    Kim, Jongryool
    Youn, Changhwan
    Kang, Myeong Joon
    Lim, Hyung Jin
    Jacob, Bruce
    Huang, Jian
    PROCEEDINGS OF 54TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, MICRO 2021, 2021, : 199 - 211
  • [48] Quick Boot of Trusted Execution Environment With Hardware Accelerators
    Trong-Thuc Hoang
    Duran, Ckristian
    Duc-Thinh Nguyen-Hoang
    Duc-Hung Le
    Tsukamoto, Akira
    Suzaki, Kuniyasu
    Cong-Kha Pham
    IEEE ACCESS, 2020, 8 : 74015 - 74023
  • [49] Lightweight Authentication Mechanism for Industrial IoT Environment Combining Elliptic Curve Cryptography and Trusted Token
    Yang, Yu-Sheng
    Lee, Shih-Hsiung
    Wang, Jie-Min
    Yang, Chu-Sing
    Huang, Yuen-Min
    Hou, Ting-Wei
    SENSORS, 2023, 23 (10)
  • [50] A solution to make trusted execution environment more trustworthy
    Kun X.
    Lei L.
    International Journal of Performability Engineering, 2018, 14 (09) : 2127 - 2136