A novel trusted hardware-based scalable security framework for IoT edge devices

被引:0
作者
Khan M. [1 ]
Hatami M. [1 ]
Zhao W. [1 ]
Chen Y. [1 ]
机构
[1] Department of Electrical and Computer Engineering, Binghamton University, Binghamton, 13902, NY
来源
Discover Internet of Things | 2024年 / 4卷 / 01期
关键词
Internet of Things (IoT); Security; Side channel attacks; Trusted hardware;
D O I
10.1007/s43926-024-00056-7
中图分类号
学科分类号
摘要
The Internet of Things (IoT) devices are pervasively deployed and embedded into our daily lives. Over several years, the massive assimilation of IoT devices has given rise to smart cities, smart factories, smart farms, etc. While IoTs can collect immense amounts of user and environmental information, the lack of adequate security measures is among the major concerns about information security and privacy. With the ever-increasing presence of IoTs, information flow between IoT devices in a single or multi-layered network is becoming increasingly vulnerable to attacks. Although several software-based solutions have been developed over the years that improve the security of resource-constrained IoT devices, there are limited efforts on hardware-oriented IoT security solutions. This paper proposes a Trusted HArdware-based Scalable Secure Architecture (THASSA) for IoT Edge systems. Leveraging standard cryptographic algorithms, THASSA provides a secure mechanism for data transfer and off-loads cryptography operations to trusted hardware. The modularized THASSA architecture allows devices to be added or removed without user intervention. Also, THASSA could be scaled to multiple subsystems using multiple trusted hardware to form IoT clusters with secure data path(s) for mission-critical applications. An experimental study has verified the correctness and effectiveness of THASSA. © The Author(s) 2024.
引用
收藏
相关论文
共 41 条
[1]  
Chen N., Chen Y., Smart city surveillance at the network edge in the era of IoT: opportunities and challenges, Smart cities: development and governance frameworks, pp. 153-176, (2018)
[2]  
Qadri Y.A., Nauman A., Zikria Y.B., Vasilakos A.V., Kim S.W., The future of healthcare internet of things: a survey of emerging technologies, IEEE Commun Surv Tutor, 22, 2, pp. 1121-1167, (2020)
[3]  
Junior F.M.R., Kamienski C.A., A survey on trustworthiness for the internet of things, IEEE Access, 9, pp. 42493-42514, (2021)
[4]  
Xu R., Chen Y., Blasch E., Chen G., Blendcac: A blockchain-enabled decentralized capability-based access control for IoTs, IEEE International Conference on Internet of Things (Ithings) and IEEE Green Computing and Communications (Greencom) and IEEE Cyber, Physical and Social Computing (Cpscom) and IEEE Smart Data (Smartdata). IEEE
[5]  
2018. P, pp. 1027-1034, (2018)
[6]  
Xu R., Chen Y., Blasch E., Chen G., A federated capability-based access control mechanism for internet of things (IoTs), Sensors and Systems for Space Applications XI., 10641, (2018)
[7]  
Li N., Liu D., Nepal S., Lightweight mutual authentication for IoT and its applications, IEEE Trans Sustain Comput, 2, 4, pp. 359-370, (2017)
[8]  
Fitwi A., Chen Y., Zhu S., Blasch E., Chen G., Privacy-preserving surveillance as an edge service based on lightweight video protection schemes using face de-identification and window masking, Electronics, 10, 3, (2021)
[9]  
Naeini P.E., Bhagavatula S., Habib H., Degeling M., Bauer L., Cranor L.F., Sadeh N., Privacy expectations and preferences in an IoT world, Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 399-412, (2017)
[10]  
Khan M., Chen Y., A randomized switched-mode voltage regulation system for IoT edge device to defend against power analysis based side channel attack, Proceedings of the 10Th International Symposium on Security and Privacy on Internet of Things