Hardware Security of Fog End-Devices for the Internet of Things

The proliferation of the Internet of Things (IoT) caused new application needs to emerge as rapid response ability is missing in the current IoT end-devices. Therefore, Fog Computing has been proposed to be an edge component for the IoT networks as a remedy to this problem. In recent times, cyber-attacks are on the rise, especially towards infrastructure-less networks, such as IoT. Many botnet attack variants (Mirai, Torii, etc.) have shown that the tiny microdevices at the lower spectrum of the network are becoming a valued participant of a botnet, for further executing more sophisticated attacks against infrastructural networks. As such, the fog devices also need to be secured against cyber-attacks, not only software-wise, but also from hardware alterations and manipulations. Hence, this article first highlights the importance and benefits of fog computing for IoT networks, then investigates the means of providing hardware security to these devices with an enriched literature review, including but not limited to Hardware Security Module, Physically Unclonable Function, System on a Chip, and Tamper Resistant Memory.

[1]  David Myers Detecting cyber attacks on industrial control systems using process mining , 2019 .

[2]  Garrett S. Rose,et al.  Physically Unclonable and Reconfigurable Computing System (PURCS) for Hardware Security Applications , 2021, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[3]  Ulrich Rührmair,et al.  PUFs in Security Protocols: Attack Models and Security Evaluations , 2013, 2013 IEEE Symposium on Security and Privacy.

[4]  François-Xavier Standaert,et al.  Introduction to Side-Channel Attacks , 2010, Secure Integrated Circuits and Systems.

[5]  Yoav Weizman,et al.  An SRAM PUF with 2 Independent Bits/Cell in 65nm , 2019, 2019 IEEE International Symposium on Circuits and Systems (ISCAS).

[6]  Nuno Pereira,et al.  Security Risk Analysis of LoRaWAN and Future Directions , 2018, Future Internet.

[7]  Yoonmyung Lee,et al.  A 445F2 leakage-based physically unclonable Function with Lossless Stabilization Through Remapping for IoT Security , 2018, 2018 IEEE International Solid - State Circuits Conference - (ISSCC).

[8]  Tim Güneysu,et al.  Secure software update and IP protection for untrusted devices in the Internet of Things via physically unclonable functions , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

[9]  Hayri Sever,et al.  Creating consensus group using online learning based reputation in blockchain networks , 2019, Pervasive Mob. Comput..

[10]  Wil Michiels,et al.  Mechanism for software tamper resistance: an application of white-box cryptography , 2007, DRM '07.

[11]  Sang Joon Kim,et al.  A Smart Hardware Security Engine Combining Entropy Sources of ECG, HRV and SRAM PUF for Authentication and Secret Key Generation , 2019, 2019 IEEE Asian Solid-State Circuits Conference (A-SSCC).

[12]  Tansu Alpcan,et al.  Fog Computing May Help to Save Energy in Cloud Computing , 2016, IEEE Journal on Selected Areas in Communications.

[13]  Prem Prakash Jayaraman,et al.  Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions , 2018, IEEE Access.

[14]  Ravi Sankar,et al.  Prevention and detection of intrusions in wireless sensor networks , 2013 .

[15]  Ismail Butun,et al.  Detecting Intrusions in Cyber-Physical Systems of Smart Cities : Challenges and Directions , 2019 .

[16]  Ping Zhang,et al.  Energy Efficient Secure Computation Offloading in NOMA-Based mMTC Networks for IoT , 2019, IEEE Internet of Things Journal.

[17]  Ismail Butun,et al.  Security Implications of Fog Computing on the Internet of Things , 2018, 2019 IEEE International Conference on Consumer Electronics (ICCE).

[18]  Paul J. Fortier,et al.  Hardware Based Detection, Recovery, and Tamper Evident Concept to Protect from Control Flow Violations in Embedded Processing , 2019, 2019 IEEE International Symposium on Technologies for Homeland Security (HST).

[19]  Lawrie Brown,et al.  Computer Security: Principles and Practice , 2007 .

[20]  Tom H. Luan,et al.  Fog Computing: Focusing on Mobile Users at the Edge , 2015, ArXiv.

[21]  Paul C. van Oorschot,et al.  A generic attack on checksumming-based software tamper resistance , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[22]  Mustafa Kocakulak,et al.  An overview of Wireless Sensor Networks towards internet of things , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).

[23]  Dimitrios Tzovaras,et al.  From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes , 2019, 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).

[24]  Arenberg Doctoral,et al.  Physically Unclonable Functions: Constructions, Properties and Applications , 2012 .

[25]  Akhilesh Tyagi,et al.  Software Tamper Resistance Through Dynamic Program Monitoring , 2005, DRMTICS.

[26]  Sergei Skorobogatov,et al.  Semi-invasive attacks: a new approach to hardware security analysis , 2005 .

[27]  Deepak Puthal,et al.  PUFchain: A Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE) , 2019, IEEE Consumer Electronics Magazine.

[28]  Mohammad Tehranipoor,et al.  Physical Attacks and Tamper Resistance , 2012 .

[29]  Houbing Song,et al.  Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures , 2019, IEEE Communications Surveys & Tutorials.

[30]  Mark Zwolinski,et al.  Overview of PUF-based hardware security solutions for the internet of things , 2016, 2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS).

[31]  Georg Sigl,et al.  Side-Channel Analysis of PUFs and Fuzzy Extractors , 2011, TRUST.

[32]  Georg Sigl,et al.  Physical Unclonable Functions , 2012, Datenschutz und Datensicherheit - DuD.

[33]  Victor I. Chang,et al.  A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments , 2018, Comput. Secur..

[34]  Markus G. Kuhn,et al.  Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.

[35]  David M. Eyers,et al.  Twenty Security Considerations for Cloud-Supported Internet of Things , 2016, IEEE Internet of Things Journal.

[36]  Mikael Gidlund,et al.  A Central Intrusion Detection System for RPL-Based Industrial Internet of Things , 2019, 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS).

[37]  Ismail Butun,et al.  Industrial Networks and IIoT: Now and Future Trends , 2020, Industrial IoT.

[38]  Dimitrios Tzovaras,et al.  Acceleration at the Edge for Supporting SMEs Security: The FORTIKA Paradigm , 2019, IEEE Communications Magazine.

[39]  Silvia Liberata Ullo,et al.  Advances in Smart Environment Monitoring Systems Using IoT and Sensors , 2020, Sensors.

[40]  Burak Kantarci,et al.  Anomaly detection and privacy preservation in cloud-centric Internet of Things , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[41]  Chih-Min Wang,et al.  A PUF scheme using competing oxide rupture with bit error rate approaching zero , 2018, 2018 IEEE International Solid - State Circuits Conference - (ISSCC).

[42]  Dirk Koch,et al.  Invited Tutorial: FPGA Hardware Security for Datacenters and Beyond , 2020, FPGA.

[43]  Jack W. Davidson,et al.  Software Tamper Resistance: Obstructing Static Analysis of Programs , 2000 .

[44]  Arslan Munir,et al.  IFCIoT: Integrated Fog Cloud IoT: A novel architectural paradigm for the future Internet of Things. , 2017, IEEE Consumer Electronics Magazine.

[45]  Ren-Hung Hwang,et al.  A QoS-aware streaming service over fog computing infrastructures , 2016, 2016 Digital Media Industry & Academic Forum (DMIAF).

[46]  Yier Jin,et al.  Privacy and Security in Internet of Things and Wearable Devices , 2015, IEEE Transactions on Multi-Scale Computing Systems.

[47]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[48]  Armin Babaei,et al.  Physical Unclonable Functions in the Internet of Things: State of the Art and Open Challenges , 2019, Sensors.

[49]  Qun Li,et al.  A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.

[50]  Marina Papatriantafilou,et al.  Intrusion Detection in Industrial Networks via Data Streaming , 2020, Industrial IoT.

[51]  Stefan Katzenbeisser,et al.  PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon , 2012, CHES.

[52]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[53]  Travis Boraten,et al.  Mitigation of Hardware Trojan based Denial-of-Service attack for secure NoCs , 2018, J. Parallel Distributed Comput..

[54]  Edward A. Lee,et al.  The Cloud is Not Enough: Saving IoT from the Cloud , 2015, HotStorage.

[55]  Francisco V. Fernández,et al.  Improving the reliability of SRAM-based PUFs in the presence of aging , 2020, 2020 15th Design & Technology of Integrated Systems in Nanoscale Era (DTIS).

[56]  Sherali Zeadally,et al.  Fog Computing Architecture, Evaluation, and Future Research Directions , 2018, IEEE Communications Magazine.

[57]  Alex Lu,et al.  Anomaly detection on the edge , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).

[58]  Giovanni Di Crescenzo,et al.  Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory , 2019, SECITC.

[59]  Henrik Klessig,et al.  Requirements and current solutions of wireless communication in industrial automation , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).

[60]  Paul C. van Oorschot,et al.  Hardware-assisted circumvention of self-hashing software tamper resistance , 2005, IEEE Transactions on Dependable and Secure Computing.

[61]  Alka Agrawal,et al.  Security Issues in Fog Environment: A Systematic Literature Review , 2020, International Journal of Wireless Information Networks.

[62]  Massimo Alioto,et al.  Trends in Hardware Security: From basics to ASICs , 2019, IEEE Solid-State Circuits Magazine.

[63]  Kire Trivodaliev,et al.  A review of Internet of Things for smart home: Challenges and solutions , 2017 .

[64]  Wissam Aoudi Departure-Based Intrusion Detection , 2019 .

[65]  Quan Wang,et al.  A PUF-based unified identity verification framework for secure IoT hardware via device authentication , 2019, World Wide Web.

[66]  Christophe Bobda,et al.  IoT Device security through dynamic hardware isolation with cloud-Based update , 2020, J. Syst. Archit..

[67]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[68]  Daniele Ielmini,et al.  Applications of Resistive Switching Memory as Hardware Security Primitive , 2019, Applications of Emerging Memory Technology.

[69]  Mikael Gidlund,et al.  Challenges of Securing the Industrial Internet of Things Value Chain , 2018, 2018 Workshop on Metrology for Industry 4.0 and IoT.

[70]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .