Security Enhancements to System on Chip Devices for IoT Perception Layer

Internet of Things (IoT) will drive the growth for semiconductor industry in next decade. In the era of IoT, millions of smart computing things are connected to solve customized applications. The tenets of IoT design are agility, scalability and security. Security is one of the important tenets for the success of IoT. In this paper, we discuss the challenges and possible solutions for IoT security that needs to be addressed at IoT perception layer/Edge node. The inevitable component of the IoT edge node is microcontroller/System on Chip (SoC). The microcontroller/SoC used in sensitive applications consists of Trusted Execution Environment (TEE), a hardware support for security. TEE's are not sufficient to address all the security issues in IoT systems.Hardware security issues like hardware Trojans, counterfeiting and debug security are tightly interlinked with the IoT perception layer security. There can be common solution to the hardware security issues and IoT perception layer security. In this paper, we briefly discuss the challenges in IoT design, IoT security, vulnerabilities of edge device, existing solutions and need for new security architecture for IoT edge nodes. And finally we present what security features, the next generation SoC/microcontrollers should incorporate to solve both hardware intrinsic security and IoT perception layer security more holistically.

[1]  Wei Zhao,et al.  Design and Realization of WInternet , 2016, ACM Trans. Cyber Phys. Syst..

[2]  N. Asokan,et al.  On-board credentials with open provisioning , 2009, ASIACCS '09.

[3]  Syed Hassan Ahmed,et al.  Cyber Physical System: Architecture, applications and research challenges , 2013, 2013 IFIP Wireless Days (WD).

[4]  Frederic T. Chong,et al.  Sapper: a language for hardware-level security policy enforcement , 2014, ASPLOS.

[5]  Yohei Hori,et al.  Cryptographie key generation from PUF data using efficient fuzzy extractors , 2014, 16th International Conference on Advanced Communication Technology.

[6]  Swarup Bhunia,et al.  Security Assurance for System-on-Chip Designs With Untrusted IPs , 2017, IEEE Transactions on Information Forensics and Security.

[7]  Srinivas Devadas,et al.  Physical Unclonable Functions and Applications: A Tutorial , 2014, Proceedings of the IEEE.

[8]  Guobin Xu,et al.  A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures , 2016, Big Data Res..

[9]  Sandip Ray,et al.  The Changing Computing Paradigm With Internet of Things: A Tutorial Introduction , 2016, IEEE Design & Test.

[10]  Carlos V. Rozas,et al.  Innovative instructions and software model for isolated execution , 2013, HASP '13.

[11]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[12]  Abdelmadjid Bouabdallah,et al.  Trusted Execution Environment: What It is, and What It is Not , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[13]  Quan Chen,et al.  Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World , 2014, CCS.