Security of an IoT Network: A VLSI Point of View

Third-party IP cores, outsourcing of IC fabrication to untrusted foundries, have increased the vulnerabilities in IC’s and reduced the trust factor of a designer on the manufactured chips. These vulnerabilities are a consequence of malicious modifications of the original design, which have the potential to cause catastrophic damage to the system which uses these IC’s. IoT networks require the least vulnerable and highly trustworthy IC’s. We present a detailed study of such malicious insertions. Next, we discuss the methods for their identification and we also propose some countermeasures from a VLSI aspect.

[1]  G. Edward Suh,et al.  Aegis: A Single-Chip Secure Processor , 2007, IEEE Design & Test of Computers.

[2]  Yiorgos Makris,et al.  Enhancing security via provably trustworthy hardware intellectual property , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.

[3]  G. Edward Suh,et al.  Hardware authentication leveraging performance limits in detailed simulations and emulations , 2009, 2009 46th ACM/IEEE Design Automation Conference.

[4]  R. Mary Lourde,et al.  Hardware Security Threats to DSP Applications in an IoT Network , 2016, 2016 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS).

[5]  Swarup Bhunia,et al.  Hardware Trojan: Threats and emerging solutions , 2009, 2009 IEEE International High Level Design Validation and Test Workshop.

[6]  Swarup Bhunia,et al.  Security against hardware Trojan through a novel application of design obfuscation , 2009, 2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers.

[7]  Jeyavijayan Rajendran,et al.  Towards a comprehensive and systematic classification of hardware Trojans , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.

[8]  Milo M. K. Martin,et al.  Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically , 2010, 2010 IEEE Symposium on Security and Privacy.

[9]  Ramjee Prasad,et al.  Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[10]  Mark Mohammad Tehranipoor,et al.  Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis , 2008, 2008 IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems.

[11]  George C. Necula,et al.  Proof-carrying code , 1997, POPL '97.

[12]  Miron Abramovici,et al.  Integrated circuit security: new threats and solutions , 2009, CSIIRW '09.