Hardware and embedded security in the context of internet of things

Internet of Things (IoT) is the interconnection of a large number of resource-constrained devices such as sensors, actuators, and nodes that generate large volumes of data which are then processed into useful actions in areas such as home and building automation, intelligent transportation and connected vehicles, industrial automation, smart healthcare, smart cities, and others. Important challenges remain to fulfill the IoT vision including data provenance and integrity, trust management, identity management, and privacy. We describe how embedded and hardware security approaches can be the basis to address these security challenges.

[1]  A. One,et al.  Smashing The Stack For Fun And Profit , 1996 .

[2]  Deian Stefan,et al.  Data-Provenance Verification For Secure Hosts , 2012, IEEE Transactions on Dependable and Secure Computing.

[3]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[4]  Jonathan M. Smith,et al.  Eros: a capability system , 1999 .

[5]  Ramesh Karri,et al.  Sensor physical unclonable functions , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[6]  Ramjee Prasad,et al.  Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[7]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[8]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[9]  Ruby B. Lee,et al.  Scalable architectural support for trusted software , 2010, HPCA - 16 2010 The Sixteenth International Symposium on High-Performance Computer Architecture.

[10]  R. Sunitha,et al.  DATA-PROVENANCE VERIFICATION FOR SECURE HOSTS , 2013 .

[11]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[12]  Ramesh Karri,et al.  NumChecker: Detecting kernel control-flow modifying rootkits by using Hardware Performance Counters , 2013, 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC).

[13]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .