Toward Remotely Verifiable Software Integrity in Resource-Constrained IoT Devices

被引:0
|
作者
Nunes, Ivan De Oliveira [1 ]
Jakkamsetti, Sashidhar [2 ]
Rattanavipanon, Norrathep [3 ]
Tsudik, Gene [4 ]
机构
[1] Rochester Inst Technol, Rochester, NY USA
[2] Robert Bosch LLC, Res & Technol Ctr, Farmington Hills, MI USA
[3] Prince Songkla Univ, Coll Comp, Phuket, Thailand
[4] Univ Calif Irvine, Irvine, CA USA
关键词
Hardware; Codes; Security; Read only memory; Memory management; Sensors; Internet of Things; Resource management; Software reliability;
D O I
10.1109/MCOM.001.2300514
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Lower-end IoT devices typically have strict cost constraints that rule out usual security mechanisms available in general-purpose computers or higher-end devices. To secure low-end devices, various low-cost security architectures have been proposed for remote verification of their software state via integrity proofs. These proofs vary in terms of expressiveness, with simpler ones confirming correct binary presence, while more expressive ones support verification of arbitrary code execution. This article provides a holistic and systematic treatment of this family of architectures. It also compares (qualitatively and quantitatively) the types of software integrity proofs, respective architectural support, and associated costs. Finally, we outline some research directions and emerging challenges.
引用
收藏
页码:58 / 64
页数:7
相关论文
共 50 条
  • [1] Secure Communications for Resource-Constrained IoT Devices†
    Taha, Abd-Elhamid M.
    Rashwan, Abdulmonem M.
    Hassanein, Hossam S.
    SENSORS, 2020, 20 (13) : 1 - 18
  • [2] A Survey on Federated Learning for Resource-Constrained IoT Devices
    Imteaj, Ahmed
    Thakker, Urmish
    Wang, Shiqiang
    Li, Jian
    Amini, M. Hadi
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01) : 1 - 24
  • [3] Attacks on Resource-Constrained IoT Devices and Security Solutions
    Sharma, Ravi
    Sharma, Nonita
    INTERNATIONAL JOURNAL OF SOFTWARE SCIENCE AND COMPUTATIONAL INTELLIGENCE-IJSSCI, 2022, 14 (01):
  • [4] A Distributed Security Mechanism for Resource-Constrained IoT Devices
    King, James
    Awad, Ali Ismail
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2016, 40 (01): : 133 - 143
  • [5] Efficient Online Classification and Tracking on Resource-constrained IoT Devices
    Aftab, Muhammad
    Chau, Sid Chi-Kin
    Shenoy, Prashant
    ACM TRANSACTIONS ON INTERNET OF THINGS, 2020, 1 (03):
  • [6] Low Latency Implementations of CNN for Resource-Constrained IoT Devices
    Mujtaba, Ahmed
    Lee, Wai-Kong
    Hwang, Seong Oun
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (12) : 5124 - 5128
  • [7] A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
    Kumar, Sunil
    Kumar, Dilip
    Dangi, Ramraj
    Choudhary, Gaurav
    Dragoni, Nicola
    You, Ilsun
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (01): : 31 - 63
  • [8] Lightweight Stream Cipher Scheme for Resource-Constrained IoT Devices
    Noura, Hassan
    Couturier, Raphael
    Pham, Congduc
    Chehab, Ali
    2019 INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2019,
  • [9] A Transfer Learning Approach for Securing Resource-Constrained IoT Devices
    Yilmaz, Selim
    Aydogan, Emre
    Sen, Sevil
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4405 - 4418
  • [10] Trustworthy Blockchain Gateways for Resource-Constrained Clients and IoT Devices
    Debe, Mazin
    Salah, Khaled
    Jayaraman, Raja
    Yaqoob, Ibrar
    Arshad, Junaid
    IEEE ACCESS, 2021, 9 : 132875 - 132887