Securing IoT Protocol Implementations Through Hardware Monitoring

被引:0
|
作者
Pouraghily, Arman [1 ]
Wolf, Tilman [1 ]
机构
[1] Univ Massachusetts, Dept Elect & Comp Engn, Amherst, MA 01003 USA
基金
美国国家科学基金会;
关键词
Internet of Things; protocol; embedded system; security; transaction; blockchain; prototype; Ethereum; FPGA; INTERNET; BLOCKCHAIN; CONTRACTS; THINGS;
D O I
10.1109/MASS.2019.00061
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things (IoT) represents the technical foundation to solve some of the most important societal and environmental problems. One of the key challenges in IoT systems is providing security for distributed, networked IoT components that are implemented with potentially very low-end embedded processing systems. As the value of sensor data and actuator access increases in IoT deployments, attackers may increasingly target these vulnerable systems and protocol implementations running on them. For protocols that involve economic transactions on blockchains, as we show in our work, there is a direct monetary value associated with successful attacks. To address this problem, we present a hardware monitoring system that augments processors with logic that tracks the correct execution of software on the embedded systems. Attacks on the system, such as buffer overflow attacks, are recognized and stopped by the hardware monitor. Therefore, the system can avoid economic loss due to an attack and ensure that the protocol implementation is secured. We show the effectiveness of our system on a prototype that uses Linux running on a soft-core LEON3 processor on an Intel Stratix IV FPGA and interacts with the Ethereum blockchain.
引用
收藏
页码:467 / 475
页数:9
相关论文
共 50 条
  • [1] Securing Next Generation Networks by Fuzzing Protocol Implementations
    Juuso, Anna-Maija
    Rontti, Tero
    Tirila, Juha-Matti
    [J]. 2011 TECHNICAL SYMPOSIUM AT ITU TELECOM WORLD (ITU WT), 2011, : 7 - 12
  • [2] Comparison of Hardware Implementations of Cryptographic Algorithms for IoT Applications
    Goswami, Sushree Sila P.
    Trivedi, Gaurav
    [J]. 2023 33RD INTERNATIONAL CONFERENCE RADIOELEKTRONIKA, RADIOELEKTRONIKA, 2023,
  • [3] Securing FPGAs in IoT: a new run-time monitoring technique against hardware Trojan
    Cheng, Jian
    Feng, Quanyuan
    Li, Chao
    Yang, Wenxiu
    [J]. WIRELESS NETWORKS, 2024, 30 (06) : 5455 - 5463
  • [4] Securing IoT Space via Hardware Trojan Detection
    Guo, Shize
    Wang, Jian
    Chen, Zhe
    Li, Yubai
    Lu, Zhonghai
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (11) : 11115 - 11122
  • [5] Multiradix Trivium Implementations for Low-Power IoT Hardware
    Mora-Gutierrez, J. M.
    Jimenez-Fernandez, C. J.
    Valencia-Barrero, M.
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2017, 25 (12) : 3401 - 3405
  • [6] Lightweight hardware monitoring of IoT devices
    Toth, Andrew
    Rapczynski, Dan
    Wampler, Jason A.
    [J]. CYBER SENSING 2018, 2018, 10630
  • [7] Securing IoT/IIoT from Software Attacks Targeting Hardware Vulnerabilities
    Polychronou, Nikolaos Foivos
    Thevenon, Pierre-Henri
    Puys, Maxime
    Beroulle, Vincent
    [J]. 2021 19TH IEEE INTERNATIONAL NEW CIRCUITS AND SYSTEMS CONFERENCE (NEWCAS), 2021,
  • [8] Securing RSA hardware accelerators through residue checking
    Lasheras, Ana
    Canal, Ramon
    Rodriguez, Eva
    Cassano, Luca
    [J]. MICROELECTRONICS RELIABILITY, 2021, 116
  • [9] Securing the IoT Gateway based on the Hardware Implementation of a Multi Pattern Search Algorithm
    Stanciu, Alexandra
    Balan, Titus-Constantin
    Gerigan, Carmen
    Zamfir, Sorin
    [J]. 2017 INTERNATIONAL CONFERENCE ON OPTIMIZATION OF ELECTRICAL AND ELECTRONIC EQUIPMENT (OPTIM) & 2017 INTL AEGEAN CONFERENCE ON ELECTRICAL MACHINES AND POWER ELECTRONICS (ACEMP), 2017, : 1001 - 1006
  • [10] Securing Internet of Things (IoT) Through an Adaptive Framework
    Farooq, Umer
    Hasan, Najam Ul
    Baig, Imran
    [J]. 2019 16TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS & DEVICES (SSD), 2019, : 387 - 392