Securing IoT Protocol Implementations Through Hardware Monitoring

被引:0
|
作者
Pouraghily, Arman [1 ]
Wolf, Tilman [1 ]
机构
[1] Univ Massachusetts, Dept Elect & Comp Engn, Amherst, MA 01003 USA
基金
美国国家科学基金会;
关键词
Internet of Things; protocol; embedded system; security; transaction; blockchain; prototype; Ethereum; FPGA; INTERNET; BLOCKCHAIN; CONTRACTS; THINGS;
D O I
10.1109/MASS.2019.00061
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things (IoT) represents the technical foundation to solve some of the most important societal and environmental problems. One of the key challenges in IoT systems is providing security for distributed, networked IoT components that are implemented with potentially very low-end embedded processing systems. As the value of sensor data and actuator access increases in IoT deployments, attackers may increasingly target these vulnerable systems and protocol implementations running on them. For protocols that involve economic transactions on blockchains, as we show in our work, there is a direct monetary value associated with successful attacks. To address this problem, we present a hardware monitoring system that augments processors with logic that tracks the correct execution of software on the embedded systems. Attacks on the system, such as buffer overflow attacks, are recognized and stopped by the hardware monitor. Therefore, the system can avoid economic loss due to an attack and ensure that the protocol implementation is secured. We show the effectiveness of our system on a prototype that uses Linux running on a soft-core LEON3 processor on an Intel Stratix IV FPGA and interacts with the Ethereum blockchain.
引用
下载
收藏
页码:467 / 475
页数:9
相关论文
共 50 条
  • [21] IoT and artificial intelligence implementations for remote healthcare monitoring systems: A survey
    Alshamrani, Mazin
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (08) : 4687 - 4701
  • [22] Specification-Based Symbolic Execution for Stateful Network Protocol Implementations in IoT
    Tempel, Soeren
    Herdt, Vladimir
    Drechsler, Rolf
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (11) : 9544 - 9555
  • [23] Securing IoT Monitoring Device using PUF and Physical Layer Authentication
    Zheng, Yue
    Dhabu, Sumedh Somnath
    Chang, Chip-Hong
    2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
  • [24] Securing MQTT protocol for IoT environment using IDS based on ensemble learning
    Zeghida, Hayette
    Boulaiche, Mehdi
    Chikh, Ramdane
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (04) : 1075 - 1086
  • [25] New ECC-Based IoT Authentication Protocol for Securing RFID Systems
    Timouhin H.
    Amounas F.
    Azrour M.
    SN Computer Science, 4 (6)
  • [26] Securing MQTT protocol for IoT environment using IDS based on ensemble learning
    Hayette Zeghida
    Mehdi Boulaiche
    Ramdane Chikh
    International Journal of Information Security, 2023, 22 : 1075 - 1086
  • [27] IoT Protocol based Environmental Data Monitoring
    Sonawala, Nishant M.
    Tank, Bharat
    Patel, Hardik
    2017 INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC), 2017, : 1041 - 1045
  • [28] SECURING DATA ON THE IOT
    Pockson, Andrew
    ELECTRONICS WORLD, 2016, 122 (1967): : 38 - 39
  • [29] Securing IoT with Blockchain
    Kothari, BhavinKumar
    Mudaliar, Shakthi
    Nadar, Sabestin
    Khadse, Mrinal
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT-2020), 2020, : 785 - 788
  • [30] Securing IoT Apps
    Balliu, Musard
    Bastys, Iulia
    Sabelfeld, Andrei
    IEEE SECURITY & PRIVACY, 2019, 17 (05) : 22 - 29