A Taxonomy and Review of Remote Attestation Schemes in Embedded Systems

被引:3
|
作者
Johnson, William A. [1 ]
Ghafoor, Sheikh [1 ]
Prowell, Stacy [2 ]
机构
[1] Tennessee Technol Univ, Dept Comp Sci, Cookeville, TN 38505 USA
[2] Oak Ridge Natl Lab, Natl Secur Sci Directorate, Oak Ridge, TN 37831 USA
关键词
Security; Embedded systems; Taxonomy; Malware; Hardware; Forensics; Costs; Remote attestation; embedded systems security; fileless malware; SOFTWARE-BASED ATTESTATION; SECURE; DEVICES; EFFICIENT; FUTURE;
D O I
10.1109/ACCESS.2021.3119220
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Embedded systems that make up the Internet of Things (IoT), Supervisory Control and Data Acquisition (SCADA) networks, and Smart Grid applications are coming under increasing scrutiny in the security field. Remote Attestation (RA) is a security mechanism that allows a trusted device, the verifier, to determine the trustworthiness of an untrusted device, the prover. RA has become an area of high interest in academia and industry and many research works on RA have been published in recent years. This paper reviewed the published RA research works from 2003-2020. Our contributions are fourfold. First, we have re-framed the problem of RA into 5 smaller problems: root of trust, evidence type, evidence gathering, packaging and verification, and scalability. We have provided a holistic review of RA by discussing the relationships between these problems and the various solutions that exist in modern RA research. Second, we have presented an enhanced threat model that allows for a greater understanding of the security benefits of a given RA scheme. Third, we have proposed a taxonomy to classify and analyze RA research works and use it to categorize 58 RA schemes reported in literature. Fourth, we have provided cost benefit analysis details of each RA scheme surveyed such that security professionals may perform a cost benefit analysis in the context of their own challenges. Our classification and analysis has revealed areas of future research that have not been addressed by researchers rigorously.
引用
收藏
页码:142390 / 142410
页数:21
相关论文
共 50 条
  • [1] Remote Attestation for Embedded Systems
    Kylanpaa, Markku
    Rantala, Aarne
    [J]. SECURITY OF INDUSTRIAL CONTROL SYSTEMS AND CYBER PHYSICAL SYSTEMS, 2016, 9588 : 79 - 92
  • [2] Hardware-assisted Remote Runtime Attestation for Critical Embedded Systems
    Geden, Munir
    Rasmussen, Kasper
    [J]. 2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 59 - 68
  • [3] Hardware-assisted remote attestation design for critical embedded systems
    Geden, Munir
    Rasmussen, Kasper
    [J]. IET INFORMATION SECURITY, 2023, 17 (03) : 518 - 533
  • [4] Cumulative Attestation Kernels for Embedded Systems
    LeMay, Michael
    Gunter, Carl A.
    [J]. COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS, 2009, 5789 : 655 - 670
  • [5] A Secure Protocol for Remote-Code Integrity Attestation of Embedded Systems: The CSP Approach
    Al-Wosabi, Abdo Ali A.
    Shukur, Zarina
    [J]. IEEE ACCESS, 2019, 7 : 170238 - 170269
  • [6] Cumulative Attestation Kernels for Embedded Systems
    Lemay, Michael
    Gunter, Carl A.
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2012, 3 (02) : 744 - 760
  • [7] A Taxonomy and Comparison of Remote Voting Schemes
    Li, Huian
    Kankanala, Abhishek Reddy
    Zou, Xukai
    [J]. 2014 23RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2014,
  • [8] A Practical Attestation Protocol for Autonomous Embedded Systems
    Kohnhaeuser, Florian
    Buscher, Niklas
    Katzenbeisser, Stefan
    [J]. 2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 263 - 278
  • [9] ScaRR: Scalable Runtime Remote Attestation for Complex Systems
    Toffalini, Flavio
    Losiouk, Eleonora
    Biondo, Andrea
    Zhou, Jianying
    Conti, Mauro
    [J]. PROCEEDINGS OF THE 22ND INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, 2019, : 121 - 134
  • [10] POSTER: Practical Embedded Remote Attestation Using Physically Unclonable Functions
    Kocabas, Unal
    Sadeghi, Ahmad-Reza
    Schulz, Steffen
    Wachsmann, Christian
    [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 797 - 799