Hardware Trojan Based Security Issues in Home Area Network: A Testbed Setup

被引:0
|
作者
Mohammed, Hawzhin [1 ]
Howell, Jimmy [2 ]
Hasan, Syed Rafay [1 ]
Guo, Nan [1 ]
Khalid, Faiq [3 ]
Elkeelany, Omar [1 ]
机构
[1] Tennessee Technol Univ, Dept Elect & Comp Engn, Cookeville, TN 38505 USA
[2] Southern Illinois Univ, Dept Comp Sci, Carbondale, IL 62901 USA
[3] Vienna Univ Technol TU Wien, Dept Comp Engn, Vienna, Austria
基金
美国国家科学基金会;
关键词
Home Area Network; Hardware Security; Advanced Metering Infrastructure; Hardware Trojan;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced Metering Infrastructure (AMI) is the main player in todays Smart Grid, and Home Area Network (HAN) is an important subsystem in AMI. HAN connects the smart home appliances (SHA) inside the home to the smart meter (SM), which is connected to the power utility company. In the last decade, hardware Trojans (HT), have been extensively studied in both academia and industry. Consequently, the vulnerability of integrated circuits (ICs) against HTs leads to the potential security threat to any system that contains ICs, and HAN is no exception. However, to the best of authors knowledge, the potential effect of HTs on HAN has not been studied in the literature so far. In this paper, we are investigating HT in HAN network. In the process, we developed a testbed which can be scalable up to 127 nodes using I 2 C interface to control and implement any kind of required network behavior. We introduced three possible scenarios of HTs in this HAN network testbed. These scenarios illustrate the manifestation of HTs in the HAN that leads to network performance degradation.
引用
收藏
页码:972 / 975
页数:4
相关论文
共 50 条
  • [1] Network Architecture, Security Issues, and Hardware Implementation of a Home Area Network for Smart Grid
    Saponara, Sergio
    Bacchillone, Tony
    [J]. JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2012, 2012
  • [2] CRC-Based Hardware Trojan Detection for Improved Hardware Security
    Mohankumar, N.
    Jayakumar, M.
    Nirmala Devi, M.
    [J]. Lecture Notes in Electrical Engineering, 2018, 471 : 381 - 389
  • [3] Property Based Formal Security Verification for Hardware Trojan Detection
    Qin, Maoyuan
    Hu, Wei
    Mu, Dejun
    Tai, Yu
    [J]. 2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2018, : 62 - 67
  • [4] Hardware Trojan Detection Based on ELM Neural Network
    Wang, Sixiang
    Dong, Xiuze
    Sun, Kewang
    Cui, Qi
    Li, Dongxu
    He, Chunxiao
    [J]. 2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 400 - 403
  • [5] Home area network: A security perspective
    Sathu, Hira
    Shukla, Ranjana
    [J]. PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND PRIVACY (ISP '07): ADVANCED TOPICS IN INFORMATION SECURITY AND PRIVACY, 2007, : 85 - 90
  • [6] A Novel Hardware Trojan Detection Based on BP Neural Network
    Li, Jun
    Chen, Jihua
    Ni, Lin
    Zhou, Errui
    [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 2790 - 2794
  • [7] Hardware Trojan Detection Technique Based on SOM Neural Network
    Wen, Ning
    Wang, Jian
    Zhang, Tao
    [J]. 2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 1645 - 1648
  • [8] GramsDet: Hardware Trojan Detection Based on Recurrent Neural Network
    Lu, Renjie
    Shen, Haihua
    Su, Yu
    Li, Huawei
    Li, Xiaowei
    [J]. 2019 IEEE 28TH ASIAN TEST SYMPOSIUM (ATS), 2019, : 111 - 116
  • [9] Trends and issues for security of home-network based on power line communication
    Nishi, RZ
    Morioka, H
    Sakurai, K
    [J]. AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, 2005, : 655 - 660
  • [10] Wireless Personal Area Network and PSO-Based Home Security System
    Gehlot, Anita
    Singh, Rajesh
    Kuchhal, Piyush
    Yadav, M. S.
    Sharma, Mahesh Kr.
    Choudhury, Sushabhan
    Singh, Bhupendra
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 2, 2016, 380 : 251 - 261