Skip to main content

2020 | OriginalPaper | Buchkapitel

Security of an IoT Network: A VLSI Point of View

verfasst von : Sreeja Rajendran, Azhar Syed, R. Mary Lourde

Erschienen in: Inventive Communication and Computational Technologies

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Third-party IP cores, outsourcing of IC fabrication to untrusted foundries, have increased the vulnerabilities in IC’s and reduced the trust factor of a designer on the manufactured chips. These vulnerabilities are a consequence of malicious modifications of the original design, which have the potential to cause catastrophic damage to the system which uses these IC’s. IoT networks require the least vulnerable and highly trustworthy IC’s. We present a detailed study of such malicious insertions. Next, we discuss the methods for their identification and we also propose some countermeasures from a VLSI aspect.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Syed A, Mary Lourde R (2016) Hardware security threats to DSP applications in an IoT network. In: 2016 IEEE international symposium on nanoelectronic and information systems (iNIS). IEEE, pp 62–66 Syed A, Mary Lourde R (2016) Hardware security threats to DSP applications in an IoT network. In: 2016 IEEE international symposium on nanoelectronic and information systems (iNIS). IEEE, pp 62–66
2.
Zurück zum Zitat Babar S, Stango A, Prasad N, Sen J, Prasad R (2011) Proposed embedded security framework for internet of things (IoT). In: IEEE international conference on wireless communication, vehicular technology, information theory and aerospace & electronic systems technology (Wireless VITAE), pp 1–5 Babar S, Stango A, Prasad N, Sen J, Prasad R (2011) Proposed embedded security framework for internet of things (IoT). In: IEEE international conference on wireless communication, vehicular technology, information theory and aerospace & electronic systems technology (Wireless VITAE), pp 1–5
4.
Zurück zum Zitat Chakraborty RS, Bhunia S (2009) Security against hardware Trojan through a novel application of design obfuscation. In: Proceedings of the 2009 international conference on computer-aided design, pp 113–116 Chakraborty RS, Bhunia S (2009) Security against hardware Trojan through a novel application of design obfuscation. In: Proceedings of the 2009 international conference on computer-aided design, pp 113–116
5.
Zurück zum Zitat Wang X, Salmani H, Tehranipoor M, Plusquellic J (2008) Hardware Trojan detection and isolation using current integration and localized current analysis Wang X, Salmani H, Tehranipoor M, Plusquellic J (2008) Hardware Trojan detection and isolation using current integration and localized current analysis
6.
Zurück zum Zitat Rajendran J, Gavas E, Jimenez J, Padman V, Karri R (2010) Towards a comprehensive and systematic classification of hardware Trojans. In: Proceedings of 2010 IEEE international symposium on circuits and systems (ISCAS), pp 1871–1874 Rajendran J, Gavas E, Jimenez J, Padman V, Karri R (2010) Towards a comprehensive and systematic classification of hardware Trojans. In: Proceedings of 2010 IEEE international symposium on circuits and systems (ISCAS), pp 1871–1874
7.
Zurück zum Zitat Abramovici M, Bradley P (2009) Integrated circuit security: new threats and solutions. In: Proceedings of the 5th annual workshop on cyber security and information intelligence research: cyber security and information intelligence challenges and strategies, CSIIRW ’09, ACM, New York, NY, USA, pp 55:1–55:3 Abramovici M, Bradley P (2009) Integrated circuit security: new threats and solutions. In: Proceedings of the 5th annual workshop on cyber security and information intelligence research: cyber security and information intelligence challenges and strategies, CSIIRW ’09, ACM, New York, NY, USA, pp 55:1–55:3
8.
Zurück zum Zitat McKelvey MA (1999) Embedded security processor. International Business Machines Corporation. Patent Number: 5,896,499 20, Apr 1999 McKelvey MA (1999) Embedded security processor. International Business Machines Corporation. Patent Number: 5,896,499 20, Apr 1999
9.
Zurück zum Zitat Suh G, O’Donnell CW, Devadas S (2005) AEGIS: a single-chip secure processor. Inf Secur Tech Rep 10(2):63–73 Suh G, O’Donnell CW, Devadas S (2005) AEGIS: a single-chip secure processor. Inf Secur Tech Rep 10(2):63–73
11.
Zurück zum Zitat Love E, Jin Y, Makris Y (2011) Enhancing security via provably trustworthy hardware intellectual property. In: IEEE international symposium on hardware-oriented security and trust Love E, Jin Y, Makris Y (2011) Enhancing security via provably trustworthy hardware intellectual property. In: IEEE international symposium on hardware-oriented security and trust
12.
Zurück zum Zitat Necula GC (1997) Proof-carrying code. In: Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on principles of programming languages, pp 106–119 Necula GC (1997) Proof-carrying code. In: Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on principles of programming languages, pp 106–119
13.
Zurück zum Zitat Hicks M, Finnicum M, King ST, Martin MMK, Smith JM (2010) Overcoming an untrusted computing base: detecting and removing malicious hardware automatically. In: IEEE symposium on security and privacy, pp 159–172 Hicks M, Finnicum M, King ST, Martin MMK, Smith JM (2010) Overcoming an untrusted computing base: detecting and removing malicious hardware automatically. In: IEEE symposium on security and privacy, pp 159–172
14.
Zurück zum Zitat Deng DY, Chan AH, Suh GE (2009) Hardware authentication leveraging performance limits in detailed simulations and emulations. In: Proceedings of the 46th annual design automation conference, DAC ’09, ACM, New York, NY, USA, pp 682–687 Deng DY, Chan AH, Suh GE (2009) Hardware authentication leveraging performance limits in detailed simulations and emulations. In: Proceedings of the 46th annual design automation conference, DAC ’09, ACM, New York, NY, USA, pp 682–687
15.
Zurück zum Zitat Beaumont M, Hopkins B, Newby T (2011) Hardware Trojans-prevention, detection, counter measures (a literature review) (No. DSTO-TN-1012). Defence Science and Technology Organisation Edinburgh (Australia) Command Control Communications and Intelligence Div Beaumont M, Hopkins B, Newby T (2011) Hardware Trojans-prevention, detection, counter measures (a literature review) (No. DSTO-TN-1012). Defence Science and Technology Organisation Edinburgh (Australia) Command Control Communications and Intelligence Div
Metadaten
Titel
Security of an IoT Network: A VLSI Point of View
verfasst von
Sreeja Rajendran
Azhar Syed
R. Mary Lourde
Copyright-Jahr
2020
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-0146-3_75