scholarly journals TZ-MRAS: A Remote Attestation Scheme for the Mobile Terminal Based on ARM TrustZone

2020 ◽  
Vol 2020 ◽  
pp. 1-16
Author(s):  
Ziwang Wang ◽  
Yi Zhuang ◽  
Zujia Yan

With the widespread use of mobile embedded devices in the Internet of Things, mobile office, and edge computing, security issues are becoming more and more serious. Remote attestation, one of the mobile security solutions, is a process of verifying the identity and integrity status of the remote computing device, through which the challenger determines whether the platform is trusted by discovering an unknown fingerprint. The remote attestation on the mobile terminal faces many security challenges presently because there is a lack of trusted roots, devices are heterogeneous, and hardware resources are strictly limited. To ARM’s mobile platform, we propose a mobile remote attestation scheme based on ARM TrustZone (TZ-MRAS), which uses the highest security authority of TrustZone to implement trusted attestation service. Compared with the existing mobile remote attestation scheme, it has the advantages of wide application, easy deployment, and low cost. To defend against the time-of-check-to-time-of-use (TOC-TOU) attack, we propose a probe-based dynamic integrity measurement model, ProbeIMA, which can dynamically detect unknown fingerprints that generate during kernel and process execution. Finally, according to the characteristics of the improved dynamic measurement model, that is, the ProbeIMA will expand the scale of the measurement dataset, an optimized stored measurement log construction algorithm based on the locality principle (LPSML) is proposed, which has the advantages of shortening the length of the authentication path and improving the verification efficiency of the platform configuration. As a proof of concept, we implemented a prototype for each service and made experimental evaluations. The experimental results show the proposed scheme has higher security and efficiency than some existing schemes.

2021 ◽  
Author(s):  
Benjamin Secker

Use of the Internet of Things (IoT) is poised to be the next big advancement in environmental monitoring. We present the high-level software side of a proof-of-concept that demonstrates an end-to-end environmental monitoring system,<br><div>replacing Greater Wellington Regional Council’s expensive data loggers with low-cost, IoT centric embedded devices, and it’s supporting cloud platform. The proof-of-concept includes a Micropython-based software stack running on an ESP32 microcontroller. The device software includes a built-in webserver that hosts a responsive Web App for configuration of the device. Telemetry data is sent over Vodafone’s NB-IoT network and stored in Azure IoT Central, where it can be visualised and exported.</div><br>While future development is required for a production-ready system, the proof-of-concept justifies the use of modern IoT technologies for environmental monitoring. The open source nature of the project means that the knowledge gained can be re-used and modified to suit the use-cases for other organisations.


2019 ◽  
Vol 1 (2) ◽  
pp. 16 ◽  
Author(s):  
Deepak Choudhary

The Internet of Things (IoT) enables the integration of data from virtual and physical worlds. It involves smart objects that can understand and react to their environment in a variety of industrial, commercial and household settings. As the IoT expands the number of connected devices, there is the potential to allow cyber-attackers into the physical world in which we live, as they seize on security holes in these new systems. New security issues arise through the heterogeneity  of  IoT  applications and devices and their large-scale deployment.


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Rachit ◽  
Shobha Bhatt ◽  
Prakash Rao Ragiri

AbstractThe Internet of Things (IoT) is a network of embedded devices that are uniquely identifiable and have embedded software required to communicate between the transient states. The purpose of this study is to explore discrete IoT security challenges pertaining to currently deployed IoT standards and protocols. We have presented a detailed review in this study that focuses on IoT's imminent security aspects, covering identification of risks pertaining to the current IoT system, novel security protocols, and security projects proffered in recent years. This work presents an updated review of the IoT architecture in the protocols and standards that are proffered for the next-gen IoT systems. A security-specific comparative analysis of protocols, standards, and proffered security models are presented as per IoT security requirements. This study elicits the need for standardization at the communication and data audit level, which exposes the hardware, software, and data to various threats and attacks. Our study reveals a need for protocols that are competent enough to be accorded for over one threat vector. This paper provides an insight into the latest security research trends, which will prove beneficial in the development of IoT security. The research outcomes can benefit the research community in IoT by integrating IoT-based devices' best security aspects.


Author(s):  
Bhawana Rudra ◽  
Thanmayee S.

The internet of things is a new paradigm where smart embedded devices are connected to the internet. In this context, wireless sensor networks (WSN) are becoming an important alternative for sensing and actuating critical applications like industrial automation, healthcare, etc. 6LoWPAN provides a means of carrying packet in the form of IPv6 over IEEE 802.15.4 and other networks. It provides end-to-end IPv6, and as such, it is able to provide direct connectivity to a huge variety of networks and to the internet. It uses an adaptation layer for fragmenting and reassembling of the IPv6 packets. Due to its low-cost communication network, it allows IoT connectivity with limited power and throughput. It can be used to overcome the challenges that are faced during the integration of WSN and IP protocols. This chapter briefly discusses IoT followed by an introduction to IPv6 and 6LoWPAN in detail along with architecture that suits IoT, 6LoWPAN mote design features and functions. It also focus on the advantages of LoWPAN with respect to IoT and its security along with smart city case studies.


2021 ◽  
Vol 17 (3) ◽  
pp. 1-25
Author(s):  
Nico Mexis ◽  
Nikolaos Athanasios Anagnostopoulos ◽  
Shuai Chen ◽  
Jan Bambach ◽  
Tolga Arul ◽  
...  

In recent years, a new generation of the Internet of Things (IoT 2.0) is emerging, based on artificial intelligence, the blockchain technology, machine learning, and the constant consolidation of pre-existing systems and subsystems into larger systems. In this work, we construct and examine a proof-of-concept prototype of such a system of systems, which consists of heterogeneous commercial off-the-shelf components, and utilises diverse communication protocols. We recognise the inherent need for lightweight security in this context, and address it by employing a low-cost state-of-the-art security solution. Our solution is based on a novel hardware and software co-engineering paradigm, utilising well-known software-based cryptographic algorithms, in order to maximise the security potential of the hardware security primitive (a Physical Unclonable Function) that is used as a security anchor. The performance of the proposed security solution is evaluated, proving its suitability even for real-time applications. Additionally, the Dolev-Yao attacker model is considered in order to assess the resilience of our solution towards attacks against the confidentiality, integrity, and availability of the examined system of systems. In this way, it is confirmed that the proposed solution is able to address the emerging security challenges of the oncoming era of systems of systems.


Author(s):  
Imran ◽  
◽  
Syed Mubashir Ali ◽  
Muhammad Alam ◽  
Mazliham Mohd Suud ◽  
...  

It is succinct as per the topic that it will focus on IoT-based security issues. The topic is emerging so contemplation is required to bridge scanty in this field. This study will focus on a rigorous literature review which will provide us scrupulous path to satisfy the industry need. In curtail IoT is not just about interconnecting embedded devices or gadgets to the Internet, however, it is also fast and continuously growing to improve the ease or satisfaction of life. The motive of IoT services is to connect the entire globe through sensors. This study reviews the IoT methodologies in the light of qualitative research. The data analysis and synthesis focus over the last three years (2018 to 2020) which are based on the PRISMA block diagram for understanding. The review identifies the IoT privacy and security issues from a different perspective and also finds out which security issue is mostly discussed in the last few years which elaborated as a basis for further research. After a review of this paper, we can easily understand the different problem faces of IoT devices with the help of comparative analysis using summary tables and graphical representation of IoT in the context of the privacy and security challenges and issues face of IoT devices. After vigorous contemplation, it is clear that in future most of the paper will discuss data security and privacy, confidentiality, and authenticity.


2005 ◽  
Vol 4 (2) ◽  
pp. 626-630 ◽  
Author(s):  
Rini Mahajan ◽  
Dr. Dheerendra Singh

Abstract- Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. It aims to construct a perfect system with powerful computing capability through a large number of relatively low-cost computing entity, and using the advanced business models like SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service) to distribute the powerful computing capacity to end users’ hands. Cloud Computing represents a new computing model that poses many demanding security issues at all levels, e.g., network, host, application, and data levels. The variety of the delivery models presents different security challenges depending on the model and consumers’ Quality of Service (QoS) requirements. Confidentiality, Integrity, Availability, Authenticity, and Privacy are essential concerns for both Cloud providers and consumers as well. This paper introduces the existing issues in cloud computing such as security, privacy, reliability and so on. This paper surveys the security problems of current cloud computing.


Author(s):  
Adiraju Prashantha Rao

The Internet of Things comprises billions of devices that can sense, communicate, compute and potentially actuate. The data generated by the Internet of Things are valuable and have the potential to drive innovative and novel applications which are one of the sources of Big Data. IoT connects real world objects to the internet using tiny sensors or embedded devices. One of the biggest advantages of the IoT is the increasing number of low-cost sensors available for many different kinds of functionalities. These sensors include a variety of devices and solutions. The trend is moving towards multi-sensor platforms that incorporate several sensing elements. In such environment, discovering, identifying, connecting and configuring sensor hardware are critical issues. The cloud-based IoT platforms can retrieve data from sensors. Therefore, IoT is a comprehensive inter-disciplinary technology, So, this chapter presents Better scheduling decisions should result in saving the time, utilization of resources and enable to meet the time constraints.


The participation of Internet devices in different communications through embedded technologies and the adaptive and interactive nature of each communication affects future development tools and applications. The majority of IoT devices are able to communicate over a wireless network, improving their usability and scalability quickly. But these usability improvements drew the attackers' attention to their personal advantages and created numerous security challenges for detection and protection. Because devices are exposed to the Internet to deliver services, they are particularly vulnerable to various threats to security and privacy.Therefore, a major concern on the Internet of Things (IoT) is the discovery of such abnormal activities that pose a security threat so that appropriate solutions can be provided with a high level of reliability. This paper will be based on a detailed overview of IoT wireless security issues and abnormal activity detection methods. It also provided an overview of the various anomaly detection models and security challenges for launching the IoT connection to the wireless network.


2021 ◽  
Author(s):  
Benjamin Secker

Use of the Internet of Things (IoT) is poised to be the next big advancement in environmental monitoring. We present the high-level software side of a proof-of-concept that demonstrates an end-to-end environmental monitoring system,<br><div>replacing Greater Wellington Regional Council’s expensive data loggers with low-cost, IoT centric embedded devices, and it’s supporting cloud platform. The proof-of-concept includes a Micropython-based software stack running on an ESP32 microcontroller. The device software includes a built-in webserver that hosts a responsive Web App for configuration of the device. Telemetry data is sent over Vodafone’s NB-IoT network and stored in Azure IoT Central, where it can be visualised and exported.</div><br>While future development is required for a production-ready system, the proof-of-concept justifies the use of modern IoT technologies for environmental monitoring. The open source nature of the project means that the knowledge gained can be re-used and modified to suit the use-cases for other organisations.


Sign in / Sign up

Export Citation Format

Share Document