Hardware Security in the Context of Internet of Things

Author(s):  
Pranesh Santikellur ◽  
Rajat Subhra Chakraborty ◽  
Jimson Mathew
Sensors ◽  
2020 ◽  
Vol 20 (20) ◽  
pp. 5729 ◽  
Author(s):  
Ismail Butun ◽  
Alparslan Sari ◽  
Patrik Österberg

The proliferation of the Internet of Things (IoT) caused new application needs to emerge as rapid response ability is missing in the current IoT end-devices. Therefore, Fog Computing has been proposed to be an edge component for the IoT networks as a remedy to this problem. In recent times, cyber-attacks are on the rise, especially towards infrastructure-less networks, such as IoT. Many botnet attack variants (Mirai, Torii, etc.) have shown that the tiny microdevices at the lower spectrum of the network are becoming a valued participant of a botnet, for further executing more sophisticated attacks against infrastructural networks. As such, the fog devices also need to be secured against cyber-attacks, not only software-wise, but also from hardware alterations and manipulations. Hence, this article first highlights the importance and benefits of fog computing for IoT networks, then investigates the means of providing hardware security to these devices with an enriched literature review, including but not limited to Hardware Security Module, Physically Unclonable Function, System on a Chip, and Tamper Resistant Memory.


Author(s):  
Ishfaq Sultan ◽  
Mohammad Tariq Banday

The spatial ubiquity and the huge number of employed nodes monitoring the surroundings, individuals, and devices makes security a key challenge in IoT. Serious security apprehensions are evolving in terms of data authenticity, integrity, and confidentiality. Consequently, IoT requires security to be assured down to the hardware level, as the authenticity and the integrity need to be guaranteed in terms of the hardware implementation of each IoT node. Physically unclonable functions recreate the keys only while the chip is being powered on, replacing the conventional key storage which requires storing information. Compared to extrinsic key storage, they are able to generate intrinsic keys and are far less susceptible against physical attacks. Physically unclonable functions have drawn considerable attention due to their ability to economically introduce hardware-level security into individual silicon dice. This chapter introduces the notion of physically unclonable functions, their scenarios for hardware security in IoT devices, and their interaction with traditional cryptography.


2016 ◽  
Vol 2016 (1) ◽  
pp. 000364-000367
Author(s):  
Bruce Kim ◽  
Sang-Bock Cho

Abstract This paper describes the design and modeling of through-silicon via (TSV)-based high-density 3D inductors for Internet of Things (IoT) applications and presents some possible challenges for TSV-based inductors in IoT applications. For cybersecurity infrastructure, we designed IoT with hardware security in mind. We provide a secure design for Internet of Things based on secure 3D inductors and then show case studies of high-density RF packages with TSV-based inductors that require hardware security, such as military applications. We use ferromagnetic materials to achieve high inductance with good quality factor.


Author(s):  
Ishfaq Sultan ◽  
Mohammad Tariq Banday

The spatial ubiquity and the huge number of employed nodes monitoring the surroundings, individuals, and devices makes security a key challenge in IoT. Serious security apprehensions are evolving in terms of data authenticity, integrity, and confidentiality. Consequently, IoT requires security to be assured down to the hardware level, as the authenticity and the integrity need to be guaranteed in terms of the hardware implementation of each IoT node. Physically unclonable functions recreate the keys only while the chip is being powered on, replacing the conventional key storage which requires storing information. Compared to extrinsic key storage, they are able to generate intrinsic keys and are far less susceptible against physical attacks. Physically unclonable functions have drawn considerable attention due to their ability to economically introduce hardware-level security into individual silicon dice. This chapter introduces the notion of physically unclonable functions, their scenarios for hardware security in IoT devices, and their interaction with traditional cryptography.


Author(s):  
Mohamed A. Bahnasawi ◽  
Khalid Ibrahim ◽  
Ahmed Mohamed ◽  
Mohamed Khalifa Mohamed ◽  
Ahmed Moustafa ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document