Visible to the public Hardware security assurance in emerging IoT applications

TitleHardware security assurance in emerging IoT applications
Publication TypeConference Paper
Year of Publication2016
AuthorsDofe, J., Frey, J., Yu, Q.
Conference Name2016 IEEE International Symposium on Circuits and Systems (ISCAS)
Keywordsaccumulated partial guessing entropy, Cisco, composability, computation power, cryptography, Hardware, hardware attacks, hardware security, hardware security assurance, hardware trojan, Internet of Things, Internet-of-Things (IoT), invasive software, IoT connected devices, IoT processing unit, low-cost dynamic permutation method, network on chip, network on chip security, network-on-chip, pubcrawl, Radiation detectors, Resiliency, Scalability, Security Assurance, side-channel analysis attack, thwart hardware Trojan attack, Trojan horses
AbstractThe Internet of Things (IoT) offers a more advanced service than a single device or an isolated system, as IoT connects diverse components, such as sensors, actuators, and embedded devices through the internet. As predicted by Cisco, there will be 50 billion IoT connected devices by 2020. Integration of such a tremendous number of devices into IoT potentially brings in a new concern, system security. In this work, we review two typical hardware attacks that can harm the emerging IoT applications. As IoT devices typically have limited computation power and need to be energy efficient, sophisticated cryptographic algorithms and authentication protocols are not suitable for every IoT device. To simultaneously thwart hardware Trojan and side-channel analysis attacks, we propose a low-cost dynamic permutation method for IoT devices. Experimental results show that the proposed method achieves 5.8X higher accumulated partial guessing entropy than the baseline, thus strengthening the IoT processing unit against hardware attacks.
DOI10.1109/ISCAS.2016.7538981
Citation Keydofe_hardware_2016-1