Abstract
Industry has been the tireless engine of prosperity. The introduction of the Internet acts as a booster to this engine, but, unfortunately, where money goes, crime follows. Big corporations spend a lot of money to secure their IT systems. Although Internet of Things (IoT) devices are not as big nor powerful as these IT systems, their power comes from their vast number. This is even more true if these devices are connected to the Internet. Industrial automation has adopted these IoT devices in the Industrial Internet of Things (IIoT), giving yet another boost to growth. However, the effort to secure IoT devices is nearly bleak in comparison to industry’s IT infrastructure. This work has the aim to illustrate that this does not need to be the case. In Trusted IoT, existing ideas in academia are translated into concrete use cases. Four use cases are handled: Environmental monitoring, IIoT on Coarse-Grained Reconfigurable Architectures (CGRAs), mobile robots and RISC-V driven unmanned aerial vehicles. Details are provided on the proof-of-concept implementations and results, addressing the security threats identified in the adversary model. Our findings highlight that solutions for securing IoT devices are feasible and achievable by focusing on the architectural level.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
L4Re - L4 runtime environment. https://os.inf.tu-dresden.de/L4Re/doc/index.html. Accessed 1 Dec 2023
Ambrosin, M., Conti, M., Ibrahim, A., Neven, G., Sadeghi, A.R., Schunter, M.: SANA: secure and scalable aggregate network attestation. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS 2016 (2016)
Asokan, N., et al.: SEDA: scalable embedded device attestation. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, pp. 964–975 (2015)
Claire Wolf: PicoRV32 - A Size-Optimized RISC-V CPU. https://github.com/YosysHQ/picorv32. Accessed 1 Dec 2023
Deb Nath, A.P., Ray, S., Basak, A., Bhunia, S.: System-on-chip security architecture and cad framework for hardware patch. In: 2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 733–738 (2018). https://doi.org/10.1109/ASPDAC.2018.8297409
Dessouky, G., Sadeghi, A.R., Zeitouni, S.: SoK: secure FPGA multi-tenancy in the cloud: challenges and opportunities. In: 2021 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 487–506 (2021). https://doi.org/10.1109/EuroSP51992.2021.00040
Dushku, E., Rabbani, M.M., Vliegen, J., Braeken, A., Mentens, N.: Prove: provable remote attestation for public verifiability. J. Inf. Secur. Appl. 75, 103448 (2023)
Fricke, F.: A novel top to bottom toolchain for generating virtual coarse-grained reconfigurable arrays. In: 2021 31st International Conference on Field-Programmable Logic and Applications (FPL), pp. 267–268 (2021). https://doi.org/10.1109/FPL53798.2021.00051
Holzinger, P., Reichenbach, M.: The HERA methodology: reconfigurable logic in general-purpose computing. IEEE Access 9, 147212–147236 (2021). https://doi.org/10.1109/ACCESS.2021.3123874
Huffmire, T., et al.: Moats and drawbridges: an isolation primitive for reconfigurable hardware based systems. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 281–295 (2007). https://doi.org/10.1109/SP.2007.28
lowRISC: Ibex RISC-V Core. https://github.com/lowRISC/ibex. Accessed 1 Dec 2023
Malche, T., Maheshwary, P., Kumar, R.: Environmental monitoring system for smart city based on secure internet of things (IoT) architecture. Wireless Pers. Commun. 107(4), 2143–2172 (2019)
Mandebi Mbongue, J., Saha, S.K., Bobda, C.: Domain isolation in FPGA-accelerated cloud and data center applications. In: Proceedings of the 2021 on Great Lakes Symposium on VLSI, pp. 283–288 (2021)
Mansouri, M., Jaballah, W.B., Önen, M., Rabbani, M.M., Conti, M.: FADIA: fairness-driven collaborative remote attestation. In: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2021, pp. 60–71. Association for Computing Machinery, New York (2021). https://doi.org/10.1145/3448300.3468284
Microchip: ATSHA204A, Fast, Secure, and Cost Effective Symmetric Authentication. https://www.microchip.com/en-us/product/atsha204a. Accessed 16 Oct 2023
Microchip: PIC32CM5164LS00064. https://www.microchip.com/en-us/product/PIC32CM5164LS00064. Accessed 8 Dec 2023
Mukherjee, B., et al.: Flexible IoT security middleware for end-to-end cloud-fog communication. Futur. Gener. Comput. Syst. 87, 688–703 (2018)
Ouni, R., Saleem, K.: Framework for sustainable wireless sensor network based environmental monitoring. Sustainability 14(14), 8356 (2022)
Quectel: L96 Hardware Design. https://auroraevernet.ru/upload/iblock/36c/36c11c043ed14557903899eb54fc4657.pdf. Accessed 2 Oct 2023
Rabbani, M.M., Vliegen, J., Winderickx, J., Conti, M., Mentens, N.: Shela: scalable heterogeneous layered attestation. IEEE Internet Things J. 6(6), 10240–10250 (2019). https://doi.org/10.1109/JIOT.2019.2936988
Vliegen, J., Rabbani, M.M., Conti, M., Mentens, N.: SACHa: self-attestation of configurable hardware. In: 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 746–751 (2019). https://doi.org/10.23919/DATE.2019.8714775
Zephyr Project memberss and individual contributors: NEORV32. https://github.com/stnolting/neorv32. Accessed 1 Dec 2023
Zhang, J., Qu, G.: Recent attacks and defenses on FPGA-based systems. ACM Trans. Reconfigurable Technol. Syst. (TRETS) 12(3), 1–24 (2019)
Acknowledgements
This work is part of the COllective Research NETworking (CORNET) project “TrustedIOT: Trusted Computing Architectures for IoT Devices”. The Belgian partners are funded by VLAIO under grant number HBC.2021.0895, while the German partners are funded by the BMWi (Federal Ministry for Economic Affairs and Energy) under IGF-Project Number 343 EBG.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Ethics declarations
Disclosure of Interests
The authors have no competing interests to declare that are relevant to the content of this article.
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Braeken, A. et al. (2024). Trusted Computing Architectures for IoT Devices. In: Skliarova, I., Brox Jiménez, P., Véstias, M., Diniz, P.C. (eds) Applied Reconfigurable Computing. Architectures, Tools, and Applications. ARC 2024. Lecture Notes in Computer Science, vol 14553. Springer, Cham. https://doi.org/10.1007/978-3-031-55673-9_17
Download citation
DOI: https://doi.org/10.1007/978-3-031-55673-9_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-55672-2
Online ISBN: 978-3-031-55673-9
eBook Packages: Computer ScienceComputer Science (R0)