Skip to main content

Trusted Computing Architectures for IoT Devices

  • Conference paper
  • First Online:
Applied Reconfigurable Computing. Architectures, Tools, and Applications (ARC 2024)

Abstract

Industry has been the tireless engine of prosperity. The introduction of the Internet acts as a booster to this engine, but, unfortunately, where money goes, crime follows. Big corporations spend a lot of money to secure their IT systems. Although Internet of Things (IoT) devices are not as big nor powerful as these IT systems, their power comes from their vast number. This is even more true if these devices are connected to the Internet. Industrial automation has adopted these IoT devices in the Industrial Internet of Things (IIoT), giving yet another boost to growth. However, the effort to secure IoT devices is nearly bleak in comparison to industry’s IT infrastructure. This work has the aim to illustrate that this does not need to be the case. In Trusted IoT, existing ideas in academia are translated into concrete use cases. Four use cases are handled: Environmental monitoring, IIoT on Coarse-Grained Reconfigurable Architectures (CGRAs), mobile robots and RISC-V driven unmanned aerial vehicles. Details are provided on the proof-of-concept implementations and results, addressing the security threats identified in the adversary model. Our findings highlight that solutions for securing IoT devices are feasible and achievable by focusing on the architectural level.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://www.microsoft.com/en-us/research/uploads/prod/2017/03/Seven-Properties-of-Highly-Secure-Devices-1st-Edition.pdf.

References

  1. L4Re - L4 runtime environment. https://os.inf.tu-dresden.de/L4Re/doc/index.html. Accessed 1 Dec 2023

  2. Ambrosin, M., Conti, M., Ibrahim, A., Neven, G., Sadeghi, A.R., Schunter, M.: SANA: secure and scalable aggregate network attestation. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS 2016 (2016)

    Google Scholar 

  3. Asokan, N., et al.: SEDA: scalable embedded device attestation. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, pp. 964–975 (2015)

    Google Scholar 

  4. Claire Wolf: PicoRV32 - A Size-Optimized RISC-V CPU. https://github.com/YosysHQ/picorv32. Accessed 1 Dec 2023

  5. Deb Nath, A.P., Ray, S., Basak, A., Bhunia, S.: System-on-chip security architecture and cad framework for hardware patch. In: 2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 733–738 (2018). https://doi.org/10.1109/ASPDAC.2018.8297409

  6. Dessouky, G., Sadeghi, A.R., Zeitouni, S.: SoK: secure FPGA multi-tenancy in the cloud: challenges and opportunities. In: 2021 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 487–506 (2021). https://doi.org/10.1109/EuroSP51992.2021.00040

  7. Dushku, E., Rabbani, M.M., Vliegen, J., Braeken, A., Mentens, N.: Prove: provable remote attestation for public verifiability. J. Inf. Secur. Appl. 75, 103448 (2023)

    Google Scholar 

  8. Fricke, F.: A novel top to bottom toolchain for generating virtual coarse-grained reconfigurable arrays. In: 2021 31st International Conference on Field-Programmable Logic and Applications (FPL), pp. 267–268 (2021). https://doi.org/10.1109/FPL53798.2021.00051

  9. Holzinger, P., Reichenbach, M.: The HERA methodology: reconfigurable logic in general-purpose computing. IEEE Access 9, 147212–147236 (2021). https://doi.org/10.1109/ACCESS.2021.3123874

    Article  Google Scholar 

  10. Huffmire, T., et al.: Moats and drawbridges: an isolation primitive for reconfigurable hardware based systems. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 281–295 (2007). https://doi.org/10.1109/SP.2007.28

  11. lowRISC: Ibex RISC-V Core. https://github.com/lowRISC/ibex. Accessed 1 Dec 2023

  12. Malche, T., Maheshwary, P., Kumar, R.: Environmental monitoring system for smart city based on secure internet of things (IoT) architecture. Wireless Pers. Commun. 107(4), 2143–2172 (2019)

    Article  Google Scholar 

  13. Mandebi Mbongue, J., Saha, S.K., Bobda, C.: Domain isolation in FPGA-accelerated cloud and data center applications. In: Proceedings of the 2021 on Great Lakes Symposium on VLSI, pp. 283–288 (2021)

    Google Scholar 

  14. Mansouri, M., Jaballah, W.B., Önen, M., Rabbani, M.M., Conti, M.: FADIA: fairness-driven collaborative remote attestation. In: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2021, pp. 60–71. Association for Computing Machinery, New York (2021). https://doi.org/10.1145/3448300.3468284

  15. Microchip: ATSHA204A, Fast, Secure, and Cost Effective Symmetric Authentication. https://www.microchip.com/en-us/product/atsha204a. Accessed 16 Oct 2023

  16. Microchip: PIC32CM5164LS00064. https://www.microchip.com/en-us/product/PIC32CM5164LS00064. Accessed 8 Dec 2023

  17. Mukherjee, B., et al.: Flexible IoT security middleware for end-to-end cloud-fog communication. Futur. Gener. Comput. Syst. 87, 688–703 (2018)

    Article  Google Scholar 

  18. Ouni, R., Saleem, K.: Framework for sustainable wireless sensor network based environmental monitoring. Sustainability 14(14), 8356 (2022)

    Google Scholar 

  19. Quectel: L96 Hardware Design. https://auroraevernet.ru/upload/iblock/36c/36c11c043ed14557903899eb54fc4657.pdf. Accessed 2 Oct 2023

  20. Rabbani, M.M., Vliegen, J., Winderickx, J., Conti, M., Mentens, N.: Shela: scalable heterogeneous layered attestation. IEEE Internet Things J. 6(6), 10240–10250 (2019). https://doi.org/10.1109/JIOT.2019.2936988

    Article  Google Scholar 

  21. Vliegen, J., Rabbani, M.M., Conti, M., Mentens, N.: SACHa: self-attestation of configurable hardware. In: 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 746–751 (2019). https://doi.org/10.23919/DATE.2019.8714775

  22. Zephyr Project memberss and individual contributors: NEORV32. https://github.com/stnolting/neorv32. Accessed 1 Dec 2023

  23. Zhang, J., Qu, G.: Recent attacks and defenses on FPGA-based systems. ACM Trans. Reconfigurable Technol. Syst. (TRETS) 12(3), 1–24 (2019)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This work is part of the COllective Research NETworking (CORNET) project “TrustedIOT: Trusted Computing Architectures for IoT Devices”. The Belgian partners are funded by VLAIO under grant number HBC.2021.0895, while the German partners are funded by the BMWi (Federal Ministry for Economic Affairs and Energy) under IGF-Project Number 343 EBG.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to An Braeken .

Editor information

Editors and Affiliations

Ethics declarations

Disclosure of Interests

The authors have no competing interests to declare that are relevant to the content of this article.

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Braeken, A. et al. (2024). Trusted Computing Architectures for IoT Devices. In: Skliarova, I., Brox Jiménez, P., Véstias, M., Diniz, P.C. (eds) Applied Reconfigurable Computing. Architectures, Tools, and Applications. ARC 2024. Lecture Notes in Computer Science, vol 14553. Springer, Cham. https://doi.org/10.1007/978-3-031-55673-9_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-55673-9_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-55672-2

  • Online ISBN: 978-3-031-55673-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics