Skip to main content

Securing Cloud-Based IoT Applications with Trustworthy Sensing

  • Conference paper
  • First Online:
  • 1251 Accesses

Abstract

The omnipresence of resource-constrained sensors connected to the cloud has enabled numerous Internet of Things (IoT) applications. However, the trust in these IoT applications is severely compromised by security concerns. We introduce a lightweight and effective security approach for such applications by protecting the sensors. Our approach leverages Physically Unclonable Functions (PUF) on the sensor platform to ensure non-repudiation of sensed data and integrity of sensor hardware and firmware. We compare the performance of different PUF implementations on Atmel, ARM, and FPGA-based sensing platforms, analyze the security properties of the proposed protocols and determine the overhead in terms of latency, storage and logic area. Our evaluation shows that it only incurs insignificant overhead on low-end sensors.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Saroiu, S., Wolman, A.: I am a sensor, and i approve this message. In: Proceedings of Mobile Computing Systems & Applications, pp. 37–42. ACM (2010)

    Google Scholar 

  2. Dua, A., Bulusu, N., Feng, W.-C., Hu, W.: Towards trustworthy participatory sensing. In: Proceedings on Hot topics in security, p. 8. USENIX (2009)

    Google Scholar 

  3. Kapadia, A., Kotz, D., Triandopoulos, N.: Opportunistic sensing: security challenges for the new paradigm. In: Proceedings of Communication Systems and Networks and Workshops, pp. 1–10. IEEE (2009)

    Google Scholar 

  4. Haider, I., Höberl, M., Rinner, B.: Trusted sensors for participatory sensing and iot applications based on physically unclonable functions. In: Proceedings of Workshop on IoT Privacy, Trust, and Security, pp. 14–21. ACM (2016)

    Google Scholar 

  5. Winkler, T., Rinner, B.: Securing embedded smart cameras with trusted computing. EURASIP J. Wirel. Commun. Netw. 2011, 530354 (2011)

    Article  Google Scholar 

  6. Potkonjak, M., Meguerdichian, S., Wong, J.L.: Trusted sensors and remote sensing. In: Proceedings on Sensors. IEEE (2010)

    Google Scholar 

  7. Rosenfeld, K., Gavas, E., Karri, R.: Sensor physical unclonable functions. In: Proceedings on Hardware-Oriented Security and Trust (HOST). IEEE (2010)

    Google Scholar 

  8. Maes, R.: Physically unclonable functions: constructions, properties and applications. Ph.D. dissertation, University of KU Leuven (2012)

    Google Scholar 

  9. Tuyls, P., Batina, L.: RFID-tags for anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115–131. Springer, Heidelberg (2006). doi:10.1007/11605805_8

    Chapter  Google Scholar 

  10. Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. J. Cryptol. 22(1), 1–61 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  11. Cao, Y., Zhang, L., Zalivaka, S.S., Chang, C., Chen, S.: CMOS image sensor based physical unclonable function for coherent sensor-level authentication. IEEE Trans. Circu. Syst. I Regular Papers 62(11), 2629–2640 (2015)

    Article  MathSciNet  Google Scholar 

  12. Rajendran, J., Tang, J., Karri, R.: Securing pressure measurements using SensorPUFs. In: Proceedings of Circuits and Systems, pp. 1330–1333. IEEE (2016)

    Google Scholar 

Download references

Acknowledgment

This research has been funded by the Austrian Research Promotion Agency (FFG) under grant number 842432. Michael Höberl has implemented RO PUF and was supported by the FP7 research project MATTHEW under grant number 610436.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ihtesham Haider .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Haider, I., Rinner, B. (2018). Securing Cloud-Based IoT Applications with Trustworthy Sensing. In: Longo, A., et al. Cloud Infrastructures, Services, and IoT Systems for Smart Cities. IISSC CN4IoT 2017 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 189. Springer, Cham. https://doi.org/10.1007/978-3-319-67636-4_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67636-4_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67635-7

  • Online ISBN: 978-3-319-67636-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics