Hardware Security of Fog End-Devices for the Internet of Things
Open Access
- 9 October 2020
- Vol. 20 (20), 5729
- https://doi.org/10.3390/s20205729
Abstract
The proliferation of the Internet of Things (IoT) caused new application needs to emerge as rapid response ability is missing in the current IoT end-devices. Therefore, Fog Computing has been proposed to be an edge component for the IoT networks as a remedy to this problem. In recent times, cyber-attacks are on the rise, especially towards infrastructure-less networks, such as IoT. Many botnet attack variants (Mirai, Torii, etc.) have shown that the tiny microdevices at the lower spectrum of the network are becoming a valued participant of a botnet, for further executing more sophisticated attacks against infrastructural networks. As such, the fog devices also need to be secured against cyber-attacks, not only software-wise, but also from hardware alterations and manipulations. Hence, this article first highlights the importance and benefits of fog computing for IoT networks, then investigates the means of providing hardware security to these devices with an enriched literature review, including but not limited to Hardware Security Module, Physically Unclonable Function, System on a Chip, and Tamper Resistant Memory.Keywords
Funding Information
- Swedish Foundation for International Cooperation in Research and Higher Education (IB2019- 8185)
- Horizon 2020 Framework Programme (773717)
This publication has 39 references indexed in Scilit:
- Online Input and State Estimation in Structural DynamicsConference Proceedings of the Society for Experimental Mechanics Series, 2016
- Fog Computing May Help to Save Energy in Cloud ComputingIEEE Journal on Selected Areas in Communications, 2016
- Privacy and Security in Internet of Things and Wearable DevicesIEEE Transactions on Multi-Scale Computing Systems, 2015
- Twenty Security Considerations for Cloud-Supported Internet of ThingsIEEE Internet of Things Journal, 2015
- A Survey of Fog ComputingPublished by Association for Computing Machinery (ACM) ,2015
- PUFs in Security Protocols: Attack Models and Security EvaluationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Physical Attacks and Tamper ResistancePublished by Springer Science and Business Media LLC ,2011
- Introduction to Side-Channel AttacksPublished by Springer Science and Business Media LLC ,2009
- Mechanism for software tamper resistancePublished by Association for Computing Machinery (ACM) ,2007
- Hardware-Assisted Circumvention of Self-Hashing Software Tamper ResistanceIEEE Transactions on Dependable and Secure Computing, 2005