Trusted Computing Architectures for IoT Devices

Research output: Contribution to book/Conference proceedings/Anthology/ReportConference contributionContributedpeer-review

Contributors

Abstract

Industry has been the tireless engine of prosperity. The introduction of the Internet acts as a booster to this engine, but, unfortunately, where money goes, crime follows. Big corporations spend a lot of money to secure their IT systems. Although Internet of Things (IoT) devices are not as big nor powerful as these IT systems, their power comes from their vast number. This is even more true if these devices are connected to the Internet. Industrial automation has adopted these IoT devices in the Industrial Internet of Things (IIoT), giving yet another boost to growth. However, the effort to secure IoT devices is nearly bleak in comparison to industry’s IT infrastructure. This work has the aim to illustrate that this does not need to be the case. In Trusted IoT, existing ideas in academia are translated into concrete use cases. Four use cases are handled: Environmental monitoring, IIoT on Coarse-Grained Reconfigurable Architectures (CGRAs), mobile robots and RISC-V driven unmanned aerial vehicles. Details are provided on the proof-of-concept implementations and results, addressing the security threats identified in the adversary model. Our findings highlight that solutions for securing IoT devices are feasible and achievable by focusing on the architectural level.

Details

Original languageEnglish
Title of host publicationApplied Reconfigurable Computing. Architectures, Tools, and Applications - 20th International Symposium, ARC 2024, Proceedings
EditorsIouliia Skliarova, Piedad Brox Jiménez, Mário Véstias, Pedro C. Diniz
PublisherSpringer, Cham
Pages241-254
Number of pages13
ISBN (print)978-3-031-55672-2
Publication statusPublished - 2024
Peer-reviewedYes

Publication series

SeriesLecture Notes in Computer Science
Volume14553
ISSN0302-9743

External IDs

Scopus 85188753383
ORCID /0000-0003-2571-8441/work/157318694
ORCID /0000-0002-6311-3251/work/157319089
Mendeley 145b881c-0f0f-320d-8196-f382644ad4d1

Keywords

Keywords

  • Security, Architectures, IoT