Device-specific security challenges and solution in IoT edge computing: a review
【Author】 Roy, Aditi; Kokila, J.; Ramasubramanian, N.; Begum, B. Shameedha
【Source】JOURNAL OF SUPERCOMPUTING
【影响因子】2.557
【Abstract】Rapid growth in IoT technology demands the need for the emergence of new IoT devices. IoT devices vary in terms of shape, size, storage, battery life, and computational power according to the specific purposes for which they are utilized. Also, since IoT devices are geographically dispersed, they are vulnerable to remote/physical attacks. Numerous research works are done to mitigate the challenges using software methods. However, in the last few decades, it is evident that software methods fail to protect IoT devices against hardware threats. The need for preventing hardware attacks drives the researchers to find a solution from a hardware perspective. This paper investigates and examines the security challenges faced by IoT devices by focusing on their hardware aspects. The outcome of the study is presented as a survey, signifying the existing solutions for different challenges. The survey primarily focuses on three major challenges: device authentication, IP protection, and hardware Trojan. Out of the analysis of 111 related schemes, it is clear that 30.6% are PUF-based schemes. A comparative study on the hardware parameter analysis of existing solutions has been performed. From this analysis, a few unresolved issues and directions for future research are identified. We expect this survey to be helpful for the research community working on hardware security challenges faced by IoT devices.
【Keywords】IoT; Hardware security; IP; Hardware Trojan; Device authentication
【发表时间】2023 2023 JUN 17
【收录时间】2023-07-14
【文献类型】综述
【主题类别】
区块链技术-协同技术-物联网
评论