Abstract
Third-party IP cores, outsourcing of IC fabrication to untrusted foundries, have increased the vulnerabilities in IC’s and reduced the trust factor of a designer on the manufactured chips. These vulnerabilities are a consequence of malicious modifications of the original design, which have the potential to cause catastrophic damage to the system which uses these IC’s. IoT networks require the least vulnerable and highly trustworthy IC’s. We present a detailed study of such malicious insertions. Next, we discuss the methods for their identification and we also propose some countermeasures from a VLSI aspect.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Syed A, Mary Lourde R (2016) Hardware security threats to DSP applications in an IoT network. In: 2016 IEEE international symposium on nanoelectronic and information systems (iNIS). IEEE, pp 62–66
Babar S, Stango A, Prasad N, Sen J, Prasad R (2011) Proposed embedded security framework for internet of things (IoT). In: IEEE international conference on wireless communication, vehicular technology, information theory and aerospace & electronic systems technology (Wireless VITAE), pp 1–5
Chakraborty RS, Narasimhan S, Bhunia S (2010) Hardware Trojan: threats and emerging solutions. http://www.trust-hub.org/resources/113
Chakraborty RS, Bhunia S (2009) Security against hardware Trojan through a novel application of design obfuscation. In: Proceedings of the 2009 international conference on computer-aided design, pp 113–116
Wang X, Salmani H, Tehranipoor M, Plusquellic J (2008) Hardware Trojan detection and isolation using current integration and localized current analysis
Rajendran J, Gavas E, Jimenez J, Padman V, Karri R (2010) Towards a comprehensive and systematic classification of hardware Trojans. In: Proceedings of 2010 IEEE international symposium on circuits and systems (ISCAS), pp 1871–1874
Abramovici M, Bradley P (2009) Integrated circuit security: new threats and solutions. In: Proceedings of the 5th annual workshop on cyber security and information intelligence research: cyber security and information intelligence challenges and strategies, CSIIRW ’09, ACM, New York, NY, USA, pp 55:1–55:3
McKelvey MA (1999) Embedded security processor. International Business Machines Corporation. Patent Number: 5,896,499 20, Apr 1999
Suh G, O’Donnell CW, Devadas S (2005) AEGIS: a single-chip secure processor. Inf Secur Tech Rep 10(2):63–73
ARM Processors. www.ti.com/lit/er/spmz637/spmz637.pdf
Love E, Jin Y, Makris Y (2011) Enhancing security via provably trustworthy hardware intellectual property. In: IEEE international symposium on hardware-oriented security and trust
Necula GC (1997) Proof-carrying code. In: Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on principles of programming languages, pp 106–119
Hicks M, Finnicum M, King ST, Martin MMK, Smith JM (2010) Overcoming an untrusted computing base: detecting and removing malicious hardware automatically. In: IEEE symposium on security and privacy, pp 159–172
Deng DY, Chan AH, Suh GE (2009) Hardware authentication leveraging performance limits in detailed simulations and emulations. In: Proceedings of the 46th annual design automation conference, DAC ’09, ACM, New York, NY, USA, pp 682–687
Beaumont M, Hopkins B, Newby T (2011) Hardware Trojans-prevention, detection, counter measures (a literature review) (No. DSTO-TN-1012). Defence Science and Technology Organisation Edinburgh (Australia) Command Control Communications and Intelligence Div
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Rajendran, S., Syed, A., Lourde, R.M. (2020). Security of an IoT Network: A VLSI Point of View. In: Ranganathan, G., Chen, J., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 89. Springer, Singapore. https://doi.org/10.1007/978-981-15-0146-3_75
Download citation
DOI: https://doi.org/10.1007/978-981-15-0146-3_75
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0145-6
Online ISBN: 978-981-15-0146-3
eBook Packages: EngineeringEngineering (R0)