Skip to main content

Security of an IoT Network: A VLSI Point of View

  • Conference paper
  • First Online:
Inventive Communication and Computational Technologies

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 89))

  • 2321 Accesses

Abstract

Third-party IP cores, outsourcing of IC fabrication to untrusted foundries, have increased the vulnerabilities in IC’s and reduced the trust factor of a designer on the manufactured chips. These vulnerabilities are a consequence of malicious modifications of the original design, which have the potential to cause catastrophic damage to the system which uses these IC’s. IoT networks require the least vulnerable and highly trustworthy IC’s. We present a detailed study of such malicious insertions. Next, we discuss the methods for their identification and we also propose some countermeasures from a VLSI aspect.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Syed A, Mary Lourde R (2016) Hardware security threats to DSP applications in an IoT network. In: 2016 IEEE international symposium on nanoelectronic and information systems (iNIS). IEEE, pp 62–66

    Google Scholar 

  2. Babar S, Stango A, Prasad N, Sen J, Prasad R (2011) Proposed embedded security framework for internet of things (IoT). In: IEEE international conference on wireless communication, vehicular technology, information theory and aerospace & electronic systems technology (Wireless VITAE), pp 1–5

    Google Scholar 

  3. Chakraborty RS, Narasimhan S, Bhunia S (2010) Hardware Trojan: threats and emerging solutions. http://www.trust-hub.org/resources/113

  4. Chakraborty RS, Bhunia S (2009) Security against hardware Trojan through a novel application of design obfuscation. In: Proceedings of the 2009 international conference on computer-aided design, pp 113–116

    Google Scholar 

  5. Wang X, Salmani H, Tehranipoor M, Plusquellic J (2008) Hardware Trojan detection and isolation using current integration and localized current analysis

    Google Scholar 

  6. Rajendran J, Gavas E, Jimenez J, Padman V, Karri R (2010) Towards a comprehensive and systematic classification of hardware Trojans. In: Proceedings of 2010 IEEE international symposium on circuits and systems (ISCAS), pp 1871–1874

    Google Scholar 

  7. Abramovici M, Bradley P (2009) Integrated circuit security: new threats and solutions. In: Proceedings of the 5th annual workshop on cyber security and information intelligence research: cyber security and information intelligence challenges and strategies, CSIIRW ’09, ACM, New York, NY, USA, pp 55:1–55:3

    Google Scholar 

  8. McKelvey MA (1999) Embedded security processor. International Business Machines Corporation. Patent Number: 5,896,499 20, Apr 1999

    Google Scholar 

  9. Suh G, O’Donnell CW, Devadas S (2005) AEGIS: a single-chip secure processor. Inf Secur Tech Rep 10(2):63–73

    Google Scholar 

  10. ARM Processors. www.ti.com/lit/er/spmz637/spmz637.pdf

  11. Love E, Jin Y, Makris Y (2011) Enhancing security via provably trustworthy hardware intellectual property. In: IEEE international symposium on hardware-oriented security and trust

    Google Scholar 

  12. Necula GC (1997) Proof-carrying code. In: Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on principles of programming languages, pp 106–119

    Google Scholar 

  13. Hicks M, Finnicum M, King ST, Martin MMK, Smith JM (2010) Overcoming an untrusted computing base: detecting and removing malicious hardware automatically. In: IEEE symposium on security and privacy, pp 159–172

    Google Scholar 

  14. Deng DY, Chan AH, Suh GE (2009) Hardware authentication leveraging performance limits in detailed simulations and emulations. In: Proceedings of the 46th annual design automation conference, DAC ’09, ACM, New York, NY, USA, pp 682–687

    Google Scholar 

  15. Beaumont M, Hopkins B, Newby T (2011) Hardware Trojans-prevention, detection, counter measures (a literature review) (No. DSTO-TN-1012). Defence Science and Technology Organisation Edinburgh (Australia) Command Control Communications and Intelligence Div

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Mary Lourde .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rajendran, S., Syed, A., Lourde, R.M. (2020). Security of an IoT Network: A VLSI Point of View. In: Ranganathan, G., Chen, J., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 89. Springer, Singapore. https://doi.org/10.1007/978-981-15-0146-3_75

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0146-3_75

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0145-6

  • Online ISBN: 978-981-15-0146-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics